Using Encryption and Steganography
Welcome to the Using Encryption and Steganography Practice Lab. In this module you will be provided with the instructions and devices needed to develop your hands-on skills.
Already have an account? Sign In »

Introduction
Welcome to the Using Encryption and Steganography Practice Lab. In this module you will be provided with the instructions and devices needed to develop your hands-on skills.
Learning Outcomes
In this module, you will complete the following exercises:
- Configure BitLocker on Portable Media
- Implement Full Disk Encryption using BitLocker
- Manage Security for Removable Media
- Hide documents in a graphics file
After completing this lab, you will be able to:
- Enable BitLocker without TPM Support
- Configure BitLocker settings via GPO
- Shrink the Existing Drive
- Enable BitLocker
- Verify BitLocker functionality
- Manage BitLocker using the command prompt
- Unlock the Encrypted Drive using Recovery Keys
- Configure restrictions for removable media using GPO
- Use Folder Steganography Tools
Exam Objectives
The following exam objectives are covered in this lab:
- CAS-003 2.2 Analyze a scenario to integrate security controls for host devices to meet security requirements.
Lab Duration
It will take approximately 1 hour to complete this lab.
Exercise 1 - Configure BitLocker on Portable Media
Windows BitLocker is a storage encryption technology that gives administrators the capability to secure fixed and removable disks including portable USB drives using encryption services built into the operating system.
For this exercise, you will secure the disk volume of Windows 8 by using the BitLocker feature.
Learning Outcomes
After completing this exercise, you will be able to:
- Enable BitLocker without TPM Support
Exercise 2 - Implement Full Disk Encryption using BitLocker
BitLocker was first introduced in Windows Server 2008 and Windows 7 Enterprise and then carried over to later versions. Disk encryption can be enabled using a local or domain group policy. To unlock an encrypted disk volume, the user must type the password to unlock it. In the event the user forgets the password for unlocking the encrypted volume, the Recovery Keys generated by BitLocker can be used to gain access to the encrypted drive.
Learning Outcomes
After completing this exercise, you will be able to:
- Configure BitLocker settings via GPO
- Shrink the Existing Drive
- Enable BitLocker
- Verify BitLocker functionality
- Manage BitLocker using the command prompt
- Unlock the Encrypted Drive using Recovery Keys
- Remove BitLocker Disk Encryption
Exercise 3 - Manage Security for Removable Media
For security reasons, most organizations will prohibit their users from using personal storage devices for transporting proprietary information. This is to avoid theft of confidential data that may put the company’s trade secrets at risk. In this exercise, you will configure basic security for portable storage media to disallow their usage by configuring Group Policy Objects or GPO.
Learning Outcomes
After completing this exercise, you will be able to:
- Configure restrictions for removable media using GPO
Exercise 4 - Hide Documents in a Graphics File
Steganography means covered or hidden. It is mainly intended to hide a secret message in a plain message or a graphics file. In this exercise, you will hide documents in a graphics file.
Learning Outcomes
After completing this exercise, you will be able to:
- Use Folder Steganography Tools
See the full benefits of our immersive learning experience with interactive courses and guided career paths.