Book Contents Navigation
Introduction
Mathew J. Heath Van Horn, PhD
FAQ
About our Students
Discussion on Grading
1. Introduction to Part I
2. Setting Up a GNS3 Environment
3. Adding a MikroTik Appliance in GNS3
4. Installing an OpenWRT Router in GNS3
5. Installing Tiny Core Linux
6. Adding a Virtual Machine to GNS3
7. Create a Linux Server
Jacob Christensen and Mathew J. Heath Van Horn, PhD
8. Create a Windows Server
Mathew J. Heath Van Horn, PhD and Raechel Ferguson
9. Build a Simple Local Area Network with DHCP running on Tiny Core Linux
10. Create a pfSense Firewall VM
11. Create an Ubuntu Desktop
Dante Rocca
12. Create a Kali Linux VM
13. Create a Vulnerable Desktop VM
14. Making GNS3 Portable
15. Installing GNS3 on Linux
Calvin Lindemann
16. Miscellaneous Resources
17. Active Reconnaissance - Social Engineering Toolkit (SET)
18. Creating OWASP BWA VM
19. Your First Network
20. Hubs and Switches
Raechel Ferguson
21. Introduction to Routers
Jacob Christensen
22. IPv4 Addressing - A Very Brief Review
23. Dynamic Host Configuration Protocol - Linux
Jacob Christensen and Dante Rocca
24. Dynamic Host Configuration Protocol - Windows
25. Dynamic Host Configuration Protocol - MikroTik CHR
26. Static Networking Part 1
Kyle Wheaton and Jacob Christensen
27. Dynamic Host Configuration Protocol - MikroTik DHCP Relay
Mathew J. Heath Van Horn, PhD; Jacob Christensen; and Kyle Wheaton
28. Domain Name System Part 1- Authoritative DNS
29. Domain Name System Part 2 - Forwarding DNS
Jacob Christensen and Kyle Wheaton
30. Domain Name System Part 3 - Dynamic DNS
31. Static Networking Part 2
32. Dynamic Networking - Routing Information Protocol
33. Dynamic Networking - Open Shortest Path First
Mathew J. Heath Van Horn, PhD and Jacob Christensen
34. Dynamic Networking - Border Gateway Protocol
35. IPv6 Addressing - Introduction
Sawyer Hansen; Dante Rocca; and Mathew J. Heath Van Horn, PhD
36. Network Hardening - pfSense Intranet
37. Network Hardening - pfSense Internet
Dante Rocca; Mathew J. Heath Van Horn, PhD; and Jacob Christensen
38. System Hardening - Windows Firewall
39. Network Monitoring - Snort Network IDS/IPS
Julian Romano and Jacob Christensen
40. System Hardening - Tripwire HIDS
Jacob Christensen and Bernard Correa
41. System Hardening - Introduction to Linux User and Group Management
42. Network Hardening - Network Segmentation and Isolation
43. Network Mapping - Zenmap Basics
44. Network Monitoring - Honeypots
Jacob Christensen; Arjun Nath; and Isha Patel
45. Network Hardening - OSPF Encrypted Authentication
46. System Hardening - SSH Public Key Authentication with Linux
Jacob Christensen; Isha Patel; and Arjun Nath
47. Introduction to Wazuh
Maggie Lindemann
48. Build the Baseline Environment (Eagle Net)
Dante Rocca and Kyle Wheaton
49. Scanning and Enumeration - Nmap Basics
Dante Rocca and Mathew J. Heath Van Horn, PhD
50. Scanning and Enumeration - Zenmap Basics
Kaden Hayrynen and Mathew J. Heath Van Horn, PhD
51. Scanning and Enumeration - Sniffing Basics
52. Scanning and Enumeration - Vulnerability Scanning (Nessus)
53. Metasploit Console and Meterpreter
Michael Lindemann and Kyle Wheaton
54. Scanning and Enumeration - Banner Grabbing
55. Gaining Access - SQL Injection
56. Gaining Access - Password Cracking
Justin La Zare
57. Maintaining Access - Backdoors
58. Covering Tracks - Hiding Programs and Files
59. Man-in-the-Middle (MITM) - Switch Hacking
William Decator and Mathew J. Heath Van Horn, PhD
60. Scanning and Enumeration: Dirbuster
61. Scanning and Enumeration - Privilege Escalation Awesome Scripts SUITE - New Generation (PEASS-ng)
Ella Lopez and Gunnar Snyder
62. Create a Windows 11 Desktop
63. Windows Sticky Keys Attack
Braedyn Case
64. Using Docker in GNS3
65. Installing Alpine Linux
66. Dynamic Host Configuration Protocol – Alpine Linux
The 'Cheat Sheet'