Ask the uCertify AI Tutor for instant help, hints, explanations or even practice questions—right inside this course.
| Title | |
|---|---|
|
no bookmarked, confident, or note marked bookmark popover collapsed
1.10.1
Creating a Virtual Machine and Installing Ubuntu Using Hyper-V Manager
|
Unattempted
|
|
no bookmarked, confident, or note marked bookmark popover collapsed
2.1.1
Displaying Metadata Information
|
Unattempted
|
|
no bookmarked, confident, or note marked bookmark popover collapsed
2.3.1
Capturing Network Traffic
|
Unattempted
|
|
no bookmarked, confident, or note marked bookmark popover collapsed
3.1.1
Taking an Incremental Backup
|
Unattempted
|
|
no bookmarked, confident, or note marked bookmark popover collapsed
3.1.2
Taking a Full Backup
|
Unattempted
|
|
no bookmarked, confident, or note marked bookmark popover collapsed
3.2.1
Creating an Amazon S3 Glacier Vault
|
Unattempted
|
|
no bookmarked, confident, or note marked bookmark popover collapsed
3.4.1
Observing an MD5-Generated Hash Value
|
Unattempted
|
|
no bookmarked, confident, or note marked bookmark popover collapsed
3.4.2
Observing an SHA256-Generated Hash Value
|
Unattempted
|
|
no bookmarked, confident, or note marked bookmark popover collapsed
3.4.3
Creating a CloudWatch Dashboard and Adding a Metric to it
|
Unattempted
|
|
no bookmarked, confident, or note marked bookmark popover collapsed
4.4.1
Performing a MITM Attack
|
Unattempted
|
|
no bookmarked, confident, or note marked bookmark popover collapsed
4.4.2
Using Social Engineering Techniques to Plan an Attack
|
Unattempted
|
|
no bookmarked, confident, or note marked bookmark popover collapsed
5.3.1
Configuring a Firewall for Inbound Rules
|
Unattempted
|
|
no bookmarked, confident, or note marked bookmark popover collapsed
5.3.2
Setting up a Honeypot on Kali Linux
|
Unattempted
|
|
no bookmarked, confident, or note marked bookmark popover collapsed
5.3.3
Enabling an Access Control List
|
Unattempted
|
|
no bookmarked, confident, or note marked bookmark popover collapsed
5.3.4
Creating a VPC
|
Unattempted
|
|
no bookmarked, confident, or note marked bookmark popover collapsed
5.3.5
Creating a Network ACL
|
Unattempted
|
|
no bookmarked, confident, or note marked bookmark popover collapsed
5.3.6
Configuring Outbound Rules for a Firewall
|
Intermediate
Unattempted
|
|
no bookmarked, confident, or note marked bookmark popover collapsed
5.7.1
Creating an Elastic Load Balancer
|
Unattempted
|
|
no bookmarked, confident, or note marked bookmark popover collapsed
5.7.2
Creating a NAT Gateway
|
Unattempted
|
|
no bookmarked, confident, or note marked bookmark popover collapsed
6.2.1
Configuring a Proxy Server
|
Unattempted
|
|
no bookmarked, confident, or note marked bookmark popover collapsed
6.4.1
Conducting IP Spoofing
|
Unattempted
|
|
no bookmarked, confident, or note marked bookmark popover collapsed
6.4.2
Conducting Cross-site Request Forgery (CSRF or XSRF) Attacks
|
Unattempted
|
|
no bookmarked, confident, or note marked bookmark popover collapsed
6.4.3
Attacking a Website Using Cross-Site Scripting (XSS) Injection
|
Unattempted
|
|
no bookmarked, confident, or note marked bookmark popover collapsed
9.10.1
Completing the Chain of Custody
|
Unattempted
|
|
no bookmarked, confident, or note marked bookmark popover collapsed
10.4.1
Simulating the DDoS Attack
|
Unattempted
|