Technologies

Lab Video Highlights

Hands-On Labs

Here is the list of hands-on labs that users can practice in TestOut Network Pro:

Cisco Web Administration Portal - New

  • Secure a Switch
  • Configure Switch IP and VLAN
  • Create VLANs
  • Configure Trunking
  • Configure Port Aggregation
  • Enable Jumbo Frame Support
  • Configure Port Mirroring
  • Configure PoE
  • Disable Switch Ports
  • Harden a Switch
  • Secure Access to a Switch
  • Audit Device Logs on a Cisco Switch
  • Update Firmware

Cisco CLI (Command Line Interface)

  • Configure DHCP Snooping – New
  • Configure Switch IP Settings
  • Configure Management VLAN Settings

DDWRT

  • Create a Home Wireless Network
  • Secure a Home Wireless Network
  • Configure Wireless Profiles

Ettercap - New

  • Poison DNS
  • Perform a DHCP Spoofing On-Path Attack

Hyper-V

  • Configure an iSCSI Target
  • Configure an iSCSI Initiator
  • Configure NIC Teaming

iOS

  • Configure IP Addresses on Mobile Devices – New
  • Configure a Secure Email Account on a Mobile Device        
  • Configure a VPN Connection iPad – New

John the Ripper - New

  • Crack a Password with John the Ripper

Linux - New

  • Enable and Disable Linux Services
  • Change Your Own Linux Password ‍
  • Change a User's Linux Password‍
  • Configure NTP

pfSense - New

  • Configure Network Security Appliance Access
  • Configure a Security Appliance
  • Configure a Perimeter Firewall
  • Configure a Screened Subnet (DMZ)
  • Implement Intrusion Prevention
  • Configure QoS
  • Configure NAT
  • Configure a Captive Portal
  • Configure a Remote Access VPN
  • Configure Logging

Physical Hardware

  • Reconnect to an Ethernet Network
  • Connect Network Devices
  • Explore Physical Connectivity
  • Connect VoIP
  • Configure Smart Devices – New
  • Design an Indoor Wireless Network
  • Design an Outdoor Wireless Network
  • Implement Physical Security

Ping

  • Select and Install a Network Adapter
  • Connect a Media Converter

PowerShell

  • Explore IP Configuration
  • Troubleshoot IP Configuration
  • Explore Network Communications
  • Explore nslookup

Ruckus Wireless

  • Implement an Enterprise Wireless Network
  • Secure an Enterprise Wireless Network
  • Enable Wireless Intrusion Prevention
  • Creating a Guest Network for BYOD – New
  • Optimize a Wireless Network

Windows 10

  • Allow Remote Desktop Connection
  • Back Up Files with File History – New
  • Recover a File from File History – New
  • Configure Account Password Policies – New
  • Connect to an Ethernet Network
  • Connect a Cable Modem
  • Connect Fiber Optic Cables
  • Connect Patch Panel Cables
  • Install a Switch
  • Select a Networking Device
  • Configure a Home Router
  • Configure IP Addresses
  • Configure Alternate Addressing
  • Configure an IPv6 Address
  • Troubleshoot Physical Connectivity
  • Explore Wireless Network Problems
  • Troubleshoot Wireless Network Problems
  • Connect to a DSL Network
  • Configure a Host Firewall

Windows Server

  • Configure a DHCP Server
  • Configure DHCP Options
  • Create DHCP Exclusions
  • Create DHCP Client Reservations
  • Configure a DHCP Relay Agent
  • Add a DHCP Server on Another Subnet
  • Configure DNS Addresses
  • Create Standard DNS Zones
  • Create Host Records
  • Create CNAME Records
  • Troubleshoot DNS Records

Wireshark - New

  • Troubleshoot Wireless Problems
  • Analyze Poison ARP Tables

Non-Technology Specific Labs

  • Respond to Social Engineering Exploits – New
  • Scan for IoT Devices – New

Technology Demos

Here is the list of technologies that we demo in TestOut Network Pro: 

Angry IP Scanner

  • Scan Network with Angry IP Scanner

Bitwarden

  • Configure Multifactor Authentication

Cisco CLI (Command Line Interface)

  • Configure Switch IP and VLAN
  • Troubleshoot Routing
  • Configure an SNMP System on a Router
  • Configure a Syslog Server on a Router
  • Monitor Interface Statistics
  • Set Up DHCP Snooping

Cisco Web Administration Portal

  • Connect to and Secure a Switch
  • Cisco IoS Basics
  • Configure Switch IP and VLAN
  • Create VLANs
  • Configure Trunking
  • Configure Port Aggregation
  • Enable Jumbo Frame Support
  • Configure Port Mirroring
  • Configure PoE
  • Configure Spanning Tree
  • Disable Switch Ports
  • Harden a Switch
  • Configure Enterprise Wireless Networks
  • Secure a Wireless Network
  • Optimize Wireless Networks
  • Monitor Switch with SNMP
  • Configure SNMP Trap
  • Audit Device Logs on a Cisco Switch
  • Update Firmware

Command Prompt

  • Use ipconfig
  • Use ping and tracert
  • Use arp and netstat
  • Use nslookup

DDWRT

  • Configure Wireless Networks

DHCP

  • Set Up Alternate Addressing
  • Configure a DHCP Server
  • DHCP Options
  • Troubleshoot DHCP Exhaustion
  • Configure DHCP Relay
  • Configure a DHCP6 Server

DNS Server

  • Configure DNS

Ettercap

  • Launch a DoS and DDoS Attack
  • Poison ARP
  • Poison DNS

FreePBX

  • Configure VoIP Server
  • Configure VoIP Phone

Hyper-V

  • Create a Virtual Machine
  • Configure Virtual Network Devices
  • Configure a NAS for Data Backups

iOS

  • Configure IP Address on iPad

John the Ripper

  • Crack Passwords
  • Crack Password Protected Files

Kemp Load Balancer

  • Configure Load a Balancing Server

Linux

  • Configure DNS Caching on Linux
  • Configure NTP on Linux
  • Use the ip Command
  • Use dig
  • Configure Linux Firewall
  • Configuring Remote Logging on Linux
  • Configure Linux Network Bonding
  • View Linux Services
  • Manage Linux Users
  • Use TCPDump

Nessus

  • Conduct a Vulnerability Scan

NetSpot

  • Conduct a Wireless Survey

Nmap

  • Scan for IoT with Nmap
  • Scan for Unsecure Protocols

Pentbox

  • Configure a Honeypot

pfSense

  • Configure Network Security Appliance Access
  • Configure Firewall Rules
  • Configure a Proxy Server
  • Configure a Screened Subnet
  • Implement Intrusion Detection and Prevention
  • Configure QoS
  • Configure NAT
  • Configure a Captive Portal
  • Configure a VPN
  • Log Events
  • Configure Netflow
  • Monitor Throughput with iperf
  • Respond to Network Attacks

Physical Hardware

  • Use Punchdown Blocks
  • Smart Devices
  • Configure UPS Settings

PowerShell

  • Examine DNS Attacks  

PuTTY

  • Connect to a Switch with SSH

SMAC

  • Use SMAC to Spoof MAC Addresses        

Social Engineering Toolkit

  • Use the Social Engineer Toolkit

TP-Link

  • Configure Software Defined Networking (SDN)  

UniFi

  • Create a Guest Network for BYOD

Windows 10

  • Implement File Backups
  • Recover Files
  • View Event LogsExplore Network Services            
  • Configure IP Settings on Workstation
  • Configure Client Addressing
  • Configure IPv6 Addresses
  • Configure a Wireless Client
  • Troubleshoot Wireless Connections
  • Configure Permissions
  • Use Remote Desktop
  • Configure NTP
  • View Windows Services
  • Monitor Utilization
  • Configure a VPN Client
  • Configure Windows Firewall
  • Create Firewall ACLs

Windows Server: Active Directory

  • Configure Windows User Account Restrictions
  • Configure an iSCSI SAN
  • Configure Account Policies and UAC Settings
  • Configure a RADIUS Solution
  • Set Up NIC Teaming
  • Configure an Update Server        

Wireshark

  • Use Wireshark to Sniff Traffic
  • Perform a On-Path DHCP Attack
  • Detect a Rogue DHCP Server
  • Use Wireshark to Troubleshoot Network Issues

Zenmap

  • Scan Network with Zenmap

Non-technology Specific Demo

  • Investigate a Social Engineering Attack