English | MP4 | AVC 1280×720 | AAC 44KHz 2ch | 31 Lessons (2h 51m) | 885 MB
Practice and enhance your Ethical Hacking and Defensive Security Skills!
Take your first step to building your very own cybersecurity lab and preparing for the future of cybersecurity. Building the Ultimate Cybersecurity Lab and Cyber Range is a vital resource for anyone serious about learning hands-on cyber skills. It is also an essential resource to study for a variety of cybersecurity certifications, including Certified Ethical Hacker (CEH), CompTIA PenTest+, CEH Practical, Offensive Security Certified Professional (OSCP), Cisco CCIE Security, or CCNP Security.
The course serves as a comprehensive guide for those beginning their journey in penetration testing, exploit development, or malware reverse engineering; it covers how to build yourown virtualized, physical, or cloud-based environment to practice your skills in a safe ecosystem.
Topics covered:
- How to create a lab for offensive and defensive cybersecurity concepts
- Learning and obtaining access to numerous tools that you can use to practice your skills, from virtual machines (VMs), Docker containers, and intentionally vulnerable systems
- Learning how you can leverage tools like Virtual Box, VMWare Workstation/Fusion, ESXi, Proxmox, or even OpenStack to build your own cyber range
- Learning how to create environments in cloud services such as AWS, Azure, Google Cloud, and Digital Ocean.
Learn How To:
- Build virtual, physical, or cloud-based cybersecurity lab.
- Use tools like Vagrant, Terraform, and Ansible to automate complex and repetitive tasks.
- Practice safe and refine a variety of offensive and defensive cybersecurity techniques.
- Get skillset to deploy and manage secure environments on various platforms and cloud services.
Table of Contents
Introduction
Building the Ultimate Cybersecurity Lab and Cyber Range Introduction
Lesson 1 Introduction to Cyber Ranges and Starting a Home Lab
Learning objectives
Introducing Cyber Ranges
Building a home lab and typical hardware requirements
Building a lab for ethical hacking, bug bounties, and penetration testing
Most common Linux distributions
Introducing WebSploit Labs
Building labs for incident response, threat hunting, and digital forensics
Lesson 2 Building Scalable Lab Infrastructures
Learning objectives
Building your own private cloud with OpenStack
Introducing Proxmox and deploying VMs and containers
Installing Proxmox featuring advanced deployments and clustering
Lesson 3 Surveying Lab Requirements for Wi-Fi and IoT Hacking
Learning objectives
Hardware requirements for wi-fi hacking
Hardware requirements for IoT hacking
Using Linux Kernel modules to build a wireless hacking lab without the need of physical adapters
Lesson 4 Building Your Lab in Cloud Environments
Learning objectives
Building a lab in AWS
Building an Active Directory hacking lab in Azure
Building your lab with AI and interacting with hundreds of APIs
Lesson 5 Automating Lab Deployments and Tasks
Learning objectives
Using Vagrant
Using Ansible
Using Terraform
Lesson 6 Building Labs for Malware Analysis
Learning objectives
Best practices when handling and detonating malware for analysis
Creating sandboxes for malware analysis
Lesson 7 Introducing Honeypots and Honeynets
Learning objectives
Comparing honeypots and honeynets
Building a honeypot and honeynets on-premises and in the cloud
Summary
Building the Ultimate Cybersecurity Lab and Cyber Range Summary
Resolve the captcha to access the links!