The Complete Cyber Range Hacking Lab: Full Course

Build a realistic, full featured, Attack and Defense environment on your Home computer. No cloud costs to worry about.

4.77 (173 reviews)
Udemy
platform
English
language
Network & Security
category
instructor
The Complete Cyber Range Hacking Lab: Full Course
2,073
students
3.5 hours
content
Nov 2022
last update
$69.99
regular price

What you will learn

Learn Active Directory Red Teaming, Web Application Hacking, Penetration Testing and Bug Bounty Hunting in a safe, customizable environment on your local system

Avoid expensive AWS or Microsoft Azure costs by hosting the entire attack range on your local machine

Build confidence for job interviews as you will know EXACTLY how modern attacks and defenses work

How to analyze packet captures with Google Stenographer and Wireshark

How to extract malicious files from packet captures with Network Miner

How to use pFsense to monitor network traffic

How to use Zeek (formerly Bro) to examine network metadata

How to use the open source host intrusion detection platform Wazuh to monitor Windows 10 endpoints

How to analyze Sysmon logs for evidence of attack

How to use Strelka to automatically extract malicious files and scan them against Yara rules

How to setup Security Onion 2, Elk, Kibana and Logstash and how to use it to hunt for evil in your network

How to use osquery and Fleet to interact with your endpoints, query processes, scheduled tasks and more

How to use WinLogBeat to ship Windows Powershell logs, Event Logs and more to your SIEM for analysis

Why take this course?

All *NEW CONTENT* for 2021!

This is the course I wish I had. 

I've been scouring Youtube and Udemy for a complete course that can walk beginners through building a Cyber Range, from start to finish, which includes a Windows Active Directory environment, vulnerable web apps and a full featured SIEM such as the ELK Stack.  There is a terrible shortage of high quality teaching in this subject.  So what did I do?  I marshalled my years of expertise and training to build the best resource for building an ethical hacking cyber attack and defense lab!  I hope to see more training like this on Udemy!

This course is a 100% hands-on workshop.  There are no PowerPoint slides.

By the end of the course you will have the confident feeling and satisfaction of knowing EXACTLY how modern attacks take place on corporate networks. 

We cover everything, nothing is left out.  For example here is a sample of the tools and technologies you will use and learn as you progress through the course:

  1. Zeek (Formerly Bro, Industry standard Network Metadata solution)

  2. Suricata (IDS and Network Security Monitoring)

  3. Stenographer (Google's robust full packet capture solution)

  4. Wireshark (Analyze packets and protocols)

  5. Network Miner (Extract files from packet captures)

  6. Wazuh (Powerful open-source EDR)

  7. Beats (Log shipper for Windows Event logs and more)

  8. OSQuery (Well-known awesome endpoint visibility tool)

  9. Sysmon + Sysmon-Modular (Endpoint visibility on steroids)

  10. Strelka (Automatically detects and analyzes malware and shoots to YARA for analysis)

  11. pfsense (Open-source firewall)

  12. Burp Suite

  13. Nmap

  14. And much much much more...

I am constantly adding to and improving this course it will not get outdated. 

Once you enroll you will be grandfathered into a lifetime of updates.

This course also provides the perfect backdrop to any other ethical hacking courses you take on Udemy because you will have a safe, isolated, realistic environment to hack, detect and block adversary actions.  You will be truly building the ultimate learning resource for ethical hacking!  So what are you doing still reading this?  Jump inside and let's start building your cyber range!

Reviews

Joshua
July 14, 2023
Pretty outdated. Know that you'll have to guess on some settings in the vm and in the sec onion setup. Haven't gotten past the sec onion setup but will update this review as I continue. Definitely needs to be updated thus far.
Giosue
April 21, 2023
A lot of time to setup the lab and very little lab time, my setup didn't work the same as Vonnie's, probably my fault, but I felt he may have left some instruction out. It would have been nice to pace pdf instructions so the student could go over them without having to re-watch everything. All-in-all I enjoyed the class.
Derell
February 23, 2023
You have to be a pretty smart cat to do what he does, the way he does it! He's by far the best instructor that I've came across on Udemy as it relates to the Cyber Security Field. This isn't for newbies at all but the instructor makes the subject matter extremely easy to understand. He literally explains everything and provides a plethora of additional information to help iterate the theory behind the practical application. There were quite a bit of unexpected hang-ups with installations, execution of commands, and lab configurations along the way however.com pause for effect...he was able to troubleshoot each issue in real time. No fluff! Website home pages and layouts change frequently for obvious reasons and its clearly mentioned throughout the instruction. Just make sure you download the latest versions and take heed to the advice given. You will not regret your purchase. This guy rocks!
Serge
January 19, 2023
1. First the screens don't match the current versions of the products. 2. The context of what is done is not explained...
Thomas
December 6, 2022
Absolutely! Saving me time from trial and error. I like the way you troubleshoot the installation. Great thus far.
Michael
May 3, 2022
Excellent course! The most invaluable and unforgettable thing that I learned is how to use my Cyber Range along with Invoke-AtomicRedTeam and MITRE ATT&CK knowledge base to perform attacks and detect these attacks! I always assumed that Blue Teaming is boring compared to Red Teaming. However, this course has opened my eyes to how fascinating Blue Teaming really is! Although the initial setting up of the Cyber Range was tedious and sometimes error-prone for me, the knowledge I gained in configuring, testing and getting to work the Security Onion, pfSense, Windows Server 2019 domain controller and Active Directory, joining the Windows 10 victim client to the domain and metasploitable2 were invaluable. I enjoyed this course so much, I have decided to try and complete as many attack and detect scenarios from the MITRE ATT&CK knowledge base as I can. Also can't wait to start the Cybersecurity Threat Hunting for SOC Analysts!
G
March 1, 2022
Excellent ! J'aurai juste aimé avoir un schéma de la topologie générale pour voir en premier lieu ce qui allait être construit . Mise à part cela super sympa !
Gorlock
June 7, 2021
I wish I had found this instructor first. I can tell by his cadence, his precise technical language and methodical approach that this is an experienced IT professional who has spent real time in the field. After having obtained the CySA+ and Pentest+, I feel like these courses will fill in all the blanks of things that I didn't learn self-studying for the exams. As a career IT professional (C#/.NET dev and Windows network admin) I very much appreciate the standards based approach (MITRE ATT&CK, OWASP). Additionally, now that I've had a year in this field as an analyst, I can easily keep up with his pace. It's so much better being able to work with a pro and not some YouTube cyber-celebrity. I ordered 5 of Vonnie's courses. This is going to take me to the next level.
Gaspari
May 23, 2021
Le cours est vraiment adapté avec des cas concret. Je le recommande pour chaque personne dans ce domaine. J'espère que d'autres personnes pourront regarder ce cours.
Brian
May 7, 2021
Good Cyber Range - "Quick" course in Hacking; some aspects of the videos on close attention to detail showed significant skill building offense and defense measures; also like the idea of creating the virtual lab as shown in VMware workstation.
Nick
April 26, 2021
This is an outstanding course and Vonnie is a great teacher. A few suggestions that would make it better: It's not stated, but people can use VirtualBox (free), you don't need to pay for VMware. Also Vonnie spends a lot of time troubleshooting his own installs/network, this should be cut out and replaced with maybe some slides that help explain some of the terminology (i.e. Sigma Rules) that most beginners don't know, but were mentioned early on as if they should.
Raymond
March 31, 2021
The course is 100% hands -on. If you really want to become a good IT security Expert? I will recommend you take this course. Vonnie , knows his material , he dives straight to the point with further explanations when deemed necessary. well rounded Virtual lab for a Security professional. Good Job , Mr. Vonnie
Stephen
January 14, 2021
So far I have gone thru the first section which is the installation of Security Onion which is spot on and clear.

Charts

Price

The Complete Cyber Range Hacking Lab: Full Course - Price chart

Rating

The Complete Cyber Range Hacking Lab: Full Course - Ratings chart

Enrollment distribution

The Complete Cyber Range Hacking Lab: Full Course - Distribution chart

Related Topics

3702942
udemy ID
12/14/2020
course created date
1/21/2021
course indexed date
Bot
course submited by