Posts

Showing posts from October, 2025

Lab 7.2.9: Scan for Windows Vulnerabilities [WLO: 4] [CLO: 3]

Lab 6.3.4: Implement Intrusion Prevention [WLOs: 3, 4] [CLOs: 3, 4]

Lab 6.1.3: Implement Physical Security [WLOs: 2, 3, 4] [CLOs: 3, 4]

Lab 13.3.6 Secure a Mobile Device [WLOs: 1, 2, 3, 4, 5] [CLOs: 1, 2, 3]

Lab 13.2.4 Discover Bluetooth Devices [WLOs: 1, 2, 3, 4, 5] [CLOs: 1, 2, 3]

Lab 13.1.14 Locate a Rogue Wireless Access Point [WLOs: 1, 2, 3, 4, 5] [CLOs: 1, 2, 3]

13.1.13 Discover a Rogue DHCP Server

13.1.9 Discover a Hidden Network

5.5.4 Configure a Remote Access VPN

5.4.5 Configure a Perimeter Firewall

5.2.7 Configure a Security Appliance