Cloud Labs

Instant, unscheduled access to immersive training environments with live virtual machines and real software

Since 2010, Jones & Bartlett Learning has been an industry leader in providing engaging virtual lab solutions for cybersecurity education. Our Cybersecurity Cloud Labs provide fully immersive mock IT infrastructures with live virtual machines and real software, where students will learn and practice the foundational information security skills they will need to excel in their future careers. Unlike simulations, these hands-on virtual labs reproduce the complex challenges of the real world, without putting an institution’s assets at risk. Available as a standalone lab solution or bundled with Jones & Bartlett Learning textbooks, Cybersecurity Cloud Labs are an essential tool for mastering key course concepts through hands-on training.

Cloud Labs

Cloud Labs for Ethical Hacking

Lab 1: Performing Passive Reconnaissance on a Target Organization
Lab 2: Conducting Scanning and Enumeration on a Target Network
Lab 3: Exploiting Vulnerable Linux Systems
Lab 4: Exploiting Vulnerable Windows Systems
Lab 5: Performing Post-Exploitation Activities and Evasive Maneuvers

Cloud Labs for Fundamentals of Information Systems Security

Lab 1: Performing Reconnaissance and Probing Using Common Tools
Lab 2: Performing a Vulnerability Assessment
Lab 3: Enabling Windows Active Directory and User Access Controls
Lab 4: Using Group Policy Objects and Microsoft Baseline Security Analyzer for Change Control
Lab 5: Performing Packet Capture and Traffic Analysis
Lab 6: Implementing a Business Continuity Plan
Lab 7: Using Encryption to Enhance Confidentiality and Integrity
Lab 8: Performing a Web Site and Database Attack by Exploiting Identified Vulnerabilities
Lab 9: Eliminating Threats with a Layered Security Approach
Lab 10: Implementing an Information Systems Security Policy

Cloud Labs for Hacker Techniques, Tools, and Incident Handling

Lab 1: Assessing and Securing Systems on a Wide Area Network (WAN)
Lab 2: Applying Encryption and Hashing Algorithms for Secure Communications
Lab 3: Data Gathering and Footprinting on a Targeted Website
Lab 4: Using Ethical Hacking Techniques to Exploit a Vulnerable Workstation
Lab 5: Attacking a Vulnerable Web Application and Database
Lab 6: Identifying and Removing Malware on a Windows System
Lab 7: Analyzing Network Traffic to Create a Baseline Definition
Lab 8: Auditing a Wireless Network and Planning for a Secure WLAN Implementation
Lab 9: Investigating and Responding to Security Incidents
Lab 10: Securing the Network with an Intrusion Detection System (IDS)

Cloud Labs for System Forensics, Investigation, and Response

Lab 1: Applying the Daubert Standard to Forensic Evidence
Lab 2: Documenting a Workstation Configuration using Common Forensic Tools
Lab 3: Uncovering New Digital Evidence Using Bootable Forensic Utilities
Lab 4: Creating a Forensic System Case File for Analyzing Forensic Evidence
Lab 5: Analyzing Images to Identify Suspicious or Modified Files
Lab 6: Recognizing the Use of Steganography in Image Files
Lab 7: Automating E-mail Evidence Discovery Using P2 Commander
Lab 8: Decoding an FTP Protocol Session for Forensic Evidence
Lab 9: Identifying and Documenting Evidence from a Forensic Investigation
Lab 10: Conducting an Incident Response Investigation for a Suspicious Login

Cloud Labs for Network Security, Firewalls, and VPNs

Lab 1: Assessing the Network with Common Security Tools
Lab 2: Defending the Network from a Simulated Attack
Lab 3: Designing a Secure Network Topology
Lab 4: Configuring the Windows Defender Firewall
Lab 5: Configuring Firewall Interfaces with pfSense
Lab 6: Monitoring and Logging Network Traffic
Lab 7: Configuring Custom Firewall Rules with pfSense
Lab 8: Configuring a VPN Server with pfSense
Lab 9: Configuring a VPN Client for Secure File Transfers
Lab 10: Penetration Testing a pfSense Firewall

Supplemental Lab 1: Analyzing Network Traffic with Wireshark
Supplemental Lab 2: Analyzing Wireless Traffic with Wireshark and NetWitness Investigator
Supplemental Lab 3: Using Social Engineering Techniques to Plan an Attack
Supplemental Lab 4: Attacking a Virtual Private Network
Supplemental Lab 5: Drafting a Network Security Policy

Cloud Labs for Managing Risk in Information Systems

Lab 1: Identifying and Exploiting Vulnerabilities
Lab 2: Conducting a PCI DSS Compliance Review
Lab 3: Preparing a Risk Management Plan
Lab 4: Performing a Risk Assessment
Lab 5: Creating an IT Asset Inventory
Lab 6: Managing Technical Vulnerabilities
Lab 7: Developing a Risk Mitigation Plan
Lab 8: Implementing a Risk Mitigation Plan
Lab 9: Performing a Business Impact Analysis
Lab 10: Analyzing the Incident Response Process

Cloud Labs for Security Strategies in Windows Platforms and Applications

Lab 1: Implementing Access Controls with Windows Active Directory
Lab 2: Using Access Control Lists to Modify File System Permissions on Windows Systems
Lab 3: Configuring Microsoft Encrypting File System and BitLocker Drive Encryption
Lab 4: Identifying and Removing Malware from Windows Systems
Lab 5: Managing Group Policy within the Microsoft Windows Environment
Lab 6: Auditing Windows Systems for Security Compliance
Lab 7: Creating a Scheduled Backup and Replicating System Folders
Lab 8: Hardening Windows Systems for Security Compliance
Lab 9: Securing Internet Client and Server Applications on Windows Systems
Lab 10: Investigating Security Incidents within the Microsoft Windows Environment

Cloud Labs for Internet Security: How to Defend Against Attackers on the Web

Lab 1: Evaluating Web Server Vulnerabilities
Lab 2: Obtaining Personally Identifiable Information Through Internet Research
Lab 3: Performing a Post-Mortem Review of a Data Breach Incident
Lab 4: Exploiting Known Web Vulnerabilities on a Live Web Server
Lab 5: Applying OWASP to a Web Security Assessment
Lab 6: Applying Regulatory Compliance Standards
Lab 7: Performing Dynamic and Static Quality Control Testing
Lab 8: Performing an IT and Web Application Security Assessment
Lab 9: Recognizing Risks and Threats Associated with Emerging Technologies
Lab 10: Implementing a Security Development Lifecycle (SDL) Plan

Cloud Labs for Access Control and Identity Management

Lab 1: Designing an Access Control System
Lab 2: Conducting a Risk Assessment of an Access Control System
Lab 3: Configuring an Active Directory Domain Controller
Lab 4: Managing Windows Accounts and Organizational Units
Lab 5: Configuring Windows File System Permissions
Lab 6: Configuring a Remote Access VPN
Lab 7: Encrypting and Decrypting Files with Public Key Infrastructure
Lab 8: Scanning an Active Directory Domain Controller for Vulnerabilities
Lab 9: Enabling Audit Trails to Enforce Accountability
Lab 10: Applying the Security Policy Framework to an Access Control Environment

Supplemental Lab 1: Managing Group Policy Objects in Active Directory
Supplemental Lab 2: Managing Linux Accounts
Supplemental Lab 3: Configuring Linux File System Permissions
Supplemental Lab 4: Authenticating Encrypted Communications with Digital Signatures
Supplemental Lab 5: Encrypting and Decrypting Web Traffic with HTTPS

Cloud Labs for Security Strategies in Linux Platforms and Application

Lab 1: Installing a Core Linux Operating System on a Server
Lab 2: Configuring Basic Security Controls on a CentOS Linux Server
Lab 3: Hardening Security with User Account Management and Security Controls
Lab 4: Applying Hardened Linux File System Security Controls
Lab 5: Hardening Security for Linux Services and Applications
Lab 6: Hardening Security by Controlling Access
Lab 7: Hardening Security for the Linux Kernel
Lab 8: Applying Best Practices for Secure Software Management
Lab 9: Applying Best Practices for Security Logging and Monitoring
Lab 10: Defining Linux OS and Application Backup and Recovery Procedures