Network Topology

Virtual Home Lab for Blue Team Security – Network Topology – Section 2

This is the second part of my Virtual Home Lab for Blue Team Security tutorial. If you would like to review the pervious introduction section of this blog series, please click here. Introduction In the previous section of this blog series, I reviewed the hardware recommendations for the implementation of this virtual home lab environment. …

Virtual Home Lab

Virtual Home Lab Foundations for Blue Team Security – An Introduction – Section 1

Introduction This series of blog posts will provide an overview of the creation, management, and utilization of a virtual security home lab environment. The home lab at its completion will involve a firewall, a Security Information and Event Management (SIEM) tool, an Intrusion Prevention System (IPS), a Honeypot, network segmentation, malware analysis tools, and more. …

Basic Nmap Commands and Scanning Techniques

Introduction to Nmap Nmap, short for Network Mapper, is an open-source tool that is used for network scanning and security auditing. It is a widely used tool that is considered to be essential by many cybersecurity professionals, network administrators, and ethical hackers. The primary purpose of Nmap is to discover hosts and services on a …