Time
9 hours 54 minutes
Difficulty
Intermediate
CEU/CPE
4

Video Transcription

00:00
Hey, everyone, welcome back to the course. So in the last video, we took a look at how control number 19 incident response and management matches up to the Miss cybersecurity framework
00:09
And these next two lab videos, We're not gonna take a step by step. Look at the labs. But we do have a step by step guide for you to follow to go ahead and complete their labs. This video in the next video, we'll just give you a brief overview of the particular lab so you understand what you'll actually be doing.
00:26
So in this particular lab, we're gonna be doing a lab called performing Initial Attack Analysis so you can find this lab inside the cyber a catalogue. And basically, what you're going to be doing is
00:35
number one attacking a Windows 2008 servers. You're gonna be opening a reverse shell after you've gained access to the server, and then you're gonna put on your defensive hat and you're gonna analyze theater tax. So you're gonna analyze and look for what we're calling the hacker the hacker account.
00:52
So again, you're initially going to be attacking the machine, gaining access and opening reverse shell and then you're going to be finding yourself essentially by performing some step by step. It's never saw response process.
01:06
Now these step by step lab guides are always available in the resource is section of the course, so that's where you'll be able to find this particular one for download.
01:15
There are many steps in this lab, but I want to stress it doesn't normally take that long. I should just taking about 45 minutes to an hour or so. If it takes you a little longer. That's perfectly fine, and you'll have an option as you get closer to the time running out on the lab toe. Actually, go ahead and extend the time.
01:30
One last thing I wanted to mention as as you go through the lab on the step by step guide. You'll also want to make sure you navigate on the right side here, And as you navigate through and complete each step, be sure to check these boxes.
01:44
That way, you could give full credit for the lab. You'll notice the task bar at the very bottom here starts to turn blue as I complete each additional step.
01:53
So again very important, make sure you do. You are checking those boxes as you go through each step in this lab should get full credit for the lab once complete.
02:01
So this video, we just took a brief introduction to the performing an initial attack analysis lap and the next city were to talk about our last lab in this course.

Up Next

CIS Top 20 Critical Security Controls

This course will provide students with an overview of the CIS Top 20 Critical Security Controls v7.1. Students in this course will learn each CIS control and why it is important to an organization.

Instructed By

Instructor Profile Image
Ken Underhill
Master Instructor at Cybrary
Master Instructor