Companies Home Search Profile

EVE-NG - How To Build Cyber Security and Networking Labs 2

Focused View

Vonnie Hudson

2:56:51

332 View
  • 1.1 Download EVE-NG Community Edition.html
  • 1. Upgrading EVE-NG Community to EVE-NG Pro.mp4
    05:21
  • 1. upgrading eve-ng community to eve-ng pro.mp4.zip
  • 2. Upgrading EVE-NG Community to EVE-NG Pro!.mp4
    08:23
  • 3.1 Buy EVE-NG Pro License.html
  • 3. How to QUICKLY get an EVE-NG Pro License.mp4
    05:53
  • 1.1 Download Windows Server 2022.html
  • 1.2 Running Windows Server in EVE-NG.html
  • 1. Windows Server 2022 Download + Import.mp4
    10:46
  • 2. Windows Server 2022 Install.mp4
    06:55
  • 3. Windows Server 2022 Snapshots in EVE-NG and VMWare Workstation.mp4
    05:50
  • 4.1 Download Kali Linux VM.html
  • 4. Kali Linux 2022 Download + Import.mp4
    06:14
  • 5. Kali Linux 2022 Conversion + Startup.mp4
    04:45
  • 6.1 pimpmykali.html
  • 6. Kali Linux 2022 Configuration.mp4
    06:32
  • 7. Kali Linux 2022 Snapshot.mp4
    02:52
  • 8.1 Windows 11.html
  • 8. Windows 11 Download + Import + Configuration + Startup.mp4
    10:44
  • 9.1 Windows 10.html
  • 9. Windows 10 Download + Import + Startup.mp4
    11:44
  • 10.1 Cisco VIRL Labs 2.0 Release.html
  • 10. Cisco IOSv Routers and Switches Download + Import + Startup.mp4
    08:17
  • 11.1 Palo Alto Networks PA-VM Trial.html
  • 11. Palo Alto Networks Firewall Requesting Access.mp4
    03:18
  • 12. Palo Alto Networks Firewall Import.mp4
    08:01
  • 13. Palo Alto Networks Firewall Startup + Configuration.mp4
    08:16
  • 1. Installing the IIS Server Role on Windows Server 2022.mp4
    06:36
  • 2. Installing OWASP Juice Shop on Windows Server 2022.mp4
    03:47
  • 3. Installing NodeJS on Windows Server 2022.mp4
    05:28
  • 4. Fixing OWASP Juice Shop! (Making it work).mp4
    07:36
  • 5. Important Note Before Beginning The Next Lecture.html
  • 6. Assembling the Pieces.mp4
    07:12
  • 7. Configuring Zones on the Palo Alto Networks Firewall.mp4
    02:16
  • 8. Configuring + Verifying Firewall Interface Configs.mp4
    05:39
  • 9. Configuring Destination NAT on the Palo Alto Networks Firewall.mp4
    04:46
  • 10. Setting the Security Policy on the Palo Alto Networks Firewall.mp4
    02:16
  • 11. Configuring OSPF in our Environment!!.mp4
    07:05
  • 1. Configuring Kali to Attack.mp4
    10:19
  • Description


    Learn how to build ADVANCED enterprise labs on your computer

    What You'll Learn?


    • How to use upgrade EVE-NG Community to Pro
    • The easiest method for Kali Linux setup in EVE-NG Pro
    • How to setup a Juice Shop VM in a Palo Alto DMZ with Destination NAT
    • How to setup Site-to-Site VPN with Palo Alto Firewall
    • How to setup OSPF on Cisco Routers
    • How to setup switched virtual interfaces (SVIs) and VLANs on Cisco Switches

    Who is this for?


  • Beginning SOC Analysts who want to level up their understanding of network attacks
  • Bug Bounty Hunters who want to know how modern web apps are compromised in Windows environments.
  • New Penetration Testers looking to tune their tradecraft
  • What You Need to Know?


  • EVE-NG Basic skills taught in the first version of this course.
  • Computer with 16GB of RAM minimum (32GB ideal)
  • EVE-NG Professional License (I show you how to do this in the course)
  • VMWare Workstation Pro (You can download the 30 day trial, works just as good)
  • More details


    Description

    You ever have the feeling that you sort of know what something is but... well not really?

    Like, you've read about it on blogs and books. 

    You've watched Youtube videos about it.

    You've heard your coworkers and vendors talk about it.

    It's all around you.  And you feel like everyone thinks you know it too...

    After all you should.. shouldn't you? But in the back of your mind you know you can play this acting game much longer.

    Acting like you know what you're talking about (when you really don't) and feeling a little guilty or insecure about it is known as Imposter Syndrome and my goal... my purpose... my MISSION in this course is to ERASE that feeling from you.

    You see.. this isn't just a course that you sit back and watch or stream on your phone while waiting in line to pick up your kid.

    No, this is a hands-on workshop, that if you follow, has the potential to completely change your life.

    I know that's a bold statement but I stand by it.

    This course will help you master the following topics:

    • What are routing protocols and why do we have them

    • OSPF Routing Protocol

    • Static Routes

    • Default Routes

    • Configuring and Verifying Routing on Cisco Routers

    • Configuring and Verifying Routing on Palo Alto Network's Firewalls

    • Understanding NAT

    • Understanding PAT (Port Address Translation)

    • Understanding Source NAT

    • Understanding Destination NAT

    • Configuring PAT on a Cisco Router

    • Configuring PAT on a Palo Alto Networks Firewall

    • Configuring Destination NAT on a Palo Alto Networks Firewall

    • What is a DMZ?

    • Configuring a DMZ on a Palo Alto Networks Firewall

    • Setting up a Windows Server 2022 IIS Web Server

    • Installing Extensions (URL Rewrite and more)

    • What is NodeJS?

    • Installing NodeJS on Windows Server 2022

    • Installing Logging (to monitor our attacks)

    • Installing a NodeJS Web App (OWASP Juice Shop) on Windows Server 2022 in a DMZ

    • What is VPN?

    • What is Site-to-Site VPN?

    • Installing Site-to-Site VPN on two Palo Alto Networks Firewalls

    • And much more!!

    This is TRULY the course I wish I had.  That's part of the reason I made this course.

    I made this course to give back and share the knowledge I've gained which I know will help you reach your goals.

    Are you ready to become awesome? Are you ready to say goodbye to Imposter Syndrome? Let's do this!

    -Vonnie
    (your friend and cyber coach)

    Who this course is for:

    • Beginning SOC Analysts who want to level up their understanding of network attacks
    • Bug Bounty Hunters who want to know how modern web apps are compromised in Windows environments.
    • New Penetration Testers looking to tune their tradecraft

    User Reviews
    Rating
    0
    0
    0
    0
    0
    average 0
    Total votes0
    Focused display
    Category
    Vonnie Hudson
    Vonnie Hudson
    Instructor's Courses
    I'll never forget the day I first got hacked. I was fooling around in an AOL chat room downloading little hacking programs called proggies and punters. I thought I was special, or leet as they call it, simply because I had a lowercase screenname which made me a bit mysterious since AOL didn't let ordinary people create lowercase names (called icases); my icase indicated that I knew how to "hack" the system. I also commanded a vast array of punters including Fate X, HaVok Platinum, Firetoolz and Area51. Punters were tiny programs that let you violate AOL's terms of service by booting innocent people off AOL. If someone made me mad I would just click a button and send them into oblivion. The victim would almost immediately be forced to logoff and go through the painful process of dialing-up and reconnecting.. These proggies also let you scroll text super fast which would prevent other people from chatting and force them to leave the room. Now that that I think about it, I was was probably at the apex of immaturity but I was barely in middle school and booting people offline was simply too much fun. But one day I met my match. I downloaded a program that was purportedly a new punter that had a bevy of features that my other tools lacked. Everything was fun in the beginning but after a few days weird things started happening to my computer. For example, my CD-ROM would randomly open on its own, my mouse cursor seemed to move without my input and strange programs would sometimes leap onto my screen and then instantly vanish. I was freaking out! It's really hard to describe just how scary this was. I had no idea what was happening but I had to find out. Apparently whoever, (or whatever) had seized control of my computer didn't make any effort to hide his or her antics. After a few weeks of complete frustration, a chat box popped on my screen from an unknown name. I was the guy who hacked me. He started to taunt me by saying things like "i got you" or "your password is 1234567" This is when I made it my mission to figure out as much as I could about this person and his methodology. After several interactions I learned he was using a remote access trojan called SubSeven. I quickly scoured the internet looking for this tool and once I found it I found my new love. That's how I got into cybersecurity and ethical hacking. I was hacked and wanted to learn how it happened. Unfortunately, back in middle school my motives weren't so pure and I used my new skills to hack other victims; however, after graduating from high school and with a little prodding by my dad to explore programming, I decided I wanted to major in Computer Science to do good in the world. Since then I've never looked back. So who am I? My name is Vonnie Hudson and I have over 13 years of hands-on experience maintaining, troubleshooting and repairing computer software and hardware. I actually started my career as a technical support analyst at a satellite internet company and eventually landed a job at IBM as a security engineer. From there I became the IT director of a large multimedia enterprise based in Time Square, New York. I'm currently a Senior CyberSecurity Analyst at a large D.C based firm and I regularly contribute to the information security community by attending information security conferences and webinars and sharing my knowledge on my blog and email list. My blog, fixedByVonnie, gets about half a million visitors per month. The articles span topics ranging from speeding up your browser to ethical hacking with Kali Linux. I'm also an author and have published a highly rated Windows 8.1/10 Kindle book on Amazon. And always being an avid learner myself, I hold numerous industry standard certifications in good standing including the A+, Network+, Security+, CCNA, CCNP, CISSP and GCIH. I have a lively Youtube channel, loyal Twitter following and a bunch of book and video ideas which I can't wait to implement. Thanks for reading my profile and checking out my videos - it's going to be a fun ride! I think my teaching style is a bit unique. I try to respect your time by quickly getting into the content but I also let my personality bleed into everything I do. My videos sometimes feel like you have your very own guru sitting next to you showing you step-by-step how to learn. I promise you that you'll not only get your solid fill of content from my videos but also take away few laughs alone the way. I can't wait to see you inside! Thanks again -Vonnie
    Students take courses primarily to improve job-related skills.Some courses generate credit toward technical certification. Udemy has made a special effort to attract corporate trainers seeking to create coursework for employees of their company.
    • language english
    • Training sessions 27
    • duration 2:56:51
    • English subtitles has
    • Release Date 2022/11/20