Udemy – CCNA Cyber Ops Tools Sec Onion Wireshark and Kali Linux

Udemy – CCNA Cyber Ops Tools Sec Onion Wireshark and Kali Linux
English | Tutorial | Size: 1.63 GB


Build home labs for the Cisco CyberOps Associate Exam CBROPS 200-201 using Security Onion, Sguil, ELSA, Metasploit, Nmap

What you’ll learn
Very Similar to my INE Course
Build CCNA Cyber Ops labs using different tools
Learn how to install and use Security Onion
Learn how to work with ELSA and PCAP files
Learn how to work with Sguil and Squert
Learn about Elastic Stack and Kibana
Learn how to install and use Wireshark
Learn how to install and use Kali Linux
Learn how to install and use VirtualBox
Learn how to install and use GNS3
Learn how to use Metasploit
Learn how to use Nmap
Practice test included
Practical assignments included to give you thorough and comprehensive understanding of the related topics and tools .
Requirements
Basic Knowledge of TCP/IP.
Basic Knowledge of Cyber Security concepts.
Network+ or CCENT/ICND1 level knowledge is recommended, but not required.
Description
***** Very Similar to my INE Course *****It is estimated that there will be about 1.5 million unfilled jobs in cyber security by the year 2020. A more recent statistic increased this number for cyber security unfilled jobs to be 3.5 million by the year 2021. In addition, recent article highlights Cisco Systems intention to become a cyber security force. For these reasons, Cisco created the CCNA Cyber Ops certification, which can become one of the most certifications in demand in the near future. Furthermore, Cisco created a scholarship program for this certification, which emphasis its importance. In this course you will learn about the tools that you can use for your study of the CCNA Cyber Ops certification and the current Cisco CyberOps Associate certification. Learning the theory side is important, but the hands on side is more important, since the main purpose of your study is to apply your knowledge in production, and since your hands on will enforce your theory knowledge. You can not teach someone how to drive a car by showing him or her how to do it, but you have to let him try and practice how to do that. Furthermore, showing you hands on labs and how to use tools without teaching you how to create these labs and install these tools, might not give you the ultimate benefit from your study . For this reason, I have created this course to teach you how to create your own home labs, and to understand the core usage and important features of the tools used in them. I believe in the saying: “Give a man a fish and you feed him for a day; teach a man to fish and you feed him for a lifetime”. If you have access to online labs, such as that offered by Cisco through their scholarship, you still need to know how to create your own home labs to continue practicing and experimenting, which is what this course will help you to achieve. On the other hand, this course will prepare you to go through these online labs quickly, and with confidence, since you will be familiar with the tools used in them. And not just online labs, but any other hands on Cyber Ops courses, like what I intend to publish in the near future.This course will teach you how to use the following tools:Security Onion (Including VM installation, working with PCAP files, ELSA, Sguil. Squert, and Kibana).Wireshark.Kali Linux.Metasploit.Nmap.VirtualBox.GNS3.This course includes several practical assignments and a practice test, in order to asses your understanding of the material included. I strongly recommend that you try the assignments and answer the question included in them, after trying solving the task practically, or even after watching the solution video. Each assignment will give you thorough and comprehensive understanding of the related topic.I hope that you will join me in this course and start your Cyber security journey. Happy learning!

Overview

Section 1: Course Introduction & Overview

Lecture 1 Course Introduction & Overview

Section 2: Working with Security Onion and VirtualBox

Lecture 2 Downloads Links

Lecture 3 Introduction to Virtualization and VirtualBox

Lecture 4 Downloading and Installing VirtualBox

Lecture 5 Introduction to Security Onion

Lecture 6 Downloading the Security Onion ISO Image

Lecture 7 Creating and Configuring the Security Onion VM

Lecture 8 Installing The Security Onion Operating System

Lecture 9 Running The Security Onion Setup

Lecture 10 Updating Security Onion

Lecture 11 Installing Guest Additions

Lecture 12 Taking a Snapshot of the Security Onion VM

Section 3: Working with ELSA and PCAP files

Lecture 13 Using the tcpreplay Command

Lecture 14 Downloading More PCAP Files

Lecture 15 Introduction to ELSA

Lecture 16 Working with ELSA – Part 1 (Log Normalization)

Lecture 17 Working with ELSA – Part 2 (Log Summarization)

Lecture 18 Working with ELSA – Part 3 (Log Aggregation)

Section 4: Working with Sguil and Squert

Lecture 19 Introduction to Sguil and Squert

Lecture 20 Working with Sguil – Part 1

Lecture 21 Working with Sguil – Part 2 (Tools Pivoting)

Lecture 22 Working with Sguil – Part 3 (Events Categorization)

Lecture 23 Exploring Squert

Section 5: Working with Elastic Stack and Kibana

Lecture 24 Introduction to Elastic Stack and Kibana

Lecture 25 Using the So-import-pcap script

Lecture 26 Exploring Kibana

Section 6: Working with GNS3

Lecture 27 Introduction to GNS3

Lecture 28 Downloading & Installing GNS3

Lecture 29 Using the GNS3 Setup Wizard

Lecture 30 Importing the Security Onion VM into GNS3

Section 7: Working with Wireshark

Lecture 31 Introduction to Wireshark

Lecture 32 Downloading & Installing Wireshark

Lecture 33 Exploring the Wiresahrk GUI & Working with Capture Filters

Lecture 34 Working with Display Filters

Lecture 35 Working with Coloring Rules and Saving Captures

Lecture 36 Follow TCP Stream & Extracting Files

Section 8: Working with Kali Linux

Lecture 37 Introduction to Kali Linux

Lecture 38 Downloading & Installing Kali Linux

Lecture 39 Exploring Kali Linux

Lecture 40 Working with the Metasploitable VM

Section 9: Working with Nmap

Lecture 41 Introduction to Nmap

Lecture 42 Working with Nmap and Zenmap

Section 10: Working with Metasploit

Lecture 43 Introduction to the Metasploit Framework

Lecture 44 Working with the Metasploit Framework and Armitage

Section 11: Practice Test

Section 12: Bonus Lecture: More courses – Lowest Price

Lecture 45 Bonus Lecture: More courses – Lowest Price

CCNA Cyber ops students who want to learn how to build their home labs and use Cyber Security Ops tools for study and in production.

Buy Long-term Premium Accounts To Support Me & Max Speed


RAPIDGATOR
rapidgator.net/file/628f1f7ac30fafa9e67bf79d886bfdb7/Udemy_-_CCNA_Cyber_Ops_Tools_Sec_Onion_Wireshark_and_Kali_Linux.part1.rar.html
rapidgator.net/file/b79b3f7d1d002a7b2b40b4bf5cb65f99/Udemy_-_CCNA_Cyber_Ops_Tools_Sec_Onion_Wireshark_and_Kali_Linux.part2.rar.html
rapidgator.net/file/b7e4d31567d701ef0dbe2bb05a07becb/Udemy_-_CCNA_Cyber_Ops_Tools_Sec_Onion_Wireshark_and_Kali_Linux.part3.rar.html

1DL
1dl.net/zcbtivi30tvz/Udemy_-_CCNA_Cyber_Ops_Tools_Sec_Onion_Wireshark_and_Kali_Linux.part1.rar.html
1dl.net/mag9hrgcai1t/Udemy_-_CCNA_Cyber_Ops_Tools_Sec_Onion_Wireshark_and_Kali_Linux.part2.rar.html
1dl.net/hf40x6x2t8id/Udemy_-_CCNA_Cyber_Ops_Tools_Sec_Onion_Wireshark_and_Kali_Linux.part3.rar.html

If any links die or problem unrar, send request to goo.gl/aUHSZc

Leave a Comment

This site uses Akismet to reduce spam. Learn how your comment data is processed.