Customizable and interchangeable virtual labs for hands-on skills.
Information Security Fundamentals
This set of labs aligns with the domains of the CompTIA Security+ certification. The learner explores aspects of Network Security (secure remote access), host hardening (host-based firewalls, security policies on Windows and Linux), social engineering, exploits (remote access trojans, wireless), cryptography, traffic analysis, and incident response procedures.
1
Securing the pfSense Firewall
2
Implementing NAT and Allowing Remote Access
3
Implementing Common Protocols and Services
4
Examining Wireless Networks
5
Implementing Security Policies on Windows and Linux
6
Data Backups in Windows, BSD, and Linux
7
Incident Response Procedures, Forensics, and Forensic Analysis
8
Crafting & Deploying Malware Using a Remote Access Trojan (RAT)
9
Social Engineering Using SET
10
Breaking WEP and WPA and Decrypting the Traffic
11
Deep Dive in Packet Analysis - Using Wireshark and Network Miner
12
Remote and Local Exploitation
13
Patching, Securing Systems, and Configuring Anti-Virus
14
Using Active Directory in the Enterprise
15
Using Public Key Encryption to Secure Messages
This set of labs aligns with the domains of the CompTIA Security+ certification. The learner explores aspects of Network Security (secure remote access), host hardening (host-based firewalls, security policies on Windows and Linux), social engineering, exploits (remote access trojans, wireless), cryptography, traffic analysis, and incident response procedures.
1 |
Securing the pfSense Firewall |
2 |
Implementing NAT and Allowing Remote Access |
3 |
Implementing Common Protocols and Services |
4 |
Examining Wireless Networks |
5 |
Implementing Security Policies on Windows and Linux |
6 |
Data Backups in Windows, BSD, and Linux |
7 |
Incident Response Procedures, Forensics, and Forensic Analysis |
8 |
Crafting & Deploying Malware Using a Remote Access Trojan (RAT) |
9 |
Social Engineering Using SET |
10 |
Breaking WEP and WPA and Decrypting the Traffic |
11 |
Deep Dive in Packet Analysis - Using Wireshark and Network Miner |
12 |
Remote and Local Exploitation |
13 |
Patching, Securing Systems, and Configuring Anti-Virus |
14 |
Using Active Directory in the Enterprise |
15 |
Using Public Key Encryption to Secure Messages |
Ethical Hacking & Systems Defense
This set of labs maps to the domains of the Certified Ethical Hacker (CEH). It employs an ethical hacking methodology to introduce the learner to various techniques and tools to include, but not limited to: reconnaissance, scanning, enumeration, exploitation, and post-exploitation.
1
Performing Reconnaissance from the WAN
2
Scanning the Network on the LAN
3
Enumerating Hosts using Wireshark, Windows, and Linux Commands
4
Remote and Local Exploitation***
5
Crafting and Deploying Malware Using a Remote Access Trojan (RAT)***
6
Capturing and Analyzing Network Traffic Using a Sniffer
7
Social Engineering Using SET***
8
Performing a Denial of Service Attack from the WAN
9
Using Browser Exploitation to Take Over a Host’s Computer
10
Attacking Webservers from the WAN
11
Exploiting a Vulnerable Web Application
12
Performing SQL Injection to Manipulate Tables in a Database
13
Breaking WEP and WPA and Decrypting the Traffic***
14
Attacking the Firewall and Stealing Data over an Encrypted Channel
15
Using Public Key Encryption to Secure Messages***
This set of labs maps to the domains of the Certified Ethical Hacker (CEH). It employs an ethical hacking methodology to introduce the learner to various techniques and tools to include, but not limited to: reconnaissance, scanning, enumeration, exploitation, and post-exploitation.
1 |
Performing Reconnaissance from the WAN |
2 |
Scanning the Network on the LAN |
3 |
Enumerating Hosts using Wireshark, Windows, and Linux Commands |
4 |
Remote and Local Exploitation*** |
5 |
Crafting and Deploying Malware Using a Remote Access Trojan (RAT)*** |
6 |
Capturing and Analyzing Network Traffic Using a Sniffer |
7 |
Social Engineering Using SET*** |
8 |
Performing a Denial of Service Attack from the WAN |
9 |
Using Browser Exploitation to Take Over a Host’s Computer |
10 |
Attacking Webservers from the WAN |
11 |
Exploiting a Vulnerable Web Application |
12 |
Performing SQL Injection to Manipulate Tables in a Database |
13 |
Breaking WEP and WPA and Decrypting the Traffic*** |
14 |
Attacking the Firewall and Stealing Data over an Encrypted Channel |
15 |
Using Public Key Encryption to Secure Messages*** |
Networking Fundamentals
This set of labs aligns with the domains of the CompTIA Network+, Cisco Certified Network Associate (CCNA), and Cisco Certified Entry Networking Technician (CCENT) certification exams. The learner will manage and troubleshoot networks, work with various TCP/IP protocols, and implement Network Security measures (port redirection, firewalls, remote access).
1
Configuring Port Redirection
2
Implementing NAT and Allowing Remote Access***
3
IPv4 vs IPv6 – Calculating, Configuring and Testing
4
Network Management
5
Business Continuity - Disaster Recovery
6
Breaking WEP and WPA and Decrypting the Traffic***
7
Closing Ports and Unnecessary Services
8
Implementing Security Policies on Windows and Linux
9
Network Security - Firewalls
10
Network Troubleshooting
11
TCP/IP Utilities
12
The OSI Model
13
TCP/IP Protocols - The Core Protocols
14
TCP/IP Protocols - Other Key Protocols
15
Types of Networks
16
Remote Access - RDP
This set of labs aligns with the domains of the CompTIA Network+, Cisco Certified Network Associate (CCNA), and Cisco Certified Entry Networking Technician (CCENT) certification exams. The learner will manage and troubleshoot networks, work with various TCP/IP protocols, and implement Network Security measures (port redirection, firewalls, remote access).
1 |
Configuring Port Redirection |
2 |
Implementing NAT and Allowing Remote Access*** |
3 |
IPv4 vs IPv6 – Calculating, Configuring and Testing |
4 |
Network Management |
5 |
Business Continuity - Disaster Recovery |
6 |
Breaking WEP and WPA and Decrypting the Traffic*** |
7 |
Closing Ports and Unnecessary Services |
8 |
Implementing Security Policies on Windows and Linux |
9 |
Network Security - Firewalls |
10 |
Network Troubleshooting |
11 |
TCP/IP Utilities |
12 |
The OSI Model |
13 |
TCP/IP Protocols - The Core Protocols |
14 |
TCP/IP Protocols - Other Key Protocols |
15 |
Types of Networks |
16 |
Remote Access - RDP |
Digital Forensics
This set of labs introduces the student to the technical aspects of Digital Forensics, including general forensic processes, imaging, hashing, file recovery, file system basics, identifying mismatched file types, reporting, and laws regarding computer evidence.
1
Introduction to File Systems
2
Common Locations of Windows Artifacts
3
Hashing Data Sets
4
Drive Letter Assignments in Linux
5
The Imaging Process
6
Introduction to Single Purpose Forensic Tools
7
Introduction to Autopsy Forensic Browser
8
FAT File System
9
The NTFS File System
10
Browser Artifact Analysis
11
Communication Artifacts
12
User Profiles and the Windows Registry
13
Log Analysis
14
Memory Analysis
15
Forensic Case Capstone
This set of labs introduces the student to the technical aspects of Digital Forensics, including general forensic processes, imaging, hashing, file recovery, file system basics, identifying mismatched file types, reporting, and laws regarding computer evidence.
1 |
Introduction to File Systems |
2 |
Common Locations of Windows Artifacts |
3 |
Hashing Data Sets |
4 |
Drive Letter Assignments in Linux |
5 |
The Imaging Process |
6 |
Introduction to Single Purpose Forensic Tools |
7 |
Introduction to Autopsy Forensic Browser |
8 |
FAT File System |
9 |
The NTFS File System |
10 |
Browser Artifact Analysis |
11 |
Communication Artifacts |
12 |
User Profiles and the Windows Registry |
13 |
Log Analysis |
14 |
Memory Analysis |
15 |
Forensic Case Capstone |
Linux Server I: Linux Fundamentals
This set of labs maps to the domains of the CompTIA Linux+ certification exam (XK0-004). It provides students with the fundamental concepts of Linux/UNIX operating systems. It covers such topics as installing the operating systems, working with a package, manager, displaying hardware and adding partitions, managing the filesystem, working with a shell (bash), monitoring processes, and creating/manipulating files.
1
CentOS Server Linux Installation
2
Ubuntu Desktop Linux Installation
3
Installing Packages and Shared Libraries on Fedora and Ubuntu
4
Displaying Hardware
5
Adding a New Partition
6
Managing Filesystem Quotas
7
Booting and Restarting the System
8
Using the BASH Shell - 1
9
Using the BASH Shell - 2
10
Using the BASH Shell - 3
11
Using the BASH Shell - 4
12
Monitoring Processes
13
Working with Files
14
Managing Text Files - 1
15
Managing Text Files - 2
16
Managing Text Files - 3
This set of labs maps to the domains of the CompTIA Linux+ certification exam (XK0-004). It provides students with the fundamental concepts of Linux/UNIX operating systems. It covers such topics as installing the operating systems, working with a package, manager, displaying hardware and adding partitions, managing the filesystem, working with a shell (bash), monitoring processes, and creating/manipulating files.
1 |
CentOS Server Linux Installation |
2 |
Ubuntu Desktop Linux Installation |
3 |
Installing Packages and Shared Libraries on Fedora and Ubuntu |
4 |
Displaying Hardware |
5 |
Adding a New Partition |
6 |
Managing Filesystem Quotas |
7 |
Booting and Restarting the System |
8 |
Using the BASH Shell - 1 |
9 |
Using the BASH Shell - 2 |
10 |
Using the BASH Shell - 3 |
11 |
Using the BASH Shell - 4 |
12 |
Monitoring Processes |
13 |
Working with Files |
14 |
Managing Text Files - 1 |
15 |
Managing Text Files - 2 |
16 |
Managing Text Files - 3 |
Linux Server II: System Administration
This set of labs maps to the domains of the CompTIA Linux+ certification exam (XK0-004). It introduces the student to the fundamentals of system administration using Linux operating systems. Topics covered include: creating and managing groups and users, scheduling tasks, working with email, basic network configurations, hardening host techniques, and an introduction to shell scripting.
1
Configuring X Windows in CentOS and Fedora Desktop
2
Accessibility Technologies
3
User and Group Accounts
4
System Administration Tasks - 1
5
System Administration Tasks - 2
6
System Administration Tasks - 3
7
crontab and at
8
Configuring Locale and Time Zone Settings
9
Working with Email - 1
10
Working with Email - 2
11
Basic Network Configuration
12
Basic Security Administration
13
Securing Data with Encryption on a Linux System
14
Host Security
15
BASH shell features
16
BASH Scripting
17
Working with a SQL Database
This set of labs maps to the domains of the CompTIA Linux+ certification exam (XK0-004). It introduces the student to the fundamentals of system administration using Linux operating systems. Topics covered include: creating and managing groups and users, scheduling tasks, working with email, basic network configurations, hardening host techniques, and an introduction to shell scripting.
1 |
Configuring X Windows in CentOS and Fedora Desktop |
2 |
Accessibility Technologies |
3 |
User and Group Accounts |
4 |
System Administration Tasks - 1 |
5 |
System Administration Tasks - 2 |
6 |
System Administration Tasks - 3 |
7 |
crontab and at |
8 |
Configuring Locale and Time Zone Settings |
9 |
Working with Email - 1 |
10 |
Working with Email - 2 |
11 |
Basic Network Configuration |
12 |
Basic Security Administration |
13 |
Securing Data with Encryption on a Linux System |
14 |
Host Security |
15 |
BASH shell features |
16 |
BASH Scripting |
17 |
Working with a SQL Database |
Scripting Fundamentals
This set of labs offers an in-depth introduction to scripting languages including basic data types, control structures, regular expressions, input/output, and textual analysis.
1
Advanced Data Structure Usage
2
File I/O, String Parsing and Data Structures
3
Tuples(Arrays), Error handling and Secure Programming
4
Loops
5
Math in Python
6
Getting Started with Python on Ubuntu - Running from the Command Line
7
Introduction to Control Structures and Data Types
8
Getting Started with Python on Ubuntu - Writing Your First Program
9
Verifying a File Type with its Extention
10
Creating a Ping Scanner
11
Data Visualization
12
Pattern Matching
13
Extracting and Cleaning Data Using Python
14
Analysis with Kmeans
15
Inheritance
This set of labs offers an in-depth introduction to scripting languages including basic data types, control structures, regular expressions, input/output, and textual analysis.
1 |
Advanced Data Structure Usage |
2 |
File I/O, String Parsing and Data Structures |
3 |
Tuples(Arrays), Error handling and Secure Programming |
4 |
Loops |
5 |
Math in Python |
6 |
Getting Started with Python on Ubuntu - Running from the Command Line |
7 |
Introduction to Control Structures and Data Types |
8 |
Getting Started with Python on Ubuntu - Writing Your First Program |
9 |
Verifying a File Type with its Extention |
10 |
Creating a Ping Scanner |
11 |
Data Visualization |
12 |
Pattern Matching |
13 |
Extracting and Cleaning Data Using Python |
14 |
Analysis with Kmeans |
15 |
Inheritance |
Network Security Fundamentals
This set of labs maps to the domains of the Implementing Cisco Network Security (IINS) exam (210-260). It focuses on the security principles needed to secure a network, including: secure remote access, virtual private networking (VPN), secure routing and switching, border and host firewalls, intrusion detection/prevention systems, and endpoint security.
1
Configuring a Windows based Firewall to Allow Incoming Traffic
2
Configuring a Linux based Firewall to Allow Incoming and Outgoing Traffic
3
Implementing Secure DHCP and DNS
4
Configuring a Linux based Firewall to Allow Outgoing Traffic
5
Configuring Access Control Lists on a Linux Based Firewall
6
Configuring a Virtual Private Network with PPTP
7
Configuring a Virtual Private Network with OpenVPN
8
Implementing RIP, RIPv2, and Securing RIP
9
Intrusion Detection using Snort
10
Writing Custom Rules
11
Host-Based Firewalls
12
Configuring RADIUS
13
Domain Security
14
Configuring a Site to Branch a Virtual Private Network
15
Closing Security Holes
This set of labs maps to the domains of the Implementing Cisco Network Security (IINS) exam (210-260). It focuses on the security principles needed to secure a network, including: secure remote access, virtual private networking (VPN), secure routing and switching, border and host firewalls, intrusion detection/prevention systems, and endpoint security.
1 |
Configuring a Windows based Firewall to Allow Incoming Traffic |
2 |
Configuring a Linux based Firewall to Allow Incoming and Outgoing Traffic |
3 |
Implementing Secure DHCP and DNS |
4 |
Configuring a Linux based Firewall to Allow Outgoing Traffic |
5 |
Configuring Access Control Lists on a Linux Based Firewall |
6 |
Configuring a Virtual Private Network with PPTP |
7 |
Configuring a Virtual Private Network with OpenVPN |
8 |
Implementing RIP, RIPv2, and Securing RIP |
9 |
Intrusion Detection using Snort |
10 |
Writing Custom Rules |
11 |
Host-Based Firewalls |
12 |
Configuring RADIUS |
13 |
Domain Security |
14 |
Configuring a Site to Branch a Virtual Private Network |
15 |
Closing Security Holes |
Linux Based Security +
This set of labs exposes the learner to various Linux-based security tools and techniques: configuring a host-based firewall, analyzing log files, cracking passwords, exploiting vulnerabilities (Shellshock), scanning for vulnerabilities, and auditing/implementing file/group/user permissions.
1
Configuring a VPN tunnel using the pfSense Firewall
2
Comparing and Contrasting using Clear Text Protocols
3
Linux Attack and Response
4
Log Analysis of Linux Systems with Grep and Gawk
5
Attacking and Defending Linux
6
Cracking Passwords on Linux Systems
7
Identifying & Analyzing Network Host Intrusion Detection System
8
Exploiting Shellshock
9
Vulnerability Scanning of a Linux Target
10
Encrypting Data using TrueCrypt and Attacking the TrueCypt password using truecrack
11
Injection Attacks using WebGoat
12
Permissions, Users, and Groups in Linux
13
Creating a Proxy Server and an SSL Certificate using the pfSense Firewall
14
Steganography
This set of labs exposes the learner to various Linux-based security tools and techniques: configuring a host-based firewall, analyzing log files, cracking passwords, exploiting vulnerabilities (Shellshock), scanning for vulnerabilities, and auditing/implementing file/group/user permissions.
1 |
Configuring a VPN tunnel using the pfSense Firewall |
2 |
Comparing and Contrasting using Clear Text Protocols |
3 |
Linux Attack and Response |
4 |
Log Analysis of Linux Systems with Grep and Gawk |
5 |
Attacking and Defending Linux |
6 |
Cracking Passwords on Linux Systems |
7 |
Identifying & Analyzing Network Host Intrusion Detection System |
8 |
Exploiting Shellshock |
9 |
Vulnerability Scanning of a Linux Target |
10 |
Encrypting Data using TrueCrypt and Attacking the TrueCypt password using truecrack |
11 |
Injection Attacks using WebGoat |
12 |
Permissions, Users, and Groups in Linux |
13 |
Creating a Proxy Server and an SSL Certificate using the pfSense Firewall |
14 |
Steganography |
Pentesting and Understanding Vulnerabilities
This set of labs covers all sides of security to give the student full understanding of not only the vulnerability, but also the consequences of exploitation. The labs will introduce Alice the admin/developer and Bob the hacker. Alice introduces vulnerabilities into the system and Bob exploits each one. The attacks are taken full circle. The labs are equipped with multiple mirrors, email server, DNS server. and web server.
1
Provisioning a Web Server
2
Exploring HTML
3
Provisioning a MySQL Database
4
Provisioning PHP
5
Dissecting the Login Process
6
SQL Injections (SQLi)
7
SQLi Vulnerability and Pentesting Steps
8
HTML Injections (HTMLi)
9
HTMLi Vulnerability and Mitigation
10
Reflected XSS
11
Reflected XSS Mitigation and URL Encoding
12
PHP Sessions and Cookies
13
Additional SCRIPT Elements
14
Session Stealing (Remote Reflected XSS)
15
Remote Reflected XSS Mitigation and URL Encoding
16
Vulnerable Forum
17
Pentesting the Forum
18
Session Stealing (Stored XSS)
19
Command Injection
20
Stateless Firewall
21
Abusing a Stateless Firewall
22
Stateful Firewall
23
Abusing a Stateful Firewall
24
IDS, SYSLOG, and NTP
25
Signature Detection and Alerting an Admin
26
IPS, SYSLOG, and NTP
27
Signature Detection and Remote Shells
28
Remote Shell: Embedding Client-side Code into a Package
29
Remote Shell Extracting Data
30
Incident Response
This set of labs covers all sides of security to give the student full understanding of not only the vulnerability, but also the consequences of exploitation. The labs will introduce Alice the admin/developer and Bob the hacker. Alice introduces vulnerabilities into the system and Bob exploits each one. The attacks are taken full circle. The labs are equipped with multiple mirrors, email server, DNS server. and web server.
1 |
Provisioning a Web Server |
2 |
Exploring HTML |
3 |
Provisioning a MySQL Database |
4 |
Provisioning PHP |
5 |
Dissecting the Login Process |
6 |
SQL Injections (SQLi) |
7 |
SQLi Vulnerability and Pentesting Steps |
8 |
HTML Injections (HTMLi) |
9 |
HTMLi Vulnerability and Mitigation |
10 |
Reflected XSS |
11 |
Reflected XSS Mitigation and URL Encoding |
12 |
PHP Sessions and Cookies |
13 |
Additional SCRIPT Elements |
14 |
Session Stealing (Remote Reflected XSS) |
15 |
Remote Reflected XSS Mitigation and URL Encoding |
16 |
Vulnerable Forum |
17 |
Pentesting the Forum |
18 |
Session Stealing (Stored XSS) |
19 |
Command Injection |
20 |
Stateless Firewall |
21 |
Abusing a Stateless Firewall |
22 |
Stateful Firewall |
23 |
Abusing a Stateful Firewall |
24 |
IDS, SYSLOG, and NTP |
25 |
Signature Detection and Alerting an Admin |
26 |
IPS, SYSLOG, and NTP |
27 |
Signature Detection and Remote Shells |
28 |
Remote Shell: Embedding Client-side Code into a Package |
29 |
Remote Shell Extracting Data |
30 |
Incident Response |
Hadoop Administration
This set of labs aligns with the domains of the Cloudera certifications and prepares the students for managing a Hadoop cluster. The labs demonstrate many command options (awk, grep, etc.) and automation using Bash. The students will learn the evolution of Hadoop architecture, starting with Hadoop version 1 and ending with version 3. They also introduce other components of the Hadoop ecosystem such as ZooKeeper and includes tasks and solutions.
1
Hadoop 1.2.1
2
Map Reduce
3
Hadoop 1.2.1 Cluster
4
Name Node Failover
5
Hadoop 2.7.3
6
Hadoop 2.7.3 Cluster
This set of labs aligns with the domains of the Cloudera certifications and prepares the students for managing a Hadoop cluster. The labs demonstrate many command options (awk, grep, etc.) and automation using Bash. The students will learn the evolution of Hadoop architecture, starting with Hadoop version 1 and ending with version 3. They also introduce other components of the Hadoop ecosystem such as ZooKeeper and includes tasks and solutions.
1 |
Hadoop 1.2.1 |
2 |
Map Reduce |
3 |
Hadoop 1.2.1 Cluster |
4 |
Name Node Failover |
5 |
Hadoop 2.7.3 |
6 |
Hadoop 2.7.3 Cluster |
PC Maintenance and Repair
This set of labs is also maps to the domains of the CompTIA A+ certifications exams: Core 1 (220-1001) and Core 2 (220-1002). It explores the fundamental principles of hardware and operating systems and prepares the learner for further study in IT-related work roles. Topics include: hardware, operating systems, networking, mobile devices, virtualization and Cloud Computing, security, troubleshooting hardware/software/networking problems, and operational procedures.
1
Examining PC Hardware
2
PC Operating Systems
3
Networking Essentials
4
Printers
5
Security Practices
6
Troubleshooting
7
Disk Maintenance and Data Recovery
8
Command Prompt Tools
9
Remote Access
10
Control Panel
11
Desktop Customization
12
Using Active Directory in the Enterprise ***
13
Data Backups in Windows, BSD, and Linux ***
14
Ubuntu Desktop Linux Installation ***
15
Domain Security ***
This set of labs is also maps to the domains of the CompTIA A+ certifications exams: Core 1 (220-1001) and Core 2 (220-1002). It explores the fundamental principles of hardware and operating systems and prepares the learner for further study in IT-related work roles. Topics include: hardware, operating systems, networking, mobile devices, virtualization and Cloud Computing, security, troubleshooting hardware/software/networking problems, and operational procedures.
1 |
Examining PC Hardware |
2 |
PC Operating Systems |
3 |
Networking Essentials |
4 |
Printers |
5 |
Security Practices |
6 |
Troubleshooting |
7 |
Disk Maintenance and Data Recovery |
8 |
Command Prompt Tools |
9 |
Remote Access |
10 |
Control Panel |
11 |
Desktop Customization |
12 |
Using Active Directory in the Enterprise *** |
13 |
Data Backups in Windows, BSD, and Linux *** |
14 |
Ubuntu Desktop Linux Installation *** |
15 |
Domain Security *** |
Introduction to Operating Systems
This set of labs is designed to provide an introduction to and basic technical understanding of the functions and operations of various desktop, server, and mobile operating systems, and focuses on operating system features, broad concepts, and diagnostic tools that allow the learner to rapidly determine the condition of a system and how best to rectify a fault. This set of labs is also intended for those preparing for the CompTIA A+ Core 2 (220-1002) certification exam.
1
Introduction to Operating Systems
2
Computer Security Basics
3
Desktop Virtualization
4
Introduction to Windows 7
5
Introduction to Windows 8.1
6
Introduction to Windows 10
7
Supporting and Troubleshooting Windows
8
Linux on the Desktop
9
Connecting Desktops and Laptops to Networks
10
Mobile Operating Systems
11
File Management in the Cloud
This set of labs is designed to provide an introduction to and basic technical understanding of the functions and operations of various desktop, server, and mobile operating systems, and focuses on operating system features, broad concepts, and diagnostic tools that allow the learner to rapidly determine the condition of a system and how best to rectify a fault. This set of labs is also intended for those preparing for the CompTIA A+ Core 2 (220-1002) certification exam.
1 | Introduction to Operating Systems |
2 | Computer Security Basics |
3 | Desktop Virtualization |
4 | Introduction to Windows 7 |
5 | Introduction to Windows 8.1 |
6 | Introduction to Windows 10 |
7 | Supporting and Troubleshooting Windows |
8 | Linux on the Desktop |
9 | Connecting Desktops and Laptops to Networks |
10 | Mobile Operating Systems |
11 | File Management in the Cloud |