Overview

Students will use utilize two virtual machines, inside a protected network, to observe configuration changes on a known good / clean system and all of the unusual network traffic generated by the suspect software they will be analyzing. On the clean system they will use Regshot, Argon Network Switcher, Process Hacker, Process Monitor and Noriben to gather details on what the suspicious program is actually doing. On another support machine they will set up a fake DNS server to receive all suspicious traffic, and pass that traffic over to Wireshark for further analysis. This lab will continue to foster tool familiarization and will provide the students an introduction to capturing network traffic by using a simple "man-in-the-middle" system.

Delivered By

CYBRScore

CybrScore’s hands-on training catalog is designed for learners like you to develop cybersecurity and I.T. experiential skills and assess their ability to defend networks through lab-based learning. The CybrScore catalog is composed of over 250 virtual labs curated by industry professionals to create a practical, holistic learning approach. Proven to enhance your understanding and skill level, the hands-on virtual labs provide an efficient and convenient source to further your education on your own time. The catalog is entirely browser-based making learning accessible wherever you have internet access. Search labs based on the desired topic, skill level, or correlation to career type. You can learn individually or with your team while tracking performance using Cybrary’s data and analytic metrics. Organizations all over the world train their employees with the CybrScore catalog on Cybrary. The myriad of unlimited labs will leverage your company as you practice with premium learning resources and develop the industry’s most sought after skills. You can also access content tailored to job roles giving you the ability to train employees based on needed job fulfillment and skills levels. Employees can also develop and master skills essential to the positions they wish to acquire and gain the experiential skills necessary to progress in the field. Access the extensive Cybrscore catalog, along with a variety of other lab vendors, through Cybrary for Business or Cybrary Insider Pro.

What is included in the CybrScore catalog?

The Cybrscore catalog includes unlimited access to the industry’s most popular labs. These labs are specially tailored for training in network defense, including labs on the following topics: Incident response Malware analysis Exploitation Penetrating testing Vulnerability Reverse engineering Information assurance Cyber forensics.

About CybrScore

Founded in 2014, CybrScore was developed to provide aspiring I.T. and Cybersecurity professionals the tools needed to develop hands-on skills in their chosen field. CybrScores’ ever-growing catalog is attributed to the company’s belief that learning by doing is the most effective way to master cybersecurity skills. CybrScore’s labs are helping new cybersecurity professionals break into the industry through their display of experiential knowledge acquired by lab practice and assisting professionals to advance and grow in their careers through skill advancement.

How to Access CybrScore With this catalog of unlimited labs, you and your team will have on-demand access to CybrScore's training that can be used anytime, and anywhere. These labs are included in the Cybrary for Business package, as well as Cybrary Insider Pro, and all access occurs directly through the Cybrary website. All labs are completed directly in the user’s browser and can be stopped and started at any time.