Home > Articles

Building Your Lab

This chapter is from the book

Summary

This chapter taught you how to create your cybersecurity lab based on nine scenarios. You learned about operating systems processes and threads, basic network communication, cloud security posture management, multicloud security, regulatory compliance, attack simulation, SIEM, threat hunting, and threat intelligence. In the next chapter, you will learn the importance of networking in the cybersecurity field, how to stay connected with the community, and how to leverage LinkedIn.

InformIT Promotional Mailings & Special Offers

I would like to receive exclusive offers and hear about products from InformIT and its family of brands. I can unsubscribe at any time.