1.1.1.4 Lab - Installing The CyberOps Workstation Virtual Machine
1.1.1.4 Lab - Installing The CyberOps Workstation Virtual Machine
Objectives
Part 1: Prepare a Personal Computer for Virtualization
Part 2: Import a Virtual Machine into VirtualBox Inventory
Background / Scenario
Computing power and resources have increased tremendously over the last 10 years. A benefit of having
multicore processors and large amounts of RAM is the ability to use virtualization. With virtualization, one or
more virtual computers operate inside one physical computer. Virtual computers that run within physical
computers are called virtual machines. Virtual machines are often called guests, and physical computers are
often called hosts. Anyone with a modern computer and operating system can run virtual machines.
A virtual machine image file has been created for you to install on your computer. In this lab, you will
download and import this image file using a desktop virtualization application, such as VirtualBox.
Required Resources
Computer with a minimum of 2 GB of RAM and 8 GB of free disk space
High speed Internet access to download Oracle VirtualBox and the virtual machine image file
Cisco and/or its affiliates. All rights reserved. Cisco Confidential Page 1 of 5 www.netacad.com
Lab - Installing the CyberOps Workstation Virtual Machine
Note: If your network is not configured with DHCP services, click Change Network Settings and select
NAT in the Attached to dropdown box. The network settings can also be access via Settings in the
Oracle VirtualBox Manager or in the virtual machine menu, select Devices > Network > Network
Settings. You may need to disable and enable the network adaptor for the change to take effect.
c. Click OK. A new window will appear, and the virtual machine boot process will start.
Cisco and/or its affiliates. All rights reserved. Cisco Confidential Page 2 of 5 www.netacad.com
Lab - Installing the CyberOps Workstation Virtual Machine
d. When the boot process is complete, the virtual machine will ask for a username and password. Use the
following credentials to log into the virtual machine:
Username: analyst
Password: cyberops
You will be presented with a desktop environment: there is a launcher bar at the bottom, icons on the
desktop, and an application menu at the top.
Note: The window running the virtual machine is a completely different computer than your host. Functions,
such as copy and paste, will not work between the two without special software tools installed. Notice the
keyboard and mouse focus. When you click inside the virtual machine window, your mouse and keyboard will
operate the guest operating system. Your host operating system will no longer detect keystrokes or mouse
movements. Press the right CTRL key to return keyboard and mouse focus to the host operating system.
Cisco and/or its affiliates. All rights reserved. Cisco Confidential Page 3 of 5 www.netacad.com
Lab - Installing the CyberOps Workstation Virtual Machine
Reflection
What are the advantages and disadvantages of using a virtual machine?
Advantages :
Dapat menggunakan beberapa operating system pada komputer yang sama.
Virtual machines dapat menyediakan Instruction Set Architecture atau biasa disebut ISA, struktur ini
berbeda dari komputer yang sebenarnya. ISA berfungsi sebagai interface antara software dan hardware.
Virtual machine dibuat dan disimpan dalam bentuk virtual hard disk. Jadi, ketika machine mengalami
crash, hal tersebut tidak akan berdampak pada host machine.
Virtual machine dapat digunakan sebagai mesin uji coba terhadap sebuah software. Misalkan kita ingin
menjalankan sebuah software untuk mengetahui keamanan terhadap software tersebut sebagai
perbandingan apakah software tersebut layak atau tidak untuk digunakan, Atau mungkin terdapat virus.
Disadvantages :
Memerlukan spesifikasi RAM yang tinggi, karena secara langsung kita menjalankan beberapa operating
system dalam waktu bersamaan.
Cisco and/or its affiliates. All rights reserved. Cisco Confidential Page 4 of 5 www.netacad.com
Lab - Installing the CyberOps Workstation Virtual Machine
Virtual machine kurang efisien dari pada real machines karena mereka mengakses hardware secara
tidak langsung. Menjalankan software diatas system operasi host berarti harus meminta akses ke
hardware dari host. Hal tersebut akan memperlambat kegunaan.
Ketika beberapa virtual machines berjalan pada host yang sama, kinerja dapat terhambat jika computer
yang dijalankannya tidak memiliki cukup daya. Karena virtual machine masih menggunakan sumber daya
dari host machine. Semakin kuat komputer host, semakin cepat mesin virtual akan berjalan.
Virtual machine dapat terinfeksi dengan kelemahan / bug yang terdapat pada mesin host.
Cisco and/or its affiliates. All rights reserved. Cisco Confidential Page 5 of 5 www.netacad.com