terça-feira, 23 de fevereiro de 2021

CISCO Cybersecurity Essentials: Demonstration of the Lab exercises of the course (Packet Tracer, Linux) | English, Portuguese

CISCO Cybersecurity Essentials related content
Lab exercises demonstrations (video playlist) (blog post)
Quiz Questions and Answers (text blog post) (video playlist)
Cisco Packet Tracer demonstrations (video playlist)
Linux OS tutorials and reviews (video playlist)
Exercícios do curso em Português (video playlist)


Demonstration of the exercises of the Cisco "Cybersecurity Essentials" course. Lab exercices of Packet Tracer and Linux Operating System.


1.5.3.5 Creating a Cyber World (Packet Tracer Lab Exercise)

Objectives
Part 1: Configure the FTP Server
Part 2: Configure the Web Server
Part 3: Configure the Email Server
Part 4: Configure the DNS Server
Part 5: Configure the NTP Server
Part 6: Configure the AAA Server

Background / Scenario: In this activity, you will configure basic server components. The IP addressing configuration is already complete. You will use the Services tab on multiple servers to deploy FTP, Web, Email, DNS, NTP, and AAA services.

In english: https://www.youtube.com/watch?v=t34Ku3fdU14
Em português: https://www.youtube.com/watch?v=a-OH5sMA-fE



1.5.3.6 Communicating in a Cyber World (Packet Tracer)

Objectives
Part 1: Send Email between Users
Part 2: Upload and Download Files using FTP
Part 3: Remotely Access an Enterprise Router using Telnet
Part 4: Remotely Access an Enterprise Router using SSH

Background / Scenario: In this activity, you will communicate across remote networks using common network services. The IP addressing, network configuration, and service configurations are already complete. You will use the client devices in the differing geographic regions to connect to both servers and other client devices.

In english: https://www.youtube.com/watch?v=ql3HTPwVRSw
Em português: https://www.youtube.com/watch?v=tcE3NDryKAs



2.5.2.5 Authentication, Authorization and Accounting (Linux Operating System)

Objectives
• Given a scenario, select the appropriate authentication, authorization, or access control.
• Install and configure security controls when performing account management, based on best practices.
Part 1: Adding Groups, Users, and Passwords on a Linux System.
Part 2: Verify Users, Groups, and Passwords.
Part 3: Using Symbolic Permissions.
Part 4: Absolute Permissions.

Background / Scenario: You will be conducting host security practices using the Linux command line by performing the following tasks: Adding Groups, Users, and Passwords, Verifying Groups, Users, and Passwords, Setting Symbolic Permissions, Setting Absolute Permissions.

In english: https://www.youtube.com/watch?v=ciSIUwrc8mg
Em português: https://www.youtube.com/watch?v=i-_FP2K5zXU



3.3.1.9 Detecting Threats and Vulnerabilities (Linux Operating System)

Objectives: Use Nmap, a port scanner and network mapping tool to detect threats and vulnerabilities on a system.

Background / Scenario: Network Mapper, or Nmap, is an open source utility used for network discovery and security auditing. Administrators also use Nmap for monitoring hosts or managing service upgrade schedules. Nmap determines what hosts are available on a network, what services are running, what operating systems are running, and what packet filters or firewalls are running.

In english: https://www.youtube.com/watch?v=MGm71Z6qikA
Em português: https://www.youtube.com/watch?v=-we-sLQTkQ4



3.3.2.7 WEP/WPA2 PSK/WPA2 RADIUS (Packet Tracer)

Objectives
Part 1: Configure WEP for Healthcare at Home
Part 2: Configure WPA2 PSK for Gotham Healthcare Branch
Part 3: Configure WPA2 RADIUS for Metropolis Bank HQ

Background / Scenario: In this activity, you will configure WiFi networks for all three geographic sites. This activity will utilize WEP, WPA2 PSK, and WPA2 RADIUS to demonstrate the varying configuration of WiFi networks and their security considerations. Healthcare at Home will be setup using WEP. Gotham Healthcare Branch will be configured with WPA2 PSK and Metropolis Bank HQ will be using WPA2 Radius. The IP addressing, network configuration, and service configurations are already complete. You will use the wireless routers and client devices in the differing geographic regions to setup multiple secure wireless networks.

In english: https://www.youtube.com/watch?v=YZD7oofSkB0
Em português: https://www.youtube.com/watch?v=ugmJzmJDA08



4.3.2.3 Using Steganography (Linux Operating System)

Objectives: Use steganography to hide a document within a JPEG file.

Background / Scenario: Steghide is an open source steganography program that hides data in various types of files such as audio and image files. You are going to hide a data file within an image file.

In english: https://www.youtube.com/watch?v=wP6CNdpoEUg
Em português: https://www.youtube.com/watch?v=H5bQmio0hxM



4.3.3.3 Configuring VPN Transport Mode (Packet Tracer)

Objectives
Part 1: Sending Unencrypted FTP Traffic
Part 2: Configuring the VPN Client within Metropolis
Part 3: Sending Encrypted FTP Traffic

Background / Scenario: In this activity, you will observe the transfer of unencrypted FTP traffic between a client and a remote site. You will then configure a VPN client to connect to the Gotham Healthcare Branch site and send encrypted FTP traffic. The IP addressing, network configuration, and service configurations are already complete. You will use a client device within Metropolis Bank HQ to transfer unencrypted and encrypted FTP data.

In english: https://www.youtube.com/watch?v=Yf_LIZWqDPs
Em português: https://www.youtube.com/watch?v=GZ-RduoHCPo



4.3.3.4 Configuring VPN Tunnel Mode (Packet Tracer)

Objectives
Part 1: Sending Unencrypted FTP Traffic
Part 2: Configuring the VPN Tunnel between Metropolis and Gotham
Part 3: Sending Encrypted FTP Traffic

Background / Scenario: In this activity, you will observe the transfer of unencrypted FTP traffic between two geographic sites. You will then configure a VPN tunnel between two geographic sites and send encrypted FTP traffic. The IP addressing, network configuration, and service configurations are already complete. You will use the client devices in the differing geographic regions to transfer FTP data securely and insecurely

In english: https://www.youtube.com/watch?v=YtFDMEZDRxA
Em português: https://www.youtube.com/watch?v=8WDG0WRF0I8



5.1.2.4 Password Cracking (Linux Operating System)

Objectives: Use a password cracking tool to recover a user’s password.

Background / Scenario: There are four user accounts, Alice, Bob, Eve, and Eric, on a Linux system. You will recover these passwords using John the Ripper, an open source password cracking tool.

In english: https://www.youtube.com/watch?v=G-aNvZ8nKeo
Em português: https://www.youtube.com/watch?v=-SOWntE_UM0



6.2.3.8 Router and Switch Redundancy (Packet Tracer)

Objectives
Part 1: Observe a Network Failover with Redundant Routers.
Part 2: Observe a Network Failover with Redundant Switches.

Background / Scenario: In this activity, you will observe the successful failover of the Metropolis network utilizing multiple routers to provide default gateway redundancy. Afterwards across the world, you will observe the successful network failover of the Gotham network utilizing multiple switches to provide redundant network pathways. The IP addressing, network configuration, and service configurations are already complete. You will use the client devices in the differing geographic regions to test the pathways before and after successful network failover.

In english: https://www.youtube.com/watch?v=p8Pjg_McZ7E
Em português: https://www.youtube.com/watch?v=S3GZLQPcFZw



6.2.4.4 Router and Switch Resilience (Packet Tracer)

Objectives
Part 1: Hardening the IOS Configuration
Part 2: Activating the Cisco IOS Resilient Configuration Feature

Background / Scenario: In this activity, you will harden the IOS configuration of a router within the Metropolis network. Afterwards, you will enable the IOS resiliency feature on a Cisco router. The IP addressing, network configuration, and service configurations are already complete. You will use the client devices in the Metropolis network to deploy the IOS resiliency configuration.

In english: https://www.youtube.com/watch?v=YWr5Ttuj2u0
Em português: https://www.youtube.com/watch?v=qhzHHAVKJKQ



7.1.1.6 Hardening a Linux System (Linux Operating System)

Objectives: Demonstrate the use of a security auditing tool to harden a Linux system.

Background / Scenario: Auditing a system for potential misconfigurations or unprotected services is an important aspect of system hardening. Lynis is an open source security auditing tool with an automated set of scripts developed to test a Linux system.

In english: https://www.youtube.com/watch?v=M8jXbJujpfw
Em português: https://www.youtube.com/watch?v=xN40BgbZ0EU



7.4.2.4 Server Firewalls and Router ACLs (Packet Tracer)

Objectives
Part 1: Connect to the Web Server
Part 2: Prevent Unencrypted HTTP Sessions
Part 3: Access the Firewall on the Email Server

Background / Scenario: In this activity, you will access a user within the Metropolis site and connect using HTTP and HTTPS to a remote Web Server. The IP addressing, network configuration, and service configurations are already complete. You will use a client device in the Metropolis site to test connectivity to a remote Web Server and then secure the Metropolis site by preventing unencrypted web sessions from connecting to the outside world.

In english: https://www.youtube.com/watch?v=zehDPIEP7Rw
Em português: https://www.youtube.com/watch?v=Lof2uUMPrgQ



8.3.1.3 Skills Integrated Challenge (Packet Tracer)

Objectives
Upload a file to the FTP/Web server using FTP.
Connect a computer via a client-to-site VPN.
Download a file via ftp using a VPN connection.
Configure and secure a wireless router.
Activate the Cisco IOS resilient configuration feature.
Configure a banner motd message.
Connect a laptop to the wireless network.

Background / Scenario: You will configure a wireless router, upload and download files using FTP, connect securely to a remote site using a VPN, and secure a Cisco IOS router.

In english: https://www.youtube.com/watch?v=cxbAEKyvAkc
Em português: https://www.youtube.com/watch?v=kVZLdzrSNe8


2 comentários: