Hardware Equipment:

  1. Servers (at least 3)
  2. Routers (at least 3)
  3. Switches (at least 5)
  4. Workstations (at least 20)
  5. Firewalls (at least 2)
  6. Wireless access points (at least 2)
  7. Network cables (Cat6) and connectors
  8. Power extension cords
  9. Uninterrupted Power Supply (UPS) units
  10. Network storage devices (at least 2)
  11. Projectors
  12. Whiteboards
  13. Printers
  14. Scanners
  15. External hard drives

Software Equipment:

  1. Operating systems: Windows, Linux and Mac OS
  2. Virtualization software: VirtualBox, VMware, Hyper-V
  3. Network monitoring software: Wireshark, Nagios, PRTG Network Monitor
  4. Penetration testing tools: Metasploit, Nmap, Aircrack-ng
  5. Forensic tools: EnCase, FTK, Sleuth Kit
  6. Firewall software: ZoneAlarm, Comodo Firewall
  7. Antivirus software: Bitdefender, Kaspersky, Norton
  8. Encryption software: VeraCrypt, TrueCrypt
  9. Programming software: Python, Java, C++
  10. Database software: MySQL, Oracle, Microsoft SQL Server
  11. Collaboration software: Microsoft Office Suite, Google Docs, Slack
  12. Web application software: Apache, Tomcat, Node.js
  13. Backup and recovery software: Acronis True Image, Backup Exec

Note: The equipment list is not exhaustive and can be modified according to the specific needs of the program

You’re now assigned as the program Director of a bachelor in cyber security for the Hong Kong University of technology Your first mission is to provide an equipment list for the set up of cyber securi

原文地址: http://www.cveoy.top/t/topic/fyNf 著作权归作者所有。请勿转载和采集!

免费AI点我,无需注册和登录