Common Lab Tasks

In: Computers and Technology

Submitted By macctown
Words 2388
Pages 10
Common Lab Tasks
In each lab, you will follow a series of step-by-step instructions designed to help you explore the environment and gather the information you need to successfully complete the deliverables. In each lab, you will perform identical steps, such as opening the virtual lab, logging in to another server, taking screen captures, and transferring files to your local computer. To avoid repeating steps in the lab itself, those common steps have been collected in this file. You may refer to this document at any time during your lab session. Though you may not be required to perform each of these steps in every lab, the Common Lab Steps are listed in the order that you are most likely to encounter them. As you review this list, you should pay attention to the logic and flow of the lab. This will help you to perform the lab procedures more quickly and more accurately. Note: The other virtual machines used in this environment may require as long as 10 minutes to complete their initialization processes (wake-up sequences) and load all required software. If you receive a connection error message, wait at least one minute before clicking on the Remote Desktop Connection icon to retry the connection.

Virtual Lab Environment
You will use the virtual lab environment to complete the learning activities in this lab manual.

Note:
The virtual lab environment, also called the Virtual Security Cloud Lab (VSCL) requires Java, Adobe Flash, and a compatible Web browser. The list of compatible browsers and required version numbers for Java and Flash is available on the VSCL Web site (http://campus.toolwire.com/b4ubegin/start.asp). The Technical Support Help Desk will not be able to assist you in the use of unsupported Web browsers. If you use an unsupported browser, you may not be able to complete the labs as directed in the lab procedures. You will need to download…...

Similar Documents

Lab Manual

...IT255 Student Lab Manual LABORATORY Student Lab Manual IT255 Fundamentals of Information Systems Security Copyright © 2012 Jones & Bartlett Learning, LLC www.jblearning.com All Rights Reserved. Current Version Date: 12/06/2010 -1- IT255 Student Lab Manual LABORATORY ISS Curriculum Overview............................................................................................................................. 5 Ethics and Code of Conduct.......................................................................................................................... 6 Laboratory #1 ................................................................................................................................................ 7 Lab #1: Perform Reconnaissance & Probing Using ZenMap GUI (Nmap) ............................................. 7 Learning Objectives and Outcomes.......................................................................................................... 7 Required Setup and Tools......................................................................................................................... 7 Deliverables ............................................................................................................................................ 11 Evaluation Criteria and Rubrics.............................................................................................................. 12 Lab #1 – Assessment Worksheet .................

Words: 19367 - Pages: 78

Ccna Lab

... Switching Basics and Intermediate Routing CCNA 3 Labs and Study Guide Instructor Edition Allan Johnson Cisco Press 800 East 96th Street Indianapolis, Indiana 46240 USA ii Switching Basics and Intermediate Routing CCNA 3 Labs and Study Guide Switching Basics and Intermediate Routing CCNA 3 Labs and Study Guide Instructor Edition Allan Johnson Copyrigh® 2007 Cisco Systems, Inc. Published by: Cisco Press 800 East 96th Street Indianapolis, IN 46240 USA All rights reserved. No part of this book may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopying, recording, or by any information storage and retrieval system, without written permission from the publisher, except for the inclusion of brief quotations in a review. Printed in the United States of America 1 2 3 4 5 6 7 8 9 0 First Printing July 2006 Library of Congress Cataloging-in-Publication Number: 2006920177 ISBN: 1-58713-186-2 Publisher Paul Boger Cisco Representative Anthony Wolfenden Cisco Press Program Manager Jeff Brady Executive Editor Mary Beth Ray Production Manager Patrick Kanouse Development Editor Andrew Cupp Senior Project Editor San Dee Phillips Copy Editor Bill McManus Technical Editor Bernadette O’Brien Team Coordinator Vanessa Evans Book and Cover Designer Louisa Adair Composition Mark Shirar Warning and Disclaimer This book is designed to provide information about the CCNA 3: Switching Basics and Intermediate Routing course of the......

Words: 136096 - Pages: 545

Labs

...and Code of Conduct Preface LAB #1 ix vii Perform Reconnaissance and Probing Using Zenmap GUI (Nmap) Introduction Deliverables Hands-On Steps 1 1 3 14 15 2 Learning Objectives 1 Evaluation Criteria and Rubrics LAB #1 AssessmeNt WoRksheet LAB #2 Perform a Vulnerability Assessment scan Using Nessus Introduction Deliverables Hands-On Steps 19 19 21 31 32 20 Learning Objectives 19 Evaluation Criteria and Rubrics LAB #2 AssessmeNt WoRksheet LAB #3 enable Windows Active Directory and User Access Controls Introduction Deliverables Hands-On Steps 35 35 37 49 50 36 Learning Objectives 35 Evaluation Criteria and Rubrics LAB #3 AssessmeNt WoRksheet LAB #4 Configure Group Policy objects and microsoft® Baseline security Analyzer (mBsA) Introduction Deliverables Hands-On Steps 53 53 55 63 64 54 Learning Objectives 53 Evaluation Criteria and Rubrics LAB #4 AssessmeNt WoRksheet iii 38351_FMxx_Pass4.indd 3 23/04/13 5:13 AM iv Contents LAB #5 Perform Protocol Capture and Analysis Using Wireshark and NetWitness Investigator 67 Introduction Deliverables Hands-On Steps 67 67 69 80 81 68 Learning Objectives Evaluation Criteria and Rubrics LAB #5 AssessmeNt WoRksheet LAB #6 Perform Business Continuity Implementation Planning Introduction Deliverables Hands-On Steps 85 85 86 87 90 91 Learning Objectives and Outcomes 85 Evaluation Criteria and Rubrics LAB #6 AssessmeNt WoRksheet LAB #7 Relate Windows......

Words: 26285 - Pages: 106

Labs

...36 LAB #3 | Network Discovery and Reconnaissance Probing Using Zenmap GUI (Nmap) LAB #3 – ASSESSMENT WORKSHEET Network Discovery and Reconnaissance Probing Using Zenmap GUI (Nmap) Course Name and Number: Student Name: Instructor Name: Lab Due Date: Overview In this lab, you used the Zenmap Graphical User Interface (GUI) for the free Nmap Security Scanner application to perform network discovery and security scans. After the initial IP network reconnaissance task, you identified the IP hosts, servers, operating systems, and applications. You identified the risks, threats, and vulnerabilities within the IT infrastructure. This utility is essential for information systems security practitioners to perform routine tasks, such as taking network inventory, managing service upgrade schedules, and monitoring host or service uptime. Lab Assessment Questions & Answers 1. What interfaces on LAN Switch 1 and LAN Switch 2 are configured with Telnet, and which interfaces are configured with SSH for remote terminal connectivity? Assessment Worksheet 2. Explain both the information systems security practitioner and hacker perspectives of using a security 37 scanning application such as Zenmap GUI (Nmap). 3. How many tests did your Intense Scan definition perform? List them all after reviewing the scan report. 4. Describe what each of these tests displays within the Zenmap GUI (Nmap) scan report. 3 Network Discovery and Reconnaissance Probing Using......

Words: 303 - Pages: 2

Commom Lab Task

...Common Lab Tasks In each lab, you will follow a series of step-by-step instructions designed to help you explore the environment and gather the information you need to successfully complete the deliverables. In each lab, you will perform identical steps, such as opening the virtual lab, logging in to another server, taking screen captures, and transferring files to your local computer. To avoid repeating steps in the lab itself, those common steps have been collected in this file. You may refer to this document at any time during your lab session. Though you may not be required to perform each of these steps in every lab, the Common Lab Steps are listed in the order that you are most likely to encounter them. As you review this list, you should pay attention to the logic and flow of the lab. This will help you to perform the lab procedures more quickly and more accurately. Note: The other virtual machines used in this environment may require as long as 10 minutes to complete their initialization processes (wake-up sequences) and load all required software. If you receive a connection error message, wait at least one minute before clicking on the Remote Desktop Connection icon to retry the connection. Virtual Lab Environment You will use the virtual lab environment to complete the learning activities in this lab manual. Note: The virtual lab environment, also called the Virtual Security Cloud Lab (VSCL) requires Java, Adobe Flash, and a compatible Web browser. The......

Words: 2388 - Pages: 10

Common Lab Tasks

...Common Lab Tasks In each lab, you will follow a series of step-by-step instructions designed to help you explore the environment and gather the information you need to successfully complete the deliverables. In each lab, you will perform identical steps, such as opening the virtual lab, logging in to another server, taking screen captures, and transferring files to your local computer. To avoid repeating steps in the lab itself, those common steps have been collected in this file. You may refer to this document at any time during your lab session. Though you may not be required to perform each of these steps in every lab, the Common Lab Steps are listed in the order that you are most likely to encounter them. As you review this list, you should pay attention to the logic and flow of the lab. This will help you to perform the lab procedures more quickly and more accurately. Note: The other virtual machines used in this environment may require as long as 10 minutes to complete their initialization processes (wake-up sequences) and load all required software. If you receive a connection error message, wait at least one minute before clicking on the Remote Desktop Connection icon to retry the connection. Virtual Lab Environment You will use the virtual lab environment to complete the learning activities in this lab manual. Note: The virtual lab environment, also called the Virtual Security Cloud Lab (VSCL) requires Java, Adobe Flash, and a compatible Web browser. The......

Words: 2388 - Pages: 10

Lab #1 – Assessment Worksheet Performing Reconnaissance and Probing Using Common Tools

...Lab #1 – Assessment Worksheet Performing Reconnaissance and Probing Using Common Tools CPSC 2106 Informations Systems Security Course Name and Number: _____________________________________________________ Student Name: ________________________________________________________________ Instructor Name: ______________________________________________________________ Lab Due Date: ________________________________________________________________ Overview In this lab, you explored the common tools available in the virtual lab environment. You used Wireshark to capture and analyze network traffic and OpenVAS to scan the network. You reviewed a sample collection of data using NetWitness Investigator, connected to a remote Windows machine, and explored two file transfer applications, FileZilla and Tftpd64. You used PuTTY to connect to a Linux machine and ran several Cisco commands to display statistics for the network interfaces. Finally, you used Zenmap to perform a scan of the network and created a network topology chart. Lab Assessment Questions & Answers 1. Name at least five applications and tools used in the lab. 2. What is promiscuous mode? Promiscuous mode allows an application to listen to all traffic on a given subnet or VLAN. 3. How does Wireshark differ from NetWitness Investigator? Wireshark captures live traffic and displays results at the packet level. Net Witness Investigator provides an aggregated overview of previously captured traffic which can be...

Words: 452 - Pages: 2

Lab Step

...Hands-On Steps Note: This lab contains detailed lab procedures which you should follow as written. Frequently performed tasks are explained in the Common Lab Tasks document on the vWorkstation desktop. You should review these tasks before starting the lab. 1. From the vWorkstation desktop, open the Common Lab Tasks file. If desired, use the File Transfer button to transfer the file to your local computer and print a copy for your reference. Figure 1 "Student Landing" workstation 2. On your local computer, create the lab deliverable files. 3. Review the Lab Assessment Worksheet at the end of this lab. You will find answers to these questions as you proceed through the lab steps. Part 1: Capture Network Traffic using TCPdump utility Note: In the next steps, you will use TCPdump, a command line utility, to capture network traffic on the TargetLinux01 virtual server. You will generate that traffic by exploiting a cross-site scripting (XSS) vulnerability in the Damn Vulnerable Web Application (DVWA) tool. In the lab environment, you will be capturing traffic on one interface. In a real-world situation, it is likely the machine would be straddling both an internal network and an external network. In that case, you would want to want to monitor both sides of the interface. Monitoring outside network traffic allows information systems security practitioners to see who and what is attempting to infiltrate your IP network. Monitoring internal traffic allows network analysts to see......

Words: 3168 - Pages: 13

Lab #1 – Assessment Worksheet. Performing Reconnaissance and Probing Using Common Tools

...Lab #1 – Assessment Worksheet Performing Reconnaissance and Probing Using Common Tools Course Name and Number: _____________________________________________________ Student Name: ________________________________________________________________ Instructor Name: ______________________________________________________________ Lab Due Date: ________________________________________________________________ Overview In this lab, you explored the common tools available in the virtual lab environment. You used Wireshark to capture and analyze network traffic and OpenVAS to scan the network. You reviewed a sample collection of data using NetWitness Investigator, connected to a remote Windows machine, and explored two file transfer applications, FileZilla and Tftpd64. You used PuTTY to connect to a Linux machine and ran several Cisco commands to display statistics for the network interfaces. Finally, you used Zenmap to perform a scan of the network and created a network topology chart. Lab Assessment Questions & Answers 1. Name at least five applications and tools used in the lab. Wireshark, Netwitness, Openvas, Filezilla, Tftpd64, Putty and Zenmap 2. What is promiscuous mode? Promiscuous mode allows an application to listen to all traffic on a given subnet or VLAN 3. How does Wireshark differ from NetWitness Investigator? Wireshark deep-dives into individual packets while Netwitness is just a high-level view, that can be compared to newer pracket......

Words: 481 - Pages: 2

Common Lab Tasks

...Common Lab Tasks In each lab, you will follow a series of step-by-step instructions designed to help you explore the environment and gather the information you need to successfully complete the deliverables. In each lab, you will perform identical steps, such as opening the virtual lab, logging in to another server, taking screen captures, and transferring files to your local computer. To avoid repeating steps in the lab itself, those common steps have been collected in this file. You may refer to this document at any time during your lab session. Though you may not be required to perform each of these steps in every lab, the Common Lab Steps are listed in the order that you are most likely to encounter them. As you review this list, you should pay attention to the logic and flow of the lab. This will help you to perform the lab procedures more quickly and more accurately. Note: The other virtual machines used in this environment may require as long as 10 minutes to complete their initialization processes (wake-up sequences) and load all required software. If you receive a connection error message, wait at least one minute before clicking on the Remote Desktop Connection icon to retry the connection. Virtual Lab Environment You will use the virtual lab environment to complete the learning activities in this lab manual. Note: The virtual lab environment, also called the Virtual Security Cloud Lab (VSCL) requires Java, Adobe Flash, and a compatible Web browser. The......

Words: 2387 - Pages: 10

Labs

...Tissues The Integumentary System 35 43 The Cell: Transport Mechanisms and Permeability–Wet Lab Classification of Covering and Lining Membranes 49 Overview of the Skeleton: Classification and Structure of Bones and Cartilages 53 The Axial Skeleton The Fetal Skeleton 59 67 81 87 93 103 77 The Appendicular Skeleton Articulations and Body Movements Microscopic Anatomy and Organization of Skeletal Muscle Gross Anatomy of the Muscular System Histology of Nervous Tissue 113 119 125 Exercise 16A Skeletal Muscle Physiology: Frogs and Human Subjects Exercise 18A Neurophysiology of Nerve Impulses: Wet Lab Gross Anatomy of the Brain and Cranial Nerves Electroencephalography Human Reflex Physiology General Sensation 153 157 167 177 173 Special Senses: Vision 133 Spinal Cord, Spinal Nerves, and the Autonomic Nervous System 145 137 Special Senses: Hearing and Equilibrium Special Senses: Olfaction and Taste Functional Anatomy of the Endocrine Glands iii Exercise 28A Role of Thyroid Hormone, Pituitary Hormone, Insulin, and Epinephrine: Wet Lab 183 Exercise 29A Blood Exercise 30 Exercise 31 Exercise 32 189 199 205 209 Anatomy of the Heart Conduction System of the Heart and Electrocardiography Anatomy of Blood Vessels Exercise 33A Human Cardiovascular Physiology: Blood Pressure and Pulse Determinations 217 Exercise 34A Frog Cardiovascular Physiology: Wet Lab Exercise 36 Exercise 38 Exercise 40 Exercise 42 Exercise 43 Exercise 44 Exercise 45 Exercise......

Words: 120457 - Pages: 482

Nt2580 Labs

...Lab 3: Enabling Windows Active Directory and User Access Controls Introduction Computer security is accomplished using many different systems, but the fundamental concepts are all rooted in the security triad known as CIA (Confidentiality, Integrity and Availability). Confidentiality is preventing the disclosure of secure information to unauthorized individuals or systems. Integrity is maintaining and assuring the accuracy of data over its life-cycle. For information to be useful it must be available when needed: thus the need for Availability. This means the data may need to be in highly redundant, highly protected storage areas with adapted power and cooling. Microsoft has developed their Active Directory Domain structure so that a central authority, the Domain Controller, is the central repository for all domain security records. It has several layers of authentication and authorization, including standard user/password, and several forms of two factor authentication. Two-factor authentication combines something you know (such as a password) with something you are (for instance, a fingerprint or retina scan) or something you possess (such as a smart card or USB stick). It can also employ a certificate system: either a selfsigned or third-party certificate system that adds a distinct third layer to the authentication process. The domain can be a stand-alone entity, or can join with other domains in a forest with offices in several cities or countries.......

Words: 4785 - Pages: 20

Labs

...© Jones & Bartlett Learning, LLC NOT FOR SALE OR DISTRIBUTION © Jones & Bartlett Learning, LLC NOT FOR SALE OR DISTRIBUTION © Jones Bartlett Lab #2© Jones &SALE ORLearning, LLC Vulnerabilities to &SALE ORLearning, LL AligningBartlett DISTRIBUTION Risks, Threats, and NOT FOR DISTRIBUT NOT FOR COBIT P09 Risk Management Controls © Jones & Bartlett Learning, LLC Introduction © Jones & Bartlett Learning, LLC NOT FOR SALE OR DISTRIBUTION NOT FOR SALE OR DISTRIBUTION Ask any IT manager about the challenges in conveying IT risks in terms of business risks, or about translating business goals into IT goals. It’s a common difficulty, as the worlds of business and IT do not inherently align. This lack of alignment was unresolved until ISACA developed a framework called COBIT, © Jones & Bartlett Learning, LLC first released in 1996.Jones & Bartlett Learning, LLC © ISACA is an IT professionals’ association centered on auditing and IT governance. This NOT FOR SALE OR DISTRIBUTION The lab lab will focus on the COBIT framework. NOT FOR SALE OR DISTRIBUTION uses the latest two versions: COBIT 4.1, which is currently the most implemented version, and COBIT 5, which is the latest version released in June 2012. Because COBIT 4.1 is freely available at the time of this writing, the lab uses this version to © Jones & Bartlett Presentation is done making use of a © Jones & Bartlett Learning, LL present handling of risk management. Learning, LLC set of COBIT......

Words: 2487 - Pages: 10

Commons

...The Commons The commons is a lobby for students to take a rest or do some own work. It has two entrances and each entrance has two large gate posts. The integral color of the lobby is bright yellow and it has an octagon ceiling. As corresponding, there is a black-green octagon pattern on the floor. In the middle part of the lobby, there are 4 high top wooden round tables and each table with four high chairs surrounded. Beside the wall connected to the left-handed entrance, there is a normal round desk and two chairs in opposite. Opposite to the left-handed wall, the right side is all glasses which are the windows of the office in the next door. At two corners, there are two tables with chairs. Besides, at the left-handed corner, there is several irregular shapes colorful glasses stick on the wall and the reflecting different color by lamps just like in KTV. The commons is a lobby for students to take a rest or do some own work. It has two entrances and each entrance has two large gate posts. The integral color of the lobby is bright yellow and it has an octagon ceiling. As corresponding, there is a black-green octagon pattern on the floor. In the middle part of the lobby, there are 4 high top wooden round tables and each table with four high chairs surrounded. Beside the wall connected to the left-handed entrance, there is a normal round desk and two chairs in opposite. Opposite to the left-handed wall, the right side is all glasses which are the windows of the office......

Words: 319 - Pages: 2

Lab 1.6

...Lab 1.6 Exercise 1.6.1 Record the amount of space you have available and how much total space you have on your Windows hard drive. This will vary by system. Exercise 1.6.2 Using a Linux or Mac OS computer, determine the amount of space you have available and how much total space you have on the hard drive. On Mac OS X, you can get this information by rightclicking the MacintoshHD icon on the desktop and selecting Get Info. On a Linux machine, you can type df -h at the command-line interface. Again, this will vary from system to system. Exercise 1.6.3 Locate the system information for your Windows machine and record the amount of RAM you have installed. This will vary from system to system. Exercise 1.6.4 Locate the amount of RAM you have available on either a Mac OS X machine or a Linux machine. Compare this to the RAM allocated for the Windows machine. On a Mac OS X computer, open the MacintoshHD directory, open the Applications folder, open the Utilities folder, and then choose System Profiler to find the amount of RAM installed. On a Linux machine, you can use the free command to display the amount of memory available and the amount in use; to get the result in megabytes, use the free -m command at the command-line interface. This will vary from system to system. Exercise 1.6.5 Access the System Information window on your Windows machine and record the type of processor and the processor speed for the computer. This will vary from system to......

Words: 894 - Pages: 4