University of Cincinnati Logo
 

20-CS-6055 - Cyber Defense Overview
Electrical Engineering and Computer Science

Additional References
Tutorials
  • Metaspolit Unleashed (training course), Offensive Security, web link.
  • Armitage Tutorial, Strategic Cyber LLC, web link.
  • nmap Tutorial, nmap.org, web link.
  • Kali Linux Tutorials, kali tutorials, web link.
  • Security Onion Intrusion Detection setup, 20 minute video, web link.
  • Cyber Penetration Testing, Iron Geek, web link.
Security Onion Notes
  • If you are encountering a problem where all of your eth* devices get numbered at >=eth2, then try deleting the /etc/udev/rules.d/70-persistent-net.rules file, and rebooting.
ERC
MainStreet
Paul Erdos
NIT
Ladies on Campus
Oscar Robinson