Time
6 hours 28 minutes
Difficulty
Intermediate
CEU/CPE
7

Video Transcription

00:00
Welcome back to cyber reintroduction, of course, to build the information security lapse.
00:04
I'm your host and instructor
00:06
Kevin Hernandez.
00:08
Now let's look at what did in the last lesson
00:10
started planning our lap.
00:12
We also started looking at reduce options into building this lap, such as using an old system repurpose assistant already had at home.
00:21
In today's lesson, we'll continue building your lab
00:25
now. There are two types of laps. A life system, right? Where you basically replicating infrastructure, You have real time data. It provides real protection to your network, considering you're implementing and let's say, a firewall or ideas host network based ideas, right? I p s sorry.
00:42
You have the closest experience, the real life, the scenario. However,
00:47
some of the negative aspects of this is there. A requires a more hardware or Boris costly, hard wearing, and it has higher complexity to configure. You have to configure several bee lands. You have to go figure different rows, access policies and oldest orphan aspects right
01:04
now from offline system. One of the negative thing is that you have to manually input
01:10
data whenever you wanna troubleshoot something rain
01:14
and sometimes they're very easy to come by and sometimes depending what you're trying to do. It might not be,
01:21
um,
01:22
one of the benefits of the offenses, and also that it doesn't impact your network performance again. It's a lives is isolated, and therefore you don't have any time off in line traffic, and it can help you familiarize with their first interface. But it's not realistic. So even though
01:40
that's both put, oppose, positive and the negative
01:42
kind of waving more to a negative because
01:47
it's not realistic. You know, it's cold again family from Hillary's with the dashboard. But you're not gonna be learning how to troubleshoot this type of event because you're giving them parameters, right. It's like you're trying to create your own puzzle, and you know you have to go through the green door, and therefore, when you create the green door, you know where it is. And therefore no,
02:06
the exit of the Paul's all right.
02:07
In this case,
02:08
everything might be a surprise. You might have my lord, your network and not know about it. Let's put it in that perspective, right? The biggest benefit of a cold system or offline system over a life system is the cost effectiveness again, less resource is means less costs,
02:25
and it's faster and easier to deploy. Talk about a big bonus right now. Let's quickly, somewhere I said. Well, if we look at both the cold system, which was fasten a C and inexpensive and a life system which produces the moles
02:40
really life type scenario
02:43
compared to a network system due to this willbe basing our lap on the life system, I hope to see you soon. Have a great day.

Up Next

Building an InfoSec Lab

This course will guide you through the basics of incorporating several Information Security Engineering Tools in your home and/or lab. By building this lab you will be able to obtain corporate-level security within your home network, as well as a higher understanding of the capabilities and advantages these tools bring to your network.

Instructed By

Instructor Profile Image
Kevin Hernandez
Instructor