Question: Discussion : Before participating in this discussion, please complete your Week 2 Course Project Assignment. What hardware setup did you choose to use for your
Discussion :
Before participating in this discussion, please complete your Week Course Project Assignment.
What hardware setup did you choose to use for your Course Project?
Why did you choose that option?
Please make your initial post by midweek and respond to at least two other student's post by the end of the Week.
Week Written Assignment Attack and Penetration Techniques
Research attack and penetration techniques and answer the following questions in a page paper.
How does knowing the attack techniques make better IDS solutions?
What tools are used in corporate companies to validate IDS systems and security postures?
Be sure to use APA style and formatting guidelines.
Upload Assignment: Week Course Project Assignment Hardware Setup
INSTRUCTIONS
Decide on what hardware setup will fit best for your project
This decision is crucial as this will determine your success or failure. Your familiarity with VMs or access to real hardware will help you decide.
VMs allow you to run the entire project from one location, but network setups may be more difficult.
A real network and hardware give insight into the setup in a real world setting.
Decide whether to use BTR or Security Onion in a VM or create your own setup and installation of BT or SO on real hardware.
DownloadInstall Wireshark into your HOST OS
Submit screenshots of completed setup.
Step by Step Solution
There are 3 Steps involved in it
1 Expert Approved Answer
Step: 1 Unlock
Question Has Been Solved by an Expert!
Get step-by-step solutions from verified subject matter experts
Step: 2 Unlock
Step: 3 Unlock
