Installing the Kali Purple Linux Environment
So far, we’ve learned how the events of the world have shaped the evolution of cybersecurity concepts over time, resulting in the need for, and creation of, Kali Purple, along with other defensive security packages. We’ve had a taste of the ELK Stack, which serves as the core component of the SIEM, itself the core component of a SOC, with the SOC a core component of Kali Purple. What do you say we start assembling the very atmosphere we’ve been raving about? Let’s get our hands dirty!
In this chapter, we are going to prepare our personal technology to host and operate our very own instance of Kali Purple. While the sections we cover may seem random, they are presented to you in a purposeful and strategic order. It is highly recommended that you follow this order of operations to ensure the smoothest experience of prepping your technology. Rest assured that there is a method to our madness, and it will be described...