So You Want To Be a SOC Analyst? With Eric Capuano
Вставка
- Опубліковано 22 бер 2023
- Do you want to be a SOC Analyst? 💪
Want to know EXACTLY how to
💥Build an amazing home lab
💥How to use that lab
💥See what SOC analyst work looks like
Then join us for this exclusive, special event where Simply Cyber welcomes Eric Capuano, former Air Force and 20+ year Cybersecurity defender (aka Master SOC Analyst)
We will walk through a detailed video of step by step soc analyst home lab building, and Eric will answer the WHY you are doing it.
He's also live to take your QA,
You won't want to miss this!!
💙 Eric SOC Analyst Lab Blog: blog.ecapuano.com/p/so-you-wa...
📲 Connect with me on socials Linktr.ee/SimplyCyber - Розваги
I have had the opportunity to meet Eric in person and learn a lot from him in only a brief discussion at Texas Cyber Summit in Austin '23. It was a brilliant conversation.
💙
I missed the live but greatful to both of you!!
Thanks for the fantastic video. Some incredible information ive taken away from this. As someone who has just passed my Google IT Support course and is really interested in the Cyber Security course next and then the Blue Team level 1 cert after, this is incredible content for me to start using now with my studies so I'll be ready for interviews hopefully in the near future!
Very Informative. Thank you sir.
Ha that's right on point for me w/ Eric mentioning using Ubuntu for folks like me w/ only an 8 year old laptop to use.
This is so insightful and practical approach. A big thanks to Eric and Gerald. Looking forward to the series
Got finished finally with Part 1. Lets of "gifts" for me LOL. Learned so much tho, thanks to you both!
I just got my security+ and very excited to focus on finding a job full time and diving into the labs. So happy I found this channel! I will forsure be ready when it comes time for my interview. Glad you are focusing on SOC stuff!
Congratulations, I am trying to get in motion to follow right behind u. As I'm left with no other options at this point. Been on the losing end of a very hefty targeted cyber attack, bank accounts back to back hacked, constant targeted spear phishing, amongst other things I'll leave offline, I still kinda dont know where to start, but what I have acquired so far is self taught. And it has been hell trying to do anything to gain more knowledge as expected. Nobody is gonna come save anybody so with that understood, I'll hold true to my values morals and principles, and defend myself on and offline. Much respect to all
Love it , very useful information
Less than 13 min into the video and am already learning a lot more than other videos/blogs about setting up VMs. Really appreciate the explanations and considerations when it comes to making decisions regarding VMs.
Eric is a wealth of information and a genuine treasure.
Finished Part one on a M1 Mac I used Ubuntu on M1 an Windows on Azure Virtual Machines. I will still continue to tugg at a way to do it on a M1 just to push the bar. As someone new to Cybersecurity I wish the best of luck for everybody attempting this
I watched Eric video from 4 yrs ago and now this one...the grey hair is a sign...lol Serious though this man is awesome and at 50 im just starting out but i hope to one day work in a SOC under someone like him. The open SoC training aspect to help improve employees is the kind of thing i love because everyone wins in the end.
He’s epic!
The grey hair is definitely a sign 😆 Thanks for the kind words 💙
Going to try it anyway and see what happens
Got stuck deploying or installing the sensor command in Limacharlie. Was using powershell not cmd w admin rights. To start The sensor command ,,, taking my time and learning allot !!!
Sorry had to edit to make it more clear. Now I want my liked ❤. Back lol 😆.
#Teamblue #Teamreplay - very informative video; thanks Gerald!
Thank god I found this video
I want to purchase VMware Workstation Pro, but I do not understand why they have the option to buy the Pro for $199 or upgrade Pro for $99. kinda confuse
is this the rolling meme (respectfully) of robin tryin to say he has a "masters in cyber security" and batman slapping the k9 poo poo out of him saying "WE WANT REAL WORLD EXPERIENCE"
This is actually alil more refreshing to hear. And is much appreciated. Ill def be taking the advice giving here with full respect, enjoy yalls weekend fellas
But would it be honest of me to say on my CV / resume that "I wrote automated response rules" when actually i copy n pasted John Capuano's response rules? Put me on the spot and I probably wouldn't know how to write a rule by myself.
I know I wonder about that too lol
Word is as "I implemented automated response rules"
Why is it that when I run "ps -T" when connected to the session it crashes and gives me a stack overflow?
Part 2, step 6 when trying to change directory's i keep getting not a directory? any reason?
and when I try to make that dir using mkdir it says its already a directory lol
Would using Windows Sandbox be an option for using as a victim box?
As long as you can network between attacker and victim and victim can network to Lima Charlie SaaS should be ok
I've noticed that the SOC lab was built using VMware on the windows operating system. Can you use VMware on Linux to do the same thing? Has anyone done it?
Edit: I spoke too soon. It works just fine!
I have a mac M1 and just wanted to know if this lab is possible to do with my system? Can I use parallels for mac and run vmware inside it? Appreciate the video
Im not sure if it’s possible. If you can get the VMs both running and can configure the networking to work, then I don’t see why not.
I have an M1 as well and came across issues when trying to set up a different lab (the Windows AD environment for TCM's PEH course and/or the Windows lab for TCM's Windows Forensics course; the latter may be related to not being able to get Burp Suite on the Kali VM running on UTM virtual machine due to an issue with Java). All that to say I'm looking to see if I can run all of these labs on a 2018 Mac Mini, which seem to be available with 16Gb+ RAM and 256+ HDs for a decent price. I haven't pulled the plug though as this is very recent venture, and I haven't confirmed compatibility between the Mac Mini and the labs. I built the PEH AD lab on the Azure cloud, but it's costing me $50 a month to sit there doing nothing.
anyone else stuck on Part 2 task 3? Im able to generate --http [linux_VM_IP] --save /opt/sliver. but after I exit im not able to cd into /opt/sliver even though it says "File exists" when I try to mkdir /opt/server. Also when typing command "locate /opt/sliver" i am able to find it. just not able to cd into it and it doesnt appear to generate payload onto /opt/sliver
YES im having the same issue. Where you able to find out what was causing this?
@@dre8231 Yes. I wish i can explain why or how we got this issue. But I will try to explain what I saw him do. So for whatever reason when we did step 10 on part 1 "mkdir -p /opt/sliver" its suppose to create a directory instead it created an .exe so he had to create a directory and moved the executable in the folder. Hope this helps
@@jaybell0819 ahhhh yes this makes sense. Thanks for the help/reply back!
@Dre were you able to fix? Lets get through this all the way to part 4
I have a bachelors in cybersecurity, Security+ cert, and working on my az-900 right now. Anybody know why I cant find a job other than not having much experience?
Your resume
do you live near a big city?
Can we have the discord link?
Not sure which discord we mention but simply cyber discord is simplycyber.io/discord
at the 41:49 timemark on the dispaly is shows step 7 the ssh user@{linux_VM_IP} that is me using my host windows not the widows victim machine correct? i ask because wen i SSH it times out....
Yes host vm so you can effectively do the things you need to do on the Linux box easier
@@SimplyCyber ok it just tells me connection timed out