Once your network is set up securely, you must continue to be vigilant.

Whether it be an innocent user’s risky behavior or an actual break-in, it is the IT professional’s responsibility to know what is happening on their network. Labs in this category explore how to identify systems on a network and the services they provide—either intentionally, through misconfiguration, or by malicious action.

 

Questions about which lab is right for you? Contact cyrin@atcorp.com.

Students will use tools such as nmap, unicornscan, and fping to identify systems on a local network, including both Unix and Windows targets. Students will identify the operating systems these systems are running, as well as the types of network services they are providing.

Prerequisites
  • Familiarity with the Unix/Linux command line
  • Basic networking concepts (TCP/IP, DNS, etc.)
Expected Duration

4 hours, self-paced. Pause and continue at any time.

4 CPEs awarded on successful completion.

Cost

$79 for 6 months of access. Register here to enroll.

This lab is also available as part of the CYRIN Network Monitoring and Recon Package as well as the CYRIN Cyber Range All Access Package.

Students will use multiple tools to identify services, including software package and version information, running on unknown systems. Network services to be targeted will include those running on non-standard ports or behind firewall rules.

Prerequisites
  • Familiarity with the Unix/Linux command line
  • Basic networking concepts (TCP/IP, DNS, etc.)
Expected Duration

4 hours, self-paced. Pause and continue at any time.

4 CPEs awarded on successful completion.

Cost

$79 for 6 months of access. Register here to enroll.

This lab is also available as part of the CYRIN Network Monitoring and Recon Package as well as the CYRIN Cyber Range All Access Package.

Students will build on the Service Identification I exercise to use service-specific information-gathering tools. Students will gather vendor, software, and version information, as well as any configuration information available remotely. Students will then use scripting tools to automate this process.

Prerequisites
  • Familiarity with the Unix/Linux command line
  • Basic networking concepts (TCP/IP, DNS, etc.)
Expected Duration

4 hours, self-paced. Pause and continue at any time.

4 CPEs awarded on successful completion.

Cost

$79 for 6 months of access. Register here to enroll.

The course is also available as part of the CYRIN Network Monitoring and Recon Package as well as the CYRIN Cyber Range All Access Package.

In this lab the student will learn how to configure and securely run the Splunk Enterprise security information collection and analysis platform. The objective of the lab is to deploy multiple instances of Splunk data forwarders through a deployment server and analyze the logs received from the servers. The student will write custom scripts to generate logs, create both visual and textual reports, organize these reports into a single dashboard, and learn to recognize malicious activity.

Prerequisites
  • Ability to use a command line editor (vi, vim, nano, or emacs).
  • Familiarity with the Linux and Windows environment and command line tools.
  • Basic understanding of shell scripting in BASH and PowerShell.
  • Intermediate understanding of networking concepts and services (TCP/IP, SSH, ...).
Expected Duration

4 hours, self-paced. Pause and continue at any time.

4 CPEs awarded on successful completion.

Cost

$79 for 6 months of access. Register here to enroll.

This lab is also available as part of the CYRIN Network Monitoring and Recon Package as well as the CYRIN Cyber Range All Access Package.