bootstrap website templates

Building Your Own Cyber Security Lab and Cyber Range

Practice and Enhance Ethical Hacking and Defensive Security Skills.
This is a course created by Omar Santos. Numerous cybersecurity and penetration testing tools and techniques have the potential to damage or destroy the target system or the underlying network. In addition, if malware is used in testing, there is the potential for infection and spread if testing in an Internet-connected testbed. This class will teach how to build your own virtualized, physical, or cloud-based environment to practice your skills in a safe ecosystem.

You will learn what you need to create a lab for offensive and defensive cybersecurity concepts. You will also learn and obtain access to numerous tools that you can use to practice your skills, from virtual machines (VMs), Docker containers, and intentionally vulnerable systems. You will learn how you can leverage tools like Virtual Box, VMWare Workstation/Fusion, ESXi, Proxmox, or even OpenStack to build your own cyber range. In addition, you will also learn how to use tools like Vagrant and Ansible to automate a lot of tasks. Vagrant files and Ansible playbooks will be shared during the class for you to build complex lab environments within minutes. You will also learn how to create environments in cloud services such as AWS, Azure, Google Cloud, and Digital Ocean.

This course is designed for anyone preparing for a certification like Certified Ethical Hacker (CEH), CompTIA PenTest+, CEH Practical, Offensive Security Certified Professional (OSCP), Cisco CCIE Security, CCNP Security. It is also designed to help those just learning how to perform penetration testing (ethical hacking), exploit development, or reverse engineer malware.

System Requirements

This webinar / live training course is mostly led by demonstrations and Q&A.
You will have the opportunity to ask questions via the Q&A panel. Some of the exercises/demonstrations will take some time to setup in your environment and they must be completed at your own time.
Several of the environments will require dedicated hardware (PC, server, laptops, etc.) with at least 8GB or RAM.


You can get a head start by downloading WebSploit. However, during class you will learn about numerous (additional) resources and tools that are available for you to practice your cybersecurity skills.

Cybersecurity Training

Omar's on-demand and Live cybersecurity training, as well as books and other resources.

Topics include: Ethical hacking (penetration testing); digital forensics and Digital Forensics and Incident Response (DFIR); threat hunting; malware analysis; reverse engineering; and more.

Omar's Cybersecurity GitHub Repository 

Over 7,000 cybersecurity references related to ethical hacking / penetration testing, digital forensics and incident response (DFIR), vulnerability research, exploit development, reverse engineering, and more. 

Stay in Touch with Omar!

© Copyright 2019 Omar Santos - All Rights Reserved