This is the original version of the CSSIA CompTIA Security+® Lab Series. We recommend that you use the latest version, NDG Security+ v3, when starting a new class.

CSSIA - NSF Logo

These lab exercises were developed through a grant initiative by the Center for Systems Security and Information Assurance (CSSIA) and the Network Development Group (NDG), funded by the National Science Foundation’s (NSF) Advanced Technological Education (ATE) program Department of Undergraduate Education (DUE) Award No. 0702872 and 1002746. This series of lab exercises is intended to support courseware for CompTIA Security+® certification.

CSSIA CompTIA Security+® Labs - v1 are supported in NETLAB+ using the Multi-purpose Security (MSEC) Pod.

Enabling the Labs

To enable the CSSIA CompTIA Security+® Labs - v1, check the box for "CompTIA Security+® Labs - v1" in the class settings. This must be done for each class requiring access to the labs.

We recommend you use the new version, CSSIA CompTIA Security+® Labs - v2, when starting a new course.

MSEC

Using the Labs

Always select the correct lab exercise for the lab being performed. Students or teams should schedule the correct lab exercise from the catalog. NETLAB+ will only show those labs for which the required pod type is available. A lab that works on different pod types may appear more than once if your system is so equipped. Instructors should select the correct lab from the Exercise tab during instructor-led lab reservations. This can be done as many times as needed during the reservation.

Importance of Choosing the Correct Lab Exercise

Several of the labs may differ from the standard pod topologies. This is handled by NETLAB+ Dynamic VLAN Mapping technology. Always select the correct lab exercise for the actual lab. This insures that NETLAB+ will set up VLANs on the control switch such that lab devices and PCs are placed in the correct LAN segment for the exercise being performed. Selecting the correct exercise will also make the completed lab output easier to find in the archive.

CSSIA CompTIA Security+® Supported Labs - v1

Lab Title CSSIA CompTIA Security+®Domain Tasks Included
1 Network Devices and Technologies - Capturing Network Traffic Network Security
  • Using tcpdump to Capture Network Traffic
  • Capturing and Analyzing Traffic with Wireshark
  • Capturing and Analyzing Traffic with Network Miner
2 Secure Network Administration Principles - Log Analysis Network Security
  • Log Analysis in Linux Using Grep
  • Log Analysis in Linux Using Gawk
  • Log Analysis in Windows Using Find
3 Protocols and Default Network Ports - Transferring Data Using TCP/IP Network Security
  • Using Hyper Text Transfer Protocol (HTTP) to Transfer Files
  • Using Fire Transfer Protocol (FTP) to Transfer Files
  • Transferring Files Securely Using SCP
4 Protocols and Default Network Ports - Connecting to a Remote System Network Security
  • Connecting to a Windows system Through the Command Line
  • Connecting to a Linux System Through the Command Line
  • Analyzing Remote Connections in Network Traffic
5 Secure Implementation of Wireless Networking Network Security
  • Examining Plain Text Traffic
  • Cracking and Examining WEP Traffic
  • Cracking and Examining WPA Traffic
6 Incident Response Procedures Compliance and Operational Security
  • Using db_autopwn to Attack a Remote System
  • Collecting Volatile Data
  • Viewing Network Logs
7 Analyze and Differentiate Types of Malware Threats and Vulnerabilities
  • Using Netcat to Send a Reverse Shell
  • Using Ncat to Send a Reverse Shell
  • Sending a Bash Shell to a Windows Machine using NetCat
8 Analyze and Differentiate Types of Attacks Using Window Commands Threats and Vulnerabilities
  • Viewing Network Resources
  • Using PSEXEC to Connect to a Remote System
  • Stopping, Starting, and Removing Services
9 Analyze and Differentiate Types of Application Attacks Threats and Vulnerabilities
  • Scanning the Network for Vulnerable Systems
  • Introduction to Metasploit, a Framework for Exploitation
  • Attacking a Remote System Utilizing Armitage
  • Post Exploitation of the Remote System
10 Mitigation and Deterrent Techniques - Anti Forensic Threats and Vulnerabilities
  • The Windows Event Viewer
  • Enabling Auditing
  • Clearing the Event Logs
11 Mitigation and Deterrent Techniques - Password Cracking Threats and Vulnerabilities
  • Cracking Linux Passwords
  • Cracking Windows Passwords
  • Cracking Windows Passwords with Cain
12 Discovering Security Threats and Vulnerabilities Threats and Vulnerabilities
  • Scanning the Network for Vulnerable Systems
  • Using Nessus
  • Introduction to Metasploit, a Framework for Exploration
13 Importance of Data Security - Data Theft Application, Data and Host Security
  • Using Metasploit to Attack a Remote System
  • Stealing Data using FTP and HTTP
  • Stealing Data using Meterpreter
14 Importance of Data Security - Securing Data Using Encryption Software Application, Data and Host Security
  • Installing TrueCrypt
  • Creating a TrueCrypt Container
  • Opening and Viewing Data within a TrueCrypt Container
15 Authentication, Authorization and Access Control Access Control and Identity Management
  • Adding Users, Groups, and Passwords
  • Symbolic Permissions
  • Absolute Permissions
16 General Cryptography Concepts Cryptography
  • Hiding a Picture within a Picture Using S-Tools
  • Hiding a Media File within a Picture Using S-Tools
  • Revealing Hidden Data Using S-Tools

About the Lab Author

Jesse Varsalone has 21 years of teaching experience and has taught computer classes for The Community College of Baltimore County, Champlain College, Johns Hopkins University, Stevenson University, Towson University, University of Maryland Baltimore County and University of Maryland University College. Jesse has taught courses in Computer Security, Hacking, Intrusions, Forensics and Network Administration. Jesse Varsalone holds the CISSP, MCT, CTT+, CEH, Security+ and other certifications. His latest book, Defense against the Black Arts: How Hackers Do What They Do and How to Protect against It, is available at http://tinyurl.com/jessebook.