Part 1:Introduction, History, and Installation
In this part, you’ll gain an understanding of how we got to be where we are today in the realm of cybersecurity. You’ll get a very brief history of technology developing alongside threats as well as solutions to those threats, resulting in the need for the cybersecurity toolsets we have today.
You’ll learn how to isolate a portion of your device (on any operating system) by using virtualization, so that you can set up your own Kali Purple instance and then install and configure your very own miniature SIEM with the ELK stack.
This part has the following chapters:
- Chapter 1, An Introduction to Cybersecurity
- Chapter 2, Kali Linux and the ELK Stack
- Chapter 3, Installing the Kali Purple Linux Environment
- Chapter 4, Configuring the ELK Stack
- Chapter 5, Sending Data to the ELK Stack