Feeling confused
-
Hello,
I am new to aci learning and I am having a hard time understanding the flow of things. I am doing the Security + 701 course and I watched the first video about security controls and I noticed in the notes section there is a lab portion in the notes. Is that something I do on a virtual machine while following the directions or is there a lab that I follow in the virtual lab section? Also do the labs in the virtual lab section follow with the lectures? I am confused how they relate? Do we just do them once we gain the knowledge or will the instructors in the course prompt us to do them?
Thanks in advance for the help,
Camille
-
@Camille-Pouncy great question! The videos teach the concepts of the 701 objectives. The labs give the learner hands-on experience with the concepts. You will encounter exercises in labs that may provide documentation to review to reinforce the concepts. The videos and labs are developed separately; however, we recommend utilizing them together to learn and practice the content. If you have additional questions, do not hesitate to reach out to us.
-
Thank you so much for your response! It answers most of my questions. So for example in the examining the principles of security notes it also says Perform a data integrity check
To support the security triangle, perform a data integrity check by:
1. Logging in to ACIWINCLIENT01 (names may vary).
2. In the Windows Taskbar, select the Microsoft Edge, and then in the Microsoft Edge window, use the address bar to browse to, and download, the Quickhash#GUI application:https://www.quickhash-gui.org/downloads/
3. On the Windows Taskbar, select the File Explorer icon, and then navigate to the following location:C:\Users\currentuser\downloads
4. In the File Explorer window, right-click and activate the context menu to extract the QuickHash-GUI-Windows-v*** file to the current location. <!-- Need to check that file name and all of the asterisks.-->
5. In the Extract Compressed (Zipped) Folders under Select a Destination and Extract Files, ensure that the Show extracted files when complete check box is selected, and then choose Extract.
6. In the File Explorer window, select the 64-Bit folder, and then choose the Quickhash-GUI application. If a Defender popup appears, select the More info hyperlink, and then select Run anyway.
7. Minimize the QuickHash window, and then on the Windows Desktop, right-click and activate the context menu, and then select New > Text Document.
8. In the Untitled - Notepad window, enter the following: Secret 1 Secret 2 Secret 3
9. In the Untitled - Notepad window, from the options menu, select File > Save as.
10. In the Save As window, save the file to the following location:C:\Users\currentuser\Desktop\version1.txt
11. Close the Notepad window, and then restore the QuickHashapplication.
12. In the QuickHash window, select the Files tab, and then in the QuickHash > File window, under Single File Hashing, select Select File.
13. In the Open existing file window, select the following file:C:\Users\currentuser\Desktop\version1.txt
14. In the QuickHash > File window, under the Select File button, locate and make note of the hash value. Here's an example:24B40CEF852E4CDD764275626D23CEE21AFA85D7
Note: You'll confirm this value in a subsequent step to ensure that integrity has been maintained.
15. Minimize the QuickHash window, and then on the Windows Desktop, open the version1.txt file
16. In the version1.txt file, delete the following: Secret 3
17. In the version1.txt window, select File > Save, and then restore the QuickHash window.
18. (If necessary), in the QuickHash window, select the Files tab, and then in the QuickHash > File window under Single File Hashing, choose Select File.
19. In the Open existing file window, select the following file:C:\Users\currentuser\Desktop\version1.txt
20. In the QuickHash > File window, under the Select File button, locate and make note of the hash value. Here's an example:753A216B99727B425C55CBC15B377C34BA1E0139
ā In the QuickHash > File window, under Expected Hash Value, paste the value copied from the previous step, and then in the Quickhash-GUI window, examine the warning.
Note: Compare this value to the value you noted in the preceeding step, and notice how the values are different. This indicates that integrity hasn't been maintained.
is the above to be done on a windows machine that we own or is there a vm provided?Thanks,
-
@Camille-Pouncy you are correct! The labs will have very detailed step-by-steps instructions and screenshots. If you reach a step that is not performing the way you expect it to, double check your previous steps. I can tell you from personal experience, I have mistyped a single command, only to find out many steps later into the exercise. Remember you are always welcome to reach out to us if you need support!
-
Thank you!