Description
In this course, you will :
- Learn how to set up an environment separate from your production network that you can use to enhance your learning.
- Investigate the reasons and motivations for establishing this lab, as well as the advantages of maintaining it.
- Learn how to add several different target systems from the latest Windows platform to intentionally vulnerable systems.
- Learn how to set up your own "Attack Workstation" with operating systems such as Kali Linux.
- After completing this course, you will have the skills, knowledge, and platform required to create a CyberSecurity Home Lab Environment.
Syllabus :
1. Setting up a Lab Environment
- Understanding What You're Trying to Do
- The Requirements
- Setting up the Host Machine Using Hyper-V
- Setting up the Host Machine Using VMware
- Configuring the Virtual Network
- Setting up the Host Machine Using VirtualBox
2. Setting up a Lab: Adding Targets (Servers)
- Understanding What You're Trying to Do (Important Info)
- Gather the Resources
- Continuing to Gather the Resources
- Installing Server 2016
- Configuring Server 2016
- Installing Server 2019
- Configuring Server 2019 Target
- Installing and Configuring Windows 10
- Installing OWASP BWA
- Installing Metasploitable2
3. Setting up a Lab: Adding Your Security Workstation
- Understanding What You're Trying to Do (Important Info)
- Gathering Resources
- Installing Kali