Existing User Login

New User? Create An Account

Request new password

We Are All About You

XpertSkills - the parent company under which iCollege operates - was established in South Africa in 2003 and since then, we have grown globally in leaps and bounds with customers and partners in more than 120 countries. With employees on 3 continents and as a next-generation, virtual organization we are unconstrained by the limits that are usually associated with traditional “brick & mortar” companies.

This allows us to focus, without distraction, on reaching our ultimate goal – ensuring your ongoing success – by providing affordable, reliable, high quality and relevant learning products whilst remaining innovative and agile.

Contact Details:

Web: www.xpertskills.com
Skype: xpertskills
Mail: info@xpertskills.com

Physical Address:

Head Office - South Africa
16 Monte Carlo Crescent
Kyalami business Park
Johannesburg
South Africa 1684

You are here

courses popup callback

LIVE LAB:

CompTIA Advanced Security Practitioner CASP CAS-003

Practical exercises in a live environment to help you get real-world, hands-on experience.

Overview

The CompTIA CASP+ Practice-Lab will provide you with the necessary platform to gain hands-on skills in advanced IT security. By completing the lab tasks, you will improve your practical skills in enterprise security, risk management and incident response, research, analysis and assessment, integration of computing, communications and business disciplines and technical integration of enterprise components. These same tasks will help you understand the objectives and competencies required by the CASP+ (CAS-003) certification exam.

Vendor:   CompTIA
Vendor Id:   CAS-003
Version:   1
Level:   Entry
Learning Time:   2000  Minutes

Exercises

  1. Work With Remote Connectivity
  2. Exercises:
    • Introduction
    • Lab Topology
    • Exercise 1 - Working with RDP
    • Exercise 2 - Administering Windows with PowerShell Remoting
    • Review
  3. Perform digital forensics
  4. Exercises:
    • Introduction
    • Lab Topology
    • Exercise 1 - Preparing a Target Drive for Acquisition in Linux
    • Exercise 2 - Deleting NTFS Files
    • Exercise 3 - Using Sleuth Kit and Autopsy
    • Review
  5. Security and Risk Management Support Materials
  6. Exercises:
    • Introduction
    • Supporting Lab Material - Security and Risk Management Part 1
    • Supporting Lab Material - Security and Risk Management Part 2
    • Review
  7. Configuring SCCM Configuration Items and Baselines
  8. Exercises:
    • Introduction
    • Lab Topology
    • Exercise 1 - Create Windows Configuration Items for Compliance Settings
    • Exercise 2 - Create Configuration Baseline and Deploy the Baseline
    • Exercise 3 - Create Windows Configuration Items for Compliance Settings
    • Review
  9. Integrate Network and Security Components
  10. Exercises:
    • Introduction
    • Lab Topology
    • Exercise 1 - Install Snort
    • Exercise 2 - Test Snort
    • Exercise 3 - Configure and Re-Test Snort
    • Exercise 4 - Configure Iptables
    • Review
  11. Install and Configure Network Load Balancing
  12. Exercises:
    • Introduction
    • Lab Topology
    • Exercise 1 - Installing Network Load Balancing Nodes
    • Exercise 2 - Configuring a New NLB Cluster
    • Exercise 3 - Adding a Secondary Node to an NLB Cluster
    • Exercise 4 - Examining the Working of an NLB Cluster
    • Exercise 5 - Configuring and Validating Port Rules for NLB
    • Review
  13. Perform Firewall Rule-based Management
  14. Exercises:
    • Introduction
    • Lab Topology
    • Exercise 1 - Configuring Firewall Rules Using Windows Firewall
    • Exercise 2 - Configuring Firewall Rules using Windows Firewall with Advanced Security
    • Exercise 3 - Configuring Firewall Rules using Remote Desktop
    • Exercise 4 - Configuring Firewall Rules from the Command Line Interface
    • Review
  15. Implement SSL VPN using ASA Device Manager
  16. Exercises:
    • Introduction
    • Lab Topology
    • Exercise 1 - Implement a Clientless SSL VPN using the Cisco ASA Device Manager
    • Exercise 2 - Implement AnyConnect using the Cisco ASA Device Manager
    • Review
  17. Configure Verify and Troubleshoot Port Security
  18. Exercises:
    • Introduction
    • Lab Topology
    • Exercise 1 - Configure Static and Dynamic Port Security
    • Exercise 2 - Configure Additional Port Security Configuration Settings
    • Exercise 3 - Configuring Err-disable Recovery
    • Review
  19. Scanning and Remediating Vulnerabilities with OpenVAS
  20. Exercises:
    • Introduction
    • Lab Topology
    • Exercise 1 - OpenVAS Scanning
    • Exercise 2 - Securing Active Directory Access LDAP
    • Exercise 3 - Validating Security Changes with OpenVAS
    • Review
  21. Configure and Verify IPv4 and IPv6 Access Lists for Traffic Filtering
  22. Exercises:
    • Introduction
    • Lab Topology
    • Exercise 1 - Configuring Standard and Extended Access Lists using IPv4
    • Exercise 2 - Configuring Named Access Lists Using IPv4
    • Exercise 3 - Creating Access-Lists in IPv6
    • Review
  23. Analyze network traffic with Wireshark
  24. Exercises:
    • Introduction
    • Lab Topology
    • Exercise 1 - Download and Install Wireshark
    • Exercise 2 - Capture Packets with Wireshark
    • Exercise 3 - Perform Packet Analysis - Part 1
    • Exercise 4 - Packet Analysis - Part 2
    • Exercise 5 - Verify Output Logs
    • Exercise 6 - Perform Packet Jumping
    • Review
  25. Configuring Endpoint Security
  26. Exercises:
    • Introduction
    • Lab Topology
    • Exercise 1 - Use Anti-virus Programs
    • Exercise 2 - Use Anti Spyware
    • Exercise 3 - Installing an Endpoint Protection Site System Role
    • Exercise 4 - Configure Definition Updates for Endpoint Protection
    • Exercise 5 - Create and Deploy Antimalware policies for Endpoint Protection
    • Exercise 6 - Configure Custom Client Settings for Endpoint Protection
    • Exercise 7 - Provision Endpoint Protection
    • Review
  27. Configuring Advanced Authentication and Authorization
  28. Exercises:
    • Introduction
    • Lab Topology
    • Exercise 1 - Install and Configure Network Policy Server
    • Exercise 2 - Install and Configure Remote Access Server
    • Exercise 3 - Configure the VPN Client
    • Exercise 4 - Viewing the NPS Logs
    • Review
  29. Encryption and Hashing
  30. Exercises:
    • Introduction
    • Lab Topology
    • Exercise 1 - Understand Cryptographic Basics
    • Exercise 2 - Comparing Hashing Algorithms
    • Exercise 3 - Comparing Hash Values
    • Review
  31. Performing security assessment using various tools
  32. Exercises:
    • Introduction
    • Lab Topology
    • Exercise 1 - Identifying Live Systems
    • Exercise 2 - Performing Zone Transfers
    • Exercise 3 - Working with Remote Targets
    • Exercise 4 - Working with Finger Command
    • Exercise 5 - Social Engineering Reconnaissance
    • Exercise 6 - Use the Social Engineering Toolkit (SET) in Kali Linux
    • Exercise 7 - Perform Routing Table Verification
    • Review
  33. Using various tools for security assessments
  34. Exercises:
    • Introduction
    • Lab Topology
    • Exercise 1 - Identifying Live Systems
    • Exercise 2 - Perform Network Footprinting
    • Review
  35. Perform Security Assessment Using MBSA
  36. Exercises:
    • Introduction
    • Lab Topology
    • Exercise 1 - Introduction to Microsoft Baseline Security Analyzer
    • Exercise 2 - Implementing Recommendations
    • Exercise 3 - Saving Microsoft Baseline Security Analyzer Reports
    • Exercise 4 - Reviewing Configuration Changes
    • Review
  37. Compliance Patching
  38. Exercises:
    • Introduction
    • Lab Topology
    • Exercise 1 - Install and Configure WSUS
    • Exercise 2 - WSUS Server Certificates Security
    • Exercise 3 - Create Computer Groups for WSUS
    • Exercise 4 - Configure GPO Policy for WSUS
    • Review
  39. Mapping Networks
  40. Exercises:
    • Introduction
    • Lab Topology
    • Exercise 1 - Working With Network Diagrams
    • Review
  41. Install and Configure ManageEngine OpManager
  42. Exercises:
    • Introduction
    • Lab Topology
    • Exercise 1 - Install and Configure ManageEngine OpManager
    • Review
  43. Implementing DNSSEC
  44. Exercises:
    • Introduction
    • Lab Topology
    • Exercise 1 - Preparing DNS Setup for DNSSEC
    • Exercise 2 - Configuring DNSSEC
    • Exercise 3 - Customizing DNSSEC
    • Review
  45. Implementing AD Federation Services
  46. Exercises:
    • Introduction
    • Lab Topology
    • Exercise 1 - Prepare System Requirements for ADFS Resource Partner
    • Exercise 2 - Prepare System Requirements for ADFS Accounts Partner
    • Exercise 3 - Enable Name Resolution for Resource and Account Domains
    • Exercise 4 - Prepare Requirements for AD FS Server Resource Partner
    • Exercise 5 - Install and Configure AD Federation Services
    • Exercise 6 - Create AD Federation Services Trusts
    • Review
  47. Performing Offline Attacks
  48. Exercises:
    • Introduction
    • Lab Topology
    • Exercise 1 - Extracting Hashes from a System
    • Exercise 2 - Cracking Extracted Hashes
    • Exercise 3 - Cracking Passwords
    • Review
  49. Configure Verify and Troubleshoot GRE Tunnel Connectivity
  50. Exercises:
    • Introduction
    • Lab Topology
    • Exercise 1 - Configure Static and Dynamic Port Security
    • Review
  51. Implement OpenPGP
  52. Exercises:
    • Introduction
    • Lab Topology
    • Exercise 1 - Installation of OpenPGP
    • Exercise 2 - OpenPGP Certificate Creation and Distribution
    • Exercise 3 - OpenPGP Signing and Importation
    • Exercise 4 - OpenPGP Verification, Encryption and Decryption
    • Review
  53. PKI Concepts
  54. Exercises:
    • Introduction
    • Lab Topology
    • Exercise 1 - Install and Configure Active Directory Certificate Services
    • Exercise 2 - Configure Certificate Revocation Lists (CRLs)
    • Exercise 3 - Managing Certificate Templates
    • Exercise 4 - Configure Certificate Auto Enrollment
    • Exercise 5 - Implement Key Archival
    • Exercise 6 - Enroll for User Certificate
    • Exercise 7 - Manage Key Recovery
    • Review
  55. Perform Banner Grabbing
  56. Exercises:
    • Introduction
    • Lab Topology
    • Exercise 1 - Performing Banner Grabbing
    • Review
  57. Using Password Cracking Tools
  58. Exercises:
    • Introduction
    • Lab Topology
    • Exercise 1 - Using Password Cracking Tools
    • Review
  59. Upgrading and Securing SSH Connection
  60. Exercises:
    • Introduction
    • Lab Topology
    • Exercise 1 - Connecting to Kali
    • Exercise 2 - Upgrading OpenSSH
    • Exercise 3 - Adding Sudo User
    • Exercise 4 - Regenerate SSH Keys to Avoid MITM Attacks
    • Exercise 5 - Display Message of the Day (MOTD)
    • Exercise 6 - Change the SSH Port
    • Review
  61. Configure Two Factor Authentication
  62. Exercises:
    • Introduction
    • Lab Topology
    • Exercise 1 - Configure Google Authenticator
    • Review
  63. Using Encryption and Steganography
  64. Exercises:
    • Introduction
    • Lab Topology
    • Exercise 1 - Configure BitLocker on Portable Media
    • Exercise 2 - Implement Full Disk Encryption using BitLocker
    • Exercise 3 - Manage Security for Removable Media
    • Exercise 4 - Hide documents in a graphics file
    • Review
LIVE LAB Access to real hardware and software in real time and with full administrator privileges to gain real-world practical experience.
  • Gain practical experience with real-world scenarios
  • Access to real hardware & software in real time
  • Experiment & put theory to practice
  • Includes exercises designed to prepare for exams.
  • 12 Months access
  • 10-Day money-back guarantee
Back to Top