University of Cincinnati Logo

20-CS-6055 - Cyber Defense Overview
Electrical Engineering and Computer Science

Additional References
  • Metaspolit Unleashed (training course), Offensive Security, web link.
  • Armitage Tutorial, Strategic Cyber LLC, web link.
  • nmap Tutorial,, web link.
  • Kali Linux Tutorials, kali tutorials, web link.
  • Security Onion Intrusion Detection setup, 20 minute video, web link.
  • Cyber Penetration Testing, Iron Geek, web link.
Security Onion Notes
  • If you are encountering a problem where all of your eth* devices get numbered at >=eth2, then try deleting the /etc/udev/rules.d/70-persistent-net.rules file, and rebooting.
Paul Erdos
Ladies on Campus
Oscar Robinson