Network Essentials Labs

Level: Foundation

Confidently design, configure, manage, troubleshoot, and analyze traffic of any wired and wireless networks. This Network Essentials lab bundle, which includes 16 distinct, hands-on labs focused on security that will prepare you to work with a variety of hardware, software and networks, making you a more well-rounded IT professional.

This lab bundle is designed to align to the learning objectives found in CompTIA’s Network+ certification — Course 2032, Certified Network Defender (CND) Certification Training.

Key Features of this Training

  • 6-month access to CYBRScore Network Essentials Labs
  • Content aligned to CompTIA’s Network+ certification

You Will Learn How To

  • Practice the objectives presented in CompTIA’s Network+ certification
  • Confidently design, configure, manage, troubleshoot, and analyze traffic of any wired and wireless networks
  • Work with a variety of hardware, software, and networks

Choose the Training Solution That Best Fits Your Individual Needs or Organizational Goals

ON DEMAND

On Demand

6-Month Access to:

  • Pre-configured labs with lab guides
  • Gain hands-on skills in topic areas aligned to CompTIA’s Network+ certification
View Course Details

Standard $125

Government $125

ADD TO CART

PRODUCT #E005

Save More On Training with FlexVouchers – A Unique Training Savings Account

Our FlexVouchers help you lock in your training budgets without having to commit to a traditional 1 voucher = 1 course classroom-only attendance. FlexVouchers expand your purchasing power to modern blended solutions and services that are completely customizable. For details, please call 888-843-8733 or chat live.

On Demand

Important Course Information

  • CYBRScore Labs Description

    Practice your skills in a virtual network environment. Learn by doing wherever you are on your own time at your own pace. CYBRScore Labs are pre-configured hardware layouts with accompanying lab guides for fast, convenient access that make studying for an exam or learning new technologies an engaging experience. CYBRScore Labs are available for use for 6 months after the date of purchase. CYBRScore Labs are hosted online and available 24x7x365.

Course Outline

  • Additional Scanning Options

    Students will leverage Nmap, a network discovery and mapping tool, to identify the systems on a network of responsibility. Students will utilize non-traditional scans to attempt avoiding an Intrusion Detection System (IDS).

  • Applying Filters to TCPDump and Wireshark

    This lab exercise is designed to allow the trainee to become familiar with applying a capture filter to TCPDump and Wireshark using Berkley Packet Filter (BPF) syntax.

  • Denial of Service PCAP Analysis

    The student will act as attacker and defender in this scenario. They will receive experience using a popular DoS tool, the Low Orbit Ion Cannon (LOIC), and then will switch over to the defensive side. On defense they will need to detect the activity, design firewall rules to block the DoS, implement the rules and then check their effectiveness.

  • Firewall Setup and Configuration

    In this lab you will perform the steps necessary to set up a pfSense firewall from the basic command line interface and then configure the firewall using the web configuration GUI on a Windows machine. This lab will provide an understanding how network interfaces are configured to allow network connectivity. You will also view and create a firewall rule which enforces your understanding of how network traffic can be managed at different levels – (IP-based, Protocol-based, Machine-based, etc).

  • Gap Analysis of Firewall Rules

    Students will log into an organization's firewall, document existing firewall rules, analyze these rules and making recommendations based on this analysis. Students will then make make the necessary changes.

  • IDS Setup

    Network and host based Intrusion Detection Systems (IDS) analyze traffic and provide log and alert data for detected events and activity. Security Onion provides multiple IDS options including Host IDS and Network IDS. In this lab you will setup Security Onion to function as a network based IDS and Snorby, the GUI web interface for Snort.

  • Monitoring Network Traffic

    In this lab we will replicate potentially malicious scans from the Internet against a corporate asset. Scans from the Internet are very common. An analyst should know how to identify this activity by artifacts that are present in the IDS as well as entries in the web logs.

  • Network Segmentation (FW/DMZ/WAN/LAN)

    In this lab we will take the concept of zones and create three zones and route traffic accordingly. We will have the trusted zones ZONE - LAN which will be the internal Local Area Network. ZONE – DMZ which will be the demilitarized zone. ZONE - WAN - which will be the Wide area network. We will set up a firewall (PFSENSE) to allow internal traffic from the LAN to the WAN. We will allow traffic WAN to DMZ and DMZ to WAN. Internal traffic WILL NOT BE ALLOWED TO ENTER THE DMZ UNLESS IT COMES through the WAN interface. This will prevent/deter hackers who if possibly compromised a DMZ asset will not be able to access the internal LAN segment. We'll also show trainees how a contractor would likely VPN into a retail network and how to appropriately restrict their access.

  • Open Source Collection

    The Open Source Collection lab is designed to familiarize students with the advanced functionality of Google, default webpages used for web-servers, and the specifics of Google Hacking database. This allows the students to understand how open source information can be used for exploitation purposes.

  • Preliminary Scanning

    Students will utilize Nmap, a network discovery and mapping tool, to identify the systems on a network of responsibility. Using the tool, students will identify other devices on the laboratory network, to include computers and network infrastructure devices, such as routers.

  • Scanning from Windows

    Students will leverage Scalnline, a windows network discovery and mapping tool, to identify the systems on a network of responsibility. Students will utilize non-traditional scans to attempt avoiding an Intrusion Detection System (IDS).

  • Setting Up Zones in a Firewall

    Students will configure a pfSense Firewall to create/isolate various network segments.

  • Specialized Linux Port Scans

    Students will leverage Hping3 to assess ports of various devices on the assigned network. Students will utilize non-traditional scans to attempt avoiding an Intrusion Detection System (IDS).

  • System Hardening

    A number of technologies exist that work together to protect systems and networks. The real value of your networks and systems rests in the data that networks carry and reside in systems. In this lab you will focus on some ways you can safeguard the data that resides on systems and when data is sent across the network. Securing an operating system, also known as hardening, strives to reduce vulnerabilities in order to protect a system against threats and attacks.

  • TCPDump

    This lab exercise is designed to allow the trainee become familiar with the basic command arguments and usage of TCPDump.

  • Using Snort and Wireshark to Analyze Traffic

    In this lab we will replicate the need for Analysts to be able to analyze network traffic and detect suspicious activity. Tools like Wireshark and Snort can be utilized to read, capture, and analyze traffic.

Questions about which training is right for you?

call 888-843-8733
chat Live Chat




100% Satisfaction Guaranteed

Your Training Comes with a 100% Satisfaction Guarantee!*

*Partner-delivered courses may have different terms that apply. Ask for details.

Preferred method of contact:
Chat Now

Please Choose a Language

Canada - English

Canada - Français