In this course,
First, you’ll explore reasons and motivation for creating this lab and the benefits you’ll gain by maintaining it.
Next, you’ll discover how to add several different target systems from the latest Windows platform to systems that are intentionally vulnerable. Having these targets will allow you to launch attacks, verify vulnerabilities, and conduct research projects without jeopardizing your production environment.
Finally, you’ll learn how to create your own “Attack Workstation” utilizing operating systems like Kali Linux. When you’re finished with this course, you’ll have the skills, knowledge, and a platform needed to build a CyberSecurity Home Lab Environment.