Cybersecurity Lab Setup for Hong Kong University of Technology: Equipment List
Cybersecurity Lab Setup for Hong Kong University of Technology: Equipment List
This comprehensive equipment list is designed to establish a state-of-the-art cybersecurity laboratory at Hong Kong University of Technology, providing students with hands-on training in critical areas such as network analysis, penetration testing, and more. This lab will serve as a foundation for a comprehensive four-year bachelor's degree in cybersecurity.
Hardware:
-
Desktop Computers: Minimum 25 units with Intel Core i7 processor, 16GB RAM, 1TB HDD and 256GB SSD storage, and 2GB Nvidia graphics card.
Brand and model recommendation: Dell Optiplex 7070 Micro. -
Servers: Minimum 2 units with Intel Xeon processor, 32GB RAM, 10TB HDD storage, and 4 1Gbps network interface cards.
Brand and model recommendation: HP ProLiant DL380 Gen10. -
Network Devices: Minimum 5 units of network switches with gigabit ports, VLAN support, and PoE capabilities.
Brand and model recommendation: Cisco Catalyst 2960X-48FPD-L. -
Network Security Devices: Minimum 2 units of firewall devices with IPS/IDS capabilities, VPN support, and advanced threat protection.
Brand and model recommendation: Fortinet FortiGate 200E. -
Wireless Access Points: Minimum 5 units with support for 802.11ac Wave 2, MU-MIMO technology, and WPA3 security.
Brand and model recommendation: Aruba Instant On AP11. -
Raspberry Pi: Minimum 10 units for IoT and embedded system security training.
Brand and model recommendation: Raspberry Pi 4 Model B. -
External Hard Drives: Minimum 5 units with 2TB storage for backup and data recovery training.
Brand and model recommendation: Seagate Expansion Desktop.
Software:
- Operating System: Windows 10 Pro and Kali Linux for desktop computers.
- Virtualization Software: VMware Workstation Pro and VirtualBox for virtual machine setup.
- Network Monitoring Software: Wireshark and SolarWinds Network Performance Monitor.
- Penetration Testing Software: Metasploit, Nmap, Burp Suite, and John the Ripper.
- Firewall Software: pfSense and FortiGate VM.
- Encryption Software: VeraCrypt and GnuPG.
- Incident Response Software: Splunk Enterprise and Snort.
Brand and model recommendation: Please refer to the official documentation of each software for system requirements and compatibility.
This equipment list is designed to provide students with a comprehensive and hands-on learning experience in cybersecurity. The equipment list is subject to change based on the evolving industry requirements and technology advancements.
原文地址: https://www.cveoy.top/t/topic/oiB0 著作权归作者所有。请勿转载和采集!