This module will teach you how to set up Monitoring, Detection and hacking lab environment for all your security research, Monitoring, Detection, hacking tools, and training you've always wanted to do. you will discover how to add several different target systems from the latest Windows platform to systems that are intentionally vulnerable such as Metasploitable, OWASP, DVWA, Mutillidae etc. Having these targets will allow you to launch attacks, verify vulnerabilities, monitor the logs and conduct research projects without your production environment.
Objectives:
Building a Cybersecurity Monitoring and Detection Lab Environment, you’ll learn how to create an environment that you can use to enhance your learning and will teach you how to set up an environment to practice your Cybersecurity and Ethical Hacking skills such as Launching a cyber-attack, verifying vulnerabilities, Conducting research projects and much more.
Who Should Attend:
Anyone who wants to learn cyber security and apply its principles in a risk-free environment should take this course. If you want to master cyber security research and learn hacking tools, then this is a perfect place to start.
Basic IP and security knowledge is nice to have. Students need to understand basic networking. Students needs to understand Networking Fundamentals. Basic of Linux, Windows and VMware workstation.
Attacker System:
Kali Linux OS
Vulnerable Web Applications:
bWAPP
Metasploitable
OWASP
Key Outcomes
This course will teach you how to set up a hacking lab environment.
Install and Configure VMware Workstation.
Setup Kali Linux Hacking OS.
Install and Configure Windows Server 2019.
Create Users and Groups in Active Directory.
Setup Receiving & Index on Splunk Server.
Security Onion and Splunk Monitoring.
This course will teach you how to set up monitoring lab environment.