Free

Building an InfoSec Lab

As a cybersecurity professional, the experience of building a secure lab at home can help you understand the capabilities you can implement in a corporate environment. Take this Building an InfoSec Lab course to obtain corporate-level security in your home network and learn valuable information to apply on the job.
6
28
M
Time
intermediate
difficulty
7
ceu/cpe

Course Content

3.6 Installing CentOS

13m

Module 3: Tool Installation
4.6 VPN

5m

Module 4: Firewall
5.6 QRadar Custom DSM Part 1

11m

Module 5: SIEM - QRadar
1.6 Hardware Selection

13m

Module 1: Lab Planning
3.7 Installing QRadar

10m

Module 3: Tool Installation
5.7 QRadar Custom DSM Part 2

10m

Module 5: SIEM - QRadar
1.7 VLAN and Smart Switch

4m

Module 1: Lab Planning
3.8 Installing Splunk

7m

Module 3: Tool Installation
3.9 Installing OSSIM

13m

Module 3: Tool Installation
3.10 Kali Linux

5m

Module 3: Tool Installation
3.11 Installing SIFT

5m

Module 3: Tool Installation
3.12 Windows Server 2016

5m

Module 3: Tool Installation
3.13 Nexpose

8m

Module 3: Tool Installation
3.14 Forensic Apps

9m

Module 3: Tool Installation
Course Description

This course will guide you through the basics of incorporating several Information Security Engineering Tools in your home and/or lab. By building this lab you will be able to obtain corporate-level security within your home network, as well as a higher understanding of the capabilities and advantages these tools bring to your network. This course will also help mirror an infrastructure similar to your corporate environment whereseveral tests could be performed without actually interacting with your corporate network. This course is amust for the professional that wants to grow in the security engineering industry.

Prerequisites:

1. Intermediate knowledge of networking including routing and switching

2. General knowledge of hardware and Hardware assembly

3. General knowledge of Operating systems including installation and configuration

4. Basic knowledge of Regular expressions (REGEX).5.Hardware or virtual lab in order to run the configuration.

Course Goals:

By the end of the course, students should be able to build, create, and configure their own lab for Information Security.

This course is part of a Career Path:
No items found.

Instructed by

Instructor
Kevin Hernandez

I’m an Information Security Professional that has been employed in several sectors of the industry. I personally believe that our profession and our responsibility does not end when we log off from our office computers, but instead, should be around us 24/7 as an integral part of our lives. The security provided by IoT companies is not the best, regardless of being from a major developer or minor developer, and therefore it is our responsibility as information security professionals, or as parents to secure our network to the best of the abilities.

I love learning from others and sharing my knowledge. I’m no expert or Guru but the little that I know will be under extensive research and collaboration with colleagues. What I learn is also applied to the real world and validated in labs, simulations, and others to assure it is operational. My current hobbies include D&D, video games, and sports such as Mixed Martial arts (MMA) and Brazilian Jiujitsu (BJJ).

Provider
Cybrary Logo
Certification Body
Certificate of Completion

Complete this entire course to earn a Building an InfoSec Lab Certificate of Completion