You are on page 1of 1

1.1.1.

4 Lab Installing the CyberOps Workstation Virtual Machine


● VirtualBox (5.2.42)
https://www.virtualbox.org/wiki/Download_Old_Builds_5_2
Pilih sesuai OS masing-masing
● cyberops_workstation.ova
http://static-course-assets.s3.amazonaws.com/CyberOps/cyberops_workstation.ova

2.0.1.2 Class Activity - Identify Running Processes


2.1.2.10 Lab - Exploring Processes, Threads, Handles, and Windows Registry
● Windows Sysinternals Suite
https://technet.microsoft.com/en-us/sysinternals/bb842062.aspx

7.0.1.2 Class Activity - What's Going On


● TCPView
http://technet.microsoft.com/en-us/sysinternals/tcpview.aspx

7.3.1.6 Lab - Exploring DNS Traffic


● Wireshark
https://www.wireshark.org/#download
Pilih sesuai OS masing-masing

11.3.1.1 Setup a Multi-VM Environment


● kali_linux.ova
http://static-course-assets.s3.amazonaws.com/CyberOps/kali_linux.ova
● metasploitable.ova
http://static-course-assets.s3.amazonaws.com/CyberOps/metasploitable.ova
● security_onion.ova
http://static-course-assets.s3.amazonaws.com/CyberOps/security_onion.ova

12.4.1.1 Alternative Lab - Interpret HTTP and DNS Data to Isolate Threat Actor
12.4.1.2 Alternative Lab - Isolate Compromised Host Using 5-Tuple
Untuk PC dengan RAM 4GB​ disarankan menggunakan alternative lab
● Alternate Security Onion VM
http://static-course-assets.s3.amazonaws.com/CyberOps/SecurityOnion_%5bALT%5d.o
va

You might also like