Technical requirements
This chapter was originally going to be a lab/exercise-heavy chapter that allowed you to explore various tools that can be used and deployed within the enterprise but still be accessible in the home lab. Well, the labs ended up creating a chapter that was over 200 pages in length and consisted of pictures and step-by-step instructions. This caused the editors to have a mild heart attack. All kidding aside, these labs are still a critical part of this chapter. With that in mind and understanding the need to have them available, Packt has made them available at the following GitHub link: https://github.com/PacktPublishing/Cybersecurity-Architects-Handbook.
The labs associated with this chapter include the following labs and exercises:
- Lab 1: Microsoft Threat Modeling Tool
- Lab 2: OWASP Threat Dragon
- Lab 3: Intrusion detection/prevention systems using Snort
- Lab 4: Firewall configuration using OPNsense
- Lab 5: SIEM solution using Graylog ...