Question: Discussion : Before participating in this discussion, please complete your Week 2 Course Project Assignment. What hardware setup did you choose to use for your

Discussion :
Before participating in this discussion, please complete your Week 2 Course Project Assignment.
What hardware setup did you choose to use for your Course Project?
Why did you choose that option?
Please make your initial post by mid-week and respond to at least two other student's post by the end of the Week.
Week 02 Written Assignment - Attack and Penetration Techniques
Research attack and penetration techniques and answer the following questions in a (1-2) page paper.
How does knowing the attack techniques make better IDS solutions?
What tools are used in corporate companies to validate IDS systems and security postures?
Be sure to use APA style and formatting guidelines.
Upload Assignment: Week 02 Course Project Assignment - Hardware Set-up
INSTRUCTIONS
1. Decide on what hardware setup will fit best for your project
This decision is crucial as this will determine your success or failure. Your familiarity with VMs or access to real hardware will help you decide.
VMs allow you to run the entire project from one location, but network setups may be more difficult.
A real network and hardware give insight into the setup in a real world setting.
Decide whether to use BT5R3 or Security Onion in a VM or create your own setup and installation of BT5 or SO on real hardware.
Download/Install Wireshark into your HOST OS!
Submit screenshots of completed setup.

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Databases Questions!