CYBERSECURITY NEWS

Web Security – Threatpost

Firewall Bug Under Active Attack Triggers CISA Warning

CISA is warning that Palo Alto Networks’ PAN-OS is under active attack and needs to be patched ASAP.

Fake Reservation Links Prey on Weary Travelers

Fake travel reservations are exacting more pain from the travel weary, already dealing with the misery of canceled flights and overbooked hotels.

Google Patches Chrome’s Fifth Zero-Day of the Year

An insufficient validation input flaw, one of 11 patched in an update this week, could allow for arbitrary code execution and is under active attack.

MMSCYBER009: Setting Up a Cyber Test Lab (1 Day)

Course Description

This course is designed for an average user to obtain the skills needed for setting up a professional working test platform.

Using both free and commercial off the shelf software (COTS) to design and implement an accepted standard test-bed for both training and experimentation with emphasis on value for effort and dollar expended. Students will learn the fundamentals of operating virtual machines and its basic techniques. In addition, students will also have hands on experience with implementing various command line operations and tasks.

After completing this course students will have ability to create a lab environment in order to successfully set up ethical test labs. This includes but is not limited to:

  • Building a Hardware and Software Test Platform
  • Passive Information Gathering
  • Analyzing Network Traffic
  • Detecting Live Systems and Analyzing Results
  • Enumerating Systems
  • Automating Encryption and Tunneling Techniques
  • Automated Attack and Penetration Tools
  • Securing Wireless Systems
  • An Introduction to Malware
  • Detecting Intrusions and Analyzing Malware
  • Forensics Detection

 

Course Outline

Module One: Virtual machines

  1. Purpose / types
  2. Real world applications
  3. Techniques and methods
  4. Advantages and disadvantages (when you should use it? When you shouldn’t use it?)

Module Two: Minimum Requirements

  1. System/ System Network requirements
  2. Software requirements
  3. Basic installation process

Module Three: Fundamentals

  1. File Extensions 101
  2. Oracle VM VirtualBox 101
    • Networking
    • Setting up multiple virtual machines
    • External device manipulation
    • Snap shots
    • Creating/Editing hard drives, partitions, and other hardware

Module Four: Tools

  1. Kali Linux
    • Basic command line operations and tasks
    • Brief overview of the “swiss army knife” tools
  2. Windows 7 (for testing purposes)
  3. Windows XP (for testing purposes)
  4. Metasploitable 2 (for testing purposes)

Module Five: Hands on Labs

  1. Wireshark
  2. More Labs