Overview

Introduction

Welcome to the Using Encryption and Steganography Practice Lab. In this module you will be provided with the instructions and devices needed to develop your hands-on skills.

Learning Outcomes

In this module, you will complete the following exercises:

  • Configure BitLocker on Portable Media
  • Implement Full Disk Encryption using BitLocker
  • Manage Security for Removable Media
  • Hide documents in a graphics file

After completing this lab, you will be able to:

  • Enable BitLocker without TPM Support
  • Configure BitLocker settings via GPO
  • Shrink the Existing Drive
  • Enable BitLocker
  • Verify BitLocker functionality
  • Manage BitLocker using the command prompt
  • Unlock the Encrypted Drive using Recovery Keys
  • Configure restrictions for removable media using GPO
  • Use Folder Steganography Tools

Exam Objectives

The following exam objectives are covered in this lab:

  • CAS-003 2.2 Analyze a scenario to integrate security controls for host devices to meet security requirements.

Lab Duration

It will take approximately 1 hour to complete this lab.

Exercise 1 - Configure BitLocker on Portable Media

Windows BitLocker is a storage encryption technology that gives administrators the capability to secure fixed and removable disks including portable USB drives using encryption services built into the operating system.

For this exercise, you will secure the disk volume of Windows 8 by using the BitLocker feature.

Learning Outcomes

After completing this exercise, you will be able to:

  • Enable BitLocker without TPM Support

Exercise 2 - Implement Full Disk Encryption using BitLocker

BitLocker was first introduced in Windows Server 2008 and Windows 7 Enterprise and then carried over to later versions. Disk encryption can be enabled using a local or domain group policy. To unlock an encrypted disk volume, the user must type the password to unlock it. In the event the user forgets the password for unlocking the encrypted volume, the Recovery Keys generated by BitLocker can be used to gain access to the encrypted drive.

Learning Outcomes

After completing this exercise, you will be able to:

  • Configure BitLocker settings via GPO
  • Shrink the Existing Drive
  • Enable BitLocker
  • Verify BitLocker functionality
  • Manage BitLocker using the command prompt
  • Unlock the Encrypted Drive using Recovery Keys
  • Remove BitLocker Disk Encryption

Exercise 3 - Manage Security for Removable Media

For security reasons, most organizations will prohibit their users from using personal storage devices for transporting proprietary information. This is to avoid theft of confidential data that may put the company’s trade secrets at risk. In this exercise, you will configure basic security for portable storage media to disallow their usage by configuring Group Policy Objects or GPO.

Learning Outcomes

After completing this exercise, you will be able to:

  • Configure restrictions for removable media using GPO

Exercise 4 - Hide Documents in a Graphics File

Steganography means covered or hidden. It is mainly intended to hide a secret message in a plain message or a graphics file. In this exercise, you will hide documents in a graphics file.

Learning Outcomes

After completing this exercise, you will be able to:

  • Use Folder Steganography Tools

Comprehensive Learning

See the full benefits of our immersive learning experience with interactive courses and guided career paths.