We may earn an affiliate commission when you visit our partners.
Vonnie Hudson

All *NEW CONTENT* for 2021.

This is the course I wish I had. 

I've been scouring Youtube and Udemy for a complete course that can walk beginners through building a Cyber Range, from start to finish, which includes a Windows Active Directory environment, vulnerable web apps and a full featured SIEM such as the ELK Stack.  There is a terrible shortage of high quality teaching in this subject.  So what did I do?  I marshalled my years of expertise and training to build the best resource for building an ethical hacking cyber attack and defense lab.  I hope to see more training like this on Udemy.

Read more

All *NEW CONTENT* for 2021.

This is the course I wish I had. 

I've been scouring Youtube and Udemy for a complete course that can walk beginners through building a Cyber Range, from start to finish, which includes a Windows Active Directory environment, vulnerable web apps and a full featured SIEM such as the ELK Stack.  There is a terrible shortage of high quality teaching in this subject.  So what did I do?  I marshalled my years of expertise and training to build the best resource for building an ethical hacking cyber attack and defense lab.  I hope to see more training like this on Udemy.

This course is a 100% hands-on workshop.  There are no PowerPoint slides.

By the end of the course you will have the confident feeling and satisfaction of knowing EXACTLY how modern attacks take place on corporate networks. 

We cover everything, nothing is left out.  For example here is a sample of the tools and technologies you will use and learn as you progress through the course:

  1. Zeek (Formerly Bro, Industry standard Network Metadata solution)

  2. Suricata (IDS and Network Security Monitoring)

  3. Stenographer (Google's robust full packet capture solution)

  4. Wireshark (Analyze packets and protocols)

  5. Network Miner (Extract files from packet captures)

  6. Wazuh (Powerful open-source EDR)

  7. Beats (Log shipper for Windows Event logs and more)

  8. OSQuery (Well-known awesome endpoint visibility tool)

  9. Sysmon + Sysmon-Modular (Endpoint visibility on steroids)

  10. Strelka (Automatically detects and analyzes malware and shoots to YARA for analysis)

  11. pfsense (Open-source firewall)

  12. Burp Suite

  13. Nmap

  14. And much much much more...

I am constantly adding to and improving this course it will not get outdated. 

Once you enroll you will be grandfathered into a lifetime of updates.

This course also provides the perfect backdrop to any other ethical hacking courses you take on Udemy because you will have a safe, isolated, realistic environment to hack, detect and block adversary actions.  You will be truly building the ultimate learning resource for ethical hacking.   So what are you doing still reading this?  Jump inside and let's start building your cyber range.

Enroll now

What's inside

Learning objectives

  • Learn active directory red teaming, web application hacking, penetration testing and bug bounty hunting in a safe, customizable environment on your local system
  • Avoid expensive aws or microsoft azure costs by hosting the entire attack range on your local machine
  • Build confidence for job interviews as you will know exactly how modern attacks and defenses work
  • How to analyze packet captures with google stenographer and wireshark
  • How to extract malicious files from packet captures with network miner
  • How to use pfsense to monitor network traffic
  • How to use zeek (formerly bro) to examine network metadata
  • How to use the open source host intrusion detection platform wazuh to monitor windows 10 endpoints
  • How to analyze sysmon logs for evidence of attack
  • How to use strelka to automatically extract malicious files and scan them against yara rules
  • How to setup security onion 2, elk, kibana and logstash and how to use it to hunt for evil in your network
  • How to use osquery and fleet to interact with your endpoints, query processes, scheduled tasks and more
  • How to use winlogbeat to ship windows powershell logs, event logs and more to your siem for analysis
  • Show more
  • Show less

Syllabus

Install and Configure VMWare Workstation Pro on their Windows host machine

Technically you could build the Cyber Range using VirtualBox but I strongly recommend against this.  Although VirtualBox is a fully capable open-source solution, the complexity and scale of our range is better suited for VMWare Workstation.  Therefore, in this lecture I will show you how to download VMWare Workstation Pro! 

Read more

And now we will install VMWare Workstation Pro.  As you will see, this is a fairly straight forward process!

Understand and appreciate why Security Onion 2 is the world's most awesome SIEM! (Yes, it rivals Splunk, Greylog and IBM QRadar)

Yes!  Now things are about to get fun.  First we need to install Security Onion 2 which will become the nexus for our Security Operations Center ("SOC").  This is arguably the most capable, free, open source platform for threat hunting, network security monitoring, and log management in existence right now. 

The most complicated (and critical) part of installation is getting the VMWare network adapters properly configured so in this lecture I will carefully explain the adapter setup and help you understand the purpose behind everything we are doing! 

Ok, so it's time to wrap this thing up.  In this lecture I'll step you through each screen of the Security Onion 2 setup so you can quickly get your SIEM up and running.  I'll also explain a few "gotcha's" to watch out for during the setup process!  Let's do this baby!

Download, install and configure pFsense to work in VMWare Workstation

What's a network without a firewall?  We can't have a realistic cyber range without one!  If you're fortunate enough to have a Palo Alto license you could just import a Palo Alto OVA into your range and pat yourself on the back, but the next best thing to that is pfSense.  Thousands of organizations trust pfSense to secure their networks as it is truly one of the best, production ready appliances for protecting an enterprise.  Today, you are going to set it up!   

We will install and configure pfSense.  Don't worry it is NOT as complicated as you might think.  I'm going to show you a simple, step-by-step approach to getting it ready for our Cyber Range. It will function like a real firewall as it will protect our internal hosts from external threats and will also mirror traffic to Security Onion 2 so we can monitor and analyze any suspicious activity. 

Setup and login to the de-facto penetration testing tool: Kali Linux

Some security researchers and people who play CTFs such as HackTheBox and TryHackMe love ParrotSec.  This is a great alternative to Kali Linux but Kali is still the pentest standard.  That's why in this lecture I'm going to wall you through setting up our attacker VM: Kali Linux. In this lecture, I'll show you the easiest way to set it up.  We'll update the distro, join our internal LAN and prime the box for attacking our targets

Now that we have Kali setup, we're going to sign-in to the pfSense GUI and configure it so that it mirrors all traffic to Security Onion 2 for analysis.  This will be important later as we start analyzing events in Kibana and hunting for evil.

It's time to log in to the Security Onion 2 Console (SOC) to see the beautiful alerts dashboard!  We're not going to see anything particularly exciting yet as we haven't launched any attacks so the purpose of this test is just to confirm we can access and authenticate into the appliance!

You will standing up vulnerable target, attack it with Kali Linux and then study the observables in your SIEM to sharpen your your Ethical Hacking skills

In this lecture we are going to download and install Metasploitable2.  Yes Metasploitable2 is an ancient VM but it's still an extremely good resource for learning how to hack.  Then we will attack the target from our Kali endpoint and watch how the Security Onion 2 SIEM not only logs the nmap scan but also the Suricata event logs the DHCP request against pFsense and alerts us that an attacker is on our network!  It's going to be awesome!  Let's dive right in.

How to download, install and setup a Windows 10 endpoint target on the network

Every Cyber Range must have Windows 10 targets.  Given the ubiquity of Windows 10 it is a must for realism and detection engineering.  So in this lecture we're going to get things started by downloading Windows 10!  In later lectures we'll instrument the endpoint with Sysmon, OSQuery, Wazuh, Windows Defender and more. It's going to be awesome, awesome awesome!  This is truly the course I wish I had when learning Information Security!

Yes! Alright now we need to make sure we have the right logging setup so when we breach the victim we can see what we did in the Security Onion and our SIEM.  Let's start by enabling Powershell module, script block and transcription logging!

Now let's turn on the Windows Defender Firewall logging because by default it is disabled.  We will need to enable it otherwise we won't see nmap scanning our Windows 10 target.

Sysmon will give us unparalleled visibility into the endpoint.  By instrumenting our victim node with Sysmon we will receive enriched telemetry in Kibana that will augment our hunt for evil.  For example, by enabling Sysmon (along with Sysmon-modular by Olaf Hartong) we will see process hashes, parent-child process relationships, command line invocations and more.  It's going to be awesome!  Oh and I almost forgot to mention it's super easy to setup!

Wazuh (pronounced "Wah - Zoo") is a free, open source security monitoring endpoint detection and response ("EDR") solution.  It provides security analytics, host based intrusion detection, log data analysis, file integrity monitoring, vulnerability detection and more.  Sound awesome right?  Yup, we're setting it up on our Windows 10 victim! Yippie Kai Yay, let's go!

This is the final piece of the puzzle as we strive to have truly performant endpoint visibility.  Beats will ship Windows Event Logs, Windows Defender Logs, Sysmon, PowerShell logs and more to our ELK stack and give us everything we need to practice hacking in our Cyber Range!

In this super quick lecture, I'm simply going to walk you through enabling Windows Defender Audit logs so we can begin shipping that telemetry to our Security Onion 2 Console! w00t!

OSquery lets us query almost any data on our endpoint as if they were a giant database of discreet tables.  And Fleet, is the sexy GUI that make the entire thing look awesome.  We will setup both in this lecture.  You'll see how awesome this tool is, it basically gives us endpoint visibility including everything from scheduled tasks (often used for attacker persistence), local ARP tables (used for attacker pivoting), basic system information (used for attacker enumeration) and more!  Let's do this baby!

You will know how to use Red Canary's Atomic Red team to test your defenses

Oh man this is really really going to be fun lol.  So in this lecture you are going to emulate compromising a Windows 10 endpoint in your Cyber Range and then we're going to do some adversary simulations with basic host recon.  We'll wrap things up by searching the events in Kibana!  I'll show you A - to - Z how to pull this off.  Let's go!

Awww yeah! Now we're going to leverage Red Canary's awesome Atomic Red Team tests (https://atomicredteam.io/) to confirm our Windows 10 endpoint is properly instrumented and generating telemetry as expected!

In this lecture we're going to detect our Mimikatz attack in Kibana.  We're also going to use Fleet, the GUI for OSquery, to detect the malware process in memory.  Let's go!

You will know how to configure and instrument a Windows Server 2019 Domain Controller and join a Windows 10 client to the domain

You can't have a cyber range without a Domain Controller ("DC").  The DC will become a key component for all Active Directory based attacks and defenses such as Kerberoasting and others.  In this lecture you'll learn how to download and install Windows Server 2019 and then join it to the Cyber Range internal network.

Now it's time to promote that bad boy to a Domain Controller and then install OSQuery, Winlogbeat, Wazuh and Sysmon (with sysmon-modular) so we can start shipping logs to Kibana for analysis!

Now we need a domain user account.  Let's create the CEO of our fictitious company and populate the required fields for his office number, email address and title.  This is a quick one so let's go!

This lecture is really just for the fun of it (totally optional).  I just wanted to show you a little tip for making your range feel more like a realistic corporate network.  You'll see one of the top places I go to download faces, royalty free images, that we can use for our fictitious Active Directory user accounts.

In this lecture it gets REAL.  I'm going to show you how to install the latest copy of Outlook so we can send maldocs (malicious documents) that contain macros (or whatever we want, for example a Cobalt Strike Beacon) to gain a foothold on the box and begin an attack.  I'll walk you through how I configured my domain, the email setup and then I'll show you a test email to prove everything is working.  It's easier than you think.

You will learn what Kerberoasting is and how to launch the attack. You will also discover detection techniques as well.

In this lecture you will learn what Kerberoasting is and then we will create a deliberately vulnerable IIS service account with an associated Service Principle Name (SPN) so we can launch a Kerberoasting attack in the next lecture! Oh yeah! Let's do this baby!

Now it's time to blast the box.  We're going to kerberoast our fake user using Invoke-Kerberoast from PowerSploit and then extract the hash, get it over to our Kali cracking rig, crack the hash with Hashcat and investigate any observables left behind from the attack.  Are you ready for this!!!??

BONUS LECTURE

Save this course

Save The Complete Cyber Range Hacking Lab: Full Course to your list so you can find it easily later:
Save

Activities

Be better prepared before your course. Deepen your understanding during and after it. Supplement your coursework and achieve mastery of the topics covered in The Complete Cyber Range Hacking Lab: Full Course with these activities:
Review Networking Fundamentals
Solidify your understanding of networking concepts before diving into cyber range setup. This will help you better grasp the network configurations within the lab environment.
Browse courses on Networking Fundamentals
Show steps
  • Review the OSI model and TCP/IP stack.
  • Practice subnetting exercises.
  • Familiarize yourself with common network protocols like HTTP, DNS, and SMTP.
Review 'Practical Packet Analysis'
Enhance your ability to analyze network traffic within the cyber range. This book will help you master Wireshark, a key tool covered in the course.
View Melania on Amazon
Show steps
  • Read the chapters on packet capture and filtering.
  • Practice analyzing sample packet captures using Wireshark.
  • Experiment with different Wireshark features and plugins.
Build a Mini-SIEM with ELK
Gain hands-on experience with SIEM technologies by building a simplified version using the ELK stack. This will reinforce your understanding of log management and security monitoring.
Show steps
  • Install and configure Elasticsearch, Logstash, and Kibana.
  • Configure Logstash to ingest logs from a sample application or system.
  • Create visualizations and dashboards in Kibana to analyze the logs.
  • Implement basic alerting rules based on log patterns.
Four other activities
Expand to see all activities and additional details
Show all seven activities
Document Attack and Defense Scenarios
Solidify your understanding of attack and defense techniques by documenting specific scenarios within your cyber range. This will help you think critically about how attacks work and how to defend against them.
Show steps
  • Choose a specific attack scenario (e.g., Kerberoasting).
  • Document the steps involved in the attack, including tools and techniques used.
  • Describe the defense mechanisms that can be used to detect and prevent the attack.
  • Create a diagram illustrating the attack and defense flow.
Atomic Red Team Exercises
Reinforce your detection engineering skills by running Atomic Red Team tests within your cyber range. This will help you validate your security controls and identify gaps in your defenses.
Show steps
  • Select a set of Atomic Red Team tests relevant to your environment.
  • Execute the tests within your cyber range.
  • Analyze the results and identify any failed tests.
  • Investigate the root cause of the failures and implement corrective actions.
Review 'Blue Team Handbook'
Deepen your understanding of security operations and threat hunting. This book will provide valuable insights into building and operating a SOC, which is directly relevant to the course.
View Melania on Amazon
Show steps
  • Read the chapters on SIEM deployment and threat hunting.
  • Identify use cases relevant to your cyber range environment.
  • Implement the use cases within your cyber range and test their effectiveness.
Contribute to Sysmon Modular Rules
Enhance your understanding of Sysmon and contribute to the community by creating or improving Sysmon Modular rules. This will help you develop advanced detection engineering skills.
Show steps
  • Study existing Sysmon Modular rules and understand their structure.
  • Identify a gap in the existing ruleset or a new attack technique to detect.
  • Create a new Sysmon Modular rule to detect the attack technique.
  • Test the rule in your cyber range and refine it as needed.
  • Submit the rule to the Sysmon Modular repository for review.

Career center

Learners who complete The Complete Cyber Range Hacking Lab: Full Course will develop knowledge and skills that may be useful to these careers:

Reading list

We've selected one books that we think will supplement your learning. Use these to develop background knowledge, enrich your coursework, and gain a deeper understanding of the topics covered in The Complete Cyber Range Hacking Lab: Full Course.
Provides a comprehensive guide to packet analysis using Wireshark, a crucial skill for network security monitoring and incident response. It covers essential techniques for capturing, filtering, and analyzing network traffic. The book is valuable as a reference tool for understanding network protocols and identifying malicious activity. It is commonly used by network administrators and security professionals.

Share

Help others find this course page by sharing it with your friends and followers:

Similar courses

Similar courses are unavailable at this time. Please try again later.
Our mission

OpenCourser helps millions of learners each year. People visit us to learn workspace skills, ace their exams, and nurture their curiosity.

Our extensive catalog contains over 50,000 courses and twice as many books. Browse by search, by topic, or even by career interests. We'll match you to the right resources quickly.

Find this site helpful? Tell a friend about us.

Affiliate disclosure

We're supported by our community of learners. When you purchase or subscribe to courses and programs or purchase books, we may earn a commission from our partners.

Your purchases help us maintain our catalog and keep our servers humming without ads.

Thank you for supporting OpenCourser.

© 2016 - 2025 OpenCourser