Active Directory Project (Home Lab) | Part 5

preview_player
Показать описание
Get some hands on experience with The Active Directory Project (Home Lab) and the best part? It's FREE!

🚀 In this video, I'll guide you through the steps of setting up an Active Directory (home lab) that includes Splunk, Kali Linux & Atomic Red Team. Explore how a domain environment works, learn how to ingest events to a SIEM and generate telemetry related to attacks seen in the wild to help you detect them in the future. If you are new to cybersecurity or IT, you don't want to miss out on this project.

Atomic Red Team Powershell Command:
Install-AtomicRedTeam -getAtomics

#activedirectory #activedirectoryproject #homelab
_________________________________
SIGN UP FOR FREE MENTORSHIP

Getting started in Cybersecurity is difficult and you don't have to do it alone.
Let me help you on your journey.

_________________________________
RECOMMEND COURSES FOR BEGINNERS:

Coursera Google Cybersecurity Program

Microsoft Cybersecurity Analyst Professional Certificate

Coursera Google IT Support Professional Certificate
_________________________________
PRODUCTS TO HELP YOU GET STARTED
_________________________________
EARLY ACCESS & EXCLUSIVE VIDEOS
_________________________________
🕒 TIMELINE
00:00 - Intro
00:18 - Objective
01:00 - Kali
06:40 - Enable RDP
07:48 - Brute force tool usage
09:47 - Splunk
12:08 - Installing ART
_________________________________
FOLLOW ME ON SOCIAL MEDIA:

Disclaimer: All opinions in my videos are solely my own. Some links provided are affiliate links!

#cybersecurity #cybersecuritytrainingforbeginners #cybersecurityforbeginners #socanalyst #soc
Комментарии
Автор

Just finished the lab! I just wanted to say thank you for doing this! I had so much fun following along! I learned a lot and felt like I got better with the commandline and powershell! Learned more about AD than any other channel previously! The configuration of splunk was so seamless I cannot wait to play around with it even and keep sending logs to it to investigate and hopefully eventually be able to identify malware and create solid detection rules around them! Cannot wait to go over it again a second time around and document the whole process! This is the project I had been looking for and came just in the nick of time cheers, mate!

cvpherhackr
Автор

I signed up for the course; this project was fantastic, thank you. I'm current pursuing course work into both Azure and Splunk, so this will be a great fit for my resume/cv once I'm done with it.

Korrath
Автор

All 5 steps are working! Really appreciate your time in doing this training!

PhannaPH
Автор

I just finished this lab! Amazing! I loved it. I am a beginner. I only have my ISC2 CC and am working towards my Security+. I am changing careers from a Medical Technologist of 10+ years to hopefully, and eventually a SOC analyst. Your explanations are very thorough and I successfully set up the server with Splunk UF and Sysmon on my own! This is the second lab I followed from your content and it worked with no hiccups! Thank you again! This project is going on my resume & website!

roulagarcia
Автор

Just finished the lab, it was very stresful but in a good way as it was the first lab where I got out of my comfort zone and did a large project. Blessing to you for making this <3

savagesurf
Автор

This was really awesome! Thank you so much for all the hard work you put into making this series! I made it to the end and am very excited I have a better understanding of AD. You're a lifesaver! Thank you again 👍

gaminginasmr
Автор

I made it to the finish line!!!!..I took it a step further and installed proxmox on an old desktop I had and even made a pfsense firewall vm to act as my dhcp server and seperate the lab from my home LAN :D :D...I did that then began your walkthrough. Gonna definitely check out your course now!

abroadstateofmind
Автор

Successfully replicated the lab environment, gaining valuable insights and boosting my confidence.

asminbhujel
Автор

Youre the best bro, I gained sm valuable knowledge and skills throughout this lab. Ive completed many guided labs/projects and you're by far the most helpful when it comes to detailed explanation and troubleshooting. Thank you for all that you do, I cant wait for your course to come out so I can sign up for that as well.

KambezJ
Автор

At the end of the series i truely belief I got some hand on experience. I want to express my gratitude to you Sir for this amazing project . Your step by step explanation makes it easy to understand. However I found the atomic red teams hard to understand and I wish you could explain more about it.
Thank you :)

waraexpresso
Автор

Heck yes! Thank you so much for this whole series, it has truly been enlightening. I look forward to utilizing this whole setup for more projects.

bryanwoodward
Автор

Hey I finished everything and wanted to say thank you for the amazing walkthrough. I did get stuck at some points, but I problem solved and figured it out. Going to add this project to my resume

ftgljared
Автор

Great Project! I was able to learn a lot throughout this whole lab and explanations were very detailed as I had no trouble following through and was able to complete it all. Thank you!! Looking forward to more!

singhisking
Автор

Yeahh, the last part of the project, after completing it I can explore it overall. 🤩🤩🤩🤩

Aksubs
Автор

Excellent content. Your efforts creating this lab is greatly appreciated

Joe-ndmi
Автор

That's Awesome! Quality content. We are very fortunate to have you ❤

pankajg
Автор

sir, thanks for your great teaching i have successfully completed with you. i have encountered many problems but learned alot. eagerly waiting for your course pleaes love form pakistan

fixprob
Автор

This is amazing! Changing life type of content

cyberjuss
Автор

great teacher and great content as usual

sohailtariq
Автор

This is an awesome Lab I plan on exploring even more and teaching myself how to search with Splunk. I do have a question, however: I entered the following into the Splunk search field "index=endpoint tsmith" and it gave no results. However when I entered "index=endpoint Account_Name=tsmith EventCode=4625" then I got my 22 results. Does this mean I have something misconfigured? Also, could you make a video on how to add it to a resume? Thank again!! Great Lab! Especially with SPLUNK!

rickbaird