This lab will demonstrate the use of various Tools, Techniques, and Procedures to create a backdoor on the target host that has already been exploited.
The last step of a penetration test is cleaning up all of the changes made to the target system. This lab will demonstrate the use of various Tools, Techniques, and Procedures to clean up the target host that has been exploited.
This lesson will provide an introduction into Linux user accounts. By the end of this lesson, you should be comfortable creating, deleting, and managing, user accounts. Groups and Permissions will also be introduced.
In this lesson, the student will learn the fundamentals of networking. The student will use the Linux operating system as a tool to understand networking concepts. By now, the student should understand the Internet, ethernet connections, and Wi-Fi. By the end of this lesson, the student should understand how machines communicate with each other in a network.
This laboratory exercise will provide a fundamental understanding of the Linux Terminal (also referred to as the command-line), a powerful tool for all cyber security professionals. The terminal allows a user to manipulate files, create users, and run terminal programs to perform certain tasks.
For the purposes of this lab, we will be focusing on the Linux filesystem and directories.
In this exercise, we will explore some various tools in the Linux operating system. Though Kali Linux comes preloaded with many tools for security practice, it is like all other operating systems with web browser applications and text editors. These tools, however, can serve every security personnel in some administrative way.
This laboratory exercise will expand your understanding of the Linux Terminal (sometimes called the “shell”, command-line, or CLI) and introduction to a powerful set of tools all cyber security professionals should fully embrace. Linux and UN*X based operating systems are comprised of thousands of “many small tools that do one thing well,” as the saying goes – a realization that only more seasoned experts fully appreciate.
This is the third module in the Cyber-Physical Industry course; however, it can be taught as a standalone module. The purpose of this module is to introduce students to an integrated perspective on security, safety, and risk that has quality management at its center.
This is the first module in the Cyber Intelligence: Analyzing Cyber Adversaries and Threats course. The purpose of this module is to introduce students to trends and challenges in cyber threats. The material is approached from the perspective of what are examples of cyber threats, how are they impacting on cyber security and how are we responding.
The purpose of this module is to introduce students to the use of Kali Linux to perform a penetration test against a target system in a controlled lab environment. The material is approached from the perspective of what an actual penetration tester would do in a real-life penetration testing scenario.