Premium Features

Previous Buy now to get complete version Next
  • Home
uCertify Logo
  • login
  • Signup
    • Help & Support
    • Accessibility
    • Testimonials
  • Hello GuestLogin or Signup
  • Feedback & Support
    • Support
    • Keyboard Shortcuts
    • Send Feedback
Scroll to top button

CyberRange

(CYBER-LABS.AA1) / ISBN: 978-1-64459-304-2
This course includes
LiveLab
Mentoring (Add-on)
2 2
Try this course No credit card required
Are you an instructor? Teach using uCertify products
Request a free evaluation copy

CyberRange

Get hands-on experience in cyber security with Cyber Range course and lab. The course is designed for cybersecurity professionals as they require hands-on and specialized education and training. The course and lab offer exploration and analysis of the various technologies and methodologies deployed by cyber ranges to grow within the ecosystem of cybersecurity training, education, and workforce development.
Here's what you will get

LiveLab
  • 29+ LiveLab
Here's what you will learn
Download Course Outline

Hands on Activities (Live Labs)

Demo chapter

  • Exploiting Windows 7 Using Metasploit
  • Exploiting a Website Using SQL Injection
  • Performing Web Application Security Analysis Using Vega
  • Performing IDS Configuration with Snort
  • Using the Legion Pentesting Framework
  • Performing Memory Analysis with Volatility
  • Performing Session Hijacking Using Burp Suite
  • Simulating the DDoS Attack
  • Performing Website Reconnaissance
  • Capturing and Exporting Data from Network Traffic Captured Using Wireshark
  • Attacking a Website Using XSS Injection
  • Resetting the Root Password
  • Using Active Directory to Manage Domain User Accounts
  • Configuring an SSH Server
  • Performing Vulnerability Scanning Using OpenVAS
  • Detecting a Phishing Site Using Netcraft
  • Enabling Intrusion Prevention and Detection
  • Performing a Phishing Attack
  • Performing a MITM Attack
  • Capturing Packets Using Wireshark
  • Handling Potential Malware Using ClamAV
  • Configuring a Linux Firewall Using Iptables
  • Using OpenSSL to Create a Public/Private Key Pair
  • Viewing the System Logs
  • Simulating a DoS Attack
  • Using OWASP ZAP
  • Using Nikto

Demo section

  • Finding Vulnerabilities of a Target Machine
  • Defending Your System Against Attacks from Unknown Sources
×
uc logo for app downloadDownload our uCertify App [lms_setting_placeholder: This filed is used to set the LMS settings.

Share with your friends and colleagues

We use cookies to enhance your experience. By continuing to visit this site you agree to our use of cookies. More information
Accept