1.0 Introduction

Video Activity
Join over 3 million cybersecurity professionals advancing their career
Sign up with
Required fields are marked with an *
or

Already have an account? Sign In »

Time
6 hours 28 minutes
Difficulty
Intermediate
CEU/CPE
7
Video Transcription
00:45
>> Good afternoon.
00:45
>> Welcome to the Cybrary course on how
00:45
>> to build an information security lab.
00:45
I'm your host and instructor, Kevin Hernandez.
00:45
A little bit about myself before we start.
00:45
I'm a senior security
00:45
professional with over six years of experience.
00:45
I started as an information security
00:45
analysts and from there,
00:45
moved and experienced different aspects of the fields,
00:45
such as forensics, vulnerability assessment,
00:45
security awareness,
00:45
penetration testing, engineering, among others.
00:45
Every experience has teach me something specific,
00:45
which I will incorporate in
00:45
this course as it is applicable.
00:45
I obtained a master's degree in information security and
00:45
assurance and currently maintain
00:45
certifications such as GX Forensics examiner,
00:45
Certified Ethical Hacking,
00:45
EnCase Certified Examiner Forensic examiner,
00:45
as well as other CompTIA certs.
00:45
I'm also a martial art practitioner.
00:45
I practice mixed martial arts and
00:45
Brazilian jiu-jitsu or Gracie jiu-jitsu,
00:45
>> however you want to call it.
00:45
>> I do not compete, but I do enjoy the workout that these
00:45
provide to me as a person and
00:45
the overall health benefits I obtain from them.
00:45
Now, you probably just spent the last eight hours or
00:45
so working for a big corporation,
00:45
maybe a medium-sized one,
00:45
and you're wondering if I'm crazy.
00:45
Do you expect me to work from home for free,
00:45
gain benefits to my employer for free?
00:45
Well, that's not the only reason
00:45
you might want to build InfoSec lab.
00:45
There's other benefits as well.
00:45
Maybe you're an IT professional,
00:45
such as a system administrator, a developer,
00:45
a stock analyst that is looking for a career change
00:45
on a role yet it's a catch-22 situation.
00:45
You cannot get that position
00:45
because you don't have the experience yet.
00:45
You cannot get the experience
00:45
since you cannot get
00:45
your foot through that door in that role.
00:45
This course will help your course solve
00:45
that experience installing, configuring these devices,
00:45
which are variants of many
00:45
of those products are often industry,
00:45
some of them which are the same product.
00:45
Maybe getting that small experience difference,
00:45
that will make your interview going
00:45
from a path to a potential candidate.
00:45
Who knows, you might be even hired.
00:45
This course is also for
00:45
those information security students.
00:45
When you talk about information security,
00:45
there's a lot of different fields,
00:45
different aspects you want to focus.
00:45
By doing this course,
00:45
it will help you perform
00:45
a basic understanding if engineering
00:45
is something you want to pursue or if you
00:45
want to be more of an analyst forensics,
00:45
pen tester, vulnerability assessment, etc.
00:45
Perhaps you're already in the field,
00:45
but you're in a very small enterprise which has
00:45
no test environment and has very limited resources.
00:45
You really want to try this thing you saw in
00:45
YouTube and cyber units in InfoSec training.
00:45
But you can't justifies this type of
00:45
change as it is high risk and you
00:45
haven't proven to your manager you have tested it.
00:45
You know this test will make your life easier at work,
00:45
but there's no way to prove it.
00:45
By building this InfoSec lab,
00:45
you will build a stronger case management and those might
00:45
facilitate and ease the process on
00:45
getting this type of firm plantations change at work.
00:45
Now perhaps you want
00:45
enterprise-level security at home
00:45
without the enterprise cost.
00:45
I know there's thermal issues,
00:45
there are a lot of software also that can be malicious.
00:45
You cannot rely only one single point of failure being
00:45
your free anti-virus included in Windows 10 or Windows 7
00:45
or that one product you pay $100 a year for licensing.
00:45
You have to have different layers of
00:45
different types of security at your home.
00:45
You need to have a web security,
00:45
you need to have all these different protections
00:45
that if you put in your hosts such as host ideas,
00:45
antivirus, web filtering,
00:45
it will clog up your system.
00:45
Why not build an environment similar to
00:45
those created in establishing
00:45
enterprises that protect your systems while also
00:45
not hindering the overall performance of your system?
00:45
Now the last thing is maybe you just love knowledge.
00:45
Hey, you're an information security.
00:45
You should not leave
00:45
your role when you exit through that door at 5:00 p.m.,
00:45
6:00 p.m., whenever you exit your office.
00:45
You should always be learning,
00:45
always experiencing new things.
00:45
Who knows? You might be
00:45
ending up in a new career, maybe a promotion.
00:45
This type of knowledge
00:45
will help you regardless of what you do,
00:45
and this is the perfect course
00:45
for you if you're looking to learn something.
00:45
Now, what will you learn in this lab?
00:45
You will learn how to build, configure,
00:45
and run different tests in your information security lab.
00:45
This involves software, hardware,
00:45
and networking configurations that will be
00:45
essential to having a successful environment.
00:45
Introduction to the lab.
00:45
First of all, what consist in information security lab?
00:45
You will learn that it is
00:45
expected out of information security lab,
00:45
which is an environment that you create in
00:45
order to practice and test
00:45
your cybersecurity skills without
00:45
risking your production environment.
00:45
What differentiates this course or
00:45
this lab documentation versus
00:45
x or y that are in the web already?
00:45
Well, the main difference is
00:45
that most of those courses out there
00:45
are for web-related penetration testing
00:45
with security OWASPs,
00:45
penetration testing, metasploitable material.
00:45
All those guides evolve throughout this aspect.
00:45
When it comes to information security engineering,
00:45
there's little to no documentation out there that
00:45
puts everything together into one source.
00:45
Even now, we will look into some of
00:45
these aspects like vulnerability assessment,
00:45
penetration testing,
00:45
and all of those different aspects
00:45
, at the end of the day,
00:45
this is not geared towards that type of lab.
00:45
This is more about having a vulnerability assessment,
00:45
also having a firewall, a SIEM,
00:45
mail proxy, practice
00:45
your Active Directory skills, having a DNS,
00:45
having all those different aspects one way
00:45
or another incorporated into your lab.
00:45
Why should we build a lab?
00:45
We already discussed those in the previous point.
00:45
However, as a refresher,
00:45
this career changes,
00:45
you'll want to test new environments,
00:45
new processes, or you want to learn new skills.
00:45
Now, how long will this course take?
00:45
This course aims to at least 25 hours worth of content.
00:45
Therefore, you will receive 25 CPEs for this course.
00:45
If you're looking into career changing,
00:45
I also recommend you take
00:45
the certification option as this might
00:45
help increase the chances of you being hired.
00:45
Now, obviously there's different trainings
00:45
and different certifications you
00:45
acquire and salary offers some of those aspects.
00:45
We are not an entity such as CompTIA,
00:45
but if your information security potential manager
00:45
is aware of our programs or offerings,
00:45
it will greatly help you know that you
00:45
went through some type
00:45
of official training to help you gain that knowledge.
00:45
In summary, what we discuss
00:45
is what is an information security lab,
00:45
the benefits of the lab,
00:45
who the target audience is,
00:45
and your expectations as
00:45
somebody that's taking this course.
00:45
In our next lesson, we will
00:45
start learning how to build
00:45
>> an information security lab.
00:45
>> We will start planning the lab,
00:45
the type of lab you will be
00:45
performing and which type
00:45
of applications you will be looking for.
00:45
Hope to see you soon. Have a great day.
Up Next