🚀 Enrollment Opens September 15, 2025.

Enroll as a Founding Member Today. Lock in this one-time launch offer.


🚀 Level-up & Expand Your Skills

Build Your Cybersecurity Homelab & Take It To the Next-Level.

In Networks & Attacks 101, we work on the essentials based off of Enterprise 101’s topology. Expanding our network infrastructure with business applications such as DNS, FTP, building an internal corporate portal. We then launch network-based attacks such as Man-in-the-Middle (MiTM), Denial of Service (DoS), create a small C2 server, exploitation. We then deploy relevant network defenses and strategies. We use Suricata Intrusion Prevention System (IPS), pfSense Firewall, Active Directory Group Policy Objects (GPO), and File Integrity Monitoring (FIM) detections to detect and prevent our attacks.

We Deploy. Attack. Defend.


🏆 Objectives

Why take this course?

  • If you want to start with hands-on practice today.
  • Build and Expand a (small) business network.
  • Build your skill sets in network infrastructure, intrusion, and prevention.
  • Begin to build a portfolio - something you can showcase.
  • Join our exclusive community of Homelab Builders.

Expected Outcomes

By the end of this Core Section, you will be able to:

  • Design & Deploy a production-ready corporate network topology with dedicated routers, corporate DNS, FTP, HTTP, SMTP servers, Firewalls, Suricata, and more.
  • Implement Security Controls including configuring firewalls with dynamic rules, deploy and write intrusion detection/prevention systems rules, and build network security policies. And implement security strategies.
  • Conduct Offensive Network Operations such as man-in-the-middle (MiTM) attacks, spoofing, password cracking, command-and-control operations, and exploitation.
  • Analyze & Respond to real-world attacks by detecting intrusions, identifying attacker techniques, and removing threats from the network.
  • Strengthen Defenses based on lessons learned from simulated attacks to harden your network against future threats.

Prerequisites

  • Enterprise 101 Has Been Completed.
  • 👉 Basic understanding of I.T. and networking.
  • 💻 A workstation with 8 GB of RAM, 4 CPU Cores, and 100+ GBs of free space.
  • 🔍 A willingness to learn.
  • ☕ Coffee.





The Curriculum

Section 1: Network Infrastructure

Extending off the baselines topology of E101, we deploy additional network infrastructure commonly seen in a business environment. Including an internal DNS server, internal corporate web page, FTP server, and a router.

Section 2: Attacks

We switch to the offensive, executing real-world attacks on our corporate network. We simulate man-in-the-middle (MiTM) attacks, spoofing, password cracking, command-and-control operations, and system exploitation.

Section 3: Defenses

We put our defender hats on, we deploy network related defenses, including firewalls, intrusion prevention systems, security policy, network and security logging.

Section 4: Self-study Labs

Here, we give you the opportunity to DIY. We have additional infrastructure to deploy, network attacks to conduct, and security defenses to launch.

Deploy - Attack - Defend

Build skills. Break systems. Beat threats.







Our Lab Network Topology.

Here's the network topology and tools we will use to build and expand our security homelab.

🔒 The ProjectSecurity Lab


If you’ve completed Enterprise 101 (or haven’t yet—enroll for free to get started), you’re ready to take the next step: Networks & Attacks 101.

In this stage, we’ll grow our simulated corporate network in preparation for a full production rollout. You’ll design and deploy a more advanced network topology with dedicated routers, corporate DNS, FTP, HTTPS web containers, firewalls, security monitoring and prevention tools, and defined network security policies. Then, we’ll switch to the offensive—executing real-world attack scenarios like man-in-the-middle (MiTM) attacks, spoofing, password cracking, command-and-control operations, and system exploitation. And finally, put our defender hats back on to kick the attackers out of our network.

This is part 2 of 4 for the ProjectSecurity Lab, where we build an entire corporate, development, and production environment to simulate a real-world application company.



Here's The Curriculum

(Take a peek inside)



  New section
Available in days
days after you enroll
  Section 0: Housekeeping
Available in days
days after you enroll
  Section 1: Network Infrastructure
Available in days
days after you enroll
  Section 2: Network Attacks
Available in days
days after you enroll
  Section 3: Network Defenses
Available in days
days after you enroll
  Section 4: Self-study Labs
Available in days
days after you enroll
  Section 5: Conclusion! Onto Cloud & Attacks 101!
Available in days
days after you enroll

💬 Here's What A Few Builders Have Said

"An amazing place for those curious and experienced in cybersecurity to come together, and swap out knowledge"

- Zeus.

"Hands on labs have introduced a very real and often missed point which is things don't always work out as planned. I get a lot of satisfaction getting the labs to work , but there's a satisfaction when it comes to troubleshooting the environment you created to reach your goal."

- Xavier.

"Learnt a lot of stuff, so thank you so much for putting up the entire project."

- Lock.

This Course Is Part Of Our Membership

Get access to Networks & Attacks 101 and our rolling course releases when you enroll in ProjectSecurity as a Lab Builder.

You also get access:

⭐ Exclusive Community Role.

📚 Additional Self-Study Labs.

👩‍💻 Bi-Monthly Meetups.

📝 Step-by-Step Documentation With Explanations.