Featured resource
2026 Tech Forecast
2026 Tech Forecast

Stay ahead of what’s next in tech with predictions from 1,500+ business leaders, insiders, and Pluralsight Authors.

Get these insights
  • Course

Building a Cybersecurity Home Lab Environment

This course will teach you how to set up a hacking lab environment for all your security research, hacking tools, and training you've always wanted to do.

Intermediate
2h 2m
(68)

Created by Dale Meredith

Last Updated Jul 31, 2025

Course Thumbnail
  • Course

Building a Cybersecurity Home Lab Environment

This course will teach you how to set up a hacking lab environment for all your security research, hacking tools, and training you've always wanted to do.

Intermediate
2h 2m
(68)

Created by Dale Meredith

Last Updated Jul 31, 2025

Get started today

Access this course and other top-rated tech content with one of our business plans.

Try this course for free

Access this course and other top-rated tech content with one of our individual plans.

This course is included in the libraries shown below:

  • Security
What you'll learn

As a cybersecurity professional, it is imperative that you establish a “laboratory” for you to practice your skills and test new vulnerabilities. Just as with any discipline, before you take your skills to the real world you need to practice, practice, and then practice some more. The time to learn a new tool or “try something out” isn’t during an engagement.

In this course, Building a CyberSecurity Lab Environment, you’ll learn how to create an environment that you can use to enhance your learning that is separate from your production network. If you’re be

First, you’ll explore reasons and motivation for creating this lab and the benefits you’ll gain by maintaining it.

Next, you’ll discover how to add several different target systems from the latest Windows platform to systems that are intentionally vulnerable. Having these targets will allow you to launch attacks, verify vulnerabilities, and conduct research projects without jeopardizing your production environment.

Finally, you’ll learn how to create your own “Attack Workstation” utilizing operating systems like Kali Linux.

When you’re finished with this course, you’ll have the skills, knowledge, and a platform needed to build a CyberSecurity Home Lab Environment.

Building a Cybersecurity Home Lab Environment
Intermediate
2h 2m
(68)
Table of contents

About the author
Dale Meredith  - Pluralsight course - Building a Cybersecurity Home Lab Environment
Dale Meredith
74 courses 4.5 author rating 5692 ratings

Dale Meredith has been a Certified Ethical Hacker/Instructor EC-Council for the past 15 years, and Microsoft Certified Trainer for over 20 years. Dale also has an additional 7 years of senior IT management experience and worked as a CTO for a popular ISP provider. Dale's expertise is in explaining difficult concepts and ensuring his students have an actionable knowledge of the course material.

Get started with Pluralsight