CSX VIRTUAL, SELF-GUIDED PRACTICE LABS

ON-DEMAND LABS FOR INDIVIDUAL PURCHASE

Choose from our comprehensive library of training labs.
6 months access

ISACA Member: $30.00 per lab

Non-Member: $45.00 per lab

Students: $20.00 per lab

Purchase Self-Paced Labs

NEW! HANDS-ON, TOPICALLY-BASED AND LOW-PRICED TRAINING LABS OFFER
CONTINUOUS TRAINING FOR ALL SKILL LEVELS – FROM BEGINNER TO ADVANCED.

Build critical, technical cybersecurity skills through hands-on lab work in a cloud-based, virtual environment.

Choose from our comprehensive library of individual, hands-on labs, focused on continuous training and skills development and varying by topic and complexity. Labs are offered at three progressive levels: Beginner, Intermediate and Advanced, and are updated regularly to help you build skills to combat the latest real-world threats and scenarios.

Learn in a Live and Dynamic Network Environment
All of our labs and instructional courses are designed to help you build your technical skillset through true hands-on learning. Guided work in our live network environment will help you learn by actually doing – and provide a safe space to practice critical skills without impacting operations. You’ll go through complex cybersecurity scenarios, based on the latest real-world threats, and be given live incidents to detect and mitigate.

Build a Customized and Continuous Training Program Based On Your Individual Needs
Customize your training by selecting labs matched to your current skill level and career objectives, and on areas where you need to build or improve your individual skills. We also offer individual, instructional training courses to complement your learning. The CSX virtual training environment is ideal for continuous learning, with frequent updates and a constantly-growing library of courses and labs.

On-Demand Format for “Anytime, Anywhere” Learning, At Your Own Pace
Like our self-paced virtual training courses, our labs are conducted on-demand in a cloud-based, virtual environment. Train whenever and wherever you want, at your own pace – without expensive travel costs and time away from work.

Minimal Technical Requirements
Unlike most typical training options, which require you to set up your own environment, CSX labs only require a high-speed Internet connection, browser and a computer. No need to download or configure anything.

Extended Access to Courses and Labs
Continue building and honing your technical skills for six months, with extended access to your purchased labs.

Every Experience is Performance-Based
Our training platform is the first to offer performance-based evaluation and scoring of every effort. You work will be assessed in real time and receive your success metrics and continuing professional education credits at the end of each lab.

Need more in-depth guidance and training in foundational areas of cyber? Try one of our in-depth instructional training courses. You’ll get hands-on lab work , plus detailed instruction and guidance in a comprehensive, 16-hour self-paced virtual format.

 

LAB

LAB TYPE

LEVEL

FUNCTIONAL DOMAIN

CPE HOURS

DESCRIPTION

Finding the Lost Web Server
Instructional
Beginner
Identify
2
Students will leverage network discovery and diagnostic capabilities to identify what happened to a corporate webserver severely damaged during an attack.
Network Scanning
Instructional
Beginner
Identify
2
Students will leverage network scanning tools to identify nodes and services on an internal network. The end goal is to create an up to date network map of their company's internal network for troubleshooting, analysis, and future reference.
HTTP Packet Analysis
Instructional
Beginner
Detect
2
Conducting basic packet analysis is a key skill for anyone working in the cybersecurity field. Students will learn how to filter and parse packets to detect if corporate intellectual property is being stolen from their organization.
Data Integrity
Instructional
Beginner
Protect
2
Students will learn the importance of data integrity through comparative analysis of hash algorithm output. Leveraging hashing tools, students will learn how to ensure that data is not compromised post-incident.
Web Server Backup
Instructional
Beginner
Recover
2
Maintaining copies of non-compromised data and files are paramount to the incident response and disaster recovery process. This lab ensures that students understand how to archive and hash non-compromised data and back it up to a safe location.
DNS Packet Analysis
Instructional
Beginner
Detect
2
Cybersecurity practitioners understand the importance of Domain Name System (DNS) packets and how they enable the flow of data across the Internet. They also understand that the subversion of DNS services on a network is a common attack seen in cybersecurity. In this lab, students will learn how to detect odd DNS activity and isolate samples of the traffic.
Scripts with Nmap
Instructional
Beginner
Identify
2
Understanding if a system’s ports are open and exposed is only half the battle of fully identifying and understanding an asset. You must also assess which services may be running on the asset. Every cybersecurity practitioner should understand how to leverage tools to understand which services are running on their networks. Students will leverage Nmap to see which services their computers are running.
Forensics 1: Imaging
Instructional
Beginner
Recover
2
The first step in computer forensics is obtaining a copy of the computers hard drive in question. This lab will guide students through that process.
Insider Threat Identification
Instructional
Beginner
Detect
2
This lab takes students through a situation where a former employee poses a serious threat to the company network.
System Baselining
Instructional
Beginner
Protect
2
Students will get more practice with MBSA, as well as be introduced to the Linux Tiger IDS in this lab.
Linux Baseline with Lynis
Instructional
Beginner
Identify
2
Lynis is a security auditing tool designed specifically for Linux systems. Lynis is an open-source product that runs on the host itself and is essential when it comes to obtaining knowledge on Linux baselining.
Script Construction and Execution
Instructional
Beginner
Identify
2
Assuming the role of a network security expert, who is responsible for creating, executing and then examining the output of a bash script and a batch file, students will learn the basics of scripting using both the Kali Linux bash and the Windows 10 command prompt.
Intrusion Detection System Implementation and Testing
Instructional
Beginner
Detect
2
Students will evaluate the functionality and applicability of IDS tools provided by the Security Onion Linux distribution, by identifying incidents and responding to alerts within the network of responsibility.
Updating Firewall Rules
Instructional
Intermediate
Protect
2
Cybersecurity professionals are often responsible for implementing acceptable use policies on their networks of responsibility. Thanks to the constant change of application usage and computing platforms, incident responders and technical professionals find themselves updating these policies regularly. In this lab, students learn how to change firewall rules to block unacceptable traffic.
Man-in-the-Middle Detection
Instructional
Intermediate
Detect
2
One of the most common attacks in the field of cybersecurity is the Man-in-the-Middle (MitM) attack. Students taking this lab will learn how to detect when a potential MitM attack is occurring.
Threat Detection
Instructional
Intermediate
Detect
2
Cybersecurity professionals are often given vague declarations of discontent from end-users experiencing technical difficulties. Understanding how to take minimal information and implement tools from their suite of capabilities to further understand the potential problems is key to proficiency. In this lab, students will implement typical network diagnostic tools to determine the type of issue an end user is having.
Cleaning Up After an Attack
Instructional
Intermediate
Recover
2
Cybersecurity professionals understand that simply detecting and responding to an incident is not enough to adequately protect an organization’s business processes and corporate assets. Therefore, it is important that practitioners understand how to recover from an incident. In this lab, students will learn how to ensure no backdoors or additional compromises exist on a system after an attack.
Forensics 2: File Recovery
Instructional
Intermediate
Recover
2
Once an image of the device in question has been obtained, file and recovery forensics can be attempted. In this lab, students will take the image created in a previous lab to investigate a possible data breach in their company.
Firewall Setup 2
Instructional
Intermediate
Protect
2
Once the initial firewall setup has been completed it's time to start adding some rules to protect specific network devices from potential threats.
Mobile Forensics
Instructional
Intermediate
Recover
2
This lab takes students through the nuances of mobile forensics. Mobile Applications, or Apps, utilize very specific technologies to store user data and configurations.
Data Leakage
Instructional
Intermediate
Identify
2
In this lab, students will interact with a username and password leak from a web app.
Packet Construction and Kernel Hardening
Instructional
Intermediate
Protect
2
In this lab, students will analyze a flood script built with Scapy, then configure their Linux kernel to detect flooding attacks.
CSX Volume 3, Challenge 1
Challenge
Intermediate
Protect/Detect
2
As part of this challenge, students must capture packets with Wireshark, configure their firewalls, and use Burp to intercept traffic.
CSX Volume 3, Challenge 2
Challenge
Intermediate
Protect/Detect
2
Students will detect and respond to a cyber attack.
Spectre Mitigation
Instructional
Intermediate
Protect
2
Spectre exploits crucial and vital susceptibilities in today's processors. Spectre uses speculative execution on processors using branch prediction. In other terms, Spectre takes advantages of the processors' performance techniques.
Meltdown Mitigation
Instructional
Intermediate
Protect
2
Meltdown exploits crucial and vital susceptibilities in today's processors. Meltdown is similar to Spectre but there are some differences. Meltdown allows access to ANY data that is mapped to current memory space.
Chrome Extension Testing
Instructional
Intermediate
Detect
2
In early 2018, security researchers discovered several nefarious Chrome extensions that were making unwanted calls to ad servers. This resulted in the removal of these Chrome extensions from the Google Extension Store and a heightened awareness to the possible effects of Chrome extensions on business networks.
Securing Web Browsers
Instructional
Intermediate
Protect
2
Ensuring web browsing security is an integral part of cybersecurity as a whole. Google Chrome and Mozilla Firefox are both used in this lab.
Passive Computer Forensics
Instructional
Intermediate
Recover
2
Leveraging the Kali and Clonezilla Linux distributions, students will image a file system, inspect identified files and leverage tools to identify nefarious deleted emails.
Triaging Incidents
Instructional
Intermediate
Respond
2
Students will generate malicious traffic, examine the generated traffic, and respond to the incidents based upon their order of importance. These actions will enable the student to understand an incident from an attacker's perspective, as well as a responder.
IOT Device Indicators
Instructional
Intermediate
Detect
2
Students will analyze a collection of IOT device communications packets and correlate the timing of data spikes with IOT user habits.
Home Automation Device Patterns
Instructional
Intermediate
Detect
2
This lab will teach a student how to analyze wireless data collection in order to map and characterize a network and the devices resident upon said network.
Browser Attacks
Instructional
Advanced
Detect
2
Phishing attacks are the lynchpin of many organizational breaches and exploitations. Cybersecurity professionals that understand this also understand that many of these attacks are successful due to lack of understanding by end users. This course will teach cybersecurity professionals how to perform a phishing attack and illustrate the importance of cybersecurity awareness when browsing the internet.
Restoring Data with Secure Copy
Instructional
Advanced
Recover
2
Every cybersecurity professional should understand the importance of obtaining, maintaining, and implementing a baseline of key system element in case of an incident. During the recovery process, pushing out clean baselines is paramount to restore system operations. In this lab, students will learn how to restore important, unaltered information by leveraging secure copy.
Testing Web Applications
Instructional
Advanced
Protect
2
Part of a comprehensive defense-in-depth implementation includes testing new capabilities and applications before implementing them into an organizations production network. This course illustrates how students can conduct testing against newly developed web applications to ensure they do not pose a risk to organizational assets.
Malware Analysis
Instructional
Advanced
Respond
2
Part of combating an incident or ensuring that an incident does not re-occur includes conducting in-depth analysis on the elements which compromised the network of the system. Thus, malware analysis has become a key capability which is applied during and after an incident. In this lab, students will gain an understanding of how to conduct malware analysis.
Scanning and Enumeration Challenge
Challenge
Advanced
 
2
In this challenge, you will have to utilize some of the knowledge you acquired in the previous labs to complete a few tasks. Please make sure to read all instructions carefully and save all results or reports into the specified files. These files are case sensitive and can change results.
Integrity and Malware Analysis
Challenge
Advanced
 
2
In this challenge, you will have to utilize some of the knowledge you acquired in the previous labs to complete a few tasks. Please make sure to read all instructions carefully and save all results or reports into the specified files. These files are case sensitive and can change results.
SQL Injection
Instructional
Advanced
Detect
2
In this lab, students will be exposed to SQL injection attacks and learn how to implement the elements of prevention.
Firewall Setup 1
Instructional
Advanced
Detect
2
Firewall routers will help protect your network from external and internal threats. This lab takes students through the first step of setting up a firewall.
DDoS Detection
Instructional
Advanced
Detect
2
Students will experience the different components of a distributed denial of service attack.
Session Hijacking
Instructional
Advanced
Detect
2
Students will identify web application cookies, interact with Burp, and a MITM attack.
Malware Detection and Removal with Baseline
Challenge
Advanced
Respond
2
In addition to Lynis, this lab features Difference, ClamAV, and other vital Linux tools. This lab fuses these essentials together in order to present a challenge.
Domain Detection
Challenge
Advanced
Detect
2
This challenge lab will be testing your packet analysis and domain detections skills.
Incident Response Script Implementation
Challenge
Advanced
Respond
2
This lab will challenge students to create scripts and appropriately leverage tools within Security Onion to enhance IDS implementation and response times.
Forensic Data Recovery and Analysis
Challenge
Advanced
Detect
2
This lab will challenge students to leverage tools such as Photorec and Wireshark to conduct forensic analysis in order to identify potential malicious activity indicators.