Docsity
Docsity

Prepare for your exams
Prepare for your exams

Study with the several resources on Docsity


Earn points to download
Earn points to download

Earn points by helping other students or get them with a premium plan


Guidelines and tips
Guidelines and tips

networking and cybersecurity syllabus, Study Guides, Projects, Research of Network Design

networking and cybersecurity syllabus

Typology: Study Guides, Projects, Research

2019/2020

Uploaded on 02/17/2020

nayla-greige
nayla-greige 🇱🇧

4

(1)

5 documents

1 / 5

Toggle sidebar

This page cannot be seen from the preview

Don't miss anything!

bg1
Networking Lab
Lab 1: Cable Construction in a LAN - The objective of this lab is to
understand the color coding standard
of UTP cable, test a coaxial cable,
create straight and crossover cable and
test/verify its connectivity and connect
computers in Local Area Network.
Lab 2: Network devices in packet tracer - The objective of this lab is to
Understand Packet tracer and Getting
to know the network devices such as
hub, switches, router .
Lab 3: hubs and switches - A switch is a multi-input, multi-output
device which transfers packets from an
input to one or more outputs. A hub
joins multiple computers (or other
network devices) together to form a
single network segment. The objective
of this lab is to see the difference of
these two devices in packet tracer, in
Wireshark with a physical
implementation, and also in Riverbed
Modeler Academic Edition.
Lab 4: Network Tap - A network TAP is a device that is
directly used to connect to the cabling
infrastructure. Instead of two switches
or routers connecting directly to each
other, the network TAP is put between
the two devices and all data flows
through the TAP. This lab shows three
different ways to monitor all
inbound/outbound traffic on a network
as follows:
- Building a network tap with a much
reduced budget.
- A tap, network tap or passive sniffer is
a network element that allows us to
duplicate network traffic from one
connection to another port and thus be
able to monitor all transmitted packets.
- Using a switch w/a port
mirroring/spanning capability and
pf3
pf4
pf5

Partial preview of the text

Download networking and cybersecurity syllabus and more Study Guides, Projects, Research Network Design in PDF only on Docsity!

Networking Lab Lab 1: Cable Construction in a LAN - The objective of this lab is to understand the color coding standard of UTP cable, test a coaxial cable, create straight and crossover cable and test/verify its connectivity and connect computers in Local Area Network. Lab 2: Network devices in packet tracer - The objective of this lab is to Understand Packet tracer and Getting to know the network devices such as hub, switches, router. Lab 3: hubs and switches - A switch is a multi-input, multi-output device which transfers packets from an input to one or more outputs. A hub joins multiple computers (or other network devices) together to form a single network segment. The objective of this lab is to see the difference of these two devices in packet tracer, in Wireshark with a physical implementation, and also in Riverbed Modeler Academic Edition. Lab 4: Network Tap - A network TAP is a device that is directly used to connect to the cabling infrastructure. Instead of two switches or routers connecting directly to each other, the network TAP is put between the two devices and all data flows through the TAP. This lab shows three different ways to monitor all inbound/outbound traffic on a network as follows:

  • Building a network tap with a much reduced budget.
  • A tap, network tap or passive sniffer is a network element that allows us to duplicate network traffic from one connection to another port and thus be able to monitor all transmitted packets.
  • Using a switch w/a port mirroring/spanning capability and

configure a specific port to rebroadcast all traffic. This port would have a listening device connected to it (a laptop running Wireshark).

  • Using an Ethernet hub connected to a listening device (a laptop running Wireshark) for monitoring. Lab 5 : Network performance - This lab is divided into two parts: the first part aims to study the switch performance when sending small and large amount of data through an Ethernet switch. Firstly, software (Network Pinger) will be used in order to generate Pings on the switch. In addition, this software will be used in order to monitor the performance of the switch.
  • The second part allows students to understand the benchmarking concept using many tools such as LAN Speed Test software, Nuttcp and IPERF commands. The second part allows students to test the switch performance using a tool called network pinger. Lab 6: Routed networks
  • This lab allows students to see advantages of a routed network over a switched network. Therefore, they will have to reproduce multiple network configurations, establish the connections and TCP/IP stack configurations in order to use Wireshark to verify the theory they learned in class as pertaining to collision- and broadcast domains
  • Network configurations: switch and hub with collision domain, Switch Parallel Paths, Switch Buffering – No Collisions, Switched Network with Multiple Subnets, Broadcast Domains in Two Subnets, Router on A Stick or One

an IP network. Lab 6: Security in Packet tracer - This lab introduces Switchport security modes (Protect, Restrict and Shutdown), sticky address, mac address, maximum number of hosts and Switchport security violation rules in detail. It allows students to learn how to secure a switch port with Switchport security feature step by step. Lab 7: Denial of Service - Denial of Service (DoS) is an attack on a computer or network that prevents legitimate use of its resources.The objective of this lab is to help students learn to perform DoS attacks and to test network for DoS flaws. In this lab they will:

- Create and launch a denial-of-service attack to a victim - Perform a DoS attack by sending huge amount of SYN/ICMP/UDP packets continuously Techniques used: Dos synflood attack by using Metasploit, SYN Flooding a Target Host Using hping3, DOS Attack with Ettercap, Ping of Death, Smurf (Amplification attack), UDP Flood Attack (Fraggle). Lab 8: Distributed Denial of Service - A distributed denial-of-service (DDoS) attack is a coordinated strike, distributed among different computers, that aims to prevent the authorized use of one or more systems or applications. The objective of this lab is to help students learn to perform DDoS attacks and to test the network when the attack is conducted in order to be able to prevent the attack. Attacking tools: Syncflood, Xerxes, slowloris Lab 9: Introduction to Firewall - To protect our network, the first main tool to use is the firewall. In this experiment, student will have hands-on experience and gain the insights on how firewalls work. This experiment shows where the firewall resides within the network, and how to basically configure it to work with the network.

Fortigate-60D is used. Lab 10: MITM and Wireshark - MitM attacks are one of the oldest forms of cyber attack. This lab allows students to perform the techniques of MITM attacks and get into the wireless attacks. Techniques used : social engineering toolkit (SET), ARP poisoning using arpspoof for wireless networks, ARP poisoning using mitmf for wired network, MITM session hijacking, Airodump-ng, DNS Spoofing, WEP Cracking, Deauthentication, Creating a fake Access point on Honeypot using Mana Toolkit