As a cybersecurity professional, it is imperative that you establish a “laboratory” for you to practice your skills and test new vulnerabilities. Just as with any discipline, before you take your skills to the real world you need to practice, practice, and then practice some more. The time to learn a new tool or “try something out” isn’t during an engagement.
In this course, Building a CyberSecurity Lab Environment, you’ll learn how to create an environment that you can use to enhance your learning that is separate from your production network. If you’re be
First, you’ll explore reasons and motivation for creating this lab and the benefits you’ll gain by maintaining it.
Next, you’ll discover how to add several different target systems from the latest Windows platform to systems that are intentionally vulnerable. Having these targets will allow you to launch attacks, verify vulnerabilities, and conduct research projects without jeopardizing your production environment.
Finally, you’ll learn how to create your own “Attack Workstation” utilizing operating systems like Kali Linux.
When you’re finished with this course, you’ll have the skills, knowledge, and a platform needed to build a CyberSecurity Home Lab Environment.
Dale Meredith has been a Certified Ethical Hacker/Instructor EC-Council for the past 15 years, and Microsoft Certified Trainer for over 20 years. Dale also has an additional 7 years of senior IT management experience and worked as a CTO for a popular ISP provider. Dale's expertise is in explaining difficult concepts and ensuring his students have an actionable knowledge of the course material.
Course Overview Hi everyone. My name is Dale Meredith, and I want to welcome you to my course, Building a Cybersecurity Home Lab Environment. Now, this course is kind of a multifunctional one. And hey, it's also kind of fun. Why? Well, as a cybersecurity expert, I often get asked the question, Dale, how do I gain experience with the tools and techniques? Well, you have to practice, practice, practice, and this course is designed to help you set up your own hacking environment that you can use without jeopardizing your production network. Heck, I run this whole thing off my laptop, so my lab is portable as well. As a cyber security professional, it's imperative that you establish a laboratory for you to practice your skills and test new vulnerabilities. Just as with any discipline, before you take your skills to the real world, you need to practice. The time to learn a new tool or try something isn't during an engagement. In this course, Building a Cybersecurity Home Lab Environment, you'll learn how to create an environment that you will use to enhance your learning that is separate for your production network. First, you'll explore the reasons and motivations for creating this lab and the benefits that you'll gain by maintaining it. Then you'll discover how to add several different target systems from the latest Windows platform to other systems that are vulnerable by purpose. Having these targets will allow you to launch different attacks, verify vulnerabilities, and conduct research projects again without jeopardizing any production environments. Finally, you'll learn how to create your own attack workstation. We'll utilize operating systems like Kali Linux, but you could add your own version of any security platform that you want. Now, if you watch this course, you'll have a virtualized playground that you can use along with any of the Pluralsight security courses to expand your knowledge and skills. I hope you'll join me in learning and understanding the concepts of building a cybersecurity home lab environment here, at Pluralsight.