Information Technology
Hands on Training icon
Hands On Training
Hands on Training icon

Build Your Own Cybersecurity Lab and Cyber Range

Course Cover
compare button icon
Course Report - Build Your Own Cybersecurity Lab and Cyber Range

Course Report

Find detailed report of this course which helps you make an informed decision on its relevance to your learning needs. Find out the course's popularity among Careervira users and the job roles that would find the course relevant for their upskilling here. You can also find how this course compares against similar courses and much more in the course report.

Course Features

icon

Duration

1 day

icon

Delivery Method

Online

icon

Available on

Limited Access

icon

Accessibility

Desktop, Laptop

icon

Language

English

icon

Subtitles

English

icon

Level

Intermediate

icon

Teaching Type

Instructor Paced

icon

Video Content

4 hours

Course Description

Many cybersecurity and penetration testing techniques and tools have the potential of causing damage to the target system and underlying network. If malware is used during testing, it is possible for infection and spread through testing in an Internet-connected environment. This class will show you how to create your own cloud-based, virtualized, or physical environment for practicing your skills in a safe environment.

This course will teach you how to set up a lab that demonstrates offensive and defensive cybersecurity concepts. Access to many tools, including virtual machines, Docker containers and intentionally vulnerable systems, will be available to you. To build your cyber range, you will be able to use tools such as Virtual Box, VMWare Workstation/Fusion and ESXi. You will also learn how Vagrant, Ansible and other tools can be used to automate many tasks. You will have the opportunity to create complex lab environments in minutes using Ansible playbooks and Vagrant files. Learn how to set up cloud services like AWS, Azure and Google Cloud.

This course is for anyone who wants to become a Certified Ethical Hacker, CompTIA PenTest+ or CEH Practical, Offensive Security Certified Professional, (OSCP), Cisco CCIE Security or CCNP Security. This course is designed for those who are just starting to learn how to do penetration testing (ethical hackers), exploit development or reverse engineer malware.

This interactive, live training will help you create different lab environments for practicing cybersecurity skills. This training is essential for anyone who wants to get certified in cybersecurity or just for those who are passionate about learning new skills.

Course Overview

projects-img

Live Class

projects-img

Human Interaction

projects-img

Personlized Teaching

projects-img

International Faculty

projects-img

Case Based Learning

projects-img

Post Course Interactions

projects-img

Case Studies,Instructor-Moderated Discussions

Skills You Will Gain

Prerequisites/Requirements

Course participants should have a basic understanding of computing and networking.

What You Will Learn

Tips on how to build a virtualized environment

Cybersecurity tools that are essential for many certifications in the industry

Getting started with vulnerable targets and malware analysis

Docker containers that include intentionally vulnerable applications along with several labs that you can complete in your own time

Automated tools to instantiate new offensive and defensive cybersecurity lab environments

Tips on how to build your lab in a cloud environment

Tips on how to segment your network and use sandboxes to analyze malware

Course Instructors

Omar Santos

Instructor

Omar Santos is an active member of the cybersecurity community, where he leads several industry-wide initiatives. He is the lead of the DEF CON Red Team Village; the chair of the Common Security Advi...
Course Cover