Note: This course is under production, Plus and Premium members can access this course while under production.
By completing the lab tasks you will improve your practical skills in identifying threats, attacks and vulnerabilities, access and identity management and risk management.
These same tasks will help you understand the objectives and competencies required by the CompTIA Security+ (SY0-501) certification exam.
The CompTIA Security+ is an intermediate level certificate aimed at IT security professionals, with a minimum of 2 years of IT administration (with a focus on security and day-to-day technical information security experience). This Practice Lab focuses on the practical aspects of the CompTIA Security + (SY0-501) exam objectives. It is therefore advised to refer to your own course materials to gain a deeper understanding of any theoretical aspects of the exam objectives.
It is also recommended that you have gained the following certification before attempting the CompTIA Security+ exam:
CompTIA Network+
No prior hands-on experience is required to use or complete this Practice Lab, however we have assumed that you know how to use a computer and that you are familiar with basic networking concepts and technologies.
-
- JSS65: Introduction 00:00:41
- JSS65: Exercise 1: Task 1 – Verify the Enabled Network Connection 00:01:00
- JSS65: Exercise 1: Task 2 – Create a Windows Firewall Rule 00:02:00
- JSS65: Exercise 1: Task 3 – Test the Firewall Rule 00:00:57
- JSS65: Exercise 1: Task 4 – Reconfigure the Firewall Rule 00:01:00
- JSS65: Exercise 2: Task 1 – Verify the Connection 00:01:00
- JSS65: Exercise 2: Task 2 – Create a Firewall Rule using Windows Firewall with Advanced Security 00:01:00
- JSS65: Exercise 2: Task 3 – Test the Firewall Rule 00:00:37
- JSS65: Exercise 2: Task 4 – Reconfigure the Firewall Rule 00:00:57
- JSS65: Exercise 3: Task 1 – Setup a Remote Session 00:01:00
- JSS65: Exercise 3: Task 2 – Create a Firewall Rule 00:01:00
- JSS65: Exercise 3: Task 3 – Verify the Firewall Rule 00:00:59
- JSS65: Exercise 3: Task 4 – Reconfigure the Firewall Rule Using the Remote Desktop Connection 00:01:00
- JSS65: Exercise 4: Task 1 – Verify Blocked Ping Packets 00:02:00
- JSS65: Exercise 4: Task 2 – Configure the Firewall using CLI Commands 00:01:00
- JSS65: Exercise 4: Task 3 – Verify the efficacy of the Firewall Rule 00:01:00
- JSS65: Exercise 4: Task 4 – Reconfigure the Firewall using CLI 00:01:00
- JSS65: Firewall Rule Based Management Summary 00:00:43
-
- JSS65: Firewalls and Evasion Introduction 00:00:37
- JSS65: Exercise 1: Task 1 – Connecting to Virtual Machines 00:02:00
- JSS65: Exercise 2: Task 1 – Download and install ZoneAlarm Free Firewall 00:02:00
- JSS65: Exercise 2: Task 2 – Verify ZoneAlarm Installation 00:01:00
- JSS65: Exercise 2: Task 3 – Uninstall AVG Antivirus 00:01:00
- JSS65: Exercise 2: Task 4 – Install ZoneAlarm Antivirus 00:01:00
- JSS65: Exercise 3: Task 1 – Managing ZoneAlarm settings 00:01:00
- JSS65: Exercise 3: Task 2 – Configure ZoneAlarm to use a proxy server 00:01:00
- JSS65: Exercise 3: Task 3 – Update the ZoneAlarm definitions and perform a quick scan 00:01:00
- JSS65: Exercise 3: Task 4 – Working with ZoneAlarm logs 00:01:00
- JSS65: Exercise 4: Task 1 – Bypass Blocked Sites Using Anonymous Website Surfing Sites 00:03:00
- JSS65: Firewalls and Evasion Summary 00:00:38
- JSS65: NAT and OpenSSH Introduction 00:00:36
- JSS65: Exercise 1: Task 1 – Resetting the Network Address 00:03:00
- JSS65: Exercise 1: Task 2 – Install and Configure Routing and Remote Access 00:05:00
- JSS65: Exercise 2: Task 1 – Install SSHD Server 00:05:00
- JSS65: Exercise 2: Task 2 – Firewall Rules 00:01:00
- JSS65: Exercise 2: Task 3 – Verify SSH Connectivity 00:02:00
- JSS65: NAT and OpenSSH Summary 00:00:42
- JSS65: Network Vulnerabilities Part 2 Introduction 00:00:49
- JSS65: Exercise 1: Task 1 – Create a DoS attack scenario 00:09:00
- JSS65: Exercise 2: Task 1 – Download and Install Mozilla Firefox 00:02:00
- JSS65: Exercise 2: Task 2 – Download and Install Anti-Phishing Toolbar: Netcraft 00:02:00
- JSS65: Exercise 2: Task 3 – Verify websites that are phished 00:01:00
- JSS65: Network Vulnerabilities Part 2 Summary 00:00:35
- JSS65: Configuring IDS and Honeypots Introduction 00:00:38
- JSS65: Exercise 1: Task 1 – Installing Snort 00:02:00
- JSS65: Exercise 1: Task 2 – Download Snort Rules 00:01:00
- JSS65: Exercise 2: Task 1 – Running Snort Tool 00:03:00
- JSS65: Exercise 2: Task 2 – Create folder and rules file in snort folder 00:05:00
- JSS65: Exercise 2: Task 1 – Modify snort configuration file 00:14:00
- JSS65: Exercise 3: Task 2 – Re-run Snort IDS tool 00:02:00
- JSS65: Configuring IDS and Honeypots Summary 00:00:28
- JSS65: Implementing DNSSEC Introduction 00:00:42
- JSS65: Exercise 1: Task 1 – Create a Zone 00:03:00
- JSS65: Exercise 1: Task 2 – Create Sample Resource Records 00:01:00
- JSS65: Exercise 1: Task 3 – Create a Non-Authoritative DNS Server 00:03:00
- JSS65: Exercise : Task 4 – Create a Secondary Domain Controller 00:03:00
- JSS65: Exercise 2: Task 1 – Sign the Zone Using Default Settings 00:01:00
- JSS65: Exercise 2: Task 2 – Distribute the TA to a Non-Authoritative DNS Server 00:04:00
- JSS65: Exercise 2: Task 3 – Verify DNSKEY Trust Anchors 00:02:00
- JSS65: Exercise 2: Task 4 – Distribute TAs to a Secondary Domain Controller 00:02:00
- JSS65: Exercise 2: Task 5 – Query a Signed Zone without DNSSEC Validation Required 00:02:00
- JSS65: Exercise 2: Task 6 – Configure Support for DNSSEC in GPO 00:04:00
- JSS65: Exercise 2: Task 7 – Query a Signed Zone with DNSSEC Validation Required 00:03:00
- JSS65: Exercise 3: Task 1 – Unsign the Secure Zone 00:01:00
- JSS65: Exercise 3: Task 2 – Re-Sign secure.practicelabs.com with Custom Parameters 00:05:00
- JSS65: Exercise 3: Task 3 – Show Failed and Unsecured Validation 00:04:00
- JSS65: Implementing DNSSEC Summary 00:00:36
- JSS65: Encryption and Hashing Introduction 00:00:51
- JSS65: Exercise 1: Task 1 – CryptoDemo Installation 00:02:00
- JSS65: Exercise 1: Task 2 – CryptoDemo Encryption 00:01:00
- JSS65: Exercise 1: Task 3 – CryptoDemo Decryption 00:01:00
- JSS65: Exercise 1: Task 4 – Key Values 00:01:00
- JSS65: Exercise 1: Task 5 – Hashing 00:01:00
- JSS65: Exercise 2: Task 1 – Install HashCalc 00:01:00
- JSS65: Exercise 2: Task 2 – Using HashCalc 00:06:00
- JSS65: Exercise 3: Task 1 – Grabbing Website Hash Values 00:02:00
- JSS65: Exercise 3: Task 2 – Using Online Comparison Tool 00:03:00
- JSS65: Encryption and Hashing Summary 00:00:49
- JSS65: Backup and Recovery Introduction 00:00:29
- JSS65: Exercise 1: Task 1 – Create a secondary virtual hard disk on a Hyper-V virtual machine 00:03:00
- JSS65: Exercise 1: Task 2 – Use diskpart to create and prepare a secondary disk for storage 00:05:00
- JSS65: Exercise 1: Task 3 – Install Windows Server Backup on a Domain Controller 00:01:00
- JSS65: Exercise 1: Task 4 – Install Windows Server Backup on a Domain Member 00:02:00
- JSS65: Exercise 2: Task 1 – Create a scheduled backup in Windows Server Backup 00:04:00
- JSS65: Exercise 2: Task 2 – Perform a single backup 00:02:00
- JSS65: Exercise 2: Task 3 – Restore a backup 00:02:00
- JSS65: Backup and Recovery Summary 00:00:45
- JSS65: Managing Local Storage and Virtual Hard Disks Introduction 00:00:42
- JSS65: Exercise 1: Task 1 – Configuring Disk Volumes with Resilient File System (ReFS) 00:06:00
- JSS65: Exercise 1: Task 2 – Creating a mirrored disk volume 00:02:00
- JSS65: Exercise 1: Task 3 – Creating a RAID 5 disk volume 00:02:00
- JSS65: Exercise 1: Task 4 – Creating a striped volume 00:02:00
- JSS65: Exercise 2: Task 1 – Create a Virtual Hard Disk 00:03:00
- JSS65: Exercise 2: Task 2 – Managing Virtual Hard Disks 00:04:00
- JSS65: Managing Local Storage and Virtual Hard Disks Summary 00:00:48
- JSS65: Managing Certificates Introduction 00:00:36
- JSS65: Exercise 1: Task 1 – Add AD Certificate Services and Certificate Web Enrollment Services 00:02:00
- JSS65: Exercise 1: Task 2 – Install AD Certificate Enterprise CA and CA Web Enrollment Service 00:02:00
- JSS65: Exercise 2: Task 1 – Configure a customized certificate template 00:04:00
- JSS65: Exercise 2: Task 2 – Create group policy for certificate auto enrollment 00:03:00
- JSS65: Exercise 2: Task 3 – Verify the certificate issuance 00:01:00
- JSS65: Exercise 3: Task 1 – Enable a Key Recovery Agent 00:00:58
- JSS65: Exercise 3: Task 2 – Request for Key Recovery Agent Certificate 00:02:00
- JSS65: Exercise 3: Task 3- Issue Key Recovery Agent certificate 00:02:00
- JSS65: Exercise 3: Task 4 – Configure CA for Key Archival 00:01:00
- JSS65: Exercise 3: Task 5 – Create a new certificate template enabled for archiving 00:02:00
- JSS65: Exercise 4: Task 1 – Request for new certificate 00:02:00
- JSS65: Exercise 4: Task 2 – Encrypt user folder using EFS 00:02:00
- JSS65: Exercise 4: Task 3 – Delete and re-create user account 00:02:00
- JSS65: Exercise 4: Task 4 – Test access to encrypted folder as re-created user account 00:01:00
- JSS65: Exercise 5: Task 1 – Import Key Recovery Agent certificate 00:03:00
- JSS65: Exercise 5: Task 2 – Using CERTUTIL to recover archived keys 00:00:46
- JSS65: Managing Certificates Summary 00:00:34
- JSS65: Data Encryption Introuction 00:00:42
- JSS65: Exercise 1: Task 1 – Configure BitLocker settings via GPO 00:05:00
- JSS65: Exercise 1: Task 2 – Shrink the Existing Drive 00:03:00
- JSS65: Exercise 1: Task 3 – Enable BitLocker 00:04:00
- JSS65: Exercise 1: Task 4 – Verify BitLocker functionality 00:01:00
- JSS65: Exercise 1: Task 5 – Manage BitLocker using the command prompt 00:01:00
- JSS65; Exercise 1: Task 6 – Unlock the Encrypted Drive using Recovery Keys 00:04:00
- JSS65: Exercise 1: Task 7 – Remove BitLocker disk encryption on Drive E 00:01:00
- JSS65: Exercise 2: Task 1 – Configure restrictions for removable media using GPO 00:02:00
- JSS65: Data Encryption Summary 00:00:27
- JSS65: Introduction to Digital Forensics 00:00:36
- JSS65: Exercise 1: Task 1 – Using ProDiscover Basic to Acquire a Drive Image 00:04:00
- JSS65: Exercise 2: Task 1 – Using ProDiscovery to Analyze Evidence 00:03:00
- JSS65: Exercise 2: Task 2 – Analyzing data 00:02:00
- JSS65: Exercise 2: Task 3 – Creating a Report 00:01:00
- JSS65: Exercise 2: Task 4 – View the Report 00:01:00
- JSS65: Exercise 2: Task 5 – Export the Report 00:03:00
- JSS65: Exercise 3: Task 1 – Image Examination 00:04:00
- JSS65: Exercise 3: Task 2 – Examine Key Words 00:03:00
- JSS65: Exercise 3: Task 3 – Allocated Data 00:02:00
- JSS65: Exercise 4: Task 1 – Report listing for unallocated files 00:00:52
- JSS65: Exercise 5: Task 1 – Keyword Examination 00:01:00
- JSS65: Introduction to Digital Forensics Summary 00:00:35
- JSS65: Configuring RADIUS Introduction 00:00:31
- JSS65: Exercise 1: Task 1 – Add PLABSA01 to a domain 00:04:00
- JSS65: Exercise 1: Task 2 – Install Network Policy Server 00:01:00
- JSS65: Exercise 1: Task 3 – Configure Network Policy Service 00:02:00
- JSS65: Exercise 1: Task 4 – Configure Network Policy Server Logs 00:01:00
- JSS65: Exercise 2: Task 1 – Prepare the VPN Interface 00:02:00
- JSS65: Exercise 2: Task 2 – Install Remote Access Service 00:01:00
- JSS65: Exercise 2: Task 3 – Initialize Remote Access Management 00:03:00
- JSS65: Exercise 2: Task 4 – Configure Authentication and Accounting Providers 00:01:00
- JSS65: Exercise 2: Task 5 – Configuring the VPN Ports 00:01:00
- JSS65: Exercise 2: Task 6 – Specify the VPN Adapter 00:00:42
- JSS65: Exercise 2: Task 7 – Grant VPN dial-in permission 00:01:00
- JSS65: Exercise 3: Task 1 – Configure secondary IP address for VPN client 00:02:00
- JSS65: Exercise 3: Task 2 – Create VPN Client dialler 00:03:00
- JSS65: Exercise 3: Task 3 – Check the Status of a VPN Connection 00:01:00
- JSS65: Exercise 4: Task 1 – Examine the NPS Logs 00:01:00
- JSS65: Exercise 4: Task 2 – Install Tools to Read the NPS Logs 00:01:00
- JSS65: Exercise 4: Task 3 – Read the NPS Logs 00:01:00
- JSS65: Exercise 4: Task 4- Export NPS Templates 00:02:00
- JSS65: Configuring RADIUS Summary 00:00:48
- JSS65: Scanning and Remediating Vulnerabilities with OpenVAS Introduction 00:00:46
- JSS65: Exercise 1: Task 1 – Connecting to Win10 and Kali 00:01:00
- JSS65: Exercise 2: Task 1 – Starting up OpenVAS 00:04:00
- JSS65: Exercise 2: Task 2 – Using OpenVAS 00:05:00
- JSS65: Exercise 2: Task 3 – OpenVAS Scanning 00:03:00
- JSS65: Exercise 3: Task 1 – Editing Security Advanced Security Settings for Pre-Windows 00:03:00
- JSS65: Exercise 3: Task 2 – Editing Network Access 00:05:00
- JSS65: Exercise 3: Task 3 – Reconfiguring Regedit Values 00:01:00
- JSS65: Exercise 3: Task 4 – Network Configuration for NetBIOS 00:01:00
- JSS65: Exercise 3: Task 5 -Advanced Firewall Configurations 00:02:00
- JSS65: Exercise 4: Task 1 – Rescanning with OpenVAS 00:02:00
- JSS65: Scanning and Remediating Vulnerabilities with OpenVAS Summary 00:00:48