Basic Cyber Security Lab Tutorial
Learn the basics of cybersecurity for free. Protect digital data and build your skills. Join now and start learning today!
in Cisco Cyber SecurityWhat you will learn?
Explore real-world network vulnerabilities and how attackers exploit them.
Look various cyber attacks with demonstration on real devices.
Watch demonstrations on MAC flooding, Ping of Death (PoD), SYN Flooding, Phishing Attack and many more.
About this course
This Cyber security lab fundamental webinar provides a thorough introduction to practical cyber security tasks. You'll observe live demonstrations of various cyber security threats and how to avoid them in our virtual lab setups.
The webinar will cover the lab tasks of our cyber security fundamentals lab. Attending this webinar will unlock that lab course at a discounted price, so that you can practice the tasks shown in this webinar on your own.
You will also join our forum and network with various cyber security professionals and students. This webinar is free to join, so anyone who wants to understand basic cyber security taks should enroll in this webinar.
Webinar Highlights
✓ Conducted by Cyber Security expert, this webinar will help you understand basic cyber security tasks.
✓ The webinar will be conducted multiple times at regular intervals, so that you don't miss the next opportunity to enroll.
✓ Webinar is free to join, and covers practicals from our Cyber Security lab course.
✓ Attending this webinar unlocks a discounted price on our Cyber Security Fundamentals Lab.
To know more about the course, contact our learner advisors
![]() |
Why You Should Attend Our Cyber Security Lab Webinar?
Attending this webinar will provide you with a sneak peek into our cyber security fundamentals lab workbook, as most of the labs will be covered in this webinar. The instructor will give live demonstrations of various cyber attacks and prevention against them using UniNet's remote labs.
You will be introduced to various cyber attacks, and our instructor will show live practicals on how these cyber attacks are carried out in real-world scenarios.
Whether you are a student or a cyber security aspirant, attending the webinar will help you discover various cyber security concepts and how they work. Later, you can check out our discounted Cyber Security fundamental lab, can practice these concepts yourself.
Who Should Enroll in This Webinar?
This course is ideal for:
● IT Professionals: Seeking to enhance their cybersecurity skills and stay updated with industry practices.
● Students: Studying computer science or related fields and looking for practical cybersecurity experience.
● Career Changers: Interested in transitioning to a career in cybersecurity.
● Tech Enthusiasts: Keen to learn about the latest cybersecurity threats and protection methods.
Suggested by top companies
Top companies suggest this course to their employees and staff.
Similar Courses
FAQ
Comments (0)
Configuring the Edge router, assigning IP addresses to all devices, including OWASP, BWAPP, PHPAC, Metasploitable, Web-SRV1, Web-SRV2, and Remote PCs.
We will use the NMAP (network mapper) tool to gather information for discovering vulnerabilities in the network.
Target a Cisco Switch using MAC flooding attack
Target the PC1 machine using Ping of Death so that it becomes unresponsive
Target the PC1 machine using ICMP flooding attack so that it becomes unresponsive
Target Web-SRV2 (IP 192.168.1.7) with SYN flood attack from Kali-Attacker machine.
Generate attack from Kali-Attacker machine to target a
victim PC1 such that the victim receives many ICMP replies
from other devices in the network.
Perform a LAND attack on Web-SRV2 as victim machine from Kali-Attacker machine.
Launch Slowloris attack on Web-SRV2 from Kali-Attacker machine so that the web server will not be able to serve the legitimate web or http requests.
Web-SRV2 should see Kali-Attacker's MAC address for the Gateway (Edge) router's IP. Also Edge router should see Kali-Attacker's MAC address for Web-SRV2's IP.
Using brute force technique on Kali-Attacker machine, hack the telnet password of Core switch and determine the login username and password of metasploitable server in the network.
Perform phishing attack by presenting a fake twitter website to users on Remote-PC1 and captured their twitter credentials from Kali-Attacker machine.
Perform SQL injection attack on vulnerable servers OWAP, PHPAC and Metasploitable from Kali-Attacker machine.
Using command injections, exploit the vulnerable server Metasploitable to gather information.
