Free

Security Onion

Security Onion is an open-source Network Security Monitoring and log management Linux Distribution. In this Security Onion course, you will explore the history, components, and architecture of the distro to improve your networking skills. Learn how to install and deploy server architectures, as well as how to replay or sniff traffic.
3
10
M
Time
beginner
difficulty
3
ceu/cpe

Course Content

10.1 Lesson 10 Overview

1m

Module 10: Other Functionality
8.1 Sniffing Traffic

4m

Module 8: Sniffing Traffic in a Distributed Environment
9.1 Lesson 9 Agenda

1m

Module 9: Management Tips and Best Practices
5.1 Server Installation Review

2m

Module 5: Reviewing the Installation
7.1 TCPReplay Part 1

2m

Module 7: Replaying Traffic on a Standalone Server
6.1 Resources Part 1

6m

Module 6: Resources
2.1 What is Security Onion?

5m

Module 2: What is Security Onion?
1.1 Introduction

4m

Module 1: Introduction
4.1 Server Configuration Demo Part 1

4m

Module 4: Installing a Distributed Environment
3.1 Security Onion Download and Installation Part 1

10m

Module 3: Installing a Standalone Server
11.1 Course Wrap Up

2m

Module 11: Wrap Up
10.2 Wazuh/OSSEC Functionality

1m

Module 10: Other Functionality
8.2 Traffic Overview in Kibana

13m

Module 8: Sniffing Traffic in a Distributed Environment
9.2 Salt Tips

5m

Module 9: Management Tips and Best Practices
6.2 Resources Part 2

4m

Module 6: Resources
5.2 Checking System Services With sostat

5m

Module 5: Reviewing the Installation
7.2 TCPReplay Part 2

17m

Module 7: Replaying Traffic on a Standalone Server
3.2 Security Onion Download and Installation Part 2

11m

Module 3: Installing a Standalone Server
2.2 Monitoring and Analysis Tools

4m

Module 2: What is Security Onion?
4.2 Server Configuration Demo Part 2

11m

Module 4: Installing a Distributed Environment
10.3 DNS Anomaly Detection Script

1m

Module 10: Other Functionality
9.3 Proxy Settings

3m

Module 9: Management Tips and Best Practices
8.3 SSH Success

1m

Module 8: Sniffing Traffic in a Distributed Environment
7.3 TCPReplay Part 3

18m

Module 7: Replaying Traffic on a Standalone Server
4.3 Server Configuration Demo Part 3

14m

Module 4: Installing a Distributed Environment
Course Description

Overall, this course will allow you to learn how to maintain and update Security Onion.

Students should have networking knowledge (TCP/IP, Protocols, Packets, etc.), linux knowledge (mkdir, Is, vi, ifconfig, etc.), and security technology knowledge (IDS, Full Packet Capture, etc).

This course is part of a Career Path:
No items found.

Instructed by

Instructor
Karl Hansen

Hi. I’m Karl. I live in the Mountain West region of the United States. I have been working in Cyber Security for over 4 years. Prior to working in Cyber Security I worked in several industries including nuclear medicine, furniture, and plumbing. I have a Bachelor of Arts in History, and a Masters of Science in Information Systems, as well as the CISSP and GCIA.

Outside of my professional life, I thoroughly enjoy working with my hands. I have done a lot of work upgrading houses, as well as milling lumber with my chainsaw with the goal of turning the wood on my lathe into something beautiful. I am also something of an urban homesteader, in that I have a fairly large garden, a flock of chickens, and my corgi, Menchi. I have a wonderful family to help me with these tasks, and I enjoy every minute of it.

Provider
Cybrary Logo
Certification Body
Certificate of Completion

Complete this entire course to earn a Security Onion Certificate of Completion

Coming mid-July
Cybrary Reimagined.
Level up with structured, role-aligned career paths.
ALL NEW!
Cybrary Reimagined.
Celebrate Cybersecurity Awareness Month with our buy 2, get 1 offer!
Level up with structured, role-aligned career paths.
Valid until October 31. Elevate your skills today!
Start Now

Heading

Heading 1

Heading 2

Heading 3

Heading 4

Heading 5
Heading 6

Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud exercitation ullamco laboris nisi ut aliquip ex ea commodo consequat. Duis aute irure dolor in reprehenderit in voluptate velit esse cillum dolore eu fugiat nulla pariatur.

Block quote

Ordered list

  1. Item 1
  2. Item 2
  3. Item 3

Unordered list

  • Item A
  • Item B
  • Item C

Text link

Bold text

Emphasis

Superscript

Subscript

This is some text inside of a div block.
Share

Purpose Statement

Cybrary Career Paths are comprehensive training programs designed to prepare you for the most in-demand roles in the cybersecurity workforce. Each path follows a Learn, Practice, Prove model and includes different activity types aligned to key topics within the path’s security domain. As you progress through the path, your progress will be measured in real time using Experience Points (XP) that serve as a comprehensive capability score for each topic. Upon completing all of the requirements for a path, you will be rewarded with a shareable digital badge via Credly.
This is some text inside of a div block.
This is some text inside of a div block.
M
Time
This is some text inside of a div block.
difficulty
This is some text inside of a div block.
ceu/cpe

Overview

Heading 1

Heading 2

Heading 3

Heading 4

Heading 5
Heading 6

Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud exercitation ullamco laboris nisi ut aliquip ex ea commodo consequat. Duis aute irure dolor in reprehenderit in voluptate velit esse cillum dolore eu fugiat nulla pariatur.

Block quote

Ordered list

  1. Item 1
  2. Item 2
  3. Item 3

Unordered list

  • Item A
  • Item B
  • Item C

Text link

Bold text

Emphasis

Superscript

Subscript

Frequently Asked Questions
No items found.
What Will I Learn?
Foundations
Focused on the core IT competencies that cybersecurity professionals need to succeed in any career path.
Defensive Security
Focused on trying to find the bad guys. Topics such as threat intelligence, threat hunting, network monitoring, incident response. Defensive security is a reactive measure taken once a vulnerability is found through prevention, detection, and response.
Engineering and Operations
Focused on building and operating information systems.
Governance, Risk, and Compliance
Focused on the core IT competencies that cybersecurity professionals need to succeed in any career path.
Leadership and Management
Focused on program design and oversight. Covers project and program management.
Offensive Security
Focused on validating security controls by trying to break them (i.e. penetration testing or ethical hacking). Topics such as Kali Linux, metasploit, scanning, and privilege escalation. Offensive security seeks out the problem or vulnerability through ethical hacking and finds a solution to disable the operation.
Offensive Security
Focused on the core IT competencies that cybersecurity professionals need to succeed in any career path.
Path Outline

Heading 1

Heading 2

Heading 3

Heading 4

Heading 5
Heading 6

Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud exercitation ullamco laboris nisi ut aliquip ex ea commodo consequat. Duis aute irure dolor in reprehenderit in voluptate velit esse cillum dolore eu fugiat nulla pariatur.

Block quote

Ordered list

  1. Item 1
  2. Item 2
  3. Item 3

Unordered list

  • Item A
  • Item B
  • Item C

Text link

Bold text

Emphasis

Superscript

Subscript

Course Outline

No items found.
No items found.
No items found.

What Our Learners Are Saying

Join 3 million+ users, including 96% of Fortune 1000 companies who use our platform to upskill their teams. See what the buzz is about - start learning for free!

No items found.