Defense-in-depth requires individual network hosts to be set up securely, whether they be individual workstations, server systems, or cloud computing nodes.

The labs in this category help you configure common operating systems securely, as well as how to configure and deploy host-based Intrusion Detection Systems (IDS's) and other security tools.

The labs in this category assume general knowledge of TCP/IP networking as well as Unix/Linux and Microsoft Windows configuration principles.

Questions about which lab is right for you? Contact info@cyrintraining.com.

Students learn to use the Windows Active Directory service to create and manage domain user accounts. They also learn to set up security policies and assign these policies to users and organizational units (OUs).

Prerequisites

Familiarity with the Windows desktop.

Expected Duration

2 hours, self-paced. Pause and continue at any time.
2 CPEs awarded on successful completion.

Availability

Included if you are a subscriber to any of the following training packages:

  • Level 1: CYRIN Enterprise Instructional Labs
  • Level 2: Attack/Defense/IR Exercises and Instructional Labs
  • Level 3: Attack Scenarios, Attack/Defense/IR Exercises, and Instructional Labs
  • Secure System Setup Package
  • Systems Security Analyst 1
  • Cyber Defense Infrastructure Support Specialist 1
  • System Administrator 2
Educational Lab

Students learn the proper setup of the OpenSSH remote administration tool, including security-relevant settings. During the exercise, students will learn best practices such as host filtering, public-key or Kerberos authentication, and PAM integration.

Prerequisites

Basic networking concepts (TCP/IP, DNS, etc.) and familiarity with the Unix/Linux command line.

Expected Duration

2 hours, self-paced. Pause and continue at any time.
2 CPEs awarded on successful completion.

Availability

Included if you are a subscriber to any of the following training packages:

  • Level 1: CYRIN Enterprise Instructional Labs
  • Level 2: Attack/Defense/IR Exercises and Instructional Labs
  • Level 3: Attack Scenarios, Attack/Defense/IR Exercises, and Instructional Labs
  • Essential Tools for Network Engineering
  • Secure System Setup Package
  • System Administrator 2
  • Security Architect
Educational Lab

In this lab, you will secure access to a computer with a web server. Specifically, you will set up SSH access using keys, disable password-based SSH logins, set up HTTPS access to a web server, and configure a firewall on a web server to allow access to just the SSH and web servers. 

Prerequisites

You should have some familiarity with the Unix command line, as well as some basic networking concepts.

Expected Duration

0.5 hours, self-paced. Pause and continue at any time.
0.5 CPEs awarded on successful completion.

Availability

Included if you are a subscriber to any of the following training packages:

  • Level 1: CYRIN Enterprise Instructional Labs
  • Level 2: Attack/Defense/IR Exercises and Instructional Labs
  • Level 3: Attack Scenarios, Attack/Defense/IR Exercises, and Instructional Labs

In this lab, you will explore some of the endpoint protection features built into Windows 10 systems. This information can have analogs in other operating systems as well.

Prerequisites

You should have some familiarity with Windows systems, as well as some basic networking concepts.

Expected Duration

0.5 hours, self-paced. Pause and continue at any time.
0.5 CPEs awarded on successful completion.

Availability

Included if you are a subscriber to any of the following training packages:

  • Level 1: CYRIN Enterprise Instructional Labs
  • Level 2: Attack/Defense/IR Exercises and Instructional Labs
  • Level 3: Attack Scenarios, Attack/Defense/IR Exercises, and Instructional Labs

Students learn how to configure and run the widely-used, free OSSEC Host Intrusion Detection System (HIDS). During the exercise, students will learn how to check for rootkits using OSSEC, how to verify file integrity, how to set up passive and active responses, and more. Host intrusion detection is critical to maintaining a secure system, and is required by HIPAA and PCI regulations, both of which OSSEC can help you meet.

Prerequisites

Basic networking concepts (TCP/IP, DNS, etc.) and familiarity with the Unix/Linux command line.

Expected Duration

2 hours, self-paced. Pause and continue at any time.
2 CPEs awarded on successful completion.

Availability

Included if you are a subscriber to any of the following training packages:

  • Level 1: CYRIN Enterprise Instructional Labs
  • Level 2: Attack/Defense/IR Exercises and Instructional Labs
  • Level 3: Attack Scenarios, Attack/Defense/IR Exercises, and Instructional Labs
  • Secure System Setup Package
  • Introduction to Cybersecurity Lab Package
  • Intrusion Detection and Prevention Lab Package
  • Cyber Defense Analyst 1
  • System Administrator 1
  • Cyber Defense Incident Responder
  • Cyber Defense Infrastructure Support Specialist 2
Educational Lab

In this lab, you will be tasked with assessing the network attack surface of an OWASP-BWA machine running an iptables-based firewall. You will also observe the attack surface from an external source, demonstrating the view of an attacker.

Prerequisites

For this lab, it is important that you have some familiarity with the Unix command line. It also helps if you have some basic knowledge of networking principles.

Expected Duration

0.5 hours, self-paced. Pause and continue at any time.
0.5 CPEs awarded on successful completion.

Availability

Included if you are a subscriber to any of the following training packages:

  • Level 1: CYRIN Enterprise Instructional Labs
  • Level 2: Attack/Defense/IR Exercises and Instructional Labs
  • Level 3: Attack Scenarios, Attack/Defense/IR Exercises, and Instructional Labs

In this lab, you will practice the concept of managing and mitigating risk using an OWASP-BWA system running an iptables-based firewall. You will explore your attack surface, then configure the firewall to filter out traffic, allowing traffic only to specific ports.

Prerequisites

You should have some familiarity with the Unix command line, as well as some basic knowledge of networking concepts.

Expected Duration

0.5 hours, self-paced. Pause and continue at any time.
0.5 CPEs awarded on successful completion.

Availability

Included if you are a subscriber to any of the following training packages:

  • Level 1: CYRIN Enterprise Instructional Labs
  • Level 2: Attack/Defense/IR Exercises and Instructional Labs
  • Level 3: Attack Scenarios, Attack/Defense/IR Exercises, and Instructional Labs

In this lab, you will explore both AppArmor and SELinux, the Mandatory Access Control systems used to lock down Linux machines.

Prerequisites

You should have some familiarity with the Unix command line, as well as some basic networking concepts.

Expected Duration

0.5 hours, self-paced. Pause and continue at any time.
0.5 CPEs awarded on successful completion.

Availability

Included if you are a subscriber to any of the following training packages:

  • Level 1: CYRIN Enterprise Instructional Labs
  • Level 2: Attack/Defense/IR Exercises and Instructional Labs
  • Level 3: Attack Scenarios, Attack/Defense/IR Exercises, and Instructional Labs