Chapter 14. Training

Solutions in this chapter:

  • Setting Up Scanning Servers
  • Setting Up Target Servers
  • Creating the Capture-the-Flag Scenario
  • Out Brief
  • Cleaning Up Afterward
  • Saving Your Back
  • Summary
  • Solutions Fast Track
  • Frequently Asked Questions

Introduction

During my early years as a security professional I had a role in training other members of my team in penetration testing. Because of the nature of penetration testing, we had to go through special precautions to ensure that surrounding network environment would not be damaged by the students. In addition, because we were using it as a training environment we wanted to keep the systems that the students were using fairly standard. We didn't want them to have to install new operating systems, ...

Get Virtualization for Security now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.