Labs: Performing Vulnerability Scans
Labs: Understanding Security Baselines
Extra Resources: Configuration Management Tool (Ansible)
Extra Resources: Assisted Lab Configuring an Intrusion Detection System
Labs: Implementing Allow Lists and Deny Lists
Extra Resources: Implementing Endpoint Protection
Extra Resources: Identifying Application Attack Indicators
Extra Resources: What is Cross Site Scripting?
Extra Resources: ARP Spoofing 01
Extra Resources: ARP Spoofing 02
Labs: Exploiting and Detecting SQLi
Extra Resources: CSRF Attack
Extra Resources: Buffer Overflow Attack
Extra Resources: SQL Injection Attack
Extra Resources: Command Injections
Labs: Incident Response Detection
Extra Resources: Ports & Protocols
Extra Resources: Splunk (SIEM Tool)
Extra Resources: Managing Incident Response, Mitigation, and Recovery
Extra Resources: Managing Data Sources for Incident Response
Extra Resources: Configuring Mitigation Controls
Labs: Using Network Sniffers
Labs: Detecting and Responding to Malware
Labs: Performing Digital Forensic
Extra Resources: What is Malware?
Extra Resources: Acquiring Digital Forensics