The Complete Cyber Range Hacking Lab: Full Course
Build a realistic, full featured, Attack and Defense environment on your Home computer. No cloud costs to worry about.What you'll learn
- Learn Active Directory Red Teaming, Web Application Hacking, Penetration Testing and Bug Bounty Hunting in a safe, customizable environment on your local system
- Avoid expensive AWS or Microsoft Azure costs by hosting the entire attack range on your local machine
- Build confidence for job interviews as you will know EXACTLY how modern attacks and defenses work
- How to analyze packet captures with Google Stenographer and Wireshark
- How to extract malicious files from packet captures with Network Miner
- How to use pFsense to monitor network traffic
- How to use Zeek (formerly Bro) to examine network metadata
- How to use the open source host intrusion detection platform Wazuh to monitor Windows 10 endpoints
- How to analyze Sysmon logs for evidence of attack
- How to use Strelka to automatically extract malicious files and scan them against Yara rules
- How to setup Security Onion 2, Elk, Kibana and Logstash and how to use it to hunt for evil in your network
- How to use osquery and Fleet to interact with your endpoints, query processes, scheduled tasks and more
- How to use WinLogBeat to ship Windows Powershell logs, Event Logs and more to your SIEM for analysis
This course is a 100% hands-on workshop. There are no PowerPoint slides.
By the end of the course you will have the confident feeling and satisfaction of knowing EXACTLY how modern attacks take place on corporate networks.
We cover everything, nothing is left out. For example here is a sample of the tools and technologies you will use and learn as you progress through the course:
- Zeek (Formerly Bro, Industry standard Network Metadata solution)
- Suricata (IDS and Network Security Monitoring)
- Stenographer (Google's robust full packet capture solution)
- Wireshark (Analyze packets and protocols)
- Network Miner (Extract files from packet captures)
- Wazuh (Powerful open-source EDR)
- Beats (Log shipper for Windows Event logs and more)
- OSQuery (Well-known awesome endpoint visibility tool)
- Sysmon + Sysmon-Modular (Endpoint visibility on steroids)
- Strelka (Automatically detects and analyzes malware and shoots to YARA for analysis)
- pfsense (Open-source firewall)
- Burp Suite
- Nmap
- And much much much more...
Watch Online On Mega
Last edited by a moderator: