Cybersecurity Monitoring & Detection Lab
Learn Cybersecurity Monitoring & Detection Lab Setup with Step-by-Step Workbook
Course Description
Introduction:
This Bootcamp will teach you how to set up Monitoring, Detection and hacking lab environment for all your security research, Monitoring, Detection, hacking tools, and training you've always wanted to do. you will discover how to add several different target systems from the latest Windows platform to systems that are intentionally vulnerable such as Metasploitable, OWASP, DVWA, Mutillidae etc. Having these targets will allow you to launch attacks, verify vulnerabilities, monitor the logs and conduct research projects without your production environment.
Objectives:
Building a Cybersecurity Monitoring and Detection Lab Environment, you’ll learn how to create an environment that you can use to enhance your learning and will teach you how to set up an environment to practice your Cybersecurity and Ethical Hacking skills such as Launching a cyber-attack, verifying vulnerabilities, Conducting research projects and much more.
Who Should Attend:
Anyone who wants to learn cyber security and apply its principles in a risk-free environment should take this course. If you want to master cyber security research and learn hacking tools, then this is a perfect place to start.
Basic IP and security knowledge is nice to have. Students need to understand basic networking. Students needs to understand Networking Fundamentals. Basic of Linux, Windows and VMware workstation.
Attacker Systems:
- Kali Linux OS
- Vulnerable Web Applications:
- bWAPP
- Metasploitable
- OWASP
Who this course is for:
- This course is for students trying to setup Cybersecurity Lab
- Network Engineers and Security Engineers
- Network Security Engineers looking to improve their Skills.
- Network & Security Engineers looking to perform different test.
Goals
What will you learn in this course:
This course will teach you how to set up a hacking lab environment.
This course will teach you how to set up monitoring lab environment.
Install and Configure VMware Workstation.
Setup different Vulnerable Web Applications.
Setup Kali Linux Hacking OS.
PfSense Firewall Configuration.
Install and Configure Windows Server 2019 .
Active Directory and DNS configuration .
Create Users and Groups in Active Directory.
Install and configure Splunk.
Setup Receiving & Index on Splunk Server.
Install Splunk Forwarder on Server 2019.
Security Onion and Splunk Monitoring.
Prerequisites
What are the prerequisites for this course?
Basic IP and security knowledge is nice to have.
Students need to understand basic networking.
Students needs to understand Networking Fundamentals.
Working knowledge of networking technology.
General knowledge of TCP/IP.
Basic Linux and programming concept.

Curriculum
Check out the detailed breakdown of what’s inside the course
Introduction to Cybersecurity
5 Lectures
-
Introduction Cyber Security 09:29 09:29
-
Cyber Security Monitoring & Detection 10:26 10:26
-
Cyber Security Monitoring & Detection Lab 06:37 06:37
-
PC Specification for Monitoring & Detection Lab 04:37 04:37
-
Resources
LAB Setup
30 Lectures

Instructor Details

Ahmad Ali
Cyber Security Consultant & Cisco Certified InstructorI am Cyber Security Consultant and Cisco Certified Trainer with several years of experience. Teaching part time for more than 10 years’ providing classroom, on-site and online training on various network, security topics and Certifications like CCNA R&S, CCNA, CCNA Security, CCNP R&S, CCNP Security, VPN, Firewalls etc. My utmost desire as an instructor is to bring my field experience into classroom in order to give my students' a feel of real-world hands-on.
Certifications:
CCIE Routing and Switching
Cisco Certified Specialist - Web Content Security Certificate
Cisco Certified Specialist - Security Identity Management Implementation Certificate
Cisco Certified Specialist - Security Core Certificate
Cisco Certified Specialist - Network Security VPN Implementation
Cisco Certified Specialist - Network Security Firepower Certificate
Cisco Certified Specialist - Enterprise Core Certificate
Cisco Certified Specialist - Enterprise Advanced Infrastructure Implementation Certificate
Cisco Certified Network Professional CCNP (Routing & Switching)
Cisco Certified Network Associate CCNA (Routing & Switching)
Cisco Certified Network Professional CCNP (Security)
Cisco Certified Network Associate CCNA (Security)
Cisco Certified Academy Instructor CCAI
Microsoft Certified Solutions Associate MCSA Server 2012
Microsoft Certified Solutions Associate MCSA Server 2008
Microsoft Certified IT Professional MCITP Server 2008
Microsoft Certified Technology Specialist MCTS Windows 7
Microsoft Certified Technology Specialist MCTS 2008
Microsoft Technology Associate MTA
EC-Council Certified Secure Computer User CSCU
Palo Alto Networks Certified Network Security Engineer (PCNSE)
Palo Alto Accredited Configuration Engineer (ACE)
EC-Council Certified, Certified Ethical Hacker (CEH)
Fortinet NSE1, NSE2, NSE3 , NSE4 and NSE7
F5 Certified BIG-IP Administrator
Course Certificate
User your certification to make a career change or to advance in your current career. Salaries are among the highest in the world.

Our students work
with the Best


































Related Video Courses
View MoreAnnual Membership
Become a valued member of Tutorials Point and enjoy unlimited access to our vast library of top-rated Video Courses
Subscribe now
Online Certifications
Master prominent technologies at full length and become a valued certified professional.
Explore Now