Chapter 14. Training
Solutions in this chapter:
- Setting Up Scanning Servers
- Setting Up Target Servers
- Creating the Capture-the-Flag Scenario
- Out Brief
- Cleaning Up Afterward
- Saving Your Back
- Summary
- Solutions Fast Track
- Frequently Asked Questions
Introduction
During my early years as a security professional I had a role in training other members of my team in penetration testing. Because of the nature of penetration testing, we had to go through special precautions to ensure that surrounding network environment would not be damaged by the students. In addition, because we were using it as a training environment we wanted to keep the systems that the students were using fairly standard. We didn't want them to have to install new operating systems, ...
Get Virtualization for Security now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.