You have been chatting with fellow cybersecurity students on their efforts to learn cybersecurity by getting hands-on training. You have discovered that some students have built their own home labs and you want to try your hand at doing this as well. You have a budget of $500, an eBay account, and an Amazon account.   Your goal for your lab is to have two servers, a switch, and a firewall. You also need software, some of which is free outright (like Linux), and some of which is free for evaluation purposes. Remember, virtualization technology will help you run more than one OS on a given hardware platform. Based on the above requirements, use 2-4 paragraphs to design and document the lab you will build, complete with the following details:  ●Hardware used, along with details like RAM and hard drive space ●Software downloaded and installed ●VMs created ●IP addressing scheme ●Attack machine details (e.g. Kali, Parrot, Black Arch)●Firewall type ●Network traffic monitoring setup ●Log traffic setup ●Switch configuration, including any VLANs ●Wireless access details (optional)

icon
Related questions
Question

You have been chatting with fellow cybersecurity students on their efforts to learn cybersecurity by getting hands-on training. You have discovered that some students have built their own home labs and you want to try your hand at doing this as well. You have a budget of $500, an eBay account, and an Amazon account.   Your goal for your lab is to have two servers, a switch, and a firewall. You also need software, some of which is free outright (like Linux), and some of which is free for evaluation purposes. Remember, virtualization technology will help you run more than one OS on a given hardware platform.

Based on the above requirements, use 2-4 paragraphs to design and document the lab you will build, complete with the following details:  ●Hardware used, along with details like RAM and hard drive space ●Software downloaded and installed ●VMs created ●IP addressing scheme ●Attack machine details (e.g. Kali, Parrot, Black Arch)●Firewall type ●Network traffic monitoring setup ●Log traffic setup ●Switch configuration, including any VLANs ●Wireless access details (optional) 

 

Expert Solution
trending now

Trending now

This is a popular solution!

steps

Step by step

Solved in 5 steps

Blurred answer