Cách thiết lập cửa sổ 11 không cần tạo tài khoản Microsoft hay đăng nhập bằng email
, windows , windows 11 , windows 12 , linux , tech , computers , pc , amd , intel , apple , macbook , internet , ssd , informatics , côngnghệ
We write about tech, science and design!
facebook.com/jomirifeMedia •
twitter.com/jomirife •
youtube.com/jomirife •
instagram.com/jomirife
Cách thiết lập cửa sổ 11 không cần tạo tài khoản Microsoft hay đăng nhập bằng email
, windows , windows 11 , windows 12 , linux , tech , computers , pc , amd , intel , apple , macbook , internet , ssd , informatics , côngnghệ
Como fazer uma auditoria completa de segurança de um sistema Linux, macOS, BSD, Solaris ou Unix, com a ferramenta Lynis, para identificar vulnerabilidades, problemas de segurança, configurações erradas ou serviços desprotegidos, e poder resolver os problemas para endurecer e proteger o sistema contra ataques de ciber criminosos pela Internet
O programa Lynis irá fazer um scan detalhado do sistema, e todas as suas defesas de segurança para detectar problemas ou vulnerabilidades que possam existir e comprometer o acesso aos sistema e dados. Os resultados da varredura serão apresentados para várias categorias e serviços a correr, indicando se tudo está bom, instalado, mal configurado, vulnerável, e sugestões que pode efetuar para resolver o problema, configurar ou ativar o serviço.
É muito importante que um administrador de rede e de um sistema ou servidor, faça uma auditoria profissional ao sistema, para melhorar a segurança do sistema ou servidor, e garantir que o sistema não está comprometido ou vulnerável a ataques, não tenha serviços vulneráveis a acessos não autorizados, e que esteja apto a bloquear ataques de ciber criminosos através da internet ou da rede local (LAN), de forma a prevenir que o sistema sofre falhas ou que seja vítima de roubo de dados e informação armazenada.
Conteúdos relacionados
Tutoriais e Análises de Distros Linux https://bit.ly/3odVU6G (playlist)
Gerir acessos em um sistema Linux https://youtu.be/qAhnKeGHrU8
Auditoria de segurança de um sistema Linux https://youtu.be/_BptRN_yXlk
Quebrar senhas de utilizadores https://youtu.be/3-mnx-MMmF4
Esteganografia para esconder ficheiros https://youtu.be/mKltEI8wVFc
Verificar portas abertas no sistema https://youtu.be/JZX1c_J7BU8
Como utilizar a ferramenta John the Ripper para quebrar ou recuperar as passwords de utilizadores de um sistema Linux. O programa irá utilizar um dicionário predefinido para comparar todas as hashes das palavras-passe das contas dos utilizadores e assim descobrir as senhas secretas dos utilizadores. Este processo pode ser rápido, demorar horas, ou dias, depende da complexidade das passwords que necessitam ser quebradas, por isso é que deve utilizar uma frase-chave (passphrase) em vez de uma palavra chave (password) com letras, números e símbolos, para tornar este processo difícil ou impossível para os ciber criminosos. Como poderá ver no tutorial, irei utilizar o ficheiro passwd e shadow de um sistema Linux, e numa questão de segundos irei descobrir as passwords de 5 utilizadores.
John the Ripper é uma ferramenta de código aberto para auditoria e recuperação de senhas para sistemas operativos. O programa oferece suporte a centenas de tipos de hash e criptografia, incluindo para: senhas de utilizadores de sistemas Linux, BSD, Solaris, AIX, QNX, macOS, Windows, também para aplicativos da web como o WordPress, groupware, bases de dados SQL, LDAP, e também capturar tráfego de rede WiFi WPA-PSK, chaves privadas criptografadas SSH, GnuPG, carteiras de criptomoedas. O processo também poder ser aplicado a arquivos ZIP, RAR, 7z, ou documentos PDF e Microsoft Office, e muitos outros.
Conteúdos relacionados
Tutoriais e Análises de Distros Linux https://bit.ly/3odVU6G (playlist)
Gerir acessos em um sistema Linux https://youtu.be/qAhnKeGHrU8
Auditoria de segurança de um sistema Linux https://youtu.be/_BptRN_yXlk
Quebrar senhas de utilizadores https://youtu.be/3-mnx-MMmF4
Esteganografia para esconder ficheiros https://youtu.be/mKltEI8wVFc
Verificar portas abertas no sistema https://youtu.be/JZX1c_J7BU8
Como utilizar esteganografia para esconder e encriptar ficheiros dentro de ficheiros. Utilizando a ferramenta Steghide para encriptar e ocultar um ficheiro de texto (odt, docx, word) dentro de uma imagem ou fotografia (jpg, jpeg, png). Ocultando assim um ficheiro protegido por uma palavra-passe dentro de outros ficheiros, que só você sabe que existe, para proteger e impedir que alguém consiga ler o documento mesmo que roube o ficheiro da imagem. Este processo funciona que qualquer tipo de ficheiros: documento, fotografia, imagem, vídeo, áudio, aplicações, etc., por isso poderá esconder um ficheiro encriptado dentro de qualquer outro ficheiros, mantendo uma aparência e funcionamento normal. Para realizar este processo, o utilizador necessita de ter os dois ficheiros no computador, escolher o ficheiro que quer ocultar e uma palavra-passe/password para o acesso, e o ficheiro que quer que sirva de contentor e que poderá ser executado normalmente. O Steghide irá permitir também reverter o processo, para extrair o ficheiro escondido e encriptado, para voltar a ter acesso aos dados ocultados.
Conteúdos relacionados
Tutoriais e Análises de Distros Linux https://bit.ly/3odVU6G (playlist)
Gerir acessos em um sistema Linux https://youtu.be/qAhnKeGHrU8
Auditoria de segurança de um sistema Linux https://youtu.be/_BptRN_yXlk
Quebrar senhas de utilizadores https://youtu.be/3-mnx-MMmF4
Esteganografia para esconder ficheiros https://youtu.be/mKltEI8wVFc
Verificar portas abertas no sistema https://youtu.be/JZX1c_J7BU8
Como usar a ferramenta “Nmap, the network mapper” para fazer um scan ao sistema e mapear a rede, para detetar as portas abertas no sistema, identificando ameaças e vulnerabilidades que possam existir no sistema e comprometer a segurança dos dados e acesso não autorizado ao sistema. O administrador da rede e do sistema pode usar o Nmap para monitorar hosts e gerir os agendamentos de atualização e patches de serviços, problemas com a versão do sistema instalado, e detetar serviços, filtros de packets, e firewalls, que estejam a ser executados no sistema. Identificando as várias vulnerabilidades que possam existir no sistema, o administrador pode tomar precauções para interromper ou bloquear possíveis ameaças ao sistema e melhorar a ciber segurança do sistema, computador ou servidor.
Conteúdos relacionados
Tutoriais e Análises de Distros Linux https://bit.ly/3odVU6G (playlist)
Gerir acessos em um sistema Linux https://youtu.be/qAhnKeGHrU8
Auditoria de segurança de um sistema Linux https://youtu.be/_BptRN_yXlk
Quebrar senhas de utilizadores https://youtu.be/3-mnx-MMmF4
Esteganografia para esconder ficheiros https://youtu.be/mKltEI8wVFc
Verificar portas abertas no sistema https://youtu.be/JZX1c_J7BU8
Como gerir
os acessos de utilizadores em um sistema Linux através dos comandos no
terminal/consola para controlo de acesso do sistema. Como criar novos
utilizadores, com uma palavra-passe e as informações pessoais sobre cada
utilizador. Verificar que o utilizador foi criado com sucesso e tem o respetivo
diretório criado e está adicionado no ficheiro passswd e shadow. Criar grupos e
adicionar os utilizadores a um grupo para que estes possa ter acessos especiais
de grupos ao qual o grupo tem acesso. Administrar e alterar as permissões dos
utilizadores, diretórios e ficheiros, através de permissões simbólicas e
absolutas, utilizando o comando chmod para adicionar ou retirar permissões de
utilizadores, grupos e outros.
Conteúdos relacionados
Tutoriais e Análises de Distros Linux https://bit.ly/3odVU6G (playlist)
Gerir acessos em um sistema Linux https://youtu.be/qAhnKeGHrU8
Auditoria de segurança de um sistema Linux https://youtu.be/_BptRN_yXlk
Quebrar senhas de utilizadores https://youtu.be/3-mnx-MMmF4
Esteganografia para esconder ficheiros https://youtu.be/mKltEI8wVFc
Verificar portas abertas no sistema https://youtu.be/JZX1c_J7BU8
How to use the “Nmap, the network mapper” tool to scan the system and map the network, to detect open ports on the system, identifying threats and vulnerabilities that may exist on the system and compromising data security and unauthorized access to system. The network and system administrator can use Nmap to monitor hosts and manage update schedules and service patches, problems with the version of the installed system, and detect services, packet filters, and firewalls that are running on the system. system. By identifying the various vulnerabilities that may exist in the system, the administrator can take precautions to interrupt or block possible threats to the system and improve the cyber security of the system, computer or server.
Related content
Tutorials and Distro Reviews https://bit.ly/3odVU6G (playlist)
Manage access on a Linux system https://youtu.be/b1vTw9gPnLs
Security audit of a Linux system https://youtu.be/PyG-_oO3YoE
Cracking user passwords on a system https://youtu.be/6GhkY-_oC-w
Steganography to hide files within files https://youtu.be/YrknHWxVRLw
Check for open ports on a Linux system https://youtu.be/LU42fFdcFbQ
How to use steganography to hide and encrypt files within files. Using the Steghide tool to encrypt and hide a text file (odt, docx, word) inside an image or photo (jpg, jpeg, png). Thus hiding a password-protected file within other files, which only you know exists, to protect and prevent someone from being able to read the document even if they steal the image file. This process works with any type of file: document, photo, image, video, audio, applications, etc., so you can hide an encrypted file within any other file, maintaining a normal appearance and operation. To perform this process, the user needs to have both files on the computer, choose the file he wants to hide and a password / password for access, and the file he wants to serve as a container and which can be executed normally. Steghide will also allow you to reverse the process, to extract the hidden and encrypted file, to have access to the hidden data again.
Related content
Tutorials and Distro Reviews https://bit.ly/3odVU6G (playlist)
Manage access on a Linux system https://youtu.be/b1vTw9gPnLs
Security audit of a Linux system https://youtu.be/PyG-_oO3YoE
Cracking user passwords on a system https://youtu.be/6GhkY-_oC-w
Steganography to hide files within files https://youtu.be/YrknHWxVRLw
Check for open ports on a Linux system https://youtu.be/LU42fFdcFbQ
How to use the John the Ripper tool to crack or recover the passwords of users of a Linux system. The program will use a predefined dictionary to compare all password hashes for user accounts and thus discover users' secret passwords. This process can be fast, take hours, or days, it depends on the complexity of the passwords that need to be broken, that is why you should use a passphrase instead of a password with letters, numbers and symbols, to make this process difficult or impossible for cyber criminals. As you can see in the tutorial, I will use the passwd and shadow file from a Linux system, and in a matter of seconds I will discover the passwords of 5 users.
John the Ripper is an open source tool for auditing and recovering passwords for operating systems. The program supports hundreds of hash types and encryption, including for: passwords for users of Linux, BSD, Solaris, AIX, QNX, macOS, Windows systems, as well as for web applications such as WordPress, groupware, SQL databases, LDAP, and also capture WPA-PSK WiFi network traffic, SSH encrypted private keys, GnuPG, cryptocurrency wallets. The process can also be applied to ZIP, RAR, 7z, or PDF and Microsoft Office documents, and many others.
Related content
Tutorials and Distro Reviews https://bit.ly/3odVU6G (playlist)
Manage access on a Linux system https://youtu.be/b1vTw9gPnLs
Security audit of a Linux system https://youtu.be/PyG-_oO3YoE
Cracking user passwords on a system https://youtu.be/6GhkY-_oC-w
Steganography to hide files within files https://youtu.be/YrknHWxVRLw
Check for open ports on a Linux system https://youtu.be/LU42fFdcFbQ
How to do a complete security audit
of a Linux, macOS, BSD, Solaris or Unix system with the Lynis tool, to identify
vulnerabilities, security problems, wrong configurations or unprotected
services, and to be able to solve the problems to harden and protect the system
against cybercriminal attacks over the Internet
The Lynis program will make a
detailed scan of the system, and all of its security defenses to detect
problems or vulnerabilities that may exist and compromise access to the system
and data. The results of the scan will be displayed for various categories and
services running, indicating whether everything is fine, installed, poorly
configured, vulnerable, and suggestions you can make to solve the problem,
configure or activate the service.
It is very important that a network administrator and a system or server, perform a professional audit of the system, to improve the security of the system or server, and ensure that the system is not compromised or vulnerable to attacks, does not have services vulnerable to access unauthorized, and able to block cybercriminal attacks via the internet or the local area network (LAN), in order to prevent the system from failing or being the victim of theft of data and stored information.
Related content
Tutorials and Distro Reviews https://bit.ly/3odVU6G (playlist)
Manage access on a Linux system https://youtu.be/b1vTw9gPnLs
Security audit of a Linux system https://youtu.be/PyG-_oO3YoE
Cracking user passwords on a system https://youtu.be/6GhkY-_oC-w
Steganography to hide files within files https://youtu.be/YrknHWxVRLw
Check for open ports on a Linux system https://youtu.be/LU42fFdcFbQ
How to manage access for the users on a Linux system using commands on the terminal/console for system access control. How to create new users, with a password and personal information about each user. Verify that the user has been successfully created and has the respective directory created, and is added to the passswd and shadow file. Create groups and add users to a group so that they can have special group accesses to which the group has access. Administer and change the permissions of users, directories and files, through symbolic and absolute permissions, using the chmod command to add or remove permissions for users, groups and others.
Related content
Tutorials and Distro Reviews https://bit.ly/3odVU6G (playlist)
Manage access on a Linux system https://youtu.be/b1vTw9gPnLs
Security audit of a Linux system https://youtu.be/PyG-_oO3YoE
Cracking user passwords on a system https://youtu.be/6GhkY-_oC-w
Steganography to hide files within files https://youtu.be/YrknHWxVRLw
Check for open ports on a Linux system https://youtu.be/LU42fFdcFbQ
CISCO Cybersecurity Essentials related content
• Lab exercises demonstrations (video playlist) (blog post)
• Quiz Questions and Answers (text blog post) (video playlist)
• Cisco Packet Tracer demonstrations (video playlist)
• Linux OS tutorials and reviews (video playlist)
• Exercícios do curso em Português (video playlist)
Demonstration of the exercises of the Cisco "Cybersecurity Essentials" course. Lab exercices of Packet Tracer and Linux Operating System.
1.5.3.5 Creating a Cyber World (Packet Tracer Lab Exercise)
Objectives
Part 1: Configure the FTP Server
Part 2: Configure the Web Server
Part 3: Configure the Email Server
Part 4: Configure the DNS Server
Part 5: Configure the NTP Server
Part 6: Configure the AAA Server
Background / Scenario: In this activity, you will configure basic server components. The IP addressing configuration is already complete. You will use the Services tab on multiple servers to deploy FTP, Web, Email, DNS, NTP, and AAA services.
In english: https://www.youtube.com/watch?v=t34Ku3fdU14
Em português: https://www.youtube.com/watch?v=a-OH5sMA-fE
1.5.3.6 Communicating in a Cyber World (Packet Tracer)
Objectives
Part 1: Send Email between Users
Part 2: Upload and Download Files using FTP
Part 3: Remotely Access an Enterprise Router using Telnet
Part 4: Remotely Access an Enterprise Router using SSH
Background / Scenario: In this activity, you will communicate across remote networks using common network services. The IP addressing, network configuration, and service configurations are already complete. You will use the client devices in the differing geographic regions to connect to both servers and other client devices.
In english: https://www.youtube.com/watch?v=ql3HTPwVRSw
Em português: https://www.youtube.com/watch?v=tcE3NDryKAs
2.5.2.5 Authentication, Authorization and Accounting (Linux Operating System)
Objectives
• Given a scenario, select the appropriate authentication, authorization, or access control.
• Install and configure security controls when performing account management, based on best practices.
Part 1: Adding Groups, Users, and Passwords on a Linux System.
Part 2: Verify Users, Groups, and Passwords.
Part 3: Using Symbolic Permissions.
Part 4: Absolute Permissions.
Background / Scenario: You will be conducting host security practices using the Linux command line by performing the following tasks: Adding Groups, Users, and Passwords, Verifying Groups, Users, and Passwords, Setting Symbolic Permissions, Setting Absolute Permissions.
In english: https://www.youtube.com/watch?v=ciSIUwrc8mg
Em português: https://www.youtube.com/watch?v=i-_FP2K5zXU
3.3.1.9 Detecting Threats and Vulnerabilities (Linux Operating System)
Objectives: Use Nmap, a port scanner and network mapping tool to detect threats and vulnerabilities on a system.
Background / Scenario: Network Mapper, or Nmap, is an open source utility used for network discovery and security auditing. Administrators also use Nmap for monitoring hosts or managing service upgrade schedules. Nmap determines what hosts are available on a network, what services are running, what operating systems are running, and what packet filters or firewalls are running.
In english: https://www.youtube.com/watch?v=MGm71Z6qikA
Em português: https://www.youtube.com/watch?v=-we-sLQTkQ4
3.3.2.7 WEP/WPA2 PSK/WPA2 RADIUS (Packet Tracer)
Objectives
Part 1: Configure WEP for Healthcare at Home
Part 2: Configure WPA2 PSK for Gotham Healthcare Branch
Part 3: Configure WPA2 RADIUS for Metropolis Bank HQ
Background / Scenario: In this activity, you will configure WiFi networks for all three geographic sites. This activity will utilize WEP, WPA2 PSK, and WPA2 RADIUS to demonstrate the varying configuration of WiFi networks and their security considerations. Healthcare at Home will be setup using WEP. Gotham Healthcare Branch will be configured with WPA2 PSK and Metropolis Bank HQ will be using WPA2 Radius. The IP addressing, network configuration, and service configurations are already complete. You will use the wireless routers and client devices in the differing geographic regions to setup multiple secure wireless networks.
In english: https://www.youtube.com/watch?v=YZD7oofSkB0
Em português: https://www.youtube.com/watch?v=ugmJzmJDA08
4.3.2.3 Using Steganography (Linux Operating System)
Objectives: Use steganography to hide a document within a JPEG file.
Background / Scenario: Steghide is an open source steganography program that hides data in various types of files such as audio and image files. You are going to hide a data file within an image file.
In english: https://www.youtube.com/watch?v=wP6CNdpoEUg
Em português: https://www.youtube.com/watch?v=H5bQmio0hxM
4.3.3.3 Configuring VPN Transport Mode (Packet Tracer)
Objectives
Part 1: Sending Unencrypted FTP Traffic
Part 2: Configuring the VPN Client within Metropolis
Part 3: Sending Encrypted FTP Traffic
Background / Scenario: In this activity, you will observe the transfer of unencrypted FTP traffic between a client and a remote site. You will then configure a VPN client to connect to the Gotham Healthcare Branch site and send encrypted FTP traffic. The IP addressing, network configuration, and service configurations are already complete. You will use a client device within Metropolis Bank HQ to transfer unencrypted and encrypted FTP data.
In english: https://www.youtube.com/watch?v=Yf_LIZWqDPs
Em português: https://www.youtube.com/watch?v=GZ-RduoHCPo
4.3.3.4 Configuring VPN Tunnel Mode (Packet Tracer)
Objectives
Part 1: Sending Unencrypted FTP Traffic
Part 2: Configuring the VPN Tunnel between Metropolis and Gotham
Part 3: Sending Encrypted FTP Traffic
Background / Scenario: In this activity, you will observe the transfer of unencrypted FTP traffic between two geographic sites. You will then configure a VPN tunnel between two geographic sites and send encrypted FTP traffic. The IP addressing, network configuration, and service configurations are already complete. You will use the client devices in the differing geographic regions to transfer FTP data securely and insecurely
In english: https://www.youtube.com/watch?v=YtFDMEZDRxA
Em português: https://www.youtube.com/watch?v=8WDG0WRF0I8
5.1.2.4 Password Cracking (Linux Operating System)
Objectives: Use a password cracking tool to recover a user’s password.
Background / Scenario: There are four user accounts, Alice, Bob, Eve, and Eric, on a Linux system. You will recover these passwords using John the Ripper, an open source password cracking tool.
In english: https://www.youtube.com/watch?v=G-aNvZ8nKeo
Em português: https://www.youtube.com/watch?v=-SOWntE_UM0
6.2.3.8 Router and Switch Redundancy (Packet Tracer)
Objectives
Part 1: Observe a Network Failover with Redundant Routers.
Part 2: Observe a Network Failover with Redundant Switches.
Background / Scenario: In this activity, you will observe the successful failover of the Metropolis network utilizing multiple routers to provide default gateway redundancy. Afterwards across the world, you will observe the successful network failover of the Gotham network utilizing multiple switches to provide redundant network pathways. The IP addressing, network configuration, and service configurations are already complete. You will use the client devices in the differing geographic regions to test the pathways before and after successful network failover.
In english: https://www.youtube.com/watch?v=p8Pjg_McZ7E
Em português: https://www.youtube.com/watch?v=S3GZLQPcFZw
6.2.4.4 Router and Switch Resilience (Packet Tracer)
Objectives
Part 1: Hardening the IOS Configuration
Part 2: Activating the Cisco IOS Resilient Configuration Feature
Background / Scenario: In this activity, you will harden the IOS configuration of a router within the Metropolis network. Afterwards, you will enable the IOS resiliency feature on a Cisco router. The IP addressing, network configuration, and service configurations are already complete. You will use the client devices in the Metropolis network to deploy the IOS resiliency configuration.
In english: https://www.youtube.com/watch?v=YWr5Ttuj2u0
Em português: https://www.youtube.com/watch?v=qhzHHAVKJKQ
7.1.1.6 Hardening a Linux System (Linux Operating System)
Objectives: Demonstrate the use of a security auditing tool to harden a Linux system.
Background / Scenario: Auditing a system for potential misconfigurations or unprotected services is an important aspect of system hardening. Lynis is an open source security auditing tool with an automated set of scripts developed to test a Linux system.
In english: https://www.youtube.com/watch?v=M8jXbJujpfw
Em português: https://www.youtube.com/watch?v=xN40BgbZ0EU
7.4.2.4 Server Firewalls and Router ACLs (Packet Tracer)
Objectives
Part 1: Connect to the Web Server
Part 2: Prevent Unencrypted HTTP Sessions
Part 3: Access the Firewall on the Email Server
Background / Scenario: In this activity, you will access a user within the Metropolis site and connect using HTTP and HTTPS to a remote Web Server. The IP addressing, network configuration, and service configurations are already complete. You will use a client device in the Metropolis site to test connectivity to a remote Web Server and then secure the Metropolis site by preventing unencrypted web sessions from connecting to the outside world.
In english: https://www.youtube.com/watch?v=zehDPIEP7Rw
Em português: https://www.youtube.com/watch?v=Lof2uUMPrgQ
8.3.1.3 Skills Integrated Challenge (Packet Tracer)
Objectives
Upload a file to the FTP/Web server using FTP.
Connect a computer via a client-to-site VPN.
Download a file via ftp using a VPN connection.
Configure and secure a wireless router.
Activate the Cisco IOS resilient configuration feature.
Configure a banner motd message.
Connect a laptop to the wireless network.
Background / Scenario: You will configure a wireless router, upload and download files using FTP, connect securely to a remote site using a VPN, and secure a Cisco IOS router.
In english: https://www.youtube.com/watch?v=cxbAEKyvAkc
Em português: https://www.youtube.com/watch?v=kVZLdzrSNe8
CISCO Cybersecurity Essentials related content
• Lab exercises demonstrations (video playlist) (blog post)
• Quiz Questions and Answers (text blog post) (video playlist)
• Cisco Packet Tracer demonstrations (video playlist)
• Linux OS tutorials and reviews (video playlist)
• Exercícios do curso em Português (video playlist)
How to solve the Lab exercice 8.3.1.3 Skills Integrated Challenge
Objectives
Upload a file to the FTP/Web server using FTP.
Connect a computer via a client-to-site VPN.
Download a file via ftp using a VPN connection.
Configure and secure a wireless router.
Activate the Cisco IOS resilient configuration feature.
Configure a banner motd message.
Connect a laptop to the wireless network.
Background / Scenario: You will configure a wireless router, upload and download files using FTP, connect securely to a remote site using a VPN, and secure a Cisco IOS router.
CISCO Cybersecurity Essentials related content
• Lab exercises demonstrations (video playlist) (blog post)
• Quiz Questions and Answers (text blog post) (video playlist)
• Cisco Packet Tracer demonstrations (video playlist)
• Linux OS tutorials and reviews (video playlist)
• Exercícios do curso em Português (video playlist)
How to solve the Lab exercice 7.4.2.4 Server Firewalls and Router ACLs
Objectives
Part 1: Connect to the Web Server
Part 2: Prevent Unencrypted HTTP Sessions
Part 3: Access the Firewall on the Email Server
Background / Scenario: In this activity, you will access a user within the Metropolis site and connect using HTTP and HTTPS to a remote Web Server. The IP addressing, network configuration, and service configurations are already complete. You will use a client device in the Metropolis site to test connectivity to a remote Web Server and then secure the Metropolis site by preventing unencrypted web sessions from connecting to the outside world.
CISCO Cybersecurity Essentials related content
• Lab exercises demonstrations (video playlist) (blog post)
• Quiz Questions and Answers (text blog post) (video playlist)
• Cisco Packet Tracer demonstrations (video playlist)
• Linux OS tutorials and reviews (video playlist)
• Exercícios do curso em Português (video playlist)
How to solve the Lab exercice 7.1.1.6 Hardening a Linux System
Objectives: Demonstrate the use of a security auditing tool to harden a Linux system.
Background / Scenario: Auditing a system for potential misconfigurations or unprotected services is an important aspect of system hardening. Lynis is an open source security auditing tool with an automated set of scripts developed to test a Linux system.
CISCO Cybersecurity Essentials related content
• Lab exercises demonstrations (video playlist) (blog post)
• Quiz Questions and Answers (text blog post) (video playlist)
• Cisco Packet Tracer demonstrations (video playlist)
• Linux OS tutorials and reviews (video playlist)
• Exercícios do curso em Português (video playlist)
How to solve the Lab exercice 6.2.4.4 Router and Switch Resilience
Objectives
Part 1: Hardening the IOS Configuration
Part 2: Activating the Cisco IOS Resilient Configuration Feature
Background / Scenario: In this activity, you will harden the IOS configuration of a router within the Metropolis network. Afterwards, you will enable the IOS resiliency feature on a Cisco router. The IP addressing, network configuration, and service configurations are already complete. You will use the client devices in the Metropolis network to deploy the IOS resiliency configuration.
CISCO Cybersecurity Essentials related content
• Lab exercises demonstrations (video playlist) (blog post)
• Quiz Questions and Answers (text blog post) (video playlist)
• Cisco Packet Tracer demonstrations (video playlist)
• Linux OS tutorials and reviews (video playlist)
• Exercícios do curso em Português (video playlist)
How to solve the Lab exercice 6.2.3.8 Router and Switch Redundancy
Objectives
Part 1: Observe a Network Failover with Redundant Routers.
Part 2: Observe a Network Failover with Redundant Switches.
Background / Scenario
In this activity, you will observe the successful failover of the Metropolis network utilizing multiple routers to provide default gateway redundancy. Afterwards across the world, you will observe the successful network failover of the Gotham network utilizing multiple switches to provide redundant network pathways. The IP addressing, network configuration, and service configurations are already complete. You will use the client devices in the differing geographic regions to test the pathways before and after successful network failover.
CISCO Cybersecurity Essentials related content
• Lab exercises demonstrations (video playlist) (blog post)
• Quiz Questions and Answers (text blog post) (video playlist)
• Cisco Packet Tracer demonstrations (video playlist)
• Linux OS tutorials and reviews (video playlist)
• Exercícios do curso em Português (video playlist)
How to solve the Lab exercice 5.1.2.4 Password Cracking
Objectives: Use a password cracking tool to recover a user’s password.
Background / Scenario: There are four user accounts, Alice, Bob, Eve, and Eric, on a Linux system. You will recover these passwords using John the Ripper, an open source password cracking tool.
CISCO Cybersecurity Essentials related content
• Lab exercises demonstrations (video playlist) (blog post)
• Quiz Questions and Answers (text blog post) (video playlist)
• Cisco Packet Tracer demonstrations (video playlist)
• Linux OS tutorials and reviews (video playlist)
• Exercícios do curso em Português (video playlist)
How to solve the Lab exercice 4.3.3.4 Configuring VPN Tunnel Mode
Objectives
Part 1: Sending Unencrypted FTP Traffic
Part 2: Configuring the VPN Tunnel between Metropolis and Gotham
Part 3: Sending Encrypted FTP Traffic
Background / Scenario
In this activity, you will observe the transfer of unencrypted FTP traffic between two geographic sites. You will then configure a VPN tunnel between two geographic sites and send encrypted FTP traffic. The IP addressing, network configuration, and service configurations are already complete. You will use the client devices in the differing geographic regions to transfer FTP data securely and insecurely
CISCO Cybersecurity Essentials related content
• Lab exercises demonstrations (video playlist) (blog post)
• Quiz Questions and Answers (text blog post) (video playlist)
• Cisco Packet Tracer demonstrations (video playlist)
• Linux OS tutorials and reviews (video playlist)
• Exercícios do curso em Português (video playlist)
How to solve the Lab exercice 4.3.3.3 Configuring VPN Transport Mode
Objectives
Part 1: Sending Unencrypted FTP Traffic
Part 2: Configuring the VPN Client within Metropolis
Part 3: Sending Encrypted FTP Traffic
Background / Scenario
In this activity, you will observe the transfer of unencrypted FTP traffic between a client and a remote site. You will then configure a VPN client to connect to the Gotham Healthcare Branch site and send encrypted FTP traffic. The IP addressing, network configuration, and service configurations are already complete. You will use a client device within Metropolis Bank HQ to transfer unencrypted and encrypted FTP data.