Cybersecurity Lab Setup for Hong Kong University of Technology: Equipment List

This comprehensive equipment list is designed to establish a state-of-the-art cybersecurity laboratory at Hong Kong University of Technology, providing students with hands-on training in critical areas such as network analysis, penetration testing, and more. This lab will serve as a foundation for a comprehensive four-year bachelor's degree in cybersecurity.

Hardware:

  1. Desktop Computers: Minimum 25 units with Intel Core i7 processor, 16GB RAM, 1TB HDD and 256GB SSD storage, and 2GB Nvidia graphics card.
    Brand and model recommendation: Dell Optiplex 7070 Micro.

  2. Servers: Minimum 2 units with Intel Xeon processor, 32GB RAM, 10TB HDD storage, and 4 1Gbps network interface cards.
    Brand and model recommendation: HP ProLiant DL380 Gen10.

  3. Network Devices: Minimum 5 units of network switches with gigabit ports, VLAN support, and PoE capabilities.
    Brand and model recommendation: Cisco Catalyst 2960X-48FPD-L.

  4. Network Security Devices: Minimum 2 units of firewall devices with IPS/IDS capabilities, VPN support, and advanced threat protection.
    Brand and model recommendation: Fortinet FortiGate 200E.

  5. Wireless Access Points: Minimum 5 units with support for 802.11ac Wave 2, MU-MIMO technology, and WPA3 security.
    Brand and model recommendation: Aruba Instant On AP11.

  6. Raspberry Pi: Minimum 10 units for IoT and embedded system security training.
    Brand and model recommendation: Raspberry Pi 4 Model B.

  7. External Hard Drives: Minimum 5 units with 2TB storage for backup and data recovery training.
    Brand and model recommendation: Seagate Expansion Desktop.

Software:

  1. Operating System: Windows 10 Pro and Kali Linux for desktop computers.
  2. Virtualization Software: VMware Workstation Pro and VirtualBox for virtual machine setup.
  3. Network Monitoring Software: Wireshark and SolarWinds Network Performance Monitor.
  4. Penetration Testing Software: Metasploit, Nmap, Burp Suite, and John the Ripper.
  5. Firewall Software: pfSense and FortiGate VM.
  6. Encryption Software: VeraCrypt and GnuPG.
  7. Incident Response Software: Splunk Enterprise and Snort.

Brand and model recommendation: Please refer to the official documentation of each software for system requirements and compatibility.

This equipment list is designed to provide students with a comprehensive and hands-on learning experience in cybersecurity. The equipment list is subject to change based on the evolving industry requirements and technology advancements.

Cybersecurity Lab Setup for Hong Kong University of Technology: Equipment List

原文地址: https://www.cveoy.top/t/topic/oiB0 著作权归作者所有。请勿转载和采集!

免费AI点我,无需注册和登录