The CyberOps Associate labs help prepare learners to earn the Cisco Certified Cyberops Associate Certification. Learners will gain hands-on practice in how to monitor, detect, and respond to cybersecurity threats. Topics include security concepts, security monitoring, host-based analysis, network intrusion analysis, and security policies procedures.
Labs |
---|
3.0.3 Lab - Identify Running Processes |
3.2.11 Lab - Exploring Processes, Threads, Handles, and Windows Registry |
3.3.10 Lab - Create User Accounts |
3.3.11 Lab - Using Windows PowerShell |
3.3.12 Lab - Windows Task Manager |
3.3.13 Lab - Monitor and Manage System Resources in Windows |
4.2.6 Lab - Working with Text Files in the CLI |
4.2.7 Lab - Getting Familiar with the Linux Shell |
4.3.4 Lab - Linux Servers |
4.4.4 Lab - Locating Log Files |
4.5.4 Lab - Navigating the Linux Filesystem and Permission Settings |
5.1.5 Lab - Tracing a Route |
5.3.7 Lab - Introduction to Wireshark |
8.2.8 Lab - Using Wireshark to Examine Ethernet Frames |
9.2.6 Lab - Using Wireshark to Observe the TCP 3-Way Handshake |
9.3.8 Lab - Exploring Nmap |
10.2.7 Lab - Using Wireshark to Examine a UDP DNS Capture |
10.4.3 Lab - Using Wireshark to Examine TCP and UDP Captures |
10.6.7 Lab - Using Wireshark to Examine HTTP and HTTPS Traffic |
17.1.7 Lab - Exploring DNS Traffic |
17.2.6 Lab - Attacking a mySQL Database |
17.2.7 Lab - Reading Server Logs |
21.0.3 Lab - Creating Codes |
21.1.6 Lab - Hashing Things Out |
21.2.10 Lab - Encrypting and Decrypting Data Using OpenSSL |
21.2.11 Lab - Encrypting and Decrypting Data Using a Hacker Tool |
21.2.12 Lab - Examining Telnet and SSH in Wireshark |
21.4.7 Lab - Certificate Authority Stores |
26.1.7 Lab - Snort and Firewall Rules |
27.1.5 Lab - Convert Data into a Universal Format |
27.2.9 Lab - Regular Expression Tutorial |
27.2.10 Lab - Extract an Executable from a PCAP |
27.2.12 Lab - Interpret HTTP and DNS Data to Isolate Threat Actor |
27.2.14 Lab - Isolate Compromised Host Using 5-Tuple |
27.2.15 Lab - Investigating a Malware Exploit |
27.2.16 Lab - Investigating an Attack on a Windows Host |
No Lab: Launch Cyber Range |
NDG Online provides technical support specifically related to the functionality of the lab environment only. Any questions or concerns regarding the learning material or lab content must be directed to your instructor. Self-paced learners who find they require additional support are encouraged to seek out a course at a local academic institution.