Scheduled Tasks using Bash
In this lab, you’ll practice running several tasks related to security analysis and automating these tasks to run on a schedule. When you’re finished, you’ll have automated a security scanning and log centralization and analysis process..
Terms and conditions apply.
Lab info
Lab author
Challenge
Getting Started in the Lab Environment
Here are the initial instructions and explanation of the lab environment. Read this while your environment is busy creating itself from nothing. Yes, this violates physics; we know. How fun!
Challenge
Run the Security Scanning Service
In this lab, you will be using the security tool, Lynis, to scan various hosts for misconfigurations.
Challenge
Consolidate and Centralize All Logs
In this challenge, you are going to pull logs from remote servers onto the bastion.
Challenge
Analyze the Log Data for Specific Pieces of Information
In this challenge, you are going to search and filter for specific information in the logs.
Challenge
Create a Scheduled Job to Automate the Process
In this challenge, you are going to automate and schedule the tasks you completed in the previous challenges.
Challenge
The Last Challenge
Welcome to the final challenge! This is your last chance to experiment in the environment. Clicking Finish Lab will end this little world that flittered into existence just for you.
Provided environment for hands-on practice
We will provide the credentials and environment necessary for you to practice right within your browser.
Guided walkthrough
Follow along with the author’s guided walkthrough and build something new in your provided environment!
Did you know?
On average, you retain 75% more of your learning if you get time for practice.
Recommended prerequisites
- Intermediate Linux
- Intermediate security principles
- Intermediate Bash
- Basic networking protocols