Lab Video Highlights
Hands-On Labs
Here is the list of hands-on labs that users can practice in TestOut Network Pro:
Cisco Web Administration Portal - New
- Secure a Switch
- Configure Switch IP and VLAN
- Create VLANs
- Configure Trunking
- Configure Port Aggregation
- Enable Jumbo Frame Support
- Configure Port Mirroring
- Configure PoE
- Disable Switch Ports
- Harden a Switch
- Secure Access to a Switch
- Audit Device Logs on a Cisco Switch
- Update Firmware
Cisco CLI (Command Line Interface)
- Configure DHCP Snooping – New
- Configure Switch IP Settings
- Configure Management VLAN Settings
DDWRT
- Create a Home Wireless Network
- Secure a Home Wireless Network
- Configure Wireless Profiles
Ettercap - New
- Poison DNS
- Perform a DHCP Spoofing On-Path Attack
Hyper-V
- Configure an iSCSI Target
- Configure an iSCSI Initiator
- Configure NIC Teaming
iOS
- Configure IP Addresses on Mobile Devices – New
- Configure a Secure Email Account on a Mobile Device
- Configure a VPN Connection iPad – New
John the Ripper - New
- Crack a Password with John the Ripper
Linux - New
- Enable and Disable Linux Services
- Change Your Own Linux Password
- Change a User's Linux Password
- Configure NTP
pfSense - New
- Configure Network Security Appliance Access
- Configure a Security Appliance
- Configure a Perimeter Firewall
- Configure a Screened Subnet (DMZ)
- Implement Intrusion Prevention
- Configure QoS
- Configure NAT
- Configure a Captive Portal
- Configure a Remote Access VPN
- Configure Logging
Physical Hardware
- Reconnect to an Ethernet Network
- Connect Network Devices
- Explore Physical Connectivity
- Connect VoIP
- Configure Smart Devices – New
- Design an Indoor Wireless Network
- Design an Outdoor Wireless Network
- Implement Physical Security
Ping
- Select and Install a Network Adapter
- Connect a Media Converter
PowerShell
- Explore IP Configuration
- Troubleshoot IP Configuration
- Explore Network Communications
- Explore nslookup
Ruckus Wireless
- Implement an Enterprise Wireless Network
- Secure an Enterprise Wireless Network
- Enable Wireless Intrusion Prevention
- Creating a Guest Network for BYOD – New
- Optimize a Wireless Network
Windows 10
- Allow Remote Desktop Connection
- Back Up Files with File History – New
- Recover a File from File History – New
- Configure Account Password Policies – New
- Connect to an Ethernet Network
- Connect a Cable Modem
- Connect Fiber Optic Cables
- Connect Patch Panel Cables
- Install a Switch
- Select a Networking Device
- Configure a Home Router
- Configure IP Addresses
- Configure Alternate Addressing
- Configure an IPv6 Address
- Troubleshoot Physical Connectivity
- Explore Wireless Network Problems
- Troubleshoot Wireless Network Problems
- Connect to a DSL Network
- Configure a Host Firewall
Windows Server
- Configure a DHCP Server
- Configure DHCP Options
- Create DHCP Exclusions
- Create DHCP Client Reservations
- Configure a DHCP Relay Agent
- Add a DHCP Server on Another Subnet
- Configure DNS Addresses
- Create Standard DNS Zones
- Create Host Records
- Create CNAME Records
- Troubleshoot DNS Records
Wireshark - New
- Troubleshoot Wireless Problems
- Analyze Poison ARP Tables
Non-Technology Specific Labs
- Respond to Social Engineering Exploits – New
- Scan for IoT Devices – New
Technology Demos
Here is the list of technologies that we demo in TestOut Network Pro:
Angry IP Scanner
- Scan Network with Angry IP Scanner
Bitwarden
- Configure Multifactor Authentication
Cisco CLI (Command Line Interface)
- Configure Switch IP and VLAN
- Troubleshoot Routing
- Configure an SNMP System on a Router
- Configure a Syslog Server on a Router
- Monitor Interface Statistics
- Set Up DHCP Snooping
Cisco Web Administration Portal
- Connect to and Secure a Switch
- Cisco IoS Basics
- Configure Switch IP and VLAN
- Create VLANs
- Configure Trunking
- Configure Port Aggregation
- Enable Jumbo Frame Support
- Configure Port Mirroring
- Configure PoE
- Configure Spanning Tree
- Disable Switch Ports
- Harden a Switch
- Configure Enterprise Wireless Networks
- Secure a Wireless Network
- Optimize Wireless Networks
- Monitor Switch with SNMP
- Configure SNMP Trap
- Audit Device Logs on a Cisco Switch
- Update Firmware
Command Prompt
- Use ipconfig
- Use ping and tracert
- Use arp and netstat
- Use nslookup
DDWRT
- Configure Wireless Networks
DHCP
- Set Up Alternate Addressing
- Configure a DHCP Server
- DHCP Options
- Troubleshoot DHCP Exhaustion
- Configure DHCP Relay
- Configure a DHCP6 Server
DNS Server
- Configure DNS
Ettercap
- Launch a DoS and DDoS Attack
- Poison ARP
- Poison DNS
FreePBX
- Configure VoIP Server
- Configure VoIP Phone
Hyper-V
- Create a Virtual Machine
- Configure Virtual Network Devices
- Configure a NAS for Data Backups
iOS
- Configure IP Address on iPad
John the Ripper
- Crack Passwords
- Crack Password Protected Files
Kemp Load Balancer
- Configure Load a Balancing Server
Linux
- Configure DNS Caching on Linux
- Configure NTP on Linux
- Use the ip Command
- Use dig
- Configure Linux Firewall
- Configuring Remote Logging on Linux
- Configure Linux Network Bonding
- View Linux Services
- Manage Linux Users
- Use TCPDump
Nessus
- Conduct a Vulnerability Scan
NetSpot
- Conduct a Wireless Survey
Nmap
- Scan for IoT with Nmap
- Scan for Unsecure Protocols
Pentbox
- Configure a Honeypot
pfSense
- Configure Network Security Appliance Access
- Configure Firewall Rules
- Configure a Proxy Server
- Configure a Screened Subnet
- Implement Intrusion Detection and Prevention
- Configure QoS
- Configure NAT
- Configure a Captive Portal
- Configure a VPN
- Log Events
- Configure Netflow
- Monitor Throughput with iperf
- Respond to Network Attacks
Physical Hardware
- Use Punchdown Blocks
- Smart Devices
- Configure UPS Settings
PowerShell
- Examine DNS Attacks
PuTTY
- Connect to a Switch with SSH
SMAC
- Use SMAC to Spoof MAC Addresses
Social Engineering Toolkit
- Use the Social Engineer Toolkit
TP-Link
- Configure Software Defined Networking (SDN)
UniFi
- Create a Guest Network for BYOD
Windows 10
- Implement File Backups
- Recover Files
- View Event LogsExplore Network Services
- Configure IP Settings on Workstation
- Configure Client Addressing
- Configure IPv6 Addresses
- Configure a Wireless Client
- Troubleshoot Wireless Connections
- Configure Permissions
- Use Remote Desktop
- Configure NTP
- View Windows Services
- Monitor Utilization
- Configure a VPN Client
- Configure Windows Firewall
- Create Firewall ACLs
Windows Server: Active Directory
- Configure Windows User Account Restrictions
- Configure an iSCSI SAN
- Configure Account Policies and UAC Settings
- Configure a RADIUS Solution
- Set Up NIC Teaming
- Configure an Update Server
Wireshark
- Use Wireshark to Sniff Traffic
- Perform a On-Path DHCP Attack
- Detect a Rogue DHCP Server
- Use Wireshark to Troubleshoot Network Issues
Zenmap
- Scan Network with Zenmap
Non-technology Specific Demo
- Investigate a Social Engineering Attack