Digital Forensic & Cyber Security - V1
Digital Forensic & Cyber Security - V1
https://www.eccouncil.org/train-certify/computer-hacking-forensic-
investigator-chfi/
Linux Foundation
https://training.linuxfoundation.org/resources/
Cisco Adaptive Security Appliances
https://www.cisco.com/c/en/us/solutions/industries/education/
educator-resource-center/networking-academy.html
Cisco Next Generation Firewall
https://learningnetwork.cisco.com/s/next-generation-firewall-training-
videos
Cisco Web Security
https://learningnetwork.cisco.com/s/web-security-training-videos
Cisco Email Security
https://learningnetwork.cisco.com/s/email-security-training-videos
Huawei Next Generation Security
https://e.huawei.com/ae/products/enterprise-networking/security
Cisco Identity Services Engine
https://www.cisco.com/site/us/en/products/security/identity-
services-engine/index.html
Task - 5
Task - 6
Task – 8
Task – 9
Task – 10
Hour#3 Perform scanning to check for live system
and open ports
Task – 11
Hour#4 Task 8 to be practiced by students
Day 3 Hour#1 Subdomains, Email, DNS information Task – 12
gathering
Task – 13
Hour#2 Task 9 & 10 to be practiced by students
Task – 14
Hour#3 Foot printing using Search Engines
Task - 15
Hour#4 Task 11 to be practiced by students
Week 3 Vulnerability Analysis, Day 1 Hour#1 Success stories (For further detail please see Task - 16
Operating System Page No: 3& 4)
(Linux) Fundamentals Hour#2 Concept of Vulnerability Task - 17
Week 4 Operating System Day 1 Hour#1 Success stories (For further detail please see Task – 22
(Linux) Page No: 3& 4)
Fundamentals, Hour#2 Managing Files and their permissions. Task – 23
Social Engineering
Exploits Hour # Task 22 to be practiced by Students Task – 24
3-4
Day 2 Hour#1 File Ownership Task – 25
Week 6 Denial of Service, Day 1 Hour#1 Motivational Lecture (For further detail Task – 38
Session Hijacking, please see Page No: 3& 4)
Hacking Web Hour#2 DOS/ DDoS concepts Task – 39
Applications
Hour#3 Perform SYN Flooding Attack using hping3 & Task – 40
Metasploit
Hour#4 Task 38 and Task 39 to be practiced by Task – 41
Students
Day 2 Hour#1 Using different attacking tools, perform Task – 42
ICMP Flood Attack / Ping of Death Attack /
DDoS Attack
Task – 43
Hour # Task 40, Task 41 and Task 42 to be practiced
Digital Forensic & Cyber Security
2-3 by Students
Task – 44
Hour#4 DOS/DDoS Countermeasures
Task – 45
Day 3 Hour#1 Session Hijacking
Types of Session Hijacking
Spoofing
Hour#2 Network Level Hijacking – Capturing Cookie
Sessions
Hour # Task 43 to be practiced by Students
Details may
3-4
be seen at
Day 4 Hour#1 Web Application Architecture
Annexure-I
Web Application Threats
OWASP Top 10 Application Security Risks –
2022
Hour#2 Web Application Security using WAF (F5
ASM)
Hour # Task 44 to be practiced by Students
3-4
Day 5 Hour#1 Web Application Hacking Methodology
Web API
Webhooks and Web Shell
Web API Hacking Methodology
Hour#2 Web Application Security using AWS WAF
Hour # Task 45 to be practiced by Students
3-4
Build Your CV Download professional CV template from
any good site (https://www.coolfreecv.com
or relevant)
Add Personal Information
Add Educational details
Add Experience/Portfolio
Add contact details/profile links
Week 7 SQL Injections, Hacking Day 1 Hour#1 Motivational Lecture (For further detail Task – 46
Wireless Networks, please see Page No: 3& 4)
Hacking Web Servers Task – 47
Hour#2 SQL Injection
Types of SQL injection
Hour#3 Task 46 to be practiced by Students Task – 48
Hour#4 SQL Injection Methodology
Task – 49
SQL Injection Tools
Day 2 Hour#1 Launch a SQL Injection Attack
Task – 50
Enumerate number of columns in database
Week 8 Digital Forensics Day 1 Hour # 1 Motivational Lecture (For further detail Task - 51b
please see Page No: 3& 4) Task - 51c
Hour # Fundamentals of Computer Forensics
2-4 Cybercrimes and their Investigation
procedures
Digital Evidence
Forensic Readiness, Incident response, and
Role of SOC (Security Operations Center) in
computer forensics
Roles and responsibilities of Forensic
Investigator
Day 2 Hour # Understanding Hard Disks and File Systems
1-4 Types of Disk drives and their characteristics
Logical structure of Disk
Day 3 Hour # Understanding boot process of windows,
1-4 linux and MAC operating systems
File systems of windows, linux and MAC
operating systems
Day 4 Hour # Examine file system using Autopsy and
1-2 Sleuth Kit tools
Hour # Data Acquistion and Duplication
3-4 Fundamentals
Day 5 Hour # Prepare Image file for examination
1-4 Acquiring disk image using FTK imager
Week 9 Digital Forensics Day 1 Hour#1 Motivational Lecture (For further detail Task – 52
please see Page No: 3& 4)
Hour# Windows Forensics Task – 53
2-4 Collect Volatile and Non-Volatile Information
Day 2 Hour# Perform Windows memory and registry
Digital Forensic & Cyber Security
1-4 analysis Task – 54
Examine cache, cookie and history recorded
in web browsers Task – 55
Examine windows files and metadata
Day 3 Hour # Understand volatile and non-volatile data in Task – 56
1-4 linux
Analyze filesystem images using Sleuth kit Task – 57
Memory forensics using Volatility and
PhotoRec
Day 4 Hour# Network Forensics
1-4 Logging fundamentals and network forensics
readiness
Summarize event correlation concepts Details may
Day 5 Hour # Identify indicators of compromise (IoCs) be seen at
1-4 from network logs Annexure-I
Perform incident detection and examination
with SIEM tools
Week 10 Digital Forensics Day 1 Hour # Investigating Web Attacks
1-4 Understand Web application forensics
Understand Internet Information Services
(IIS) logs
Day 2 Hour # Understand Apache Web Server logs
1-4 Intrusion Detection System
Web Application Firewall (WAF)
Investigate Web Attacks on Windows-based
Servers
Day 3 Hour # Dark Web Forensics
1-4 Understand Dark Web
Identify traces of Tor browser during
investigation
Tor browser forensics
Day 4 Hour # Database Forensics
1-4 Determine data storage and database
evidence repositories in MSSQL server
Collect evidence files on MSSQL server
Perform MSSQL forensics
Day 5 Hour # Cloud Forensics
1-4 Understand basic cloud computing concepts
Cloud Forensics
Fundamentals of Amazon Web Services
(AWS)
Forensic methodologies for containers and
microservices
Week 11 Digital Forensics, Cisco Day 1 Hour# Malware Forensics Task – 58
Adaptive Security 1-4 Static Malware analysis
Appliance (ASA) Analyze suspicious word and PDF documents Task – 59
Dynamic Malware analysis and approaches
Day 2 Hour#1 ASA Firewall Technologies
Digital Forensic & Cyber Security
Basic Firewall initialization using CLI and Task – 60
ASDM
Firewall Access Control Task – 61
Hour#2 Task 59 to be practiced by Students
Hour#3 NAT on ASA (IPv4 / IPv6) Task – 62
Hour#4 Task 60 to be practiced by Students
Day 3 Hour#1 Routing and VLAN configuration Task – 63
Week 12 Next Generation Firewall Day 1 Hour#1 Motivational Lecture (For further detail Task – 67
(USG 6000v), please see Page No: 3& 4)
Data Center Advanced Hour#2 Evolution / Need for NGFW Task – 68
Architecture and Deployment Models
implementation of Web Hour#3 Initial Setup / Boot strapping of Huawei Task – 69
Security. USG6000v Firewall
Hour#4 Task 67 to be practiced by Students Task – 70
Day 2 Hour#1 Traffic flow
Security Policy Components Task – 71
Security Zones
Creating Individual Objects and Groups Task – 72
Hour#2 Task 68 to be practiced by Students
Task – 73
Hour#3 Filtering based on Application Visibility and
Control
Task – 74
Hour#4 Task 69 to be practiced by Students
Task
Task Description Remarks
No.
Cyber Security
Open Source As a professional Ethical Hacker or Pen Tester, your first
Information Gathering
step will be to check for the reachability of a computer in the
using Windows
Command Line target network. Operating systems offer several utilities
Utilities
that you can readily use for primary information – gathering.
1 Windows command-line utilities such as ping nslookup.
And tracert gather important information like IP address,
maximum Packet Fame size, etc., about a target network of
system that form a base for security assessment and pen
test.
Finding Company’s As a professional ethical hacker, you should be able to
Sub – domains using
extract information on the target using an automated tool
Sublist3r
2 such as Sublist3r. It uses multiple search engines to gather
the subdomains of a target domain. This lab will
demonstrate extracting information using Sublist3r.
Gathering Personal During information gathering you need to gather personal
Information using
information about employees working on critical positions in
Online People Search
Services the target organization such as Network Administrator, Help
3 Desk Employees, and Receptionist etc. The information
collected can be useful in performing social engineering.
This lab will demonstrate how you can search for personal
information using online people search services.
Gathering Information As a professional ethical hacker, you should be able to
from LinkedIn using
extract information on the target using an automated tool
In Spy
4 such as InSpy. It uses Google to extract valuable
information about the employees of an organization through
their twitter profiles.
13 NetBIOS Enumeration In Windows, you have a utility named Nbtstat that helps you
using Nbtstat and
Nmap obtain NetBIOS information, such as NetBIOS name tables
and NetBIOS name cache. It is a pretty easy-to-use utility
with a few parameters. Nmap, other than the command,
contains a Nmap Scripting Engine (NSE) used to execute
Digital Forensic & Cyber Security
ready-made scripts available within it. NSE also contains a
script that helps you perform NetBIOS enumeration and can
help you determine the NetBIOS names and MAC
addresses.
14 SNMP Enumeration Several devices are configured to use the Simple Network
using IP network
Browser and SNMP- Management Protocol (SNMP), which helps an administrator
Check manage them and get their current status. An attacker can
perform SNMP enumeration by using the default community
string and extracting a lot of information from the device. The
information can include ARP and routing tables. In this
exercise, you will learn to perform SNMP enumeration using
IP network browser and SNMP-Check utility
15 NTP, DNS and FTP Network Time Protocol (NTP) is used for time
Enumeration
synchronization. It can provide information to connect users
to an NTP server, system names, and operating systems.
Systems internal to a network can use either an internal or
external NTP server. Even though the NTP service is not a
concern for many network administrators, if exploited, it can
provide a wealth of information to the attacker. DNS plays a
vital role on the Internet. There are several tools that the
attacker can use to perform a zone transfer. Some of the key
tools are nslookup, dig, and DNSRecon. The host command
can also provide a lot of information, such as SOA records of
the authoritative nameservers or print the IP addresses of a
specific domain.
16 Use Nikto for Nikto is a vulnerability scanner that is part of Kali Linux.
Vulnerability Scanning
Ethical hackers, penetration testers widely use it, and
hackers to find the vulnerabilities in web applications.
17 Use Lynis for System Lynis is a built-in multi-purpose tool in Kali Linux. It is
Vulnerability Scanning
designed to perform tasks like security auditing, compliance
Digital Forensic & Cyber Security
testing, penetration testing, vulnerability detection and
system hardening.
18 Vulnerability After the vulnerability assessments have been executed,
Assessment reports
using Nikto their outcome should be in the form of reports. The outcome
of the scan will contain one or more vulnerabilities that
should be listed within a report, which should contain the
remediation step for the vulnerabilities that have been
located. Using Nikto, create a formatted vulnerability
assessment report.
19 Installation of Ubuntu Kali Linux is a famous distribution for Hackers, Pentesters,
Linux and Kali Linux
Forensics Investigators and Security Researchers that
comes pre-configured with already installed hacking tools
that you can use.
20 Basic Shell commands A shell is a special user program that provides an interface
of Linux
to the user to use operating system services. Shell accepts
human-readable commands from the user and converts
them into something which the kernel can understand. It is a
command language interpreter that executes commands
read from input devices such as keyboards or from files. In
this lab exercise, we will learn/practice basic terminal
commands of Linux.
21 Managing users and In Linux, every user is assigned an individual account which
group accounts,
partitions contains all the files, information, and data of the user. You
can create multiple users in a Linux operating system using
Linux user commands. Users and groups are used to control
access to files and resources.
22 Managing Files and Linux is a multi-user system. Every file and directory in your
their Permissions
account can be protected from or made accessible to other
users by changing its access permissions. Every user has
responsibility for controlling access to their files.
23 File Ownership All Linux files belong to an owner and a group. When
Digital Forensic & Cyber Security
permissions and users are represented by letters, that is
called symbolic mode. For users, u stands for user owner, g
for group owner, and o for others. For permissions, r stands
for read, w for write, and x for execute.
24 Working with Bash / A shell script is an executable file containing multiple shell
Shell Scripts
commands that are executed sequentially. Linux Shell
scripting is writing a series of command for the shell to
execute. Shell variables store the value of a string or a
number for the shell to read. Shell scripting in Linux can help
you create complex programs containing conditional
statements, loops, and functions.
25 Installation of CentOS CentOS is one of the most popular Linux distributions. It is
an open-source operating system that provides an
enterprise-class computing platform. CentOS is a
manageable, predictable, stable, and reproducible platform
derived from RHEL sources. In contrast, RHEL is a
commercial Linux distribution. CentOS is developed for the
amd64 platform. In this Lab, CentOS would be installed on
VMWare workstation.
26 Apache Server on Linux As a Web server, Apache is responsible for accepting
directory (HTTP) requests from Internet users and sending
them their desired information in the form of files and Web
pages. Apache is the most commonly used Web server on
Linux systems. Web servers are used to serve Web pages
requested by client computers. Clients typically request and
view Web pages using Web browser applications such as
Firefox, Opera, Chromium, or Internet Explorer.
27 FTP/SMB/DHCP/DNS/ Domain Name System (DNS) is used to resolve (translate)
Mail Servers on Linux
hostnames to internet protocol (IP) addresses and vice
versa. A DNS server, also known as a nameserver, maps IP
addresses to hostnames or domain names. We can use
Digital Forensic & Cyber Security
linux distribution for building other common services like
FTP/SMB/DHCP/Apache and Mail services.
28 Social Engineering Social engineering is the art of manipulating and utilizing
Techniques using
phishing human behavior to conduct a security breach. using phishing
and pharming. Phishing uses technical deception to
convince a user to provide personal information, such as
passwords, social security numbers, credit card numbers,
bank account details, and so on.
29 Social Engineering In pharming, user is redirected to a malicious copy of a
Techniques using
pharming genuine website. When a user types the correct URL in the
Web browser, the user is instead redirected to a look-alike
website.
30 Performing Online An online password attack is performed on network services,
Password Attacks
such as SSH, HTTP, FTP, SMB, etc. Most of the time,
servers or network devices are not equipped to block an
online password attack. Therefore, these attacks can
succeed without much effort. For example, an attacker might
guess a user’s password from a website login. Password
attacks can be of two types. The first type is the dictionary
attack, which uses a list of common words. It continues to
run through the list until a suitable match is found. On the
other hand, a brute-force attack uses words based on a
given character set. With an online password attack, either
one of the methods can be used. However, a dictionary
attack is mostly the choice because of the slow speed of the
attack.
31 Gain Access to a Armitage is a GUI-driven front-end which sits on top of
Remote System using
Armitage Metasploit and gives us the ability to “hack like the movies”.
Armitage is available for free and built into Backtrack. If you
are running Kali, you may need to install it before using.
Using this tool, you can create sessions, share hosts,
Digital Forensic & Cyber Security
capture data, download files, communicate through a shared
event log and run bots to automate pen testing tasks.
32 Hide Data using Steganography is the technique of hiding secret data within
Steganography
an ordinary, non-secret, file or message in order to avoid
detection; the secret data is then extracted at its destination.
The use of steganography can be combined with encryption
as an extra step for hiding or protecting data. Hide’N’Send is
one of the best image Steganography tools. It includes
encryption and hiding of data under an image file (JPEG
format). It encrypts the data using the F5 steganography
algorithm. Hiding of data is done using the LSB (Least
Significant Bit) algorithm for Image Steganography. Instead
of hiding in a file structure, these algorithms hide the data
inside the image.
33 Use of Wireshark Wireshark is the most sought-after packet capturing and
Sniffing Tool
sniffing tool. It helps you capture the live network traffic from
various networks. You can use it to monitor the network or
even get sensitive information like passwords transmitted in
cleartext. You can also filter the traffic to find the information
you are looking for. In this task, you will learn to use
Wireshark.
34 Sniffing using MAC Switches rely on the MAC addresses to forward traffic to the
Flooding Attack
appropriate port. An attacker can conduct a MAC attack to
make a switch work as a hub. When the CAM table is filled
with the spoofed MAC address, it cannot save any new MAC
address and behaves like a hub. In this exercise, you will
learn to perform MAC attacks using Macof.
35 Sniffing Technique: A DHCP server is configured to lease IP addresses to clients
DHCP Starvation Attack
on a network. An attacker can target DHCP with the DHCP
starvation attack. Using this attack, an attacker sends many
DHCP requests to a DHCP server, which eventually forces
Digital Forensic & Cyber Security
the server to lease all IP addresses. In this scenario, you will
learn to launch the DHCP attacks using Yersinia.
36 Sniffing Technique: DNS poisoning intends to forge the DNS records so that the
DNS Poisoning
victim can be redirected to the malicious sites. The attacker
adds the fake or forged records into the DNS resolver cache,
which the DNS uses to respond to the DNS queries received
from the clients. In this task, you will learn to perform DNS
poisoning using DNSChef
37 Sniffing detection and Various methods can be used against sniffing, which usually
countermeasures using
XArp utility takes place using weak protocols, such as HTTP and FTP.
As a basic precaution, you would avoid using weak
protocols. It is always advisable to use protocols that encrypt
traffic. Encryption also prevents the attacker from reading
data in transmission. In this exercise, you will learn to
prevent sniffing attacks using XArp utility
38 SYN Flooding a Target A SYN flood is a form of denial – of – service attack in which
Host using Metasploit
an attacker sends a succession of SYN requests to a target
machine in an attempt to exhaust its resources and
make it unresponsive to legitimate in incoming traffic
39 SYN Flooding a Target A SYN flood is a form of denial – of – service attack in which
Host using hping3
an attacker sends a succession of SYN requests to the
target’s system to consume enough server resources to
make the system unresponsive to legitimate traffic. Hs A
SYN flood attack works by not responding to the server with
the expected ACK code. The malicious client can either not
send the expected ACK, or spoof the source IP address in
the SYN, causing the server to send the SYN – ACK to a
falsified IP address – which will not send an ACK because it
“knows” that it never sent a SYN. The server will wait for the
acknowledgment for some time, as simple network
congestion could also be the cause of the missing ACK, but
Digital Forensic & Cyber Security
in an attack increasingly large numbers of half – open
connections will bind resources on the server until no new
connections is made , resulting in a denial of service to
legitimate traffic, Some systems may also malfunction badly
or even crash
40 Perform ICMP Flood ICMP flooding is a type of denial-of-service (DoS) attack in
Attack using hping3
which the attacker sends a large number of ICMP packets to
the victim. In this task, you will learn to conduct ICMP
flooding using hping3.
41 Perform Ping of Death Using the ping command, you can perform a Ping of Death
Attack
attack. You can send data packets of a size of 65500
indefinitely to a target system. While it may not bring down a
system, it will impact the target system’s performance. In this
task, you will perform the Ping of Death attack.
42 Performing Distributed A distributed denial of service (DDoS) attack involves a
Denial of Service Attack
using HOIC group of compromised systems usually infected with Trojans
used to perform a DoS attack on a target system or
network.
43 Network Level Session In network level hijacking, you are looking to identify the
Hijacking – Capture
Cookie Sessions session id or cookie that identifies a user’s session with a
server. This information can be used later in application level
hijacking to take over a session. In this exercise, you will
capture cookies using Burp Suite.
44 Web Application F5 BIG-IP® Application Security Manager™ (ASM) is a
Security using WAF (F5
ASM) flexible web application firewall that secures web
applications in traditional, virtual, and private cloud
environments. In this exercise, you will explore different
strategies to use F5 ASM.
45 Web Application AWS WAF is a web application firewall that helps protect
Security using AWS
WAF apps and APIs against bots and exploits that consume
79 Cisco ISE policies Implementing next generation NAC solution with Identity
(AAA, Profiling,
management, profiling, posturing, BYOD access control and
Posturing, Guest
Access) guest services
Session- 1 OVERVIEW
Aims and Objectives:
To introduce the communication skills and how it will work
Get to know mentor and team - build rapport and develop a strong sense of a
team
Provide an introduction to communication skills
Team to collaborate on an activity sheet developing their communication,
teamwork, and problem-solving
Gain an understanding of participants’ own communication skills rating at
the start of the program
Session Close: MENTOR: Close the session with the opportunity for
5 minutes anyone to ask any remaining questions.
Instructor:
Facilitate the wrap-up of the session. A quick reminder
of what is coming up next and when the next session
will be.
SUCCESS STORY
1. Self & Family background Seemant Sehgal, Founder and CEO of BreachLock
Inc. is a promising Cyber Security Entrepreneur in the
EU and USA tech scene. His venture BreachLock has
been listed amongst Top 10 Vulnerability Management
Solution providers for 2019 and is listed in Top 10
Vulnerability Assessment Solutions by Gartner Peers
insights. He is an ardent supporter of RED Teaming
philosophy. Seemant is a regular speaker at
international conferences and also an author for the
ISACA Journal since 2015. In January 2015, Seemant’s
paper on “Effective Cyber Threat Management –
Evolution And Beyond” was published in the ISACA
Journal
3. Post-training activities
His areas of expertise include cyber resilience, payment
security ( PSD2, PCI DSS), ISO 27001, Cyber defense
and SOC. He is a proud contributor/supporter for Threat
Intelligence Based Ethical Red teaming (TIBER)
initiative.He has been recently engaged with
organizations such as ING Group, Capital One Bank,
IBM, COMODO Security Solutions (UK) and Cisco
Systems offering them his expertise in various domains
of Information Security. He has also achieved various
certifications including SANS GSNA, CISM, CISA, CEH,
ISO 27001 Lead Implementer.
1. To call a passed out successful trainee of the institute. He will narrate his success story
to the trainees in his own words and meet trainees as well.
2. To see and listen to a recorded video/clip (5 to 7 minutes) showing a successful
trainee Audio-video recording that has to cover the above-mentioned points.*
3. The teacher displays the picture of a successful trainee (name, trade, institute,
organization, job, earning, etc) and narrates his/her story in the teacher’s own motivational
words.
* The online success stories of renowned professional can also be obtained from Annex-II
Work ethic is a standard of conduct and values for job performance. The modern definition of what
constitutes good work ethics often varies. Different businesses have different expectations. Work
ethic is a belief that hard work and diligence have a moral benefit and an inherent ability, virtue, or
value to strengthen character and individual abilities. It is a set of values-centered on the
importance of work and manifested by determination or desire to work hard.
The following ten work ethics are defined as essential for student success:
1. Attendance:
Be at work every day possible, plan your absences don’t abuse leave time. Be punctual
every day.
2. Character:
Honesty is the single most important factor having a direct bearing on the final success of
an individual, corporation, or product. Complete assigned tasks correctly and promptly.
Look to improve your skills.
3. Team Work:
The ability to get along with others including those you don’t necessarily like. The ability to
carry your weight and help others who are struggling. Recognize when to speak up with an
idea and when to compromise by blend ideas together.
4. Appearance:
Dress for success set your best foot forward, personal hygiene, good manner, remember
that the first impression of who you are can last a lifetime
5. Attitude:
Listen to suggestions and be positive, accept responsibility. If you make a mistake, admit it.
Values workplace safety rules and precautions for personal and co-worker safety. Avoids
unnecessary risks. Willing to learn new processes, systems, and procedures in light of
changing responsibilities.
6. Productivity:
Do the work correctly, quality and timelines are prized. Get along with fellows, cooperation
is the key to productivity. Help out whenever asked, do extra without being asked. Take
pride in your work, do things the best you know-how. Eagerly focuses energy on
Digital Forensic & Cyber Security
accomplishing tasks, also referred to as demonstrating ownership. Takes pride in work.
7. Organizational Skills:
Make an effort to improve, learn ways to better yourself. Time management; utilize time and
resources to get the most out of both. Take an appropriate approach to social interactions
at work. Maintains focus on work responsibilities.
8. Communication:
Written communication, being able to correctly write reports and memos.
Verbal communications, being able to communicate one on one or to a group.
9. Cooperation:
Follow institute rules and regulations, learn and follow expectations. Get along with fellows,
cooperation is the key to productivity. Able to welcome and adapt to changing work
situations and the application of new or different skills.
10. Respect:
Work hard, work to the best of your ability. Carry out orders, do what’s asked the first time.
Show respect, accept, and acknowledge an individual’s talents and knowledge. Respects
diversity in the workplace, including showing due respect for different perspectives,
opinions, and suggestions.