Thirdd Party Search Labs Page

Instant, unscheduled access to immersive training environments with live virtual machines and real software

Since 2010, Jones & Bartlett Learning has been an industry leader in providing engaging virtual lab solutions for cybersecurity education. Our Cybersecurity Cloud Labs provide fully immersive mock IT infrastructures with live virtual machines and real software, where students will learn and practice the foundational information security skills they will need to excel in their future careers. Unlike simulations, these hands-on virtual labs reproduce the complex challenges of the real world, without putting an institution’s assets at risk. Available as a standalone lab solution or bundled with Jones & Bartlett Learning textbooks, Cybersecurity Cloud Labs are an essential tool for mastering key course concepts through hands-on training.

Cloud Labs

Cloud Labs for Ethical Hacking

Lab 1: Performing Passive Reconnaissance on a Target Organization
Lab 2: Conducting Scanning and Enumeration on a Target Network
Lab 3: Exploiting Vulnerable Linux Systems
Lab 4: Exploiting Vulnerable Windows Systems
Lab 5: Performing Post-Exploitation Activities and Evasive Maneuvers

Cloud Labs for Fundamentals of Information Systems Security

Lab 1: Performing Reconnaissance and Probing Using Common Tools
Lab 2: Performing a Vulnerability Assessment
Lab 3: Enabling Windows Active Directory and User Access Controls
Lab 4: Using Group Policy Objects and Microsoft Baseline Security Analyzer for Change Control
Lab 5: Performing Packet Capture and Traffic Analysis
Lab 6: Implementing a Business Continuity Plan
Lab 7: Using Encryption to Enhance Confidentiality and Integrity
Lab 8: Performing a Web Site and Database Attack by Exploiting Identified Vulnerabilities
Lab 9: Eliminating Threats with a Layered Security Approach
Lab 10: Implementing an Information Systems Security Policy

Cloud Labs for Hacker Techniques, Tools, and Incident Handling

Lab 1: Assessing and Securing Systems on a Wide Area Network (WAN)
Lab 2: Applying Encryption and Hashing Algorithms for Secure Communications
Lab 3: Data Gathering and Footprinting on a Targeted Website
Lab 4: Using Ethical Hacking Techniques to Exploit a Vulnerable Workstation
Lab 5: Attacking a Vulnerable Web Application and Database
Lab 6: Identifying and Removing Malware on a Windows System
Lab 7: Analyzing Network Traffic to Create a Baseline Definition
Lab 8: Auditing a Wireless Network and Planning for a Secure WLAN Implementation
Lab 9: Investigating and Responding to Security Incidents
Lab 10: Securing the Network with an Intrusion Detection System (IDS)

Cloud Labs for System Forensics , Investigation, and Response

Lab 1: Applying the Daubert Standard to Forensic Evidence
Lab 2: Documenting a Workstation Configuration using Common Forensic Tools
Lab 3: Uncovering New Digital Evidence Using Bootable Forensic Utilities
Lab 4: Creating a Forensic System Case File for Analyzing Forensic Evidence
Lab 5: Analyzing Images to Identify Suspicious or Modified Files
Lab 6: Recognizing the Use of Steganography in Image Files
Lab 7: Automating E-mail Evidence Discovery Using P2 Commander
Lab 8: Decoding an FTP Protocol Session for Forensic Evidence
Lab 9: Identifying and Documenting Evidence from a Forensic Investigation
Lab 10: Conducting an Incident Response Investigation for a Suspicious Login

Cloud Labs for Network Security, Firewalls, and VPNs

Lab 1: Analyzing Protocols with Wireshark
Lab 2: Using Wireshark and NetWitness Investigator to Analyze Wireless Traffic
Lab 3: Configuring a pfSense Firewall on the Client
Lab 4: Configuring a pfSense Firewall on the Server
Lab 5: Penetration Testing a pfSense Firewall
Lab 6: Using Social Engineering Techniques to Plan an Attack
Lab 7: Configuring a Virtual Private Network Server
Lab 8: Configuring a VPN Client for Secure File Transfers
Lab 9: Attacking a Virtual Private Network
Lab 10: Investigating and Responding to Network Security Incidents

Cloud Labs for Security Strategies in Windows Platforms and Applications

Lab 1: Implementing Access Controls with Windows Active Directory
Lab 2: Using Access Control Lists to Modify File System Permissions on Windows Systems
Lab 3: Configuring BitLocker and Windows Encryption
Lab 4: Identifying and Removing Malicious Software from Windows Systems
Lab 5: Managing Group Policy within the Microsoft Windows Environment
Lab 6: Creating a Scheduled Backup and Replicating System Folders
Lab 7: Securing Servers with the Security Configuration Wizard and the Windows Firewall
Lab 8: Securing Internet Client and Server Applications on Windows Systems
Lab 9: Protecting Digital Evidence, Documentation, and the Chain of Custody
Lab 10: Hardening Windows Server Security Using Microsoft Baseline Security Analyzer

Cloud Labs for Internet Security: How to Defend Against Attackers on the Web

Lab 1: Evaluating Web Server Vulnerabilities
Lab 2: Obtaining Personally Identifiable Information Through Internet Research
Lab 3: Performing a Post-Mortem Review of a Data Breach Incident
Lab 4: Exploiting Known Web Vulnerabilities on a Live Web Server
Lab 5: Applying OWASP to a Web Security Assessment
Lab 6: Applying Regulatory Compliance Standards
Lab 7: Performing Dynamic and Static Quality Control Testing
Lab 8: Performing an IT and Web Application Security Assessment
Lab 9: Recognizing Risks and Threats Associated with Emerging Technologies
Lab 10: Implementing a Security Development Lifecycle (SDL) Plan

Cloud Labs for Access Control, Authentication, and Public Key Infrastructure

Lab 1: Configuring an Active Directory Domain Controller
Lab 2: Managing Windows Accounts and Organizational Units
Lab 3: Configuring Windows File System Permissions
Lab 4: Managing Group Policy Objects in Active Directory
Lab 5: Configuring Windows Firewalls
Lab 6: Managing Linux Accounts
Lab 7: Configuring Linux File System Permissions
Lab 8: Encrypting and Decrypting Files with PKI
Lab 9: Authenticating Security Communications with Digital Signatures
Lab 10: Encrypting and Decrypting Web Traffic with HTTPS

Cloud Labs for Security Strategies in Linux Platforms and Application

Lab 1: Installing a Core Linux Operating System on a Server
Lab 2: Configuring Basic Security Controls on a CentOS Linux Server
Lab 3: Hardening Security with User Account Management and Security Controls
Lab 4: Applying Hardened Linux File System Security Controls
Lab 5: Hardening Security for Linux Services and Applications
Lab 6: Hardening Security by Controlling Access
Lab 7: Hardening Security for the Linux Kernel
Lab 8: Applying Best Practices for Secure Software Management
Lab 9: Applying Best Practices for Security Logging and Monitoring
Lab 10: Defining Linux OS and Application Backup and Recovery Procedures