Building a Cybersecurity Home Lab Environment
Offered By: Pluralsight
Course Description
Overview
This course will teach you how to set up a hacking lab environment for all your security research, hacking tools, and training you've always wanted to do.
As a cybersecurity professional, it is imperative that you establish a “laboratory” for you to practice your skills and test new vulnerabilities. Just as with any discipline, before you take your skills to the real world you need to practice, practice, and then practice some more. The time to learn a new tool or “try something out” isn’t during an engagement. In this course, Building a CyberSecurity Lab Environment, you’ll learn how to create an environment that you can use to enhance your learning that is separate from your production network. If you’re be First, you’ll explore reasons and motivation for creating this lab and the benefits you’ll gain by maintaining it. Next, you’ll discover how to add several different target systems from the latest Windows platform to systems that are intentionally vulnerable. Having these targets will allow you to launch attacks, verify vulnerabilities, and conduct research projects without jeopardizing your production environment. Finally, you’ll learn how to create your own “Attack Workstation” utilizing operating systems like Kali Linux. When you’re finished with this course, you’ll have the skills, knowledge, and a platform needed to build a CyberSecurity Home Lab Environment.
As a cybersecurity professional, it is imperative that you establish a “laboratory” for you to practice your skills and test new vulnerabilities. Just as with any discipline, before you take your skills to the real world you need to practice, practice, and then practice some more. The time to learn a new tool or “try something out” isn’t during an engagement. In this course, Building a CyberSecurity Lab Environment, you’ll learn how to create an environment that you can use to enhance your learning that is separate from your production network. If you’re be First, you’ll explore reasons and motivation for creating this lab and the benefits you’ll gain by maintaining it. Next, you’ll discover how to add several different target systems from the latest Windows platform to systems that are intentionally vulnerable. Having these targets will allow you to launch attacks, verify vulnerabilities, and conduct research projects without jeopardizing your production environment. Finally, you’ll learn how to create your own “Attack Workstation” utilizing operating systems like Kali Linux. When you’re finished with this course, you’ll have the skills, knowledge, and a platform needed to build a CyberSecurity Home Lab Environment.
Syllabus
- Course Overview 2mins
- Setting up a Lab Environment 34mins
- Setting up a Lab: Adding Targets (Servers) 71mins
- Setting up a Lab: Adding Your Security Workstation 12mins
Taught by
Dale Meredith
Related Courses
Hacking and PatchingUniversity of Colorado System via Coursera Injection SQL Avec Kali
Coursera Project Network via Coursera CompTIA PenTest+ (PT0-001): 5 Selecting Pen Testing Tools
LinkedIn Learning Kali Linux on Windows 10 First Look
LinkedIn Learning Learning Kali Linux
LinkedIn Learning