Funny choices in some ways ... Splunk is a data management tool not specific to security. Nothing was included for host-based vulnerability detection (which can catch a lot of stuff not known to network scans). Nothing on automating software updates. Nothing on backup and recovery. Nothing on improved access control approaching POLA. Nothing on reverse engineering (or is there some of that in Metasploit?). Nothing on filtering mail and web (except if Snort covers some of that?). I think it would have been better to outline some security roles first and then list the tools helpful in each role.
Funny choices in some ways ...
Splunk is a data management tool not specific to security.
Nothing was included for host-based vulnerability detection (which can catch a lot of stuff not known to network scans). Nothing on automating software updates. Nothing on backup and recovery. Nothing on improved access control approaching POLA. Nothing on reverse engineering (or is there some of that in Metasploit?). Nothing on filtering mail and web (except if Snort covers some of that?).
I think it would have been better to outline some security roles first and then list the tools helpful in each role.
Run Kali Linux as a virtual machine on top of virtualbox
That's what I do