Entry Level IT Pro Training Live




Jr. Systems Administration Training

Resources

We will be adding more resources at no cost to our members taking live courses.

Soft Skills

Our Team has hand-picked top 10 soft skills courses for our members. This bundle is a must-have for anyone looking to start an IT career or even experience IT professional can take benefit from this package. ZERO cost to members that are taking our live courses or Premium members.

  • Balancing Priorities – 60 Slides
  • Behavioral Interviews – 74 Slides
  • Creative Problem Solving – 90 Slides
  • Ethics In The Workplace – 59 Slides
  • Meetings – 56 – Slides
  • Navigating Difficult Conversations -46 – Slides
  • Solid Business Writing – 66 – Slides
  • Time Management – 98 – Slides
  • Productive Work Habits -63- Slides

The CompTIA Security+ Practice-Lab will provide you with the necessary platform to gain hands-on skills in IT security

Note: This course is under production, Plus and Premium members can access this course while under production.

By completing the lab tasks you will improve your practical skills in identifying threats, attacks and vulnerabilities, access and identity management and risk management.

These same tasks will help you understand the objectives and competencies required by the CompTIA Security+ (SY0-501) certification exam.

The CompTIA Security+ is an intermediate level certificate aimed at IT security professionals, with a minimum of 2 years of IT administration (with a focus on security and day-to-day technical information security experience). This Practice Lab focuses on the practical aspects of the CompTIA Security + (SY0-501) exam objectives. It is therefore advised to refer to your own course materials to gain a deeper understanding of any theoretical aspects of the exam objectives.

It is also recommended that you have gained the following certification before attempting the CompTIA Security+ exam:

CompTIA Network+

No prior hands-on experience is required to use or complete this Practice Lab, however we have assumed that you know how to use a computer and that you are familiar with basic networking concepts and technologies.

Course Curriculum

Module 1: Firewall Rule Based Management
JSS65: Introduction 00:00:41
JSS65: Exercise 1: Task 1 – Verify the Enabled Network Connection 00:01:00
JSS65: Exercise 1: Task 2 – Create a Windows Firewall Rule 00:02:00
JSS65: Exercise 1: Task 3 – Test the Firewall Rule 00:00:57
JSS65: Exercise 1: Task 4 – Reconfigure the Firewall Rule 00:01:00
JSS65: Exercise 2: Task 1 – Verify the Connection 00:01:00
JSS65: Exercise 2: Task 2 – Create a Firewall Rule using Windows Firewall with Advanced Security 00:01:00
JSS65: Exercise 2: Task 3 – Test the Firewall Rule 00:00:37
JSS65: Exercise 2: Task 4 – Reconfigure the Firewall Rule 00:00:57
JSS65: Exercise 3: Task 1 – Setup a Remote Session 00:01:00
JSS65: Exercise 3: Task 2 – Create a Firewall Rule 00:01:00
JSS65: Exercise 3: Task 3 – Verify the Firewall Rule 00:00:59
JSS65: Exercise 3: Task 4 – Reconfigure the Firewall Rule Using the Remote Desktop Connection 00:01:00
JSS65: Exercise 4: Task 1 – Verify Blocked Ping Packets 00:02:00
JSS65: Exercise 4: Task 2 – Configure the Firewall using CLI Commands 00:01:00
JSS65: Exercise 4: Task 3 – Verify the efficacy of the Firewall Rule 00:01:00
JSS65: Exercise 4: Task 4 – Reconfigure the Firewall using CLI 00:01:00
JSS65: Firewall Rule Based Management Summary 00:00:43
Module 2: Firewalls and Evasion
JSS65: Firewalls and Evasion Introduction 00:00:37
JSS65: Exercise 1: Task 1 – Connecting to Virtual Machines 00:02:00
JSS65: Exercise 2: Task 1 – Download and install ZoneAlarm Free Firewall 00:02:00
JSS65: Exercise 2: Task 2 – Verify ZoneAlarm Installation 00:01:00
JSS65: Exercise 2: Task 3 – Uninstall AVG Antivirus 00:01:00
JSS65: Exercise 2: Task 4 – Install ZoneAlarm Antivirus 00:01:00
JSS65: Exercise 3: Task 1 – Managing ZoneAlarm settings 00:01:00
JSS65: Exercise 3: Task 2 – Configure ZoneAlarm to use a proxy server 00:01:00
JSS65: Exercise 3: Task 3 – Update the ZoneAlarm definitions and perform a quick scan 00:01:00
JSS65: Exercise 3: Task 4 – Working with ZoneAlarm logs 00:01:00
JSS65: Exercise 4: Task 1 – Bypass Blocked Sites Using Anonymous Website Surfing Sites 00:03:00
JSS65: Firewalls and Evasion Summary 00:00:38
Module 3: NAT and OpenSSH
JSS65: NAT and OpenSSH Introduction 00:00:36
JSS65: Exercise 1: Task 1 – Resetting the Network Address 00:03:00
JSS65: Exercise 1: Task 2 – Install and Configure Routing and Remote Access 00:05:00
JSS65: Exercise 2: Task 1 – Install SSHD Server 00:05:00
JSS65: Exercise 2: Task 2 – Firewall Rules 00:01:00
JSS65: Exercise 2: Task 3 – Verify SSH Connectivity 00:02:00
JSS65: NAT and OpenSSH Summary 00:00:42
Module 4: Network Vulnerabilities Part 1
JSS65: Network Vulnerabilities Part 1 Introduction 00:00:40
JSS65: Exercise 1: Task 1 – Using Nmap 00:06:00
JSS65: Exercise 1: Task 2 – Using Zenmap 00:05:00
JSS65: Exercise 2: Task 1 – Observe traffic pattern using WireShark 00:01:00
JSS65: Network Vulnerabilities Part 1 Summary 00:00:39
Module 5: Network Vulnerabilities Part 2
JSS65: Network Vulnerabilities Part 2 Introduction 00:00:49
JSS65: Exercise 1: Task 1 – Create a DoS attack scenario 00:09:00
JSS65: Exercise 2: Task 1 – Download and Install Mozilla Firefox 00:02:00
JSS65: Exercise 2: Task 2 – Download and Install Anti-Phishing Toolbar: Netcraft 00:02:00
JSS65: Exercise 2: Task 3 – Verify websites that are phished 00:01:00
JSS65: Network Vulnerabilities Part 2 Summary 00:00:35
Module 6: Application Data - Establish Host Security
JSS65: Application Data – Establish Host Security Introduction 00:00:25
JSS65: Exercise 1: Task 1 – Updating Windows Defender 00:03:00
JSS65: Exercise 1: Task 2 – Using an Online Anti-Malware Scanner 00:02:00
JSS65: Exercise 1: Task 3 – Exploring Internet Explorer Browser Security 00:03:00
JSS65: Application Data – Establish Host Security Summary 00:00:38
Module 7: Configuring IDS and Honeypots
JSS65: Configuring IDS and Honeypots Introduction 00:00:38
JSS65: Exercise 1: Task 1 – Installing Snort 00:02:00
JSS65: Exercise 1: Task 2 – Download Snort Rules 00:01:00
JSS65: Exercise 2: Task 1 – Running Snort Tool 00:03:00
JSS65: Exercise 2: Task 2 – Create folder and rules file in snort folder 00:05:00
JSS65: Exercise 2: Task 1 – Modify snort configuration file 00:14:00
JSS65: Exercise 3: Task 2 – Re-run Snort IDS tool 00:02:00
JSS65: Configuring IDS and Honeypots Summary 00:00:28
Module 8: Password Cracking Tools
JSS65: Password Cracking Tools Introduction 00:00:22
JSS65: Exercise 1: Task 1 – Connecting to Virtual Machines 00:01:00
JSS65: Exercise 1: Task 2 – Install Cain & Abel 00:02:00
JSS65: Exercise 1: Task 3 – Using Cain & Abel 00:03:00
JSS65: Exercise 1: Task 4 – Using PWdump7 00:07:00
JSS65: Exercise 1: Task 5 – Disable LM HASH 00:03:00
JSS65: Exercise 1: Task 6 – LM Hash Generation 00:02:00
JSS65: Exercise 1: Task 7 – Detecting Rootkits 00:03:00
JSS65: Password Cracking Tools Summary 00:00:39
Module 9: Implementing DNSSEC
JSS65: Implementing DNSSEC Introduction 00:00:42
JSS65: Exercise 1: Task 1 – Create a Zone 00:03:00
JSS65: Exercise 1: Task 2 – Create Sample Resource Records 00:01:00
JSS65: Exercise 1: Task 3 – Create a Non-Authoritative DNS Server 00:03:00
JSS65: Exercise : Task 4 – Create a Secondary Domain Controller 00:03:00
JSS65: Exercise 2: Task 1 – Sign the Zone Using Default Settings 00:01:00
JSS65: Exercise 2: Task 2 – Distribute the TA to a Non-Authoritative DNS Server 00:04:00
JSS65: Exercise 2: Task 3 – Verify DNSKEY Trust Anchors 00:02:00
JSS65: Exercise 2: Task 4 – Distribute TAs to a Secondary Domain Controller 00:02:00
JSS65: Exercise 2: Task 5 – Query a Signed Zone without DNSSEC Validation Required 00:02:00
JSS65: Exercise 2: Task 6 – Configure Support for DNSSEC in GPO 00:04:00
JSS65: Exercise 2: Task 7 – Query a Signed Zone with DNSSEC Validation Required 00:03:00
JSS65: Exercise 3: Task 1 – Unsign the Secure Zone 00:01:00
JSS65: Exercise 3: Task 2 – Re-Sign secure.practicelabs.com with Custom Parameters 00:05:00
JSS65: Exercise 3: Task 3 – Show Failed and Unsecured Validation 00:04:00
JSS65: Implementing DNSSEC Summary 00:00:36
Module 10: Social Engineering Reconnaissance
JSS65: Social Engineering Reconnaissance Introduction 00:00:22
JSS65: Exercise 1: Task 1 – Log into MyBook 00:00:00
JSS65: Exercise 1: Task 2 – Exploring and Gathering Information 00:03:00
JSS65: Social Engineering Reconnaissance Summary 00:01:00
Module 11: Encryption and Hashing
JSS65: Encryption and Hashing Introduction 00:00:51
JSS65: Exercise 1: Task 1 – CryptoDemo Installation 00:02:00
JSS65: Exercise 1: Task 2 – CryptoDemo Encryption 00:01:00
JSS65: Exercise 1: Task 3 – CryptoDemo Decryption 00:01:00
JSS65: Exercise 1: Task 4 – Key Values 00:01:00
JSS65: Exercise 1: Task 5 – Hashing 00:01:00
JSS65: Exercise 2: Task 1 – Install HashCalc 00:01:00
JSS65: Exercise 2: Task 2 – Using HashCalc 00:06:00
JSS65: Exercise 3: Task 1 – Grabbing Website Hash Values 00:02:00
JSS65: Exercise 3: Task 2 – Using Online Comparison Tool 00:03:00
JSS65: Encryption and Hashing Summary 00:00:49
Module 12: Understanding PKI Concepts
JSS65: Understanding PKI Concepts Introduction 00:00:45
JSS65: Exercise 1: Task 1 – Install Active Directory Enterprise Root Certificate Service 00:03:00
JSS65: Exercise 1: Task 2 – Configure Active Directory Certificate Services 00:03:00
JSS65: Exercise 1: Task 3 – Install Subordinate CA 00:03:00
JSS65: Exercise 1: Task 4 – Configure Subordinate CA 00:03:00
JSS65: Exercise 2: Task 1 – Request User Certificates 00:08:00
JSS65: Exercise 2: Task 2 – Verify Issued Certificate 00:02:00
JSS65: Exercise 2: Task 3 – Configure a new path for CRLs 00:02:00
JSS65: Exercise 2: Task 4 – Adding Certificate Managers 00:00:39
JSS65: Understanding PKI Concepts Summary 00:00:52
Module 13: Backup and Recovery
JSS65: Backup and Recovery Introduction 00:00:29
JSS65: Exercise 1: Task 1 – Create a secondary virtual hard disk on a Hyper-V virtual machine 00:03:00
JSS65: Exercise 1: Task 2 – Use diskpart to create and prepare a secondary disk for storage 00:05:00
JSS65: Exercise 1: Task 3 – Install Windows Server Backup on a Domain Controller 00:01:00
JSS65: Exercise 1: Task 4 – Install Windows Server Backup on a Domain Member 00:02:00
JSS65: Exercise 2: Task 1 – Create a scheduled backup in Windows Server Backup 00:04:00
JSS65: Exercise 2: Task 2 – Perform a single backup 00:02:00
JSS65: Exercise 2: Task 3 – Restore a backup 00:02:00
JSS65: Backup and Recovery Summary 00:00:45
Module 14: Implement Patching using WSUS
JSS65: Implement Patching using WSUS Introduction 00:00:50
JSS65: Exercise 1: Task 1 – Initialize Disk Storage for WSUS 00:02:00
JSS65: Exercise 1: Task 2 – Install and Configure WSUS 00:08:00
JSS65: Exercise 1: Task 3 – Enable SSL for WSUS Server 00:05:00
JSS65: Exercise 1: Task 4 – Configure domain to trust self-signed certificate 00:03:00
JSS65: Exercise 2: Task 1 – Create Computer Groups 00:02:00
JSS65: Exercise 2: Task 2 – Approve Downloaded Updates 00:02:00
JSS65: Exercise 3: Task 1 – Create a GPO for Update Services Client 00:06:00
JSS65: Exercise 3: Task 2 – Verify WSUS Client Functionality 00:06:00
JSS65: Implement Patching using WSUS Summary 00:01:00
Module 15: Managing Local Storage and Virtual Hard Disks
JSS65: Managing Local Storage and Virtual Hard Disks Introduction 00:00:42
JSS65: Exercise 1: Task 1 – Configuring Disk Volumes with Resilient File System (ReFS) 00:06:00
JSS65: Exercise 1: Task 2 – Creating a mirrored disk volume 00:02:00
JSS65: Exercise 1: Task 3 – Creating a RAID 5 disk volume 00:02:00
JSS65: Exercise 1: Task 4 – Creating a striped volume 00:02:00
JSS65: Exercise 2: Task 1 – Create a Virtual Hard Disk 00:03:00
JSS65: Exercise 2: Task 2 – Managing Virtual Hard Disks 00:04:00
JSS65: Managing Local Storage and Virtual Hard Disks Summary 00:00:48
Module 16: Implementing a Network Policy Server
JSS65: Implementing a Network Policy Server Introduction 00:00:37
JSS65: Exercise 1: Task 1 – Install the Network Policy Server 00:01:00
JSS65: Exercise 1: Task 2 – Configure the Network Policy Service 00:02:00
JSS65: Exercise 1: Task 3 – Configure the Network Policy Server Logs 00:01:00
JSS65: Exercise 1: Task 4 – Prepare the VPN Interface 00:02:00
JSS65: Exercise 1: Task 5 – Install the Remote Access Service 00:01:00
JSS65: Exercise 1: Task 6 – Initialize Routing and Remote Access 00:02:00
JSS65: Exercise 1: Task 7 – Configure the Network Policy 00:05:00
JSS65: Exercise 2: Task 1 – Configure the VPN Ports 00:00:00
JSS65: Exercise 2: Task 2 – Create a VPN Client Connection 00:02:00
JSS65: Exercise 2: Task 3 – View the Details of the VPN Connection 00:01:00
JSS65: Exercise 2: Task 4 – Test the VPN Connection 00:02:00
JSS65: Exercise 3: Task 1 – Examine the NPS Log 00:02:00
JSS65: Exercise 3: Task 2 – Install the NPS Log Reader 00:01:00
JSS65: Exercise 3: Task 3 – Read the NPS Log Using the Third-Party Reader 00:01:00
JSS65: Exercise 3: Task 4 – Export NPS Templates 00:01:00
JSS65: Implementing a Network Policy Server Summary 00:00:46
Module 17: Managing Certificates
JSS65: Managing Certificates Introduction 00:00:36
JSS65: Exercise 1: Task 1 – Add AD Certificate Services and Certificate Web Enrollment Services 00:02:00
JSS65: Exercise 1: Task 2 – Install AD Certificate Enterprise CA and CA Web Enrollment Service 00:02:00
JSS65: Exercise 2: Task 1 – Configure a customized certificate template 00:04:00
JSS65: Exercise 2: Task 2 – Create group policy for certificate auto enrollment 00:03:00
JSS65: Exercise 2: Task 3 – Verify the certificate issuance 00:01:00
JSS65: Exercise 3: Task 1 – Enable a Key Recovery Agent 00:00:58
JSS65: Exercise 3: Task 2 – Request for Key Recovery Agent Certificate 00:02:00
JSS65: Exercise 3: Task 3- Issue Key Recovery Agent certificate 00:02:00
JSS65: Exercise 3: Task 4 – Configure CA for Key Archival 00:01:00
JSS65: Exercise 3: Task 5 – Create a new certificate template enabled for archiving 00:02:00
JSS65: Exercise 4: Task 1 – Request for new certificate 00:02:00
JSS65: Exercise 4: Task 2 – Encrypt user folder using EFS 00:02:00
JSS65: Exercise 4: Task 3 – Delete and re-create user account 00:02:00
JSS65: Exercise 4: Task 4 – Test access to encrypted folder as re-created user account 00:01:00
JSS65: Exercise 5: Task 1 – Import Key Recovery Agent certificate 00:03:00
JSS65: Exercise 5: Task 2 – Using CERTUTIL to recover archived keys 00:00:46
JSS65: Managing Certificates Summary 00:00:34
Module 18: Protocols and Services - SNMP
JSS65: Protocols and Services – SNMP Introduction 00:00:33
JSS65: Exercise 1: Task 1 – Install The Dude-Server Monitoring software 00:02:00
JSS65: Exercise 2: Task 1 – SNMP Agent 00:05:00
JSS65: Exercise 3: Task 1 – Using THE DUDE Application 00:07:00
JSS65: Protocols and Services – SNMP Summary 00:00:34
Module 19: Data Encryption
JSS65: Data Encryption Introuction 00:00:42
JSS65: Exercise 1: Task 1 – Configure BitLocker settings via GPO 00:05:00
JSS65: Exercise 1: Task 2 – Shrink the Existing Drive 00:03:00
JSS65: Exercise 1: Task 3 – Enable BitLocker 00:04:00
JSS65: Exercise 1: Task 4 – Verify BitLocker functionality 00:01:00
JSS65: Exercise 1: Task 5 – Manage BitLocker using the command prompt 00:01:00
JSS65; Exercise 1: Task 6 – Unlock the Encrypted Drive using Recovery Keys 00:04:00
JSS65: Exercise 1: Task 7 – Remove BitLocker disk encryption on Drive E 00:01:00
JSS65: Exercise 2: Task 1 – Configure restrictions for removable media using GPO 00:02:00
JSS65: Data Encryption Summary 00:00:27
Module 20: Implementing Software RAID
JSS65: Implementing Software RAID Introduction 00:00:32
JSS65: Exercise 1: Task 1 – Creating RAID-5 Volume 00:05:00
JSS65: Exercise 1: Task 2 – Creating Mirrored Volume 00:02:00
JSS65: Exercise 1 Task 3 – Create Striped Volume 00:02:00
JSS65: Implementing Software RAID Summary 00:00:38
Module 21: Introduction to Digital Forensics
JSS65: Introduction to Digital Forensics 00:00:36
JSS65: Exercise 1: Task 1 – Using ProDiscover Basic to Acquire a Drive Image 00:04:00
JSS65: Exercise 2: Task 1 – Using ProDiscovery to Analyze Evidence 00:03:00
JSS65: Exercise 2: Task 2 – Analyzing data 00:02:00
JSS65: Exercise 2: Task 3 – Creating a Report 00:01:00
JSS65: Exercise 2: Task 4 – View the Report 00:01:00
JSS65: Exercise 2: Task 5 – Export the Report 00:03:00
JSS65: Exercise 3: Task 1 – Image Examination 00:04:00
JSS65: Exercise 3: Task 2 – Examine Key Words 00:03:00
JSS65: Exercise 3: Task 3 – Allocated Data 00:02:00
JSS65: Exercise 4: Task 1 – Report listing for unallocated files 00:00:52
JSS65: Exercise 5: Task 1 – Keyword Examination 00:01:00
JSS65: Introduction to Digital Forensics Summary 00:00:35
Module 22: Implementing AD Federation Services
JSS65: Implementing AD Federation Services Introduction 00:00:32
JSS65: Exercise 1: Task 1 – Add and install AD Certificate Services 00:02:00
JSS65: Exercise 1: Task 2 – Export root CA certificate to a file 00:01:00
JSS65: Exercise 1: Task 3 – Configure custom certificate template on CA server 00:02:00
JSS65: Exercise 1: Task 4 – Allow issuance of new template 00:00:57
JSS65: Exercise 1: Task 5 – Request web certificate for ADFS server 00:05:00
JSS65: Exercise 2: Task 1 – Install a new AD DS forest 00:02:00
JSS65: Exercise 2: Task 2 – Install and configure AD Certificate Services 00:02:00
JSS65: Exercise 2: Task 3 – Export root CA certificate 00:01:00
JSS65: Exercise 2: Task 4 – Configure custom certificate template on CA server 00:01:00
JSS65: Exercise 2: Task 5 – Allow issuance of new template 00:00:50
JSS65: Exercise 2: Task 6 – Request web certificate for ADFS server 00:03:00
JSS65: Exercise 2: Task 7 – Create GPO for trusted root CA in PRACTICELABS.COM and PRACTICEIT.CO.UK domains 00:04:00
JSS65: Exercise 3: Task 1 – Configure alternate DNS and DNS forwarding 00:07:00
JSS65: Exercise 4: Task 1 – Install IIS on PLABDM01 00:04:00
JSS65: Exercise 4: Task 2 – Request computer certificate for IIS 00:04:00
JSS65: Exercise 4: Task 3 – Configure SSL bindings 00:01:00
JSS65: Exercise 4: Task 4 – Download a sample claims application 00:01:00
JSS65: Exercise 4: Task 5 – Add web application 00:01:00
JSS65: Exercise 5: Task 1 – Install IIS on PLABDC01 and PLABSA01 that will run AD FS 00:02:00
JSS65: Exercise 5: Task 2 – Add ADFS feature in resource partner 00:01:00
JSS65: Exercise 5: Task 3 – Configure a standalone federation server 00:03:00
JSS65: Exercise 5: Task 4 – Verify the availability of federation metadata on AD FS Server 00:03:00
JSS65: Exercise 5: Task 5 – Install AD FS in accounts partner domain 00:01:00
JSS65: Exercise 5: Task 6 – Configure a standalone federation server in accounts partner organization 00:02:00
JSS65: Exercise 5: Task 7 – Verify the availability of federation metadata on AD FS Server on accounts partner 00:00:35
JSS65: Exercise 6: Task 1 – Enable claims provider trust 00:04:00
JSS65: Exercise 6: Task 2 – Configure the Windows Identity Foundation Federation Utility 00:04:00
JSS65: Exercise 6: Task 3 – Configure a relying party trust for the claims web application 00:03:00
JSS65: Exercise 6: Task 4 – Configure claim rules for the relying party trust 00:05:00
JSS65: Exercise 6: Task 5 – Create a claims provider trust for the claims web application 00:02:00
JSS65: Exercise 6: Task 6 – Configure claim rules for the claims provider trust 00:02:00
JSS65: Implementing AD Federation Services Summary 00:00:44
Module 23: Configuring RADIUS
JSS65: Configuring RADIUS Introduction 00:00:31
JSS65: Exercise 1: Task 1 – Add PLABSA01 to a domain 00:04:00
JSS65: Exercise 1: Task 2 – Install Network Policy Server 00:01:00
JSS65: Exercise 1: Task 3 – Configure Network Policy Service 00:02:00
JSS65: Exercise 1: Task 4 – Configure Network Policy Server Logs 00:01:00
JSS65: Exercise 2: Task 1 – Prepare the VPN Interface 00:02:00
JSS65: Exercise 2: Task 2 – Install Remote Access Service 00:01:00
JSS65: Exercise 2: Task 3 – Initialize Remote Access Management 00:03:00
JSS65: Exercise 2: Task 4 – Configure Authentication and Accounting Providers 00:01:00
JSS65: Exercise 2: Task 5 – Configuring the VPN Ports 00:01:00
JSS65: Exercise 2: Task 6 – Specify the VPN Adapter 00:00:42
JSS65: Exercise 2: Task 7 – Grant VPN dial-in permission 00:01:00
JSS65: Exercise 3: Task 1 – Configure secondary IP address for VPN client 00:02:00
JSS65: Exercise 3: Task 2 – Create VPN Client dialler 00:03:00
JSS65: Exercise 3: Task 3 – Check the Status of a VPN Connection 00:01:00
JSS65: Exercise 4: Task 1 – Examine the NPS Logs 00:01:00
JSS65: Exercise 4: Task 2 – Install Tools to Read the NPS Logs 00:01:00
JSS65: Exercise 4: Task 3 – Read the NPS Logs 00:01:00
JSS65: Exercise 4: Task 4- Export NPS Templates 00:02:00
JSS65: Configuring RADIUS Summary 00:00:48
Module 24: Install and Configure Network Load Balancing
JSS65: Install and Configure Network Load Balancing Introduction 00:01:00
JSS65: Exercise 1: Task 1 – Install IIS 00:03:00
JSS65: Exercise 1: Task 2 – Install NLB on Servers 00:03:00
JSS65: Exercise 2: Task 1 – Create the First NLB Cluster Node 00:02:00
JSS65: Exercise 2: Task 2 – Configure DNS 00:02:00
JSS65: Exercise 3: Task 1 – Add a Second Server to the Cluster 00:03:00
JSS65: Exercise 4: Task 1 – Study the Working of an NLB Cluster 00:03:00
JSS65: Exercise 5: Task 1 – Configure Port Rules 00:08:00
JSS65: Exercise 5: Task 2 – Validate Port Rules 00:02:00
JSS65: Exercise 5: Task 3 – Validate High Availability of NLB Cluster 00:00:41
JSS65: Install and Configure Network Load Balancing Summary 00:00:35
Module 25: Scanning and Remediating Vulnerabilities with OpenVAS
JSS65: Scanning and Remediating Vulnerabilities with OpenVAS Introduction 00:00:46
JSS65: Exercise 1: Task 1 – Connecting to Win10 and Kali 00:01:00
JSS65: Exercise 2: Task 1 – Starting up OpenVAS 00:04:00
JSS65: Exercise 2: Task 2 – Using OpenVAS 00:05:00
JSS65: Exercise 2: Task 3 – OpenVAS Scanning 00:03:00
JSS65: Exercise 3: Task 1 – Editing Security Advanced Security Settings for Pre-Windows 00:03:00
JSS65: Exercise 3: Task 2 – Editing Network Access 00:05:00
JSS65: Exercise 3: Task 3 – Reconfiguring Regedit Values 00:01:00
JSS65: Exercise 3: Task 4 – Network Configuration for NetBIOS 00:01:00
JSS65: Exercise 3: Task 5 -Advanced Firewall Configurations 00:02:00
JSS65: Exercise 4: Task 1 – Rescanning with OpenVAS 00:02:00
JSS65: Scanning and Remediating Vulnerabilities with OpenVAS Summary 00:00:48

Course Reviews

N.A

ratings
  • 5 stars0
  • 4 stars0
  • 3 stars0
  • 2 stars0
  • 1 stars0

No Reviews found for this course.

TAKE THIS COURSE
5 STUDENTS ENROLLED

New to IT? Watch this video

Mission

This platform is open to all professionals seeking information related to their jobs or those who would like to learn or Teach job skills.
Become a Partner

ABOUT

Jobskillshare is home to skill sharing. It provides an opportunity to those who want to learn new skills, improve on their current skills, and last but not least share their valued skills
Read More

SUPPORT

Email: support@jobskillshare.org

Voice Mail: 530 -431- 8008 (USA)

 Need Help?

Certificate Code

  • PMI, Project Management Institute, Project Management Professional (PMP), PMP, Certified Associate in Project Management (CAPM), CAPM, PMI Agile Certified Practitioner (PMI-ACP), PMI-ACP,
  • PMI Risk Management Professional (PMI-RMP), PMI-RMP, PMBOK, PgMP, PULSE OF THE PROFESSION, THE PMI TALENT TRIANGLE and The PMI REP Logo are registered marks of the Project Management Institute, Inc.
  • Accredited ITIL® training is provided by itSM Solutions, a Acquiros Accredited Training Organization. ITIL® and PRINCE2® are registered trade marks of the Axelos LTD. The Swirl logo™ is a trade mark of the Axelos LTD. CCNA, CCNP, Cisco are registered trademarks or trademarks of Cisco Systems, Inc. All other trademarks mentioned on this site are the property of their respective owners.
top
© Jobskillshare. All rights reserved 2019

Processing...

Login

Create an Account

Forgot

Create an Account Login

Register

By Signing up, you agree to our Terms of Services, Privacy Policy and GDPR Policy
Already Member ? Login Now.
X