Page Index - Justin-Boyd/CIT-Class GitHub Wiki
130 page(s) in this GitHub Wiki:
- Home
- Kahoots
- Windows 10 ova
- EndPoint Security
- HoneyPots
- Data Loss Prevention
- Chapter 4: Mail Security
- Advances SIEM:
- Lab1 - Log Queries:
- Lab 2: Log parsing - extracting fields
- Lab3: Search Operators
- Lab4: Advanced Queries
- Installing Demisto
- Extra links
- Class 1 Lab 1 ‐ ClamAV Portable Installation
- Please reload this page
- Class 1 Lab 2 ‐ Btpassing an Antivirus Application
- Please reload this page
- Class 1 Lab 3 ‐ Creating YARA Rules
- Please reload this page
- Class 1 Lab 4 ‐ Create an Allow List Database
- Please reload this page
- Class 1 Lab 5 ‐ Securing the Infrastructure
- Please reload this page
- Class 1 Lab 6 ‐ Implementing Secure Design
- Please reload this page
- Class 1 ‐ Endpoint Security
- Please reload this page
- Class 2 Lab 1 ‐ Honeypot Placement
- Please reload this page
- Class 2 Lab 2 ‐ Set Up a Modern Honey Network (MHN)
- Please reload this page
- Class 2 Lab 3 ‐ Valhala Honeypot
- Please reload this page
- Class 2 Lab 4 ‐ Cowrie as a Bait
- Please reload this page
- Class 2 ‐ Honeypots
- Please reload this page
- Class 3 Lab 1 ‐ Data Leak Use Case
- Please reload this page
- Class 3 Lab 2 ‐ Regular Expression (Regex) Practice
- Please reload this page
- Class 3 Lab 3 ‐ OpenDLP Installation
- Please reload this page
- Class 3 Lab 4 ‐ Bypassing DLP
- Please reload this page
- Class 3 Lab 5 ‐ Ensure Compliance
- Please reload this page
- Class 3 ‐ Data Loss Prevention
- Please reload this page
- Class 4 Lab 1 ‐ nslookup
- Please reload this page
- Class 4 Lab 2 ‐ Practice Pop 3 Commands
- Please reload this page
- Class 4 Lab 3 ‐ Email Spoofing
- Please reload this page
- Class 4 ‐ Mail Security
- Please reload this page
- Class 5 Lab 1 ‐ Environment Setup
- Please reload this page
- Class 5 Lab 2 ‐ Snort Installation & Configuration
- Please reload this page
- Class 5 Lab 3 ‐ Splunk Deployment
- Please reload this page
- Class 5 Lab 4 ‐ Search Events
- Please reload this page
- Class 5 Lab 5 ‐ Grep and Awk
- Please reload this page
- Class 5 ‐ SIEM Introduction
- Please reload this page
- Class 6 Lab 1 ‐ Log Query
- Please reload this page
- Class 6 Lab 2 ‐ Log Parsing
- Please reload this page
- Class 6 lab 3 ‐ Search operators
- Please reload this page
- Class 6 Lab 4 ‐ Advanced Queries
- Please reload this page
- Class 6 Lab 5 ‐ Zeek It
- Please reload this page
- Class 6 ‐ Advanced SIEM
- Please reload this page
- Class 7 Lab 1 ‐ Creating Alerts
- Please reload this page
- Class 7 Lab 2 ‐ Dashboards
- Please reload this page
- Class 7 Lab 3 ‐ Inegrating Demisto in Splunk
- Please reload this page
- Class 7 Lab 4 ‐ Creating a Playbook
- Please reload this page
- Class 7 ‐ SIEM & SOAR
- Please reload this page
- Class 8 Lab 1 ‐ Searching Shodan
- Please reload this page
- Class 8 Lab 2 ‐ Mirai Botnet Research
- Please reload this page
- Class 8 Lab 3 ‐ Stuxnet Worm Research
- Please reload this page
- Class 8 Lab 4 ‐ Analyzing Firmware
- Please reload this page
- Class 8 Lab 5 ‐ What Is Critical Infrastructure?
- Please reload this page
- Class 8 Lab 6 ‐ Discovering SCADA
- Please reload this page
- Class 8 ‐ IIoT & ICS
- Please reload this page
- Class 9 Lab 1 ‐ Securing a Home
- Please reload this page
- Class 9 Lab 2 ‐ Securing an Office Building
- Please reload this page
- Class 9 Lab 3 ‐ Securing a Military Facility
- Please reload this page
- Class 9 Lab 4 ‐ Planning for Security and Continuity
- Please reload this page
- Class 9 Lab 5 ‐ Test Your Awareness
- Please reload this page
- Class 9 ‐ Physical Security
- Please reload this page
- Classs 10 Lab 1 ‐ Get Familiar with diagrams.net
- Please reload this page
- Classs 10 Lab 2 ‐ Drawing a Secure Topology
- Please reload this page
- Classs 10 Lab 3 ‐ High‐Level Analysis
- Please reload this page
- Classs 10 ‐ Secure Network Architecture
- Please reload this page
- Exam Review
- Please reload this page
- Final Project
- Please reload this page