Scheduled Tasks using Bash
In this lab, you’ll practice running several tasks related to security analysis and automating these tasks to run on a schedule. When you’re finished, you’ll have automated a security scanning and log centralization and analysis process..
Terms and conditions apply.
Getting Started in the Lab Environment
Here are the initial instructions and explanation of the lab environment. Read this while your environment is busy creating itself from nothing. Yes, this violates physics; we know. How fun!
Run the Security Scanning Service
In this lab, you will be using the security tool, Lynis, to scan various hosts for misconfigurations.
Consolidate and Centralize All Logs
In this challenge, you are going to pull logs from remote servers onto the bastion.
Analyze the Log Data for Specific Pieces of Information
In this challenge, you are going to search and filter for specific information in the logs.
Create a Scheduled Job to Automate the Process
In this challenge, you are going to automate and schedule the tasks you completed in the previous challenges.
The Last Challenge
Welcome to the final challenge! This is your last chance to experiment in the environment. Clicking Finish Lab will end this little world that flittered into existence just for you.
Provided environment for hands-on practice
We will provide the credentials and environment necessary for you to practice right within your browser.
Follow along with the author’s guided walkthrough and build something new in your provided environment!
Did you know?
On average, you retain 75% more of your learning if you get time for practice.
- Intermediate Linux
- Intermediate security principles
- Intermediate Bash
- Basic networking protocols