Existing User Login

New User? Create An Account

Request new password

We Are All About You

XpertSkills - the parent company under which iCollege operates - was established in South Africa in 2003 and since then, we have grown globally in leaps and bounds with customers and partners in more than 120 countries. With employees on 3 continents and as a next-generation, virtual organization we are unconstrained by the limits that are usually associated with traditional “brick & mortar” companies.

This allows us to focus, without distraction, on reaching our ultimate goal – ensuring your ongoing success – by providing affordable, reliable, high quality and relevant learning products whilst remaining innovative and agile.

Contact Details:

Web: www.xpertskills.com
Skype: xpertskills
Mail: info@xpertskills.com
Phone: +27 10 020 2067

Physical Address:

Head Office - South Africa
16 Monte Carlo Crescent
Kyalami business Park
Johannesburg
South Africa 1684

You are here

CISSP : Certified Information Systems Security Professional 2015

LIVE LAB:

CISSP : Certified Information Systems Security Professional 2015

Practical exercises in a live environment to help you get real-world, hands-on experience.

Overview

The CISSP Practice Lab will provide you with the necessary platform to gain hands on skills in security. By completing the lab tasks you will improve your practical skills in Security and Risk Management, Asset Security, Security Engineering, Communications and Network Security, Identity and Access Management, Security Assessment and Testing, Security Operations and Software Development Security. These same tasks will help you understand the objectives and competencies required by the ISC2 CISSP certification exam.

Vendor:   ISC2
Vendor Id:   ISC2-CISSP
Version:   1
Level:   Entry

Exercises

  1. Introduction to CISSP
  2. Exercises:
    • Introduction
    • Supporting Lab Material - The 8 Domains of CISSP
    • Summary
  3. Security and Risk Management
  4. Exercises:
    • Introduction
    • Supporting Lab Material - Security and Risk Management Part 1
    • Supporting Lab Material - Security and Risk Management Part 2
    • Summary
  5. Encryption and Hashing
  6. Exercises:
    • Introduction
    • Exercise 1 - Cryptographic Basics
    • Exercise 2 - Comparing Hashing Algorithms
    • Exercise 3 - Comparing Hash Values
    • Summary
  7. SCCM Configuration Items and Baselines
  8. Exercises:
    • Introduction
    • Exercise 1 - Create Windows Configuration Items for Compliance Settings
    • Exercise 2 - Create Configuration Baseline and Deploy the Baseline
    • Exercise 3 - Import Configuration Data in SCCM 2012
    • Summary
  9. Implement OpenPGP
  10. Exercises:
    • Introduction
    • Exercise 1 - Installation of OpenPGP
    • Exercise 2 - OpenPGP Certificate Creation and Distribution
    • Exercise 3 - OpenPGP Signing and Importation
    • Exercise 4 - OpenPGP Verification, Encryption and Decryption
    • Summary
  11. Two factor Authentication with SSH
  12. Exercises:
    • Introduction
    • Exercise 1 - Connecting to Kali
    • Exercise 2 - Configure Google Authenticator
    • Summary
  13. Implement SSL VPN using ASA Device Manager
  14. Exercises:
    • Introduction
    • Exercise 1 - Implement a Clientless SSL VPN using the Cisco ASA Device Manager
    • Exercise 2 - Implement AnyConnect using the Cisco ASA Device Manager
    • Summary
  15. Configure and Verify IPv4 and IPv6 Access Lists for Traffic Filtering
  16. Exercises:
    • Introduction
    • Exercise 1 - Configuring Standard and Extended Access Lists using IPv4
    • Exercise 2 - Configuring Named Access Lists Using IPv4
    • Exercise 3 - Creating Access-Lists in IPv6
    • Summary
  17. Configuring IPtables
  18. Exercises:
    • Introduction
    • Exercise 1 - Configuring IPtables
    • Summary
  19. Windows Command Line Tools
  20. Exercises:
    • Introduction
    • Exercise 1 - IPconfig
    • Exercise 2 - Netstat
    • Exercise 3 - Ping
    • Exercise 4 - Tracert and Route
    • Exercise 5 - ARP and Whoami
    • Summary
  21. Administering and Deploying Endpoint Protection
  22. Exercises:
    • Introduction
    • Exercise 1 - Installing an Endpoint Protection Site System Role
    • Exercise 2 - Configure Definition Updates for Endpoint Protection
    • Exercise 3 - Create and Deploy Antimalware Policies for Endpoint Protection
    • Exercise 4 - Configure Custom Client Settings for Endpoint Protection
    • Exercise 5 - Provision Endpoint Protection
    • Summary
  23. Bitlocker on Portable Media
  24. Exercises:
    • Introduction
    • Exercise 1 - Configure Bitlocker on Portable Media
    • Summary
  25. Managing Remote Desktop
  26. Exercises:
    • Introduction
    • Exercise 1 - Working with RDP
    • Exercise 2 - Administering Windows with PowerShell Remoting
    • Summary
  27. Manage Role-based Security
  28. Exercises:
    • Introduction
    • Exercise 1 - Manage Role-based Security
    • Summary
  29. Configuring MBSA Scanner
  30. Exercises:
    • Introduction
    • Exercise 1 - Introduction to Microsoft Baseline Security Analyser
    • Exercise 2 - Implementing Recommendations
    • Exercise 3 - Saving Microsoft Security Baseline Analyzer Reports
    • Exercise 4 - Reviewing Configuration Changes
    • Summary
  31. Compliance Patching
  32. Exercises:
    • Introduction
    • Exercise 1 - Install and Configure WSUS
    • Exercise 2 - WSUS Server Certificates Security
    • Exercise 3 - Create Computer Groups for WSUS
    • Exercise 4 - Configure GPO Policy for WSUS
    • Summary
  33. Passive Topology Discovery
  34. Exercises:
    • Introduction
    • Exercise 1 - Packet Capture with Wireshark
    • Exercise 2 - Output Logs
    • Exercise 3 - Packet Analysis Part 1
    • Exercise 4 - Packet Analysis Part 2
    • Summary
  35. Scanning and Remediating Vulnerabilities with OpenVAS
  36. Exercises:
    • Introduction
    • Exercise 1 - Connecting to Kali
    • Exercise 2 - OpenVAS Scanning
    • Exercise 3 - Securing Active Directory Access LDAP
    • Exercise 4 - Validating Security Changes with OpenVAS
    • Summary
  37. Installing Kali
  38. Exercises:
    • Introduction
    • Exercise 1 - Installing Kali to Hyper-V
    • Summary
  39. Implement Backup and Recovery
  40. Exercises:
    • Introduction
    • Exercise 1 - View Disk allocation Information to Review Storage Pool Data
    • Exercise 2 - Create a Protection Group, Add Members and Client Computers to a Protection Group
    • Summary
  41. Installation and Verification of Snort
  42. Exercises:
    • Introduction
    • Exercise 1 - Installation of Assistance Programs
    • Exercise 2 - Configuring Snort
    • Exercise 3 - Snort Verification and Results
    • Summary
  43. Configuring and Securing IIS
  44. Exercises:
    • Introduction
    • Exercise 1 - IIS Setup
    • Exercise 2 - IIS Platform Tour
    • Exercise 3 - Inetpub Configuration
    • Exercise 4 - IIS Configuration and Security Practices
    • Summary
  45. Upgrading and Securing SSH Connection
  46. Exercises:
    • Introduction
    • Exercise 1 - Connecting to Kali
    • Exercise 2 - Upgrading OpenSSH
    • Exercise 3 - Adding Sudo User
    • Exercise 4 - Regenerate SSH Keys to Avoid MITM Attacks
    • Exercise 5- Change the MOTD (Message of the Day)
    • Exercise 6- Change the SSH Port for Safety
    • Summary
  47. DVWA - Manual SQL Injection and Password Cracking
  48. Exercises:
    • Introduction
    • Exercise 1 - DVWA Usage
    • Exercise 2 - Performing an SQL Injection Attack
    • Exercise 3 - Password Cracking with John
    • Summary
LIVE LAB Access to real hardware and software in real time and with full administrator privileges to gain real-world practical experience.
USD 295 USD 120 59% OFF
  • Gain practical experience with real-world scenarios
  • Access to real hardware & software in real time
  • Experiment & put theory to practice
  • Includes exercises designed to prepare for exams.
  • 12 Months access (Unless indicated otherwise)
  • 10-Day money-back guarantee
Back to Top