Your Demo Progress

0%
Data Science Lab
Gen AI Lab
Network+ Lab
Practice Questions (0/3)
Data Science Lab: Customer Analytics & Predictive Modeling
Advanced Lab
Scenario: E-Commerce Customer Churn Analysis
You are a Data Scientist at GlobalShop Inc., an e-commerce company experiencing a 15% customer churn rate. The CEO has tasked you with analyzing customer behavior data to identify at-risk customers and build a predictive model. Your analysis will drive a $2M retention marketing campaign targeting the right customers at the right time.

Learning Objectives:

  • SQL Data Extraction: Write complex queries to extract and transform customer data from multiple tables
  • Exploratory Data Analysis: Identify patterns, correlations, and anomalies in customer behavior
  • Feature Engineering: Create meaningful features like RFM scores, engagement metrics, and cohort analysis
  • Statistical Analysis: Apply hypothesis testing and confidence intervals to validate findings
  • Data Visualization: Create compelling charts and dashboards to communicate insights

Dataset Configuration

50,000 records

Visualization Settings

SQL Query Editor - PostgreSQL 15

Query Results (100 rows, 0.23s)
customer_id customer_name total_orders lifetime_value days_since_order churn_risk
C-10234John Smith12$2,456.89145High Risk
C-10567Sarah Johnson8$1,234.5098High Risk
C-10891Mike Davis25$5,678.2572Medium Risk
C-11023Emily Chen45$12,345.0015Low Risk

Pro Tips & Hints

  • RFM Analysis: Calculate Recency, Frequency, and Monetary scores to segment customers effectively
  • Cohort Analysis: Group customers by signup month to track retention over time
  • Window Functions: Use LAG() and LEAD() to compare customer behavior over time periods
  • CTEs: Use Common Table Expressions for cleaner, more readable complex queries
Lab Progress: 0/5 analysis steps completed

Data Science Lab Complete! Skills Mastered:

SQL Analytics

Complex queries, aggregations, and window functions

Customer Segmentation

RFM analysis and churn prediction modeling

Data Visualization

Creating insightful charts and dashboards

Business Intelligence

Translating data into actionable insights

Generative AI Lab: Enterprise Chatbot Development
Advanced Lab
Scenario: Building an AI-Powered Customer Support System
TechStart Inc. wants to implement an AI-powered customer support chatbot to handle 70% of routine inquiries. As the AI/ML Engineer, you must configure a Large Language Model (LLM) with appropriate prompt engineering, safety guardrails, and response optimization. The system must handle product questions, troubleshooting, and order status while maintaining brand voice and avoiding hallucinations.

Learning Objectives:

  • Prompt Engineering: Design effective system prompts, few-shot examples, and context management
  • Model Configuration: Tune temperature, top-p, and token limits for optimal response quality
  • Safety & Guardrails: Implement content filtering, PII detection, and response validation
  • RAG Integration: Connect knowledge base for accurate, grounded responses
  • Performance Optimization: Balance latency, cost, and quality trade-offs

Model Configuration

Precise (0) Creative (2)

Safety & Guardrails

Prompt Engineering Studio

System Prompt Token Count: 287
Hi, I ordered a TechStart Pro laptop 3 days ago but haven't received any shipping confirmation. Order #TS-78234. Can you help?

Hello! I'd be happy to help you track your TechStart Pro order. 🎉

I found order #TS-78234. Great news - your laptop shipped yesterday! Here are the details:

  • 📦 Carrier: FedEx Express
  • 📍 Tracking: 7892-4567-8901
  • 📅 Estimated delivery: Tomorrow by 5 PM

You should have received an email with tracking info. Would you like me to resend it?

1.2s latency 342 tokens All guardrails passed

Pro Tips & Best Practices

  • Temperature: Use 0.0-0.3 for factual Q&A, 0.7-1.0 for creative tasks. Customer support typically works best at 0.3-0.5
  • Few-Shot Examples: Include 2-3 example conversations in your system prompt to establish desired response format
  • Chain-of-Thought: For complex queries, instruct the model to "think step by step" before answering
  • Grounding: Always use RAG to retrieve relevant docs before generating responses to reduce hallucinations
Lab Progress: 0/5 configuration steps completed

Gen AI Lab Complete! Skills Mastered:

Prompt Engineering

System prompts, few-shot learning, and context management

Model Configuration

Temperature tuning, token limits, and response optimization

Safety Implementation

Content filtering, PII protection, and guardrails

Production Deployment

Latency optimization and cost management

Network+ Lab: Multi-Site Enterprise Network Implementation
Advanced Lab
Scenario: Healthcare Network Infrastructure Deployment
MedTech Hospital is opening a new 500-bed facility and needs a HIPAA-compliant network infrastructure. As the Senior Network Engineer, you must design and configure a segmented network with multiple VLANs for patient data, medical devices, administrative systems, and guest access. The network must support high-availability, QoS for VoIP and telemedicine, and strict access controls between departments.

Learning Objectives:

  • VLAN Configuration: Implement network segmentation for security isolation between departments
  • Inter-VLAN Routing: Configure Layer 3 switching for controlled traffic flow between segments
  • Spanning Tree Protocol: Implement STP/RSTP for loop prevention and redundancy
  • QoS Implementation: Prioritize critical traffic like VoIP and medical telemetry
  • Network Security: Apply ACLs, port security, and 802.1X authentication

Network Component Palette

Drag components to the drop zones in the diagram
IDS/IPS Sensor
Load Balancer
Wireless Controller
VPN Concentrator

Healthcare Network Topology - Drag components to complete the diagram

Core Layer
Distribution Layer
Access Layer
Servers/Services
Internet / WAN
CORE-RTR-01
10.0.0.1
FW-NGFW-01
10.0.0.254
DIST-SW-01
L3 Switch | 10.0.1.1
DIST-SW-02
L3 Switch | 10.0.1.2
ACC-SW-01
VLAN 10
ACC-SW-02
VLAN 20
ACC-SW-03
VLAN 30
WAP-01
VLAN 40
Workstation
Med Device
Printer
Mobile
DB Server
VLAN 10
Patient Data
172.16.10.0/24
VLAN 20
Medical Devices
172.16.20.0/24
VLAN 30
Admin/Staff
172.16.30.0/24
VLAN 40
Guest WiFi
172.16.40.0/24

VLAN Configuration

Switch Port Configuration

Cisco IOS CLI - DIST-SW-01

! VLAN Configuration for Healthcare Network
! DIST-SW-01 - Distribution Layer Switch
 
DIST-SW-01# configure terminal
DIST-SW-01(config)# vlan 10
DIST-SW-01(config-vlan)# name PATIENT_DATA
DIST-SW-01(config-vlan)# exit
 
DIST-SW-01(config)# interface vlan 10
DIST-SW-01(config-if)# ip address 172.16.10.1 255.255.255.0
DIST-SW-01(config-if)# no shutdown
DIST-SW-01(config-if)# ip helper-address 172.16.99.10
 
! Configure trunk port to access switches
DIST-SW-01(config)# interface GigabitEthernet1/0/1
DIST-SW-01(config-if)# switchport mode trunk
DIST-SW-01(config-if)# switchport trunk allowed vlan 10,20,30,40,99
DIST-SW-01(config-if)# switchport trunk native vlan 99
DIST-SW-01(config-if)# spanning-tree portfast trunk
% Warning: portfast should only be enabled on ports connected to a single host.
 
DIST-SW-01(config-if)# end
DIST-SW-01# copy running-config startup-config
Building configuration...
[OK]

Pro Tips & Hints

  • VLAN 1: Never use VLAN 1 for user traffic - it's the default and poses security risks
  • Native VLAN: Use a dedicated management VLAN (like 99) as native to prevent VLAN hopping attacks
  • STP: Enable BPDU Guard on access ports to prevent rogue switches from disrupting the network
  • QoS: Mark voice traffic with DSCP EF (46) for priority queuing across the network
Lab Progress: 0/6 devices configured

Network+ Lab Complete! Skills Mastered:

VLAN Implementation

Network segmentation and isolation for security

Inter-VLAN Routing

Layer 3 switching and SVI configuration

Spanning Tree Protocol

Loop prevention and network redundancy

Network Security

Port security, BPDU Guard, and ACL implementation

Practice Questions: Multi-Certification Exam Prep
3 Questions

Test your knowledge across three major certification domains: Security+, CISSP, and CISM

CompTIA Security+ (SY0-701)
Domain 1.0: Attacks & Threats
A security analyst discovers that an attacker has gained access to the network by exploiting a vulnerability in a public-facing web application. The attacker then moved laterally through the network, escalated privileges, and exfiltrated sensitive data over an encrypted channel. Which of the following BEST describes this type of attack?
A. Denial of Service (DoS) attack
B. SQL injection attack
C. Advanced Persistent Threat (APT)
D. Brute force attack

Correct Answer: C. Advanced Persistent Threat (APT)

An APT is characterized by a sophisticated, multi-stage attack where threat actors gain initial access, establish persistence, move laterally, escalate privileges, and exfiltrate data over time. The use of encrypted channels for data exfiltration is a common APT technique to avoid detection.

ISC² CISSP
Domain 3: Security Architecture
An organization is implementing a zero-trust architecture. The security team needs to ensure that all access requests are verified regardless of the source. According to zero-trust principles, which of the following should be the PRIMARY basis for granting access to resources?
A. Network location and IP address
B. Continuous verification of identity, device health, and context
C. VPN connection from an approved corporate device
D. User's department and job title

Correct Answer: B. Continuous verification of identity, device health, and context

Zero-trust architecture operates on the principle of "never trust, always verify." Access decisions should be based on continuous verification of multiple factors including user identity, device posture, behavior analytics, and contextual information—not just network location or static credentials.

ISACA CISM
Domain 1: Information Security Governance
The board of directors has asked the information security manager to demonstrate the value of the security program. Which of the following metrics would BEST demonstrate alignment between security initiatives and business objectives?
A. Number of security patches applied per month
B. Reduction in security incidents affecting critical business processes
C. Total number of firewall rules implemented
D. Hours spent on security awareness training

Correct Answer: B. Reduction in security incidents affecting critical business processes

To demonstrate business value, security metrics should be tied to business outcomes rather than technical activities. Showing how security initiatives have reduced incidents impacting critical business processes directly links security efforts to protecting business value and supports strategic decision-making.

Want more practice questions across all certification domains?

Upgrade for Full Access - 300+ PBQs

Confirm Submission

Are you sure you want to submit all your answers? You won't be able to change them after submission.

Success!
Your action was completed successfully.

Network+ Lab Instructions

Lab Objective

Design and configure a HIPAA-compliant healthcare network with proper segmentation, security controls, and high-availability features. You will deploy security appliances by dragging them from the palette, configure VLANs, and set up switch port security.

1
Pending
Deploy Security Appliances
Drag the IDS/IPS Sensor from the component palette to the left drop zone. Then drag the Load Balancer to the right drop zone. These appliances will protect the network perimeter and distribute traffic.
Pro Tip

IDS/IPS should be placed between the firewall and distribution layer to inspect all traffic entering the internal network segments.

2
Pending
Configure VLAN Segmentation
Select VLAN 10 - Patient Data from the dropdown and enter the following settings:
  • Subnet: 172.16.10.0/24
  • Gateway: 172.16.10.1
  • DHCP Range: 172.16.10.100 - 172.16.10.200
Hint

For HIPAA compliance, patient data must be isolated on its own VLAN with restricted inter-VLAN routing rules.

3
Pending
Configure Trunk Ports
In the Switch Port Configuration panel:
  • Set Port Mode to Trunk
  • Set Native VLAN to 99
  • Enter Allowed VLANs: 10,20,30,40,99
Warning

Never use VLAN 1 as the native VLAN. This is a common security misconfiguration that enables VLAN hopping attacks.

4
Pending
Enable Port Security Features
Enable the following security features on access ports:
  • PortFast - For faster convergence on edge ports
  • BPDU Guard - Prevents rogue switch connections
Pro Tip

Enable Root Guard on distribution switch ports to prevent unauthorized STP topology changes from the access layer.

5
Pending
Verify and Apply Configuration
Review your configuration in the CLI terminal preview. When satisfied with your settings, click "Apply Config" to apply the configuration to the switches. Then click "Submit Network Configuration" to complete the lab.
Hint

Always use copy running-config startup-config to save your configuration. Otherwise, changes will be lost on reboot!

Lab Progress

0/5