source: cybrary.it

What are we doing?

This lab consists of 6 exercises that guides us through the use of network utilities when trying to troubleshoot a misconfigured network connection. First exercise introduces us to the command ipconfig while exercise 2 and 3 introduces us to pathping and route. Next, exercise 4 brings us over to the Linux world and introduces us to iptables before heading into the commands tcpdump and nmap.

Why would we want to do this?

Network utilities like ipconfig and pathping are extremely useful troubleshooting and analysis tools when it comes to understanding what’s going on within our network…


source: cybrary.it

What are we doing?

This lab consists of two exercises that teach us how to use Performance Monitor on our Windows 10 system and teaches us how to create a bottleneck to test our log management skills.

Why would we want to do this?

Sometimes, in order to find a solution we need to see where the problem is occurring and at what rate is the problem happening at. With Performance Monitor, we can specify what we want to monitor and see if any irregularities are occurring.

With our bottleneck situation, we again use this to create a controlled environment…


source: cybrary.it

What are we doing?

This lab consists of two exercises that guide us on how to install and configure a DHCP and DNS server for our network.

Why would we want to do this?

Managing IP addresses is no easy task, and thinking we could handle it all on our own must also mean we’ve come across some kind of real-life Limitless pill. Even so, trying to manage it without the aide of automation services like DHCP and DNS means we’d only be working hard, and not necessarily working smart. …


Source: cybrary.it

Vendor: Practice Labs

Lab: 1.11 — Troubleshoot Internet Connection and DNS Issues

Lab Learning Outcomes

  • Exercise 1 — Troubleshooting Network (WAN) Connectivity Issues: network binding, proxy settings
  • Exercise 2 — Troubleshooting DNS Issues

After completing this lab, we will be able to:

  • Identify, analyze, and re-configure network bindings using Windows PowerShell
  • Modify, apply, and verify proxy settings
  • Troubleshoot hosts files issues
  • Troubleshoot DNS issues
  • Analyze DNS environment settings using BPA

CompTIA Network+ N10–007 Exam Objectives:

N10–007–5.2: Given a scenario, use the appropriate tool (Command line: ping, nslookup)

N10–007–5.5: Given a scenario, troubleshoot common network service issues (Names not resolving)

What are we doing?


source: cybrary.it

Vendor

Practice Labs

Lab

1.10 — Install Hyper-V

Lab Learning Outcomes

  • Exercise 1 — Enabling Hyper-V Feature

After completing this lab, we will be able to:

  • Install Hyper-V
  • Create a private virtual switch

CompTIA Network+ N10–007 Exam Objectives

N10–007–2.4: Explain the purposes of virtualization and network storage technologies:

  • Virtual networking components (Virtual switch, Hypervisor)

What are we doing?

This lab consists of one exercise guiding us through the installation and configuration of a hypervisor, called Hyper-V, to enable a virtual switch.

Why would we want to do this?

Hypervisors help us create virtual machines (VMs). Without them, it would be rather difficult to create a VM and utilize its OS on one of our hardware devices. …


source: cybrary.it

Vendor

Practice Labs¹

Lab

1.9 — Implement a Host-based Firewall

Lab Learning Outcomes

  • Exercise 1 — Configuring Firewall Rules Using Windows Defender Firewall
  • Exercise 2 — Configuring Firewall Rules using Windows Defender Firewall with Advanced Security
  • Exercise 3 — Configuring Firewall Rules from the Command Line Interface

After completing this lab, we will be able to:

  • Configure firewall rules using Windows Defender Firewall
  • Configure firewall rules using Windows Defender Firewall with Advanced Security
  • Configure firewall rules using Command Line Interface

CompTIA Network+ N10–007 Exam Objectives

  • N10–007 2.2 — Given a scenario, determine the appropriate placement of networking devices on a network and install/configure them (Firewall)
  • N10–007 5.5 — Given a…

source: cybrary.it

Vendor

Practice Labs¹

Lab

1.8 — Common Network Vulnerabilities

Lab Learning Outcomes

After completing this lab, we will be able to:

  • Perform ARP Poisoning using Ettercap
  • Spoof a DNS Server using Ettercap
  • Defend against a Man in the Middle Attack (MiTM) using Arpwatch, Wireshark, BIND, and CheckmyHTTPS
  • Identify DNS server vulnerabilities by creating a new host domain and transferring the DNS zone using AXFR
  • Use available tools to mitigate phishing such as SmartScreen Filter

CompTIA Network+ N10–007 Exam Objectives

N10–007 4.4 — Summarize common networking attacks — DoS:

  • Phishing
  • DNS…

source: cybrary.it

Vendor

Practice Labs

Lab

1.7 — Install OS Updates and Configure Security Policies

Learning Outcomes

  • Exercise 1 — Managing Windows Update
  • Exercise 2 — Configuring Network Security Policy

After completing this lab, we’ll be able to:

  • Manage common Windows update properties (Manually install Windows updates, Manually uninstall updates and restore previous version)
  • Utilize OS hardening by applying network account policies in a Windows domain (Manage user password policies, Manage user account lockouts)

CompTIA Network+ Exam Objectives

N10–007 3.5 — Identify policies and best practices (Password Policy)

N10–007 4.5 — Given a scenario, implement network device hardening (Avoiding Common Passwords, Patching and Updates)

N10–007 4.6 — Explain common mitigation…


source: cybrary.it

Vendor

Practice Labs

Lab

1.6 — Network Services and Protocols Part III

Learning Outcomes

After completing this lab, we will be able to:

  • Configure port 21 for FTP
  • Configure port 161 for SNMP
  • Configure port 23 for Telnet
  • Configure port 445 for SMB
  • Configure port 3389 for RDP
  • Configure VNC and SSH

CompTIA Network+ Exam Objectives

N10–007 1.1 — Explain the…


Source: cybrary.it

Vendor

Practice Labs

Lab

1.5 — Network Services and Protocols Part II

Learning Outcomes

  • Exercise 1 — Identify Default HTTP Port
  • Exercise 2 — Identify Default HTTPS Port
  • Exercise 3 — Contrast TCP and UDP Protocols
  • Exercise 4 — Use a Port Scanner

After completing this lab, we will be able to:

  • Start packet capture of packets exchanged using HTTP protocol
  • Create HTTP traffic by accessing a website
  • Verify Port 80 for HTTP
  • Capture HTTPS traffic using Wireshark
  • Verify HTTPS uses port 443 by default
  • Contrast TCP and UDP Protocols
  • Use Advanced IP Scanner tool to collect system information
  • Use Advanced IP Scanner tool…

Bryan Renzy

Anxious Buddhist | Hobby Eater | Maze Master

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store