Linux Endpoint Security: Networking
In this lab you will discover common commands used to evaluate and analyze Linux networking functions with a focus on establishing a foundation for cyber security skills.
Terms and conditions apply.
Getting Started in the Lab Environment
Here are the initial instructions and explanation of the lab environment. Read this while your environment is busy creating itself from nothing. Yes, this violates physics; we know. How fun!
Discover ARP and Linux Layer 2 Functions
Leverage the ARP command to enumerate layer devices at layer two, and understand how a device's ARP cache is important for network security.
Use the ROUTE Command to Understand Layer 3 Operations
Discover layer 3 network functions and routes using the route command, and discover how these are relevant to cyber security.
Leverage nslookup and host to Explain Linux host DNS Functions
Explore the basic configurations and functions of host and domain naming service on Linux.
Identify Network Activity with netstat
Leverage netstat to interrogate Linux endpoint network activity and identify the listening service launched from the educational malware.
The Last Challenge
This is the last challenge of this lab, and your last chance to experience the environment before clicking finish lab, ending this small little world that flittered into existence just for you.
Provided environment for hands-on practice
We will provide the credentials and environment necessary for you to practice right within your browser.
Follow along with the author’s guided walkthrough and build something new in your provided environment!
Did you know?
On average, you retain 75% more of your learning if you get time for practice.