Mostrar el registro sencillo del ítem

dc.contributorNetwork, Information and Computer Security (NICS) Laben_US
dc.contributor.authorNieto Jiménez, Ana
dc.contributor.authorLópez-Muñoz, Francisco Javier 
dc.contributor.otherLenguajes y Ciencias de la Computaciónen_US
dc.date.accessioned2019-12-04T10:07:18Z
dc.date.available2019-12-04T10:07:18Z
dc.date.created2019
dc.date.issued2019-12-04
dc.identifier.urihttps://hdl.handle.net/10630/18975
dc.descriptionThis guide is only a small part of the security content that can be learned during the "Master's Degree in Computer Engineering" - Cybersecurity Degree. The guide is used by the students as reinforcement during practical classes, but there is much more content that is not found in the guide. Indeed, the student has access to the virtual machine resulting from the steps in the guide (including all the scripts and networks configured for GNS3), so these steps are only used if the student wants to set up their own environment at home. Moreover, vulnerability analyses are very dependent on the living system. The student learns how to use Metasploit and other pentesting tools during the course, although this is not included in deep in the guide. This guide is only a first step towards cybersecurity training.en_US
dc.description.abstractThe objective of this guide is to provide useful information for the deployment of a virtual laboratory using GNS3 with the aim of testing security features. In this guide GNS3 is used together with other tools for training in network security. It is possible to install all these tools in a single virtual machine. In addition, the virtual machine must have nested virtualisation enabled in order to run inside other virtual machines (e.g. Kali Linux).en_US
dc.language.isoengen_US
dc.relation.ispartofDiseño y Configuración de Sistemas Seguros en Red / Design and Configuration of Secure Network Systemsen_US
dc.rightsinfo:eu-repo/semantics/openAccessen_US
dc.rights.urihttp://creativecommons.org/licenses/by-nc-nd/4.0/*
dc.subjectSeguridad informáticaen_US
dc.subject.otherSecurityen_US
dc.subject.otherGns3en_US
dc.subject.otherPentestingen_US
dc.subject.otherVulnerability analysisen_US
dc.subject.otherHoneypotsen_US
dc.subject.otherIdsen_US
dc.titleGNS3 for Security Practitionersen_US
dc.typeinfo:eu-repo/semantics/otheren_US
dc.centroE.T.S.I. Informáticaen_US
dc.rights.ccAttribution-NonCommercial-NoDerivatives 4.0 Internacional*


Ficheros en el ítem

Este ítem aparece en la(s) siguiente(s) colección(ones)

Mostrar el registro sencillo del ítem

Attribution-NonCommercial-NoDerivatives 4.0 Internacional
Excepto si se señala otra cosa, la licencia del ítem se describe como Attribution-NonCommercial-NoDerivatives 4.0 Internacional