Security Engineering
Free
This is where we develop your technical skills. You will learn popular security tools such as SPLUNK, Nessus and Wireshark.
Prior to this course, you should have your home lab set up and ready to go. You will need the to have the following virtual machines set up:
- Windows 10
- Linux (Debian/Kali)
For the best Experience in this course, you will need to have a computer where you can download software. We recommend you to have a computer that meet the following specifications:
- i5 CPU (i7 even better)
- 8GB RAM (12-16 even better)
- Solid State Drive
You can get away with lower specs but you risk computer freezing when you run multiple virtual machines… that can create a frustrating experience with your labs.
Course Features
- Lectures 29
- Quizzes 8
- Skill level All Beginner
- Language English
- Students 290
- Certificate No
- Assessments Self
-
Chapter 4
- SEC ENG – Introduction to Security Engineering
- SEC ENG – Introduction to SPLUNK
- SEC ENG – Intro to SPLUNK Quiz
- SEC ENG – Splunk Installation and Splunk App
- SEC ENG – Splunk Installation Quiz
- Chapter 4.8 Maping Your Lab Network
- 4.8 Lab
- SEC ENG – Install Splunk Forwarders Part 1
- 4.9 Lab
- SEC ENG – Install SPLUNK Forwarders Part 2
- 4.10 Lab
- Install SPLUNK Forwarders Part 3
- 4.11 lab
- Chapter 4.12 Searching with SPLUNK
- 4.12 Lab
- Chapter 4.13 Splunk Report and Dashboard
- 4.13 Lab
-
Chapter 5
- Chapter 5.1 Introduction to the OSI Model Using Real World Examples
- 5.1 Questions
- Chapter 5.2 Data Packets, 3 Way Handshake and ARP
- 5.2 Questions
- Chapter 5.3 Introduction to WireShark
- 5.3 Questions
- Chapter 5.4 Install Wireshark and start data capture
- 5.4 Lab
- Chapter 5.5 Wireshark Filters and Windows
- 5.5 Lab
- Chapter 5.6 TCP Close Connection, TCP Flags & Intrusion Detection
- 5.6 Questions
- Chapter 5.7 Isolating Wireshark Traffic and Saving Files
- 5.7 Lab
- Chapter 5.8 Wireshark Flags SSL traffic
- 5.8 Lab
- Chapter 5.9 Detecting Attacks with Wireshark Intro to Nmap
- 5.9 Questions
- Chapter 5.10 Identifying a Host Discovery Scan on Wireshark
- 5.10 Lab
- CHAPTER 5.11 IDENTIFYING A PORT SCAN ON WIRESHARK
- 5.11 Lab
- CHAPTER 5.12 IDENTIFYING AN PORT SCAN ON WIRESHARK PART 2
- 5.12 Lab
- CHAPTER 5.13 IDENTIFYING A SERVICE SCAN ON WIRESHARK.
- 5.13 lab
- Chapter 5.14 Identifying an Aggressive Scan on Wireshark
- 5.14 Lab
-
Chapter 6
- Chapter 6.1 Introduction to Nessus
- 6.1 Questions
- Chapter 6.2 Host Discovery Scan with Nessus
- 6.2 Lab
- Chapter 6.3 Host Discovery Scan with Nessus Part 2
- 6.3 Lab
- CHAPTER 6.4 BASIC NETWORK SCAN WITH NESSUS
- 6.4 Lab
- CHAPTER 6.5 Credential Network Scan with Nessus.
- 6.5 Lab
- CHAPTER 6.6 VULNERABILITY REPORT AND MANAGEMENT