- Lab Requirements
- Creating Your Lab
- Self-Assessment
- Summary
Self-Assessment
I know this chapter has a lot of information to digest, and you must be tired by now. But, if you think about it, you just had a major tour across different cybersecurity areas and the opportunity to practice many things and learn many new technologies.
Since this chapter was created using the 30-day Azure subscription, it is important for you to use at least 20 days to do all scenarios and have 9 days spare to review exercises that you have identified as needing more attention.
After you finish implementing all scenarios, reviewing all concepts, and taking notes, use Table 3.2 to perform a self-assessment per scenario. Notice that the entries in the Completion and Observations columns for scenarios 1 and 2 are only examples. The rest of the table is blank, so you can write your own observations.
Table 3.2 Self-assessment per scenario
Scenario |
Completion |
Observations |
---|---|---|
Understand operating system processes and threads |
100 percent |
I feel comfortable with this topic. Still need to dig more to understand threads, but I have a good idea of how things work. |
Understanding the communication between two hosts in the same TCP/IP subnet |
90 percent |
I really liked this one. I feel like I can work all day long reading network packages. While I felt passionate about this topic, I still have a lot to learn because my background is not in computers. Need to do more computer network training. |
Cloud Security Posture Management |
|
|
Multicloud Security Posture Management |
|
|
Understanding regulatory and compliance standards |
|
|
Simulating and detecting attacks on Windows and Linux |
|
|
Implementing a cloud-based Security information and event management (SIEM) |
|
|
Threat hunting |
|
|
Gathering Threat Intelligence |
|
|
Understand operating system process and threads |
|
|
Understanding the communication between two hosts in the same TCP/IP subnet |
|
|
In Table 3.2, in the first two examples for the first two scenarios, the goal of the Completion column is to track how far you went on that scenario. Remember that while scenarios 1 and 2 are straightforward, others are more complex and will take longer. Ideally, you should finish everything, but you own your agenda, and if you don’t have time to finish everything, the only requirement is to be honest with yourself and take notes to document your level of completion.
Another important column in this table is the Observations. The examples provided for scenarios 1 and 2 are some of the things that you can add. I advise you to write down which scenarios you were more excited and passionate about. This is when you will discover what triggers and motivates you and what you believe would be a good investment of your time to learn more. These nine scenarios cover different areas of cybersecurity, from the very basic level to the most advanced. Being exposed to all these tools and guided labs during the 30-day trial is an excellent way to identify which area you would like to work in the future.