Building Virtual Machine Labs: A Hands-On Guide (Second Edition): Volume 2 (Black and White Print) (Building Virtual Machine Labs: A Hands-On Guide (Second Edition) - Black and White Print) by Tony Robinson

Building Virtual Machine Labs: A Hands-On Guide (Second Edition): Volume 2 (Black and White Print) (Building Virtual Machine Labs: A Hands-On Guide (Second Edition) - Black and White Print)

Tony Robinson
417 pages
Independently published
Sep 2021
Paperback
Computers & Internet WSBN
0
Readers
0
Reviews
0
Discussions
0
Quotes
Most Information Technology professionals agree that virtualization is vital, as it provides a safe and malleable work environment with which to learn and experiment. The only downside is that virtualization can be extremely daunting to learn, and even harder to set up with strong security controls. There is a plethora of knowledge on how to build home labs, but it can be difficult to find. The premise of this book is to provide students a hands-on, go-to resource for building a secure, customizable lab environment.Readers will choose one of five hypervisors for building their baseline lab environment, and will be guided through performing all of the necessary setup tasks. This allows students to become more familiar with virtualization technologies, gain mastery over their chosen hypervisor, and design a safe and secure virtual lab environment for further endeavors.The second edition of this work covers new technologies, and adds an additional 400 pages of guidance and extra content over the first edition.. Students should be aware that this is volume 2 of a two volume set, and that both volumes are required for the full experience. Volume 1 can be found here: https://www.amazon.com/Building-Virtual-Machine-Labs-Hands/dp/B09GXHNJFC. Volume II focuses on bringing students lab environments to full functionality, building upon the foundations of Volume I. Students will learn how to configure the pfSense firewall distribution to serve as the nerve center of their lab environment, enable remote access to their virtual machines, install either the Snort 3 or Suricata network intrusion detection software platforms, install Splunk as a log aggregation solution, and integrate it with either Snort 3 or Suricata, as well as extra content dedicated towards enhancing student's lab environments, and expanding them towards meeting their goals.. Volume II Contents:. Chapter 13: pfSense Firewall Policy and Network Services 600Chapter 14: Routing and Remote Access for Hosted Hypervisors 656Chapter 15: Routing and Remote Access for Bare-metal Hypervisors 754Chapter 16: Network Intrusion Detection 894Chapter 17: Setting up Splunk 909Chapter 18: End of the Beginning 949Chapter 19: Extra Credit 966.
Join the conversation

No discussions yet. Join BookLovers to start a discussion about this book!

No reviews yet. Join BookLovers to write the first review!

No quotes shared yet. Join BookLovers to share your favorite quotes!

Earn Points
Your voice matters. Every comment, review, and quote earns you reward points redeemable for Bitcoin.
Comment +5 pts Review +20 pts Quote +7 pts Upvote +1 pt
BookMatch Quiz
Find books similar to this one
About this book
Pages 417
Publisher Independently publis...
Published 2021
Readers 0