Join over 3 million cybersecurity professionals advancing their career
Sign up with
Required fields are marked with an *
Already have an account? Sign In »
1 hour 18 minutes
thank you for reaching this far in the series.
We've covered quite a bit of ground and learn how to set up your own same installation.
To summarize, we've learned how to install an oasis. I am Server and Sensor.
We've learned how to configure a nose asylum server and censor be of both the SS H view and with application view.
We've learned how to set up a network intrusion detection system to capture, analyze live network traffic.
We've learned how to install Kali Lennox.
We've learned how to install a Web server afford system logs, V. S, a slug.
At this point, you have a good lap to develop your skills even further.
To get even more out of this course, you can take everything a step further
for a red team. Example, You could installment exploitable on your Web server and perform some penetration testing on the box from your column machine
While learning so offensive security, you can view how both the hosts, intrusion detection system and network intrusion detection system handled the network attacks and exploits.
To learn a bit more about networking, you can reconfigure the lab to work on different feelings.
You could then work on creating specific be land permissions to learn how the lance could be used to help secure network.
Really, this Elvis I have lab set up. Can't compliment an additional labs you want to pursue.
In conclusion, I'd like to thank you for following along
for more great video content and tutorials. Cyber got I t. And my personal site a life secure dot com are both Great resource is
if you have any questions or feedback regarding this course, you can email me via the contact form of my sight.
I hope you learned something valuable and I wish you best of luck in your cybersecurity journey.