🚀 Enrollment Opens September 15, 2025.
Enroll as a Founding Member Today. Lock in this one-time launch offer.

🚀 Level-up & Expand Your Skills
Build Your Cybersecurity Homelab & Take It To the Next-Level.
In Networks & Attacks 101, we work on the essentials based off of Enterprise 101’s topology. Expanding our network infrastructure with business applications such as DNS, FTP, building an internal corporate portal. We then launch network-based attacks such as Man-in-the-Middle (MiTM), Denial of Service (DoS), create a small C2 server, exploitation. We then deploy relevant network defenses and strategies. We use Suricata Intrusion Prevention System (IPS), pfSense Firewall, Active Directory Group Policy Objects (GPO), and File Integrity Monitoring (FIM) detections to detect and prevent our attacks.
We Deploy. Attack. Defend.
🏆 Objectives
Why take this course?
- If you want to start with hands-on practice today.
- Build and Expand a (small) business network.
- Build your skill sets in network infrastructure, intrusion, and prevention.
- Begin to build a portfolio - something you can showcase.
- Join our exclusive community of Homelab Builders.
Expected Outcomes
By the end of this Core Section, you will be able to:
- Design & Deploy a production-ready corporate network topology with dedicated routers, corporate DNS, FTP, HTTP, SMTP servers, Firewalls, Suricata, and more.
- Implement Security Controls including configuring firewalls with dynamic rules, deploy and write intrusion detection/prevention systems rules, and build network security policies. And implement security strategies.
- Conduct Offensive Network Operations such as man-in-the-middle (MiTM) attacks, spoofing, password cracking, command-and-control operations, and exploitation.
- Analyze & Respond to real-world attacks by detecting intrusions, identifying attacker techniques, and removing threats from the network.
- Strengthen Defenses based on lessons learned from simulated attacks to harden your network against future threats.
Prerequisites
- ✅ Enterprise 101 Has Been Completed.
- 👉 Basic understanding of I.T. and networking.
- 💻 A workstation with 8 GB of RAM, 4 CPU Cores, and 100+ GBs of free space.
- 🔍 A willingness to learn.
- ☕ Coffee.
The Curriculum
Section 1: Network Infrastructure
Extending off the baselines topology of E101, we deploy additional network infrastructure commonly seen in a business environment. Including an internal DNS server, internal corporate web page, FTP server, and a router.
Section 2: Attacks
We switch to the offensive, executing real-world attacks on our corporate network. We simulate man-in-the-middle (MiTM) attacks, spoofing, password cracking, command-and-control operations, and system exploitation.
Section 3: Defenses
We put our defender hats on, we deploy network related defenses, including firewalls, intrusion prevention systems, security policy, network and security logging.
Section 4: Self-study Labs
Here, we give you the opportunity to DIY. We have additional infrastructure to deploy, network attacks to conduct, and security defenses to launch.

Deploy - Attack - Defend
Build skills. Break systems. Beat threats.




Our Lab Network Topology.
Here's the network topology and tools we will use to build and expand our security homelab.

🔒 The ProjectSecurity Lab
If you’ve completed Enterprise 101 (or haven’t yet—enroll for free to get started), you’re ready to take the next step: Networks & Attacks 101.
In this stage, we’ll grow our simulated corporate network in preparation for a full production rollout. You’ll design and deploy a more advanced network topology with dedicated routers, corporate DNS, FTP, HTTPS web containers, firewalls, security monitoring and prevention tools, and defined network security policies. Then, we’ll switch to the offensive—executing real-world attack scenarios like man-in-the-middle (MiTM) attacks, spoofing, password cracking, command-and-control operations, and system exploitation. And finally, put our defender hats back on to kick the attackers out of our network.
This is part 2 of 4 for the ProjectSecurity Lab, where we build an entire corporate, development, and production environment to simulate a real-world application company.

Here's The Curriculum
(Take a peek inside)
- Disable CTRL ALT DEL on [project-x-dc] (2:20)
- Disable Microsoft Window Licensing Service on [project-x-dc] (Prevents 1 HR Shutdown) (7:46)
- Disable Microsoft Window Licensing Service on [project-x-win-client] (Prevents 1 HR Shutdown) (7:39)
- Remove janed account on [project-x-corp-svr] (5:15)
- Create Snapshot for all VMs (Pre-NA101 Exercises) (2:31)
- [Lecture] Networking Basics (11:02)
- [Lecture] Network Communications (17:29)
- [Lecture] Network Tools (11:42)
- Docker Basics (Dockerfile, Images, Containers) (7:26)
- Setup DNS Container [project-x-corp-svr-dns] (20:44)
- Setup FTP Container [project-x-corp-svr-ftp] (11:05)
- Setup HTTP Container [project-x-corp-svr-web] (7:05)
- Packet Analysis With Wireshark (12:28)
- Packet Analysis With tcpdump (6:46)
- Windows Firewall Playground (8:53)
- Setup pfSense Firewall Part 1 & 2 [project-x-corp-fw] (20:37)
- Setup pfSense Firewall Part 3 & 4 [project-x-corp-fw] (27:41)
- Provision Suricata IPS on [project-x-sec-work] (1:57)
- [Lecture] Network Attacks Overview (1:10)
- Update [project-x-attacker] Keyring (1:52)
- UFW Rules on [project-x-corp-svr] (2:24)
- MiTM: ARP Cache Poisoning [project-x-win-client] (4:37)
- MiTM: DNS Zone Poisoning [project-x-corp-svr-web] (19:11)
- IP Spoofing [project-x-linux-client] (11:03)
- Deploy DoS Attack on [project-x-corp-svr-web] (10:50)
- Exploit Outdated vsftp (CVE-2011-2523) (9:01)
- Credential Stuffing John Doe For Internal Portal Access (projectxcorp.com) (8:05)
- Create A Very Basic Command & Control Server In Python (16:14)
- [Lecture] Defense Strategies & Tools (10:34)
- Change VirtualBox Network Adapter Settings (6:29)
- Change IP Addresses on all VMs (13:43)
- Wazuh Manger & UFW Rules on [project-x-sec-box] (3:40)
- Add Wazuh Agents to [project-x-corp-svr] & [project-x-sec-work] (7:15)
- Update Wazuh Agents On Workstations [win-client], [linux-client], [sec-work] & Domain Controller [project-x-dc] (6:36)
- Add [project-x-attacker] to CORP-DMZ (2:30)
- Install pfSuricata on [project-x-corp-fw] (9:36)
- Layer 2 Security Monitoring (Prevent ARP Cache Poisoning) (6:44)
- Layer 3-4 Security Monitoring (4:27)
- Layer 7 Security Monitoring (3:29)
- Ingest pfSuricata Logs Into Wazuh on [project-x-corp-fw] (18:08)
- Ingest Security Logs Into Wazuh On [project-x-sec-work] (10:47)
- Group Policy Object Organization on [project-x-dc] (6:51)
- Deploy GPO on [project-x-dc] to [project-x-win-client] (15:42)
- Zone Monitoring (DNS Security) on [project-x-corp-svr-dns) (17:57)
- Prevent Command & Control Server Access on [project-x-linux-client] (6:42)
💬 Here's What A Few Builders Have Said
"An amazing place for those curious and experienced in cybersecurity to come together, and swap out knowledge"
- Zeus.
"Hands on labs have introduced a very real and often missed point which is things don't always work out as planned. I get a lot of satisfaction getting the labs to work , but there's a satisfaction when it comes to troubleshooting the environment you created to reach your goal."
- Xavier.
"Learnt a lot of stuff, so thank you so much for putting up the entire project."
- Lock.

This Course Is Part Of Our Membership
Get access to Networks & Attacks 101 and our rolling course releases when you enroll in ProjectSecurity as a Lab Builder.
You also get access:
⭐ Exclusive Community Role.
📚 Additional Self-Study Labs.
👩💻 Bi-Monthly Meetups.
📝 Step-by-Step Documentation With Explanations.