



Study with the several resources on Docsity
Earn points by helping other students or get them with a premium plan
Prepare for your exams
Study with the several resources on Docsity
Earn points to download
Earn points by helping other students or get them with a premium plan
Community
Ask the community for help and clear up your study doubts
Discover the best universities in your country according to Docsity users
Free resources
Download our free guides on studying techniques, anxiety management strategies, and thesis advice from Docsity tutors
networking and cybersecurity syllabus
Typology: Study Guides, Projects, Research
1 / 5
This page cannot be seen from the preview
Don't miss anything!
Networking Lab Lab 1: Cable Construction in a LAN - The objective of this lab is to understand the color coding standard of UTP cable, test a coaxial cable, create straight and crossover cable and test/verify its connectivity and connect computers in Local Area Network. Lab 2: Network devices in packet tracer - The objective of this lab is to Understand Packet tracer and Getting to know the network devices such as hub, switches, router. Lab 3: hubs and switches - A switch is a multi-input, multi-output device which transfers packets from an input to one or more outputs. A hub joins multiple computers (or other network devices) together to form a single network segment. The objective of this lab is to see the difference of these two devices in packet tracer, in Wireshark with a physical implementation, and also in Riverbed Modeler Academic Edition. Lab 4: Network Tap - A network TAP is a device that is directly used to connect to the cabling infrastructure. Instead of two switches or routers connecting directly to each other, the network TAP is put between the two devices and all data flows through the TAP. This lab shows three different ways to monitor all inbound/outbound traffic on a network as follows:
configure a specific port to rebroadcast all traffic. This port would have a listening device connected to it (a laptop running Wireshark).
an IP network. Lab 6: Security in Packet tracer - This lab introduces Switchport security modes (Protect, Restrict and Shutdown), sticky address, mac address, maximum number of hosts and Switchport security violation rules in detail. It allows students to learn how to secure a switch port with Switchport security feature step by step. Lab 7: Denial of Service - Denial of Service (DoS) is an attack on a computer or network that prevents legitimate use of its resources.The objective of this lab is to help students learn to perform DoS attacks and to test network for DoS flaws. In this lab they will:
- Create and launch a denial-of-service attack to a victim - Perform a DoS attack by sending huge amount of SYN/ICMP/UDP packets continuously Techniques used: Dos synflood attack by using Metasploit, SYN Flooding a Target Host Using hping3, DOS Attack with Ettercap, Ping of Death, Smurf (Amplification attack), UDP Flood Attack (Fraggle). Lab 8: Distributed Denial of Service - A distributed denial-of-service (DDoS) attack is a coordinated strike, distributed among different computers, that aims to prevent the authorized use of one or more systems or applications. The objective of this lab is to help students learn to perform DDoS attacks and to test the network when the attack is conducted in order to be able to prevent the attack. Attacking tools: Syncflood, Xerxes, slowloris Lab 9: Introduction to Firewall - To protect our network, the first main tool to use is the firewall. In this experiment, student will have hands-on experience and gain the insights on how firewalls work. This experiment shows where the firewall resides within the network, and how to basically configure it to work with the network.
Fortigate-60D is used. Lab 10: MITM and Wireshark - MitM attacks are one of the oldest forms of cyber attack. This lab allows students to perform the techniques of MITM attacks and get into the wireless attacks. Techniques used : social engineering toolkit (SET), ARP poisoning using arpspoof for wireless networks, ARP poisoning using mitmf for wired network, MITM session hijacking, Airodump-ng, DNS Spoofing, WEP Cracking, Deauthentication, Creating a fake Access point on Honeypot using Mana Toolkit