CyberCorps UK LogoCyberCorps UK
Teams Link
  1. Home
Feeling StupidKeyboard Layout

Labs

Task Manager Lab

Access Task Manager in multiple ways, analyse processes, and capture performance data.

Network Performance Lab

Monitor bandwidth, latency, and packet drops using Windows performance diagnostics and built-in reports.

Windows 11 Disk Cleanup Lab

Guided practice freeing space, clearing temp files, and optimizing storage on Windows 11.

Windows Task Scheduler Lab

Create recurring tasks, configure triggers, and automate maintenance with Task Scheduler.

Windows File Share Lab

Create a local user, build a secure share, and verify access from another session.

Windows User & Group Lab

Create local accounts, manage group membership, and sign in as a delegated user.

Windows Password Policy Lab

Enforce strict password requirements using local security policy and validation checks.

BitLocker To Go Lab

Encrypt a removable drive with BitLocker, generate recovery keys, and unlock on another PC.

MMC Admin Console Lab

Build a custom MMC console with essential snap-ins for local administration.

Artificial Intelligence

Copilot Study Course

Learn prompt engineering, revision workflows, and troubleshooting with Microsoft Copilot.

Security Fundamentals

Foundational Concepts

CIA Triad & Security Controls

Confidentiality, Integrity, Availability principles and security control frameworks

Security Models Overview

Compare Bell-LaPadula, Biba, Clark-Wilson, and Brewer-Nash for layered assurance

The Cyber Kill Chain

Adversary lifecycle phases with controls and detection opportunities

MITRE ATT&CK® Framework

Tactics, techniques, and procedures for threat-informed defense

Cryptography

Symmetric Cryptography

Shared key encryption, AES, and implementation security

Asymmetric Cryptography

Public key cryptography fundamentals (comprehensive guide)

Hashing Algorithms

Cryptographic hash functions, properties, and security applications

Hashing Calculator

Interactive hashing calculator with multiple algorithms

Symmetric Encryption Demo

Interactive symmetric encryption and decryption tool

PKI (Public Key Infrastructure)

Certificate authorities, digital certificates, and trust management

Steganography

Hidden data techniques and LSB bitmap image manipulation

Networking & Security Tools

SSH (Secure Shell)

Secure remote access with key management and authentication

SSL/TLS (Transport Security)

Cryptographic protocols for secure network communications

Nmap

Network mapping and security scanning tool (comprehensive guide)

Tshark

Command-line packet analysis and network troubleshooting

Ettercap

Comprehensive suite for MITM attacks and network analysis

Threats & Vulnerabilities

Malware Types & Detection

Survey of malware families and modern detection techniques

OWASP Top Ten

Critical web application risks with mitigation strategies and labs

CVSS & NVD

Score vulnerabilities and operationalize the National Vulnerability Database

Vulnerability Scanning Techniques

Exposure discovery using authenticated scans, agents, and cloud APIs

Threat Intelligence & Hunting

Run an intelligence-led hunt programme that reduces adversary dwell time

Information Gathering

OSINT

Open Source Intelligence techniques (comprehensive guide)

Google Dorking

Advanced search techniques (comprehensive guide)

System & Data Protection

Document Classification & DLP

Label sensitive assets, apply DLP controls, and govern subjects/objects effectively

Windows Defender & Security

Comprehensive guide to Windows built-in security features

BitLocker Drive Encryption

Microsoft's full-volume disk encryption for data protection

Firewall Technologies

Compare legacy, NGFW, WAF, host-based, and cloud-native firewall controls

Networking

IPv4 Addresses

Unified IPv4 addressing fundamentals, calculators, and references

IPv6 Addresses

IPv6 addressing and configuration (comprehensive guide)

NAT/PAT (Address Translation)

Network address translation for IP conservation and security

VLANs (Virtual LANs)

Network segmentation, trunking, and VLAN security configuration

VPN (Virtual Private Networks)

Site-to-Site, Remote Access, and SSL VPN implementations

RADIUS & TACACS+ Authentication

Centralized AAA protocols for network device access control

Common Ports Reference

Network ports and services reference (comprehensive guide)

DNS Query & Troubleshooting Tools

Compare nslookup, dig, and host to diagnose DNS issues effectively

DNS Infrastructure

Follow resolution from hosts file and caches to root, TLD, and authoritative servers

Ping & Traceroute Toolkit

Compare ping, traceroute, tracert, pathping, and mtr for connectivity analysis

Hardware Components

Processors (CPU)

Intel, AMD, and Apple Silicon architectures and performance comparison

RAM Memory

Memory types, specifications, and performance characteristics

Storage Devices

HDDs, SSDs, NVMe drives, and storage technology comparison

Peripheral Connections

USB, ports, and connectivity standards (comprehensive guide)

Hardware Comparison Tool

Interactive tool to compare and configure computer hardware

CPU Performance Tool

Analyze processor performance for gaming, workloads, and efficiency

RAM Calculator

Calculate memory performance, bandwidth, and suitability for different use cases

Storage Calculator

Compare storage performance, transfer times, and cost analysis

Linux

Linux Permissions

Understand DAC, special bits, and common scenarios with interactive examples.

Linux Terminal Lab

Hands-on terminal exercises covering navigation, permissions, and scripting basics.

Bash Scripting

Automate tasks with shell scripts, conditionals, loops, and reusable functions.

Windows vs. Linux Commands

Side-by-side command reference to translate administrative tasks between shells.

Windows

Windows 11 Clean Install

Offline install workflow and ms-cxh:localonly account bypass

Windows 11 Offline Account

Trigger ms-cxh:localonly to create local admin accounts during OOBE

Reset Your PC

PC reset and troubleshooting guide

DiskPart

Windows disk management command-line utility

Windows Admin Tools

System administration and management

Windows Registry & System32\config

Explore registry hives, SYSTEM32\config files, and safe maintenance practices

PowerShell Execution Policy

PowerShell security settings (comprehensive guide)

Windows 11 File Sharing

Create and manage network shares with security best practices

WSL Ubuntu Lab

Install WSL 2, deploy Ubuntu 24.04, and manage multiple Linux distros

Windows Shortcuts

Essential keyboard shortcuts and commands

Linux & Unix

Linux File Permissions

Master Unix/Linux permissions, ACLs, and access control security

Scripting & Automation

Bash Scripting

Master Linux shell scripting with development environments, constructs, and automation

PowerShell Scripting

Windows PowerShell cmdlets, ISE, and automation techniques

Python Scripting

Python automation, interpreters, and cybersecurity applications

Interactive Scripting Labs

Hands-on laboratories for Bash, PowerShell, and Python scripting

Cloud Computing

Cloud Computing

Comprehensive guide to cloud services, providers, and best practices

Virtualization

VMs, hypervisors, and container technology

IT Governance

Change Management & Asset Lifecycle

IT governance, procurement security, and secure asset disposal processes

Compliance Frameworks

ISO 27000 Series

International information security management system standards

PCI DSS

Payment Card Industry Data Security Standard controls and requirements

SOX (Sarbanes-Oxley)

Financial reporting requirements and key IT general controls

GLBA

Gramm-Leach-Bliley Act data protection expectations for financial institutions

HIPAA

Healthcare privacy, security rules, and safeguarding of PHI

GDPR

European Union personal data protection obligations and governance

UK Data Protection Act

UK GDPR and DPA 2018 duties for controllers, processors, and individuals

UK Computer Misuse Act

Criminal offences and defences for unauthorised access and misuse of IT systems

Common Criteria

Global assurance framework for evaluating security of IT products and systems

Capability Maturity Models

Maturity-level frameworks (CMMI, CERT-RMM) for governing process and resilience improvements

Business Continuity & Disaster Recovery

Resilience planning, continuity execution, and recovery strategies for critical services

SIEM & SOAR Automation

Integrate detection and response platforms using APIs, webhooks, YAML/JSON playbooks, and data pipelines

Other Lectures

Information Warfare

Modern tactics and defense strategies

Backup Strategies

Data backup and recovery methods (comprehensive guide)

Windows & Linux Commands

Command comparison reference (comprehensive guide)

Security Podcasts

Recommended cybersecurity podcasts

A+ Glossary

Essential IT terms and definitions

Yorkshire Burger

Anglo-American fusion recipe

Demonstrations

Binary Demonstration

Use 8-bits to build a byte and watch the decimal value update instantly.

Subnetting & CIDR

Visualise prefix lengths, subnet masks, and usable hosts for any /CIDR.

Hands-on Labs

Windows CMD Lab

Hands-on exercises for Command Prompt basics

Task Manager Lab

Access Task Manager quickly and analyse system processes

Performance Monitor Lab

Master PerfMon for system monitoring and troubleshooting

Network Performance Lab

Monitor bandwidth, latency, and packet drops using Windows diagnostics.

Windows 11 Disk Cleanup Lab

Guided practice freeing space, clearing temp files, and optimizing storage on Windows 11.

Windows Task Scheduler Lab

Create recurring tasks, configure triggers, and automate maintenance with Task Scheduler.

Windows File Share Lab

Create a local user, build a secure share, and verify access from another session.

Windows User & Group Lab

Create local accounts, manage group membership, and sign in as a delegated user.

Windows Password Policy Lab

Enforce strict password requirements using local security policy and validation checks.

Windows Defender Security Lab

Configure antivirus, firewall, and advanced security features

BitLocker USB Encryption Lab

Hands-on practice encrypting USB drives with BitLocker To Go

MMC Admin Console Lab

Build custom MMC consoles with essential administrative snap-ins

IIS Installation Lab

Install and configure Internet Information Services on Windows 11

Linux Terminal Lab

Master essential Linux/Unix command line operations

macOS Terminal Lab

Unix commands and Mac-specific terminal features

Nmap Recon Lab

Plan, execute, and document scoped network scans with Nmap.

LSB Steganography Demo

1 bit per byte manipulation - hiding text in RGB pixel data

Quizzes

Port Matching Quiz

Match network ports with their services

IP Address Mastery Quiz

Subnet calculations and IPv4/IPv6 address recognition

Service Port Quiz

Choose the correct port for each network service

Numbers

Number Sequences

Mathematical sequences and patterns

Base-10 (Decimal) System

Understanding the decimal number system fundamentals

Base-2 (Binary) System

Binary number system - the language of computers

Base-16 (Hexadecimal) System

Hexadecimal system for memory addressing and networking

ASCII Table

Complete ASCII character encoding reference

© 2024 Michael Stout