The aim of the LOST Project is the development of an eLearning environment that helps security instructors teach hands-on technological knowledge on security testing and auditing. 


This environment is based on an eLearning Platform, a Testbed, aManagement Interface, Learning Materials and a list of proposals for New Developments for our students that allows us to make the project grow and evolve.

The Testbed


Students use the testbed to implement the scenarios proposed in the different lessons of the Learning Materials. A specific scenario is designed for each of the lessons, in order to accomplish the defined objectives.


The access to the testbed is controlled by the instructor, who controls the activity of each student, using the information obtained by the monitoring system. Using this information the instructor can certify if the student has accomplished the objectives for each lesson. 


Students use the front end to log into the environment and check the different scenarios that they have to implement. Once they are logged in the firewall allows them the access to the corresponding scenario.

The Learning Materials


The Learning Materials have been designed to teach students IT security from the Ethical Hacking perspective, so they are able to implement a complete security audit process, detect the vulnerabilities of an IT infrastructure and identify the necessary security countermeasures.


To do so, the lessons have been structured in the chapters at the right.


The different scenarios of the testbed are designed especifically to better acomplish the objectives of each lesson.

  1. Basic Scenarios
  2. Cryptography
  3. Password cracking
  4. Basic Network Attacks
  5. Footprinting
  6. Host scanning
  7. Fingerprinting
  8. Vulnerabilities
  9. Penetration
  10. Firewalls
  11. Hacking Wi-Fi

The Management Interface


Students use the management interface, or front-end, to log into the environment and check the different scenarios that they have to implement. Once they are logged in, an access firewall allows them the access to the correspondent scenario of the test bed.


The access to the test bed is supervised by the instructor, who controls the activity of each student, using the information obtained by a monitoring system. Using this information the trainer can certify whether each student has accomplished the objectives for each lesson or not.