CCNA Cyber Ops Tools Sec Onion Wireshark and Kali Linux

Build home labs for the Cisco CyberOps Associate Exam CBROPS 200-201 using Security Onion, Sguil, ELSA, Metasploit, Nmap
CCNA Cyber Ops Tools Sec Onion Wireshark and Kali Linux
File Size :
1.33 GB
Total length :
4h 21m

Category

Instructor

Bassam Alkaff • Remote Author @ INE

Language

Last update

11/2023

Ratings

4.9/5

CCNA Cyber Ops Tools Sec Onion Wireshark and Kali Linux

What you’ll learn

Very Similar to my INE Course: CCNA Cyber Ops Labs – Create Your Labs
Build CCNA Cyber Ops labs using different tools
Learn how to install and use Security Onion
Learn how to work with ELSA and PCAP files
Learn how to work with Sguil and Squert
Learn about Elastic Stack and Kibana
Learn how to install and use Wireshark
Learn how to install and use Kali Linux
Learn how to install and use VirtualBox
Learn how to install and use GNS3
Learn how to use Metasploit
Learn how to use Nmap
Practice test included
Practical assignments included to give you thorough and comprehensive understanding of the related topics and tools .
This course will be updated frequently. Lectures about theory concepts, tools’ usage, and practical labs will be added to the course gradually.

CCNA Cyber Ops Tools Sec Onion Wireshark and Kali Linux

Requirements

Basic Knowledge of TCP/IP.
Basic Knowledge of Cyber Security concepts.
Network+ or CCENT/ICND1 level knowledge is recommended, but not required.

Description

*** Very Similar to my INE Course: CCNA Cyber Ops Labs – Create Your Labs ***Note: This course will be updated frequently. Lectures about theory concepts, tools’ usage, and practical labs will be added to the course graduallyIt is estimated that there will be about 1.5 million unfilled jobs in cyber security by the year 2020. A more recent statistic increased this number for cyber security unfilled jobs to be 3.5 million by the year 2021. In addition, recent article highlights Cisco Systems intention to become a cyber security force. For these reasons, Cisco created the CCNA Cyber Ops certification, which can become one of the most certifications in demand in the near future. Furthermore, Cisco created a scholarship program for this certification, which emphasis its importance. In this course you will learn about the tools that you can use for your study of the CCNA Cyber Ops certification and the current Cisco CyberOps Associate certification. Learning the theory side is important, but the hands on side is more important, since the main purpose of your study is to apply your knowledge in production, and since your hands on will enforce your theory knowledge. You can not teach someone how to drive a car by showing him or her how to do it, but you have to let him try and practice how to do that. Furthermore, showing you hands on labs and how to use tools without teaching you how to create these labs and install these tools, might not give you the ultimate benefit from your study . For this reason, I have created this course to teach you how to create your own home labs, and to understand the core usage and important features of the tools used in them. I believe in the saying: “Give a man a fish and you feed him for a day; teach a man to fish and you feed him for a lifetime”. If you have access to online labs, such as that offered by Cisco through their scholarship, you still need to know how to create your own home labs to continue practicing and experimenting, which is what this course will help you to achieve. On the other hand, this course will prepare you to go through these online labs quickly, and with confidence, since you will be familiar with the tools used in them.  And not just online labs, but any other hands on Cyber Ops courses, like what I intend to publish in the near future.This course will teach you how to use the following tools:Security Onion (Including VM installation, working with PCAP files, ELSA, Sguil. Squert, and Kibana).Wireshark.Kali Linux.Metasploit.Nmap.VirtualBox.GNS3.This course includes several practical assignments and a practice test, in order to asses your understanding of the material included. I strongly recommend that you try the assignments and answer the question included in them, after trying solving the task practically, or even after watching the solution video. Each assignment will give you thorough and comprehensive understanding of the related topic.I hope that you will join me in this course and start your Cyber security journey. Happy learning!Very Important: How to use this courseBased on students’ feedback, you can view this course by going directly to the section you are interested in. However, it is recommended that you at least skim quickly over the other preceding sections.For example, you can go to the ELSA and Sguil sections (the core of the course) directly if you are already familiar with VirtualBox and the Security Onion installation process, or skim quickly over those sections as a review.

Overview

Section 1: Course Introduction & Overview

Lecture 1 Course Introduction & Overview

Lecture 2 Very Important: How to use this course

Section 2: Working with Security Onion and VirtualBox

Lecture 3 Downloads Links

Lecture 4 Introduction to Virtualization and VirtualBox

Lecture 5 Downloading and Installing VirtualBox

Lecture 6 Introduction to Security Onion

Lecture 7 Downloading the Security Onion ISO Image

Lecture 8 Creating and Configuring the Security Onion VM

Lecture 9 Installing The Security Onion Operating System

Lecture 10 Running The Security Onion Setup

Lecture 11 Updating Security Onion

Lecture 12 Installing Guest Additions

Lecture 13 Taking a Snapshot of the Security Onion VM

Section 3: Working with ELSA and PCAP files

Lecture 14 Using the tcpreplay Command

Lecture 15 Downloading More PCAP Files

Lecture 16 Introduction to ELSA

Lecture 17 Working with ELSA – Part 1 (Log Normalization)

Lecture 18 Working with ELSA – Part 2 (Log Summarization)

Lecture 19 Working with ELSA – Part 3 (Log Aggregation)

Section 4: Working with Sguil and Squert

Lecture 20 Introduction to Sguil and Squert

Lecture 21 Working with Sguil – Part 1

Lecture 22 Working with Sguil – Part 2 (Tools Pivoting)

Lecture 23 Working with Sguil – Part 3 (Events Categorization)

Lecture 24 Exploring Squert

Section 5: Working with Elastic Stack and Kibana

Lecture 25 Introduction to Elastic Stack and Kibana

Lecture 26 Using the So-import-pcap script

Lecture 27 Exploring Kibana

Section 6: Working with GNS3

Lecture 28 Introduction to GNS3

Lecture 29 Downloading & Installing GNS3

Lecture 30 Using the GNS3 Setup Wizard

Lecture 31 Importing the Security Onion VM into GNS3

Section 7: Working with Wireshark

Lecture 32 Introduction to Wireshark

Lecture 33 Downloading & Installing Wireshark

Lecture 34 Exploring the Wiresahrk GUI & Working with Capture Filters

Lecture 35 Working with Display Filters

Lecture 36 Working with Coloring Rules and Saving Captures

Lecture 37 Follow TCP Stream & Extracting Files

Section 8: Working with Kali Linux

Lecture 38 Introduction to Kali Linux

Lecture 39 Downloading & Installing Kali Linux

Lecture 40 Exploring Kali Linux

Lecture 41 Working with the Metasploitable VM

Section 9: Working with Nmap

Lecture 42 Introduction to Nmap

Lecture 43 Working with Nmap and Zenmap

Section 10: Working with Metasploit

Lecture 44 Introduction to the Metasploit Framework

Lecture 45 Working with the Metasploit Framework and Armitage

Section 11: Theory Concepts

Lecture 46 The Cyber Kill Chain Model

Section 12: Practice Test

Section 13: Bonus Lecture: More courses – Lowest Price

Lecture 47 Bonus Lecture: More courses – Lowest Price

CCNA Cyber ops students who want to learn how to build their home labs and use Cyber Security Ops tools for study and in production.

Course Information:

Udemy | English | 4h 21m | 1.33 GB
Created by: Bassam Alkaff • Remote Author @ INE

You Can See More Courses in the IT & Software >> Greetings from CourseDown.com

New Courses

Scroll to Top