Time
6 hours 28 minutes
Difficulty
Intermediate
CEU/CPE
7

Video Transcription

00:00
Welcome back to the summary course in building. You're in for a sec lap. I'm your host and instructor Kevin Hernandes.
00:07
Up to this point in this course, we have cover a broad scope of material. We started by looking at two different options for braiding. Our lap first would look at a cold lap, which consisted in having the technology's installed. In order to familiarize yourself with the architecture and configuration of these tools,
00:26
this type of life has the advantage of having lower research requirements and having simple configuration.
00:33
In the other hand, we also look at a life system.
00:37
This left architecture will simulate those that are in corporate environments. It will interconnect. Technologies will also provide us with features such as BP en network segmentation enhance security features offer at the corporate level such as firewalls, Web proxies. I'm p s
00:56
to name a couple.
00:58
Not only that, but you will also be able to keep a closer eye on what happens in your neck work. Enderlin, be at the utilisation off a security incident and event monitoring tool or yes, I am for short.
01:11
These technologies just mentioned cover a great portion of our lab but we also look at options. Such a spent testing operating systems,
01:19
for example, can clinics as well of forensic based systems such as sift
01:25
an autopsy.
01:26
All of these applications will be installed in our virtual lap, which will be hosted in Vienna. Where's Ex Excite, which is free of cost for Internet purposes? In fact, most, if not all, of our tools mentioned in the lap will be free of cost. Or at least his basic features will be.
01:45
Some of them will offer premium features such as entangles Web proxy. However, there are several options for tools for you to pick.
01:53
Once we looked at the technology's consider in her lap, we started looking at the vendors, offer products in those technologies and are like mentioned free of charge. So of these included, I pee, Fire Entangled and PF cents off our firewall technologies,
02:08
which also included in hence features covered by our requirements of I PS or Intrusion Prevention Systems I. D. S interim detection systems as full a sweat proxies. Such a squid
02:21
for S I am. We looked at different technologies and vendors such as ivy EMS curator
02:28
Awesome from Alien Bolt, which is actually a part of a team tee and Splunk free, which is Splunk.
02:35
This require also some base operating systems in order to be installed. For example, curator requires Santo's version 7.5 in order for it to be fully deployed in our environment,
02:47
based on the tools who gather the hardware requirements,
02:52
who are also able to look at how many resources were required for us to build our lap.
02:58
Well, look at several options when building the lap.
03:00
So chess buying a small farm factor system or a verbal from E ve. For example, we look at the L.
03:07
Well, look at the bricks and the intel nooks,
03:09
creating your current equipment minus something more RAM
03:13
or buying a pre built system for manufacturers sold in major retailers.
03:19
He also have option off building their own machine. We included a small guy for in order for you to familiar sights yourself with this highway,
03:27
you should be able to download it below.
03:30
This guy was created by one of our T. A S. Robert, and all credit should go to him.
03:36
We also learn about the villains and smart socialists, and the benefit is these bring to our infrastructure,
03:43
which will show you one particular unit that I personally purchased and installed to utilize in my lab.
03:50
Lastly was are preparing our harbor by forming our drives and unloading tools to facilitate the installation off our software.
04:00
Due to the lack of physical drives in her system,
04:02
for example,
04:04
we used a tool called Rufus
04:06
which will assist us particular in this first installation of VX. Exciting.
04:12
We'll get the seed of Tollan action shortly.
04:15
Now, in today's lesson, we'll download and install XXII.
04:19
Let's get to it. Model three.
04:23
Lesson one installing E X X A.
04:27
Now, on today's lesson, all this cost about
04:30
getting e s exciting.
04:31
Now, when we talk about s excite every firing to being worse hyper by, sir, this is basically what I would like to call a building block for a different appliances.
04:44
What I'm trying to say is that
04:46
when he becomes harbor appliances, right,
04:50
if you're looking to have a 1 to 1 replication, you will require a lot of hardware ports in order to properly replicate an enterprise level security with different layers off security. However, when you have s X sign, you can add multiple types of appliances. This is like your
05:10
on the work level. I ps
05:11
You could have your firewall. You gonna have your s. I am your protection, your proxy, all of those in one simple solution and one simple piece of hardware as long as your hard work requirements are met. So what I'm trying to say is, if you have a system
05:30
that requires a lot of resource is let's say such a sigh AM
05:34
right now you're using our repurpose hardware. Such a supper old laptop only has four gigabytes of ram.
05:42
Most likely
05:44
you will need to put on Lee that particular hardware
05:48
appliance in this old laptop. You will not be able to put more
05:55
tools in one location that does not supported again. If you're having a life system,
06:00
it will require probably a lot of resource person. If you're using a offline or us cold lab, that most likely you might be able to get away with it. Now let's quickly search for S X. I
06:14
excite downloads here in a shortage, and here you can see download being work, be sphere hyper visor for free. Let's click on that.
06:21
And in this scenario, I'm already locked in, huh? You won't be able to see my email. Hopefully for now. But if I'm not careful or not, you will see my license. So I need to make sure I right over that. And I did. So when you got here, Ryan,
06:38
you're most likely common to hear if you're not locked in and you will see this little camcorder type of icons, right? No, it's not an iPhone with a camera anymore. And if you click on them, you can actually have a four and 1/2. Meaning a video
06:54
on how to install and configured this plans. Right
06:58
now.
07:00
In order to do this before installing or going crazy, you need to make sure you meet the hardware requirements during set in place. This case you can cook in this little window. You can, for example, See here you can pick your different options. What type of appliance or part where you'il icing in the CPU series. Now, if you are
07:19
not aware, for example, you saying it's six tops seven and updated your resold. You can see that most of these are, um, sort of A great CP is right now.
07:30
Yeah, I guess you know when you're using. Is that our enterprise saying, Well, that's most likely what you end up with what I really thought You will have this and it's not really required. How do I know? Because if you're very careful here and you look around, you can see different I three's high fives and I seven
07:48
processor for intel. And if you're looking
07:53
clothes into, this year's going to see a 47 100 from Intel, right?
07:58
No, I did a quick search right on how old is to Cebu. And if you look here, it's
08:03
quarter to 2013. We're looking at a CPU that's almost six years old, and it's staring that list now. That doesn't mean supports the current version of I S s. I what? It still means that it's considered, at least in some of these versions are still supported, right?
08:20
So taking that into consideration, done, disqualified, discredited. Any type of all resource is just because it's not the one you have now. One thing you have to take into consideration is that if you're down here, you wouldn't see that you require a cp Siris
08:39
based on the release. All right,
08:43
But
08:43
that's about it. It's It's okay. Have 20 sockets when a court for soggy dead before source. I'm sorry, but it doesn't tell you how much tramp, how much story to Sarah. So you will have to go into this page, right? And I will provide you that link
08:56
to see how much exactly. Now this is for 5.0. Apparently, if you're looking here, what in general, you have a very similar approach now from a ram perspective, right,
09:09
You will search for him,
09:11
right? And you can see it at you. Require a minimum of two gigs and a maximum of four. Or recommend that a cakes. I'm sorry.
09:18
When it comes to storage,
09:20
it doesn't really tell you how much it is.
09:24
But
09:26
we will go into that when you actually download the ISO. When inconstancy bu and actually have a 32 bit in a 64 bit and with at least two course. So that that way, if you have a system that has ah hopper trading a multi core processing, then unit, you know you can actually limit
09:43
or modified these parameters into properly
09:46
assigning the bother that's required.
09:50
No. Let's go back
09:50
to the insulation site. Right
09:54
As we go here, you can actually go to license and download.
09:58
And right here you can manually download the application. Not right here. You see, it's 311 megabytes, right? To be generous. We're gonna round that up to the higher gigabyte. So we're gonna actually give it a little more space in order to properly document what we need.
10:16
So right here haven't associate. Right? And we gotta keep track of how much hardware we're gonna need for each up. This appliances. Right. So here gotta go type app. Minimum. Graham
10:31
recommended
10:31
Ren
10:33
still rich.
10:35
Great
10:37
insulation. Right. And also, I'm gonna need CPU force give or take,
10:43
right?
10:45
No, for this applying applicant application are appliance. He s excite, all right.
10:50
Minimum rhymes to recommended room was eight. The storage. I said we're gonna round it up to the
10:58
one above it, right? And obviously this will grow. I sweeten star more appliances into it.
11:05
And the CPU courses two. Now this we want to save and keep track after look into further applications. Okay? Now, I have already downloaded the e x x I application will be installing it shortly into our hard work. The first thing we're gonna do is first to grab the USB
11:22
where we put the S Excite image
11:24
on plug it into the USB port. In our system, as such,
11:30
this is required to be done prior to booting up the system. Once put up, you have to be very careful and pay attention to the boot option keys and select a USB key from this election.
11:43
If you pay attention to the bottom left corner of the screen, you can see a countdown. This is basically the USB being written.
11:52
After he finishes loading, it will be presented with a following screen. Welcome to being worked. Yes, excites 6.7 doctor installation BM, where installs almost systems but on Lian does in the completely guide are supported
12:07
and then it provides you the link off touch devices. After worse, you will be
12:11
the end users License agreement.
12:15
Scroll down. You should be able to go through it.
12:18
It will start scanning for the available hard drives in order to performed insulation.
12:24
In this case, as you notice, it doesn't take too long to identify. And here itself it's our hard drive arts all estate that we're gonna be utilizing the selected
12:35
and continued insulation Assoc.
12:37
I had a prior installation to E s Excite on my hard drive.
12:41
So in my scenario, I will overwrite this elation. However, in your case, you will be presented on Lee with the option to install
12:48
Select your keyword lee out
12:50
and select your root password and make sure you write it down somewhere. This is actually the reason I'm reinstalled it. I forgot the password
12:58
and I have to install it.
13:00
Let's go ahead with installation. You should take a few minutes or so in order to install.
13:07
Once it's done,
13:07
you'll be presented with the following screen as seen
13:13
Hit Enter to reboot the system asked requested.
13:16
You will see the screen There will be rebooting and make sure you remove the USB. At this step, it will be not require any more.
13:24
Here's assistant rebooting.
13:26
You will see the little screen here with the eyepiece and all that in for information. You can see your computer model to CPU
13:33
Iran, and it will also show some service is study has loaded. So what have we learned today?
13:41
We basically utilize Rufus in order to convert our I s O into a bootable USB
13:46
utilize. This used to be in order to install e S x I within our system. We actually proceeded with the installation step, but step
13:56
up to the point where it was completed in future lessons will actually go over the exercise dashboards and we'll proceed in getting familiarized with the operating systems among those will actually go ahead and activate exercise which will cover in our next lesson.
14:16
Hope to see you soon. Have a great day.

Up Next

Building an InfoSec Lab

This course will guide you through the basics of incorporating several Information Security Engineering Tools in your home and/or lab. By building this lab you will be able to obtain corporate-level security within your home network, as well as a higher understanding of the capabilities and advantages these tools bring to your network.

Instructed By

Instructor Profile Image
Kevin Hernandez
Instructor