Please feel free to reach out to me in the Contact Me page if you have any questions or inquiries!
Domain Name System
Active Directory
Group Policy
DHCP
Powershell
Shares and Permissions
Microsoft Endpoint Security
Security Policies and Authentication
Packet Tracer Labs
Amazon AWS Labs
Introduction
CLI Fundamentals
Users and Permissions
Networking and System Management
Services and Hardening
Host Security
Network Security
Scripting Labs
Network Security Systems & Architecture
Network Attacks and Mitigation
Network Traffic Analysis
Practical Cryptography
Firewall Fundamentals
VPN Technologies
Network Monitoring
IPS & IDS Concepts
Scenario:
You have just been hired at a new company, GoodCorp, which is experiencing serious network security challenges. Users can access resources they should not have access to, inbound traffic still needs to be properly filtered/blocked, and GoodCorp lacks secure access to remote employees. Your manager assigned you in the SOC and all security-related requests are sent to you, you must resolve all requests sent to you.
Requests:
Ticket 1: The HR manager has requested that you block traffic to prevent employees from using computers in the office for gaming. (For this project ICMP is used for gaming)
Ticket 2: The warehouse manager requested VPN access for the employees. The firewall is not licensed and configured, but he wants the employee to have temporary access via other means. He asks you to make the web server and SSH service available for connection from remote networks.
Ticket 3: The company's CISO decided to implement a detection and prevention system against potential known network attacks.. She put you in charge of the implementation. Set up a mechanism capable of detecting DoS and Brute-Force attacks and verifying that they function correctly.
Endpoint Security
Honeypots
Data Loss Prevention
Mail Security
Security Information and Event Management (SIEM) and Security Orchestration, Automation, and Response (SOAR)
IIoT & ICS (Industrial Internet of Things and Industrial Control Systems)
Objective: Connect to the Splunk system, investigate the events, and identify a suspicious message to obtain the flag.
Scenario: An organization’s monitoring system identified suspicious download activities captured in a honeypot. The Splunk system recorded the event, but the system cannot be accessed because its operator was recently released from the company. You were hired as a security analyst not long after. The system administrator was able to provide you with access to the mail server and told you that all the data needed to access the Splunk system is stored on that server.
Steps:
Introduction to Programming
Data Types and Conditions
Loops
File System & Error Handling
Functions
Network Communication
Python Final Project
Implement learned skills to create an automated program that can be used in real-life scenarios. Create a program that can detect active ARP Spoofing attacks on host machines by locating MAC address duplications in the ARP table entries and create a log accordingly.
Network Scanning
On-Path Attacks
Brute-Force Attacks
Social Engineering
Infrastructure Attacks
Windows Privilege Escalation
Linux Privilege Escalation
Web Application Security Fundamentals
XSS and File Inclusion
SQL Injection
Report Writing
Copyright © 2023 Pate's PC Repair- All Rights Reserved.
Powered by GoDaddy
We use cookies to analyze website traffic and optimize your website experience. By accepting our use of cookies, your data will be aggregated with all other user data.