Integrate Network and Security Components
Welcome to the Integrate Network and Security Components Practice Lab. In this module you will be provided with the instructions and devices needed to develop your hands-on skills.
Already have an account? Sign In »

Introduction
Welcome to the Integrate Network and Security Components Practice Lab. In this module you will be provided with the instructions and devices needed to develop your hands-on skills.
Learning Outcomes
In this module, you will complete the following exercises:
- Install Snort
- Test Snort
- Configure and Re-Test Snort
- Configure Iptables
After completing this lab, you will be able to:
- Install Snort
- Download Snort Rules
- Run the Snort Tool
- Create a folder and move the rule files in the snort folder
- Modify the Snort configuration file
- Re-run Snort IDS tool
- Connect Win10 and Kali
- Install Putty into Kali
- Configure Telnet Services on Win8.1
- Test Bi-directional traffic through Telnet and SSH connections
- Configure iptables to block Telnet
- Test Telnet connection with Zenmap
- Configure iptables to drop SSH connections
Exam Objectives
The following exam objectives are covered in this lab:
- CAS-003 2.1 Analyze a scenario and integrate network and security components, concepts and architectures to meet security requirement.
Lab Duration
It will take approximately 1 hour to complete this lab.
Exercise 1 - Install Snort
Snort is a portable intrusion detection system (IDS) for Windows and Linux operating systems. This tool is capable of capturing real-time network traffic analysis and perform packet logging on TCP/IP networks.
Learning Outcomes
After completing this exercise, you will be able to:
- Install Snort
- Download Snort Rules
Exercise 2 - Test Snort
After Snort has been installed, it needs to be tested for its configuration. This exercise will run and test the Snort configuration and add the rule files in Snort.
Learning Outcomes
After completing this exercise, you will be able to:
- Run the Snort Tool
- Create a folder and move the rule files in the Snort folder
Exercise 3 - Configure and Re-Test Snort
This exercise will consist of modifying the configuration files and then re-testing snort to confirm that it works.
Learning Outcomes
After completing this exercise, you will be able to:
- Modify the Snort configuration file
- Re-run Snort IDS tool
Exercise 4 - Configure Iptables
Kali is a multifaceted Linux operating system which is mainly focused on security and penetration testing. It combines a wide range of tools, from port scanners both active and passive to forensic tools which can be used to pull deleted data off hard drives.
Learning Outcomes
After completing this exercise, you will be able to:
- Connect Win10 and Kali
- Install Putty into Kali
- Configure Telnet Services on Win8.1
- Test Bi-directional traffic through Telnet and SSH connections
- Configure iptables to block Telnet
- Test Telnet connection with Zenmap
- Configure IP tables to drop SSH connections
See the full benefits of our immersive learning experience with interactive courses and guided career paths.