Build Your Own Cybersecurity Lab and Cyber Range
Published by Pearson
Practice and Enhance Ethical Hacking and Defensive Security Skills
Numerous cybersecurity and penetration testing tools and techniques have the potential to damage or destroy the target system or the underlying network. In addition, if malware is used in testing, there is the potential for infection and spread if testing in an Internet-connected testbed. This class will teach how to build your own virtualized, physical, or cloud-based environment to practice your skills in a safe ecosystem.
You will learn what you need to create a lab for offensive and defensive cybersecurity concepts. You will also learn and obtain access to numerous tools that you can use to practice your skills, from virtual machines (VMs), Docker containers, and intentionally vulnerable systems. You will learn how you can leverage tools like Virtual Box, VMWare Workstation/Fusion, ESXi, Proxmox, or even OpenStack to build your own cyber range. In addition, you will also learn how to use tools like Vagrant and Ansible to automate a lot of tasks. Vagrant files, Terraform scripts, and Ansible playbooks will be shared during the class for you to build complex lab environments within minutes. You will also learn how to create environments in cloud services such as AWS, Azure, Google Cloud, and Digital Ocean.
This live and interactive training is designed to help you get started building different lab environments to practice cybersecurity skills. It is invaluable for individuals preparing for cybersecurity certifications such as Certified Ethical Hacker (CEH), CompTIA PenTest+, CEH Practical, Offensive Security Certified Professional (OSCP), Cisco CCIE Security, or CCNP Security. It also serves as a comprehensive guide for those beginning their journey in penetration testing, exploit development, or malware reverse engineering.
Let's enhance your skills and foster your passion for learning with our immersive, interactive training program. Start building your cybersecurity lab today and prepare for the future of cybersecurity.
What you’ll learn and how you can apply it
- You'll comprehend the practical steps and tools needed to set up a virtual, physical, or cloud-based cybersecurity lab, allowing you to practice and refine your skills in a secure, controlled environment.
- You'll understand how to utilize tools like Vagrant, Terraform, and Ansible for automating tasks, which will significantly streamline the setup and management of your lab environment, making it more efficient and less time-consuming.
- You'll gain an in-depth understanding of using various platforms, such as Virtual Box, VMWare Workstation/Fusion, ESXi, Proxmox, OpenStack, and cloud services like AWS, Azure, Google Cloud, and Digital Ocean to build versatile cybersecurity environments.
- You'll acquire an understanding of applying and practicing both offensive (penetration testing, exploit development) and defensive (malware reverse engineering) security techniques within your safe, self-created cybersecurity lab.
And you’ll be able to:
- You'll be capable of building your own virtual, physical, or cloud-based cybersecurity lab, effectively managing its functions, and ensuring its secure operation.
- Using tools like Vagrant, Terraform, and Ansible, you'll be able to automate complex and repetitive tasks, significantly reducing the time and effort required to set up and manage your lab environment.
- You'll be able to safely practice and refine a variety of offensive and defensive cybersecurity techniques, including penetration testing, exploit development, and malware reverse engineering within your safe lab environment.
- You'll have the skillset to deploy and manage secure environments on various platforms and cloud services like AWS, Azure, Google Cloud, and Digital Ocean, increasing your adaptability in the cybersecurity landscape.
This live event is for you because...
- You are interested in cybersecurity
- You are preparing for the cybersecurity certifications
- You want to learn about the different ways that you can practice your skills in a safe environment
- You want to learn different tips on how to create multiple
Prerequisites
- Course participants should have a basic understanding of computing and networking.
Course Set-up:
- Supplemental information and additional material for this course can be accessed at: https://h4cker.org/labs
Recommended Preparation:
- Explore: Omar Santos’s Ethical Hacking Playlist!
Recommended Follow-up:
- Watch: The Art of Hacking (Video Collection) by Omar Santos, Ron Taylor, Jon Sternstein and Chris McCoy
- Watch: Certified Ethical Hacker (CEH), 2nd Edition by Omar Santos, Nick Garner and William Bo Rothwell
- Watch: The Complete Cybersecurity Bootcamp, 2nd Edition by Omar Santos
Schedule
The time frames are only estimates and may vary according to how the class is progressing.
Section 1: Introduction to Cyber Ranges and Starting a Home Lab (50 minutes)
- Introducing Cyber Ranges
- Building a home lab and typical hardware requirements
- Building a lab for ethical hacking, bug bounties, and pentration testing
- Most common Linux distributions
- Introducing WebSploit Labs
- Building labs for incident response, threat hunting, and digital forensics
Break (10 minutes)
Section 2: Building Scalable Lab Infrastructures (30 minutes)
- Building your own private cloud with OpenStack
- Introducing Proxmox
- Installing Proxmox
- Deploying VMs in Proxmox
- Deploying Containers in Proxmox
- Advanced Deployments and Clustering
Section 3: Surveying Lab Requirements for Wi-Fi and IoT Hacking (20 minutes)
- Hardware requirements for Wi-Fi Hacking
- Hardware requirements for IoT Hacking
- Using Linux Kernel modules to build a wireless hacking lab without the need of physical adapters
Break (10 minutes)
Section 4: Building your lab in cloud environments (20 minutes)
- Building a lab in AWS
- Building an Active Directory Hacking Lab in Azure
- Building labs in Google Cloud
Section 5: Automating Lab Deployments and Tasks (30 minutes)
- Using Vagrant
- Using Ansible
- Using Terraform
- Custom scripts
Break (10 minutes)
Section 6: Building Labs for Malware Analysis (30 minutes)
Best practices when handling and detonating malware for analysis
Creating sandboxes for malware analysis
Section 7: Introducing Honeypots and Honeynets (20 minutes)
Comparing Honeypots and Honeynets
Building a Honeypots and Honeynets on-premises and in the Cloud
Q&A (10 minutes)
Your Instructor
Omar Santos
Omar Santos is a Distinguished Engineer at Cisco focusing on artificial intelligence (AI) security, research, incident response, and vulnerability disclosure. He is a board member of the OASIS Open standards organization and the founder of OpenEoX. Omar's collaborative efforts extend to numerous organizations, including the Forum of Incident Response and Security Teams (FIRST) and the Industry Consortium for Advancement of Security on the Internet (ICASI). Omar is the co-chair of the FIRST PSIRT Special Interest Group (SIG). Omar is the lead of the DEF CON Red Team Village and the chair of the Common Security Advisory Framework (CSAF) technical committee. Omar is the author of over 20 books, numerous video courses, and over 50 academic research papers. Omar is a renowned expert in ethical hacking, vulnerability research, incident response, and AI security. His dedication to cybersecurity has made a significant impact on technology standards, businesses, academic institutions, government agencies, and other entities striving to improve their cybersecurity programs.