Advanced Laboratory on Information Security Management

Published: 29 September 2025| Version 1 | DOI: 10.17632/zwd9sp9h9f.1
Contributors:
Nestor Alzate Mejia, JHON HAIDE CANO BELTRAN

Description

The environment will be deployed in GNS3 or Cisco Packet Tracer and includes a Domain Controller, a File Server, a RADIUS server for AAA, and Cisco networking devices configured with VLAN segmentation. Students will implement strong password policies, time-based access control, auditing, Port-Security, and DHCP Snooping. Through this practice, students will gain an understanding of how these mechanisms protect networks against unauthorized access and mitigate common internal threats.

Files

Steps to reproduce

# Advanced Laboratory on Information Security Management — Dataset This package contains anonymized sample data, device configs, and scripts to reproduce and evaluate the controls described in the lab **Advanced Laboratory on Information Security Management**. ## Contents - `data/`: Synthetic logs, ACL exports, and topology artifacts. - `scripts/`: PowerShell (AD/GPO) and Cisco IOS configs for AAA, VLANs, and L2 hardening. - `results/`: Example evidence/summary CSVs (placeholders you can overwrite with real runs). - `docs/`: The original lab guide and a template for the final report. ## How to use 1. Import the Cisco configs into GNS3/Packet Tracer devices; adjust IPs as needed. 2. Run PowerShell scripts on a Windows Server with AD DS/NPS and on domain-joined clients. 3. Capture logs and command outputs, then export summaries to `results/` for archiving. 4. When depositing to **Mendeley Data**, include this README and the `metadata.json` (see root). ## License Data & text: **CC BY 4.0**. Scripts: **MIT License** (see headers).

Institutions

  • Universidad Cooperativa de Colombia

Categories

Systems Engineering

Licence