🚀 A Practical Start to Security

Build a Cybersecurity Homelab


Homelabs give you a practical way to apply what you learn in books, online courses, or certifications. Homelabs are practical and flexible. With a curated environment, you can simulate a cyberattack, emulate parts of a business environment or practice your engineering skills. Your homelab is the perfect place to experiment.

This program is here to help you jumpstart your own homelab.

🏆 Objectives

Why take this course?

  • If you want to start with hands-on practice today.
  • Build a (small) business network.
  • Begin to build a portfolio - something you can showcase.
  • It's free.

Expected Outcomes

  • Will have a functional virtual network with simulate business components.
  • Email sever, workstations, security server, SIEM, XDR, security sandbox.
  • Learn the basics of setting up a business environment.
  • Understand the basic steps of conducting a cyber-attack, from initial access to breached.
  • Implement relevant security detections.

Prerequisites

  • Basic understanding of I.T.
  • A workstation with 8 GB of RAM, 4 CPU Cores, and 100 GBs of free space.
  • A willingness to learn!

👉 Here's What You'll Build

This program (Enterprise 101) focuses on the foundations of building an enterprise environment. Through virtualization, we are going to emulate a business called ProjectX with the following:

  • Windows Active Directory.
  • Windows 11 Enterprise.
  • Ubuntu Desktop 22.04.
  • Security Onion.
  • Postfix Email Server.
  • Security Server with Wazuh.
  • End-to-end Cyberattack.
  • Detection Writing with Wazuh.

Curriculum

  Introduction
Available in days
days after you enroll
  Skills Section 1: A Primer on VirtualBox & Virtualization
Available in days
days after you enroll
  Skills Section 2: Introduction to Linux
Available in days
days after you enroll
  Section 1: Build an Enterprise Network
Available in days
days after you enroll
  Section 2: Create a Vulnerable Environment & Detections
Available in days
days after you enroll
  Section 3: Cyber Attack - Initial Access to Breached
Available in days
days after you enroll
  Section 4: Catch the Attacker
Available in days
days after you enroll
  Conclusion
Available in days
days after you enroll

Choose a Pricing Option