Conclusion

Video Activity
Join over 3 million cybersecurity professionals advancing their career
Sign up with
Required fields are marked with an *
or

Already have an account? Sign In »

Time
1 hour 18 minutes
Difficulty
Beginner
Video Transcription
00:05
thank you for reaching this far in the series.
00:08
We've covered quite a bit of ground and learn how to set up your own same installation.
00:13
To summarize, we've learned how to install an oasis. I am Server and Sensor.
00:18
We've learned how to configure a nose asylum server and censor be of both the SS H view and with application view.
00:25
We've learned how to set up a network intrusion detection system to capture, analyze live network traffic.
00:30
We've learned how to install Kali Lennox.
00:33
We've learned how to install a Web server afford system logs, V. S, a slug.
00:39
At this point, you have a good lap to develop your skills even further.
00:43
To get even more out of this course, you can take everything a step further
00:48
for a red team. Example, You could installment exploitable on your Web server and perform some penetration testing on the box from your column machine
00:57
While learning so offensive security, you can view how both the hosts, intrusion detection system and network intrusion detection system handled the network attacks and exploits.
01:07
To learn a bit more about networking, you can reconfigure the lab to work on different feelings.
01:11
You could then work on creating specific be land permissions to learn how the lance could be used to help secure network.
01:18
Really, this Elvis I have lab set up. Can't compliment an additional labs you want to pursue.
01:25
In conclusion, I'd like to thank you for following along
01:27
for more great video content and tutorials. Cyber got I t. And my personal site a life secure dot com are both Great resource is
01:37
if you have any questions or feedback regarding this course, you can email me via the contact form of my sight.
01:44
I hope you learned something valuable and I wish you best of luck in your cybersecurity journey.