415 Labs

CSCI 415 Labs

Most labs are mapped to objectives of the Certified Ethical Hacking (CEH) qualifications. A couple are mapped to CompT IA.

The mapping to CEH objectives means that the student will be familiar with the same tools and techniques that malicious black hat hackers use to conduct catastrophic cyberattacks.

Examples of security jobs that require or prefer CEH certification:  https://www.indeed.com/q-Ceh-jobs.html

 

Module Lab Certified Ethical Hacking (CEH) domain
1 Using Social Engineering (SET)

AND

Scanning the Network on the LAN

Social Engineering

 

Scanning

2 Using Public Key Encryption to Secure Messages

AND

Symmetric key program

AND

Cryptography
3 Remote and Local Exploitation

AND

Hash Digest program

System Hacking
4 Exploiting a Vulnerable Web Application

AND

Attacking Webservers from the WAN

Hacking Web Applications

 

Hacking Web Server

5 Performing a Denial of Service Attack from the WAN

AND

Performing SQL Injection to Manipulate Tables in a DB

DOS

 

 

SQL Injection

6 Attacking the Firewall and Stealing Data over and Encrypted Channel

AND

Securing the pfSense Firewall

Evading IDS, Firewalls, and Honeypots

 

CompTIA: Network Security

7 Digital Forensics: To Catch a Fake (Exercise)

AND

Steganography (exercise with external program)

CompTIA: Network Security

(Computing Technology Industry Association)

8 Capturing and Analyzing Network Traffic Using a Sniffer Sniffing
9 Using Browser Exploitation to Take Over a Host’s Computer Session Hijacking
10 WEP & WPA & Decrypting the Traffic Hacking Wireless Networks

Comments are closed.