Autoplay
Autocomplete
Previous Lesson
Complete and Continue
Build a Cybersecurity Homelab - A Practical Guide to Offense & Defense [Enterprise 101]
Introduction
Introduction + Expected Outcomes + Prerequisites (10:45)
ProjectX (Fictional Company) (3:46)
[Download] Step-by-Step Guides
[Download] Virtual Machine ISOs (Will Take Several Hours)
[Download] Project Files on GitHub (Optional)
Skills Section 1: A Primer on VirtualBox & Virtualization
VirtualBox Overview (6:18)
Download VirtualBox (4:53)
VirtualBox Guest Additions (Full Screen & Shared Clipboard) (4:20)
VirtualBox Network (Provision a NatNetwork) (2:11)
VirtualBox Snapshots (1:57)
Skills Section 2: Introduction to Linux
Introduction to Linux (4:38)
Working with Directories (10:11)
Navigating to Terminal, Navigation Commands, Help (15:02)
File and Directory Permissions (11:43)
Find and Working with Files (28:53)
Input and Output Redirection (18:43)
Patterns, Process Control, and Variables (9:53)
Users and Software (6:44)
Section 1: Build an Enterprise Network
Build a Business Network (CORP) Overview (13:23)
Introduction to Active Directory (7:18)
Build a Directory Services Server (30:46)
Connecting to Active Directory (3:43)
Provision & Setup Windows 11 Enterprise (14:47)
Provision & Setup Ubuntu Desktop 22.04 (21:49)
Provision & Setup Ubuntu Server 22.04 (18:14)
Postfix Overview (5:25)
Setup Postfix (24:29)
Provision & Setup Security Onion (7:51)
Security Server - Provision & Setup Ubuntu 22.04 (15:04)
Setup Wazuh (22:45)
Section 2: Create a Vulnerable Environment & Detections
Create a Vulnerable Environment & Detections Introduction (2:17)
Setup Detections & Alerts (32:56)
Vulnerable Environment Configurations (30:18)
Section 3: Cyber Attack - Initial Access to Breached
Cyber Atttack - Initial Access to Breached Introduction (4:17)
Provision Attacker Machine (Kali Linux) (7:02)
Prerequisities - Cyber Atttack (4:44)
Reconnaissance - Initial Access (28:53)
Lateral Movement - Privilege Escalation (16:09)
Data Exfiltration - Persistence (18:31)
Section 4: Catch the Attacker
Defend - Catch the Attacker Introduction (2:40)
Investigation & Defense (5:26)
Conclusion
Conclusion (2:13)
Teach online with
VirtualBox Guest Additions (Full Screen & Shared Clipboard)
Lesson content locked
If you're already enrolled,
you'll need to login
.
Enroll in Course to Unlock