Companies Home Search Profile

EVE-NG - How To Build Cyber Security and Networking Labs

Focused View

Vonnie Hudson

3:07:43

17 View
  • 1.1 EVE-NG.html
  • 1. What is EVE-NG (And why is it so awesome).mp4
    07:02
  • 2.1 VMWare Workstation Pro.html
  • 2. Download + Install VMWare Workstation Pro.mp4
    03:11
  • 3.1 Download EVE-NG.html
  • 3. Download + Install EVE-NG Community OVF.mp4
    08:13
  • 4. Configuring EVE-NG Community!.mp4
    03:26
  • 5.1 EVE-NG Windows Client.html
  • 5. Download + Install EVE-NG Windows Client Pack.mp4
    03:34
  • 6.1 WinSCP.html
  • 6. Download + Install WinSCP.mp4
    08:42
  • 1. The EVE-NG Web GUI.mp4
    10:59
  • 2. Understanding how EVE-NG networking relates to VMWare Workstation.mp4
    06:13
  • 1.1 A Quick and Important EVE-NG Note.txt
  • 1.2 EVE-NG Qemu Image Naming Format.html
  • 1.3 EVE-NG Supported Images.html
  • 1. Understanding EVE-NG Qemu Image Naming.mp4
    10:30
  • 2. Windows 11 Pro.mp4
    07:39
  • 3.1 EVE-NG Flat Icons.html
  • 3. Configuring Beautiful Replacements for the EVE-NG Icons.mp4
    03:50
  • 4.1 Windows 10 Pro.html
  • 4. Windows 10 Pro.mp4
    09:46
  • 5.1 Windows Server 2022.html
  • 5. Windows Server 2022.mp4
    08:24
  • 6.1 Kali Linux.html
  • 6. Kali.mp4
    08:02
  • 7.1 Cisco Modeling Labs (CML).html
  • 7.2 Cisco VIRL Images.html
  • 7.3 EVE-NG Cisco Routers + Switches.html
  • 7. Cisco Routers + Switches.mp4
    13:20
  • 8.1 Palo Alto Networks PA-VM.html
  • 8. Palo Alto Networks Firewall.mp4
    08:10
  • 9.1 OWASP Juice Shop.html
  • 9.2 Ubuntu 20.html
  • 9. OWASP Juice Shop.mp4
    08:07
  • 1. Designing our Network.mp4
    07:32
  • 2. Configuring our Network.mp4
    13:00
  • 3. Static Destination NAT Configuration.mp4
    04:20
  • 4. Testing our Network.mp4
    14:35
  • 5. Installing Juice Shop.mp4
    19:08
  • Description


    Learn how to build Enterprise Grade Labs on your Laptop

    What You'll Learn?


    • The quick and painless process to setting up EVE-NG
    • How to finally understand EVE-NG networking and VMWare Workstation Pro
    • How to upload appliance images into EVE-NG
    • How to break free from imposter syndrome by building real labs and getting hands-on skills!

    Who is this for?


  • Anyone who always feels intimidated by EVE-NG thinking there is a lot of setup.
  • Anyone studying for the Cisco CCNA, Cisco CCNP, CompTIA Network+ or CompTIA Security+ exams.
  • Anyone who has tried to use GNS3 to build home networking labs and is looking for something better
  • What You Need to Know?


  • Laptop with at least 8GB RAM
  • 40GB HDD minimum
  • Intel i5 or i7 CPU
  • Internet Connection
  • More details


    Description

    I know the feeling.

    You get hired into a position that's a little bit out of your league... and every day feels like a panic.

    You can feel the acid churning in your stomach.

    You can feel your mouth getting dry, palms getting sweaty and heart starting to race.

    It's called imposter syndrome and I've been there!  I still remember the first day I was hired on as a Senior Penetration Tester at a large consulting firm in the Washington D.C area.  I was the lead but I basically got the job on a few YouTube videos, inside connections and a killer resume. 

    Yeah, I had some experience but not the kind required for the role - and man I seriously felt like one day my boss, my colleagues, my wife - everyone would find out I was a poser.

    I honestly had no idea what I was doing so everyday was acting day.

    Well guess what???

    I'm NOT going to let this happen to you.

    I couldn't sleep for weeks! And trust me I'm a pretty good sleeper but after landing the job I was terrified.

    I honestly wish I had a course like this when I was just getting into cyber security, information technology and studying for my CCNA, CCNP and Network+ certifications.

    The purpose of this course is focused and simple:

    By the end of the course you will know how to build a enterprise grade network lab with REAL networking gear inside a virtual environment you can take with you anywhere on your laptop.

    Yes, you'll need a beefy laptop (mine has 32GB of RAM but 16GB will work).  But even if you don't have the hardware specs this course is a great "just incase" course to have in your library because I'm giving you everything you need to build complex lab scenarios.  Everything is one place.  I haven't held back anything.

    You're getting step-by-step video walkthroughs from an expert with over 15 years of experience in Information Technology, Virtualization and Cyber Security. 

    If you've ever wanted an environment to play, experiment, learn and train - without those annoying cloud costs and complexity - you are in the right place.

    This course is for you.

    Move over GNS3 - EVE-NG is in charge!

    See you inside :)

    Who this course is for:

    • Anyone who always feels intimidated by EVE-NG thinking there is a lot of setup.
    • Anyone studying for the Cisco CCNA, Cisco CCNP, CompTIA Network+ or CompTIA Security+ exams.
    • Anyone who has tried to use GNS3 to build home networking labs and is looking for something better

    User Reviews
    Rating
    0
    0
    0
    0
    0
    average 0
    Total votes0
    Focused display
    Vonnie Hudson
    Vonnie Hudson
    Instructor's Courses
    I'll never forget the day I first got hacked. I was fooling around in an AOL chat room downloading little hacking programs called proggies and punters. I thought I was special, or leet as they call it, simply because I had a lowercase screenname which made me a bit mysterious since AOL didn't let ordinary people create lowercase names (called icases); my icase indicated that I knew how to "hack" the system. I also commanded a vast array of punters including Fate X, HaVok Platinum, Firetoolz and Area51. Punters were tiny programs that let you violate AOL's terms of service by booting innocent people off AOL. If someone made me mad I would just click a button and send them into oblivion. The victim would almost immediately be forced to logoff and go through the painful process of dialing-up and reconnecting.. These proggies also let you scroll text super fast which would prevent other people from chatting and force them to leave the room. Now that that I think about it, I was was probably at the apex of immaturity but I was barely in middle school and booting people offline was simply too much fun. But one day I met my match. I downloaded a program that was purportedly a new punter that had a bevy of features that my other tools lacked. Everything was fun in the beginning but after a few days weird things started happening to my computer. For example, my CD-ROM would randomly open on its own, my mouse cursor seemed to move without my input and strange programs would sometimes leap onto my screen and then instantly vanish. I was freaking out! It's really hard to describe just how scary this was. I had no idea what was happening but I had to find out. Apparently whoever, (or whatever) had seized control of my computer didn't make any effort to hide his or her antics. After a few weeks of complete frustration, a chat box popped on my screen from an unknown name. I was the guy who hacked me. He started to taunt me by saying things like "i got you" or "your password is 1234567" This is when I made it my mission to figure out as much as I could about this person and his methodology. After several interactions I learned he was using a remote access trojan called SubSeven. I quickly scoured the internet looking for this tool and once I found it I found my new love. That's how I got into cybersecurity and ethical hacking. I was hacked and wanted to learn how it happened. Unfortunately, back in middle school my motives weren't so pure and I used my new skills to hack other victims; however, after graduating from high school and with a little prodding by my dad to explore programming, I decided I wanted to major in Computer Science to do good in the world. Since then I've never looked back. So who am I? My name is Vonnie Hudson and I have over 13 years of hands-on experience maintaining, troubleshooting and repairing computer software and hardware. I actually started my career as a technical support analyst at a satellite internet company and eventually landed a job at IBM as a security engineer. From there I became the IT director of a large multimedia enterprise based in Time Square, New York. I'm currently a Senior CyberSecurity Analyst at a large D.C based firm and I regularly contribute to the information security community by attending information security conferences and webinars and sharing my knowledge on my blog and email list. My blog, fixedByVonnie, gets about half a million visitors per month. The articles span topics ranging from speeding up your browser to ethical hacking with Kali Linux. I'm also an author and have published a highly rated Windows 8.1/10 Kindle book on Amazon. And always being an avid learner myself, I hold numerous industry standard certifications in good standing including the A+, Network+, Security+, CCNA, CCNP, CISSP and GCIH. I have a lively Youtube channel, loyal Twitter following and a bunch of book and video ideas which I can't wait to implement. Thanks for reading my profile and checking out my videos - it's going to be a fun ride! I think my teaching style is a bit unique. I try to respect your time by quickly getting into the content but I also let my personality bleed into everything I do. My videos sometimes feel like you have your very own guru sitting next to you showing you step-by-step how to learn. I promise you that you'll not only get your solid fill of content from my videos but also take away few laughs alone the way. I can't wait to see you inside! Thanks again -Vonnie
    Students take courses primarily to improve job-related skills.Some courses generate credit toward technical certification. Udemy has made a special effort to attract corporate trainers seeking to create coursework for employees of their company.
    • language english
    • Training sessions 22
    • duration 3:07:43
    • English subtitles has
    • Release Date 2024/03/11

    Courses related to Cyber Security

    Courses related to Network Security