Lighthouse Labs Project Space


All documents link to a PDF format in Google Drive. Hash values are indicated for download purposes.
Certain projects include a video presentation linking to youtube or an alternative hosting platform.
Project: Week 1 - Network Administration
In this project, you will create a report that includes details and information about the devices in your Lab environment. You will use Nmap and Wireshark to discover details about each device, confirm your discovered information by double-checking it on the devices themselves, and then create network documentation to support your discoveries. To support your findings, you will also document how and where you found the information you include in your documentation.


SHA256: d6769f4328fcc22af5b5274ddb3a245457561c93d639eb53dfeccc83d0202ba9
MD5: d246ce54c912d6197330397dc6c873cd
Project: Week 2 - Risks & Vulnerabilities
In this project, you will create a report that gives recommendations on sensors that should be monitored, associating the sensor with well known IoCs for the organization in the case study. The report explains what sensors should be used, prioritizing them and connecting them to IoCs, threats and vulnerabilities. It specifies what alert thresholds need to be set and why.



Project: Week 2 Presentation
SHA256: 7f3fb63970dd6c66f0bf3fd38f4d1b91c725a5dd94605e7e99a1485956d301a0
MD5: c324361894c5c3fe4ca8418336a1f38d
Project: Week 3 - Log Analysis
You’ve just been tasked with an important project by your company’s security team: build a powerful log monitoring tool that can detect suspicious activity before it becomes a full-blown security incident.
Your manager wants this tool to be simple, effective, and—most importantly—open-source so that other security teams around the world can use and improve it. Your job is to develop the first version of this tool, and if it’s good enough, it might just become a must-have in the cybersecurity community.
Introducing LogHawk: a script-based log analysis tool designed to quickly scan logs for security threats, system errors, and unusual activity.
SHA256: f937d2708aa091254e774a7e883060b46676c37605a1c314de4ca4c3db1ddde0
MD5: 1fcee68463e9aaef7a468fb15a29011a
Project: Week 4 - Playbook for Cat & Box Scenario
In this project, you will create a custom playbook using the NIST Incident Response Lifecycle as well as the guidelines shared by CISA for developing playbooks meant for incident response. The playbook will address a potential Cyber Security breach in the scenario described in the project.


SHA256: a9c3859dead1275caeab8783793755752ab35c059f4dcbc76579f0fde5a1d008
MD5: 029dd540d770ef82aa5fad5ec843e3e8
Project: Week 5 - Risks Management Case Study
In this project, you will use the ISO 27001 Risk Management Framework to create a Risk Management Plan for the scenario described in the case study. You will utilize your understanding of Risk Assessment Table, Risk Treatment Table, and Statement of Applicability (SOA) to complete the Risk Management Plan.


SHA256: 5f8da381730c7f54110f1f83b438ca434496a4dd9f3b2fe5fb544a8648a6c076
MD5: 8f883f5d3f1c1678858d88251ef12aae
Project: Week 6 - Cat's Company Vulnerabilities
In this project, you will analyze the results of a vulnerability assessment scan, and write a vulnerability assessment report for the executive team. The report will include detailed scan results, methodology, findings, risk assessment and prioritized recommendations.


SHA256: c7f78a6cea129eae5650b085bae653befc06177d9471cb493607995439aeec77
MD5: 7e3ed17f3e2c76444764f13cabcdb2f9
Project 6: Presentation

Project: Week 7 - IR Plan, Playbook, and Policy
In this project, you will create an outline for a policy set. Within each policy outline, you will indicate what playbook(s) would be used and why. You will utilize the NIST 7-step incident process for this project and submit a slideshow that explains “Why” each policy is recommended and the consequences of non-compliance for both the company and the individual.


SHA256: 3018548db4dbdc4353a279f844d7e0804ec0e85b840e7a9a37ebd6b3b50cf74d
MD5: 8bfb5165e78da0f72234fc95603c13e5
Project 7: Presentation

Project: Week 8 - Cyber Best Practices
For this project, you have to review the entire Cyber Security policy for the company by talking about the basic concepts to protect users. You must write a report and explain it to the board and to all the tech teams they are working within the scenario presented.


SHA256: 7f6ab0a545dd0f3809f2be8b94ddfc7ada4c390446b9b32306deb58dd72d07bb
MD5: 277e3e36668581289d5affdbc65a8413
Project: Week 9 - Writing Investigation & Research Report.
In this project, you will develop an investigation and research report on a Cyber Security attack of your choice and record different aspects of the attack such as tools and technologies used in the attack, systems targeted, security controls and mitigation techniques employed post-attack, etc.


SHA256: 31aec2cd1fe934352ebaf4ccf79defa8754b59ad894b756211c5dd31d7e8d2a0
MD5: c152a7b9543188103ea85ae48125cb1a
Project: Week 10 - Forensics Report and Documentation.
This project uses a scenario created by DFIR Madness. You will work through a case entitled: The Stolen Szechuan Sauce. Then you will answer the list of questions around the case by investigating the artifacts provided and document the process.


SHA256: 66a01d1484ba84a35208357a8e9b92f3842f2ddfde65636ce9305a09c393d06b
MD5: 72ae9fb4334e9c77c3b811cbed46d1e2
Project: Week 11 - Secure Architecture Report and Recommendations.
In this project, you will write a Security Architecture Recommendations Report on the basis of your review of the security architecture of a mid-sized e-commerce company and the vulnerabilities & the gaps you have identified in the company's network.


SHA256: 018a7a156d79c727e4f5a2101c11e115bbb92cf0a5a7dfc09cbbfab48bf3eaed
MD5: 80b559e0c73c8783be2c905df5262c0e
Project 11: Presentation

Project: Week 12 - Capstone Project
The final project combines the tools, skills and techniques that you have seen throughout the course. You will be given a realistic on-the-job scenario, from which you will make security recommendations. Once you have completed your recommendations, you will analyze a threat scenario and create an incident response report. As a final step, you will prepare a presentation for Demo Day to outline key features of your recommendations and report, and showcase your work

