Creating Cyber Security Lab Environment in EVE-NG

Beginner 5 English
Created by Ahmad Ali
Last updated Wed, 15-Feb-2023
+ View more

Overview of Creating Cyber Security Lab Environment in EVE-NG

Introduction: 

This Course will teach you how to set up an environment to practice your Cybersecurity, Ethical Hacking and Pen testing skills such as Launching a cyberattack, verifying vulnerabilities, Conducting research projects and Much more. After this Course I am sure you will never ask someone to provide you EVE NG qcow2 images as you will learn how to convert any type of image to qcow2 with 4 different methods also, you will easily troubleshoot EVE NG errors which you are facing on daily basis. you will

discover how to add several different target systems from the latest Windows platform to systems that are intentionally vulnerable such as Metasploitable, OWASP, phpAuction, DVWA, Mutillidae etc. Having these targets will allow you to launch attacks, verify vulnerabilities, and conduct research projects without your production environment.

Who Should Attend:

Anyone who wants to learn cyber security and apply its principles in a risk-free environment should take this course. If you want to master cyber security research and learn hacking tools, then this is a perfect place to start.


Topics Covered in Creating Cyber Security Lab Environment in EVE-NG

  • This Bootcamp will teach you how to set up a hacking lab environment
  • Ethical Hacking and Pen testing skills
  • Setup different Vulnerable Web Applications
  • Layers of the Web or Internet
  • Cybersecurity Introduction, Defense Models & Important
  • Will learn how to convert any type of image to EVE NG qcow2
  • Install and Configure EVE NG
  • Setup different Hacking OS

Requirements for Creating Cyber Security Lab Environment in EVE-NG

  • Basic IP and security knowledge is nice to have.
  • Students need to understand basic networking.
  • Students needs to understand Networking Fundamentals.
  • Working knowledge of networking technology.
  • General knowledge of TCP/IP.
  • Basic Linux and programming concept.

Modules

49 Lessons 10:09:32 Hours
Introduction to Cybersecurity
13 Lessons 02:21:54 Hours
  • Introduction to Cybersecurity
    00:12:07
  • Cybersecurity Defense Models
    00:05:58
  • Cybersecurity Important
    00:10:22
  • Cybersecurity Model
    00:09:19
  • Cybersecurity Certifications
    00:06:45
  • Zero Trust Architecture
    00:06:23
  • Layers of the Web
    00:14:07
  • Layers of the Web
    00:18:47
  • Best OS for Hacking
    00:06:38
  • Hacking Hardware Devices
    00:08:16
  • OWASP Top Ten 10
    00:13:58
  • Vulnerable Web Applications
    00:06:19
  • Password Attack
    00:22:55
  • EVE NG and Images Links
    00:11:03
  • Install VMware Workstation Pro
    00:09:30
  • Install & Configure EVE-NG
    00:13:21
  • Installing EVE-NG Client Pack
    00:05:41
  • EVE NG Qemu Image Naming
    00:22:23
  • Upload IOS Routers on EVE NG
    00:04:28
  • Upload IOU Switches in EVE NG
    00:05:03
  • EVE-NG Networks Clouds
    00:14:49
  • bWAPP Server Setup
    00:15:06
  • Metasploitable Setup
    00:17:00
  • OWASP Server Setup
    00:14:02
  • PHP Auction Site Setup
    00:08:49
  • Kali Linux OS Setup
    00:24:29
  • Backbox OS Setup
    00:15:31
  • Parrot OS Setup
    00:19:24
  • Cyber Attacks Lab Setup
    00:34:58
  • Web Servers Configuration
    00:06:43
  • Vulnerable Servers Config
    00:23:54
  • EDG Router Configuration
    00:06:57
  • Reconnaissance Attack
    00:32:11
  • MAC Flooding Attack
    00:08:18
  • Ping Of Death Attack
    00:06:40
  • ICMP Flooding Attack
    00:10:57
  • SYN Flooding Attack
    00:13:11
  • Smurf Attack
    00:13:08
  • LAND Attack
    00:06:31
  • Slowloris Attack
    00:09:13
  • ARP Spoofing Attack
    00:23:00
  • DHCP Starvation Attack
    00:16:49
  • DHCP Spoofing Attack
    00:07:52
  • Phishing Attack
    00:08:25
  • SQL Injection Attack
    00:14:30
  • Command Injection Attack
    00:07:09
  • DNS Spoofing Attack
    00:16:33
  • Creating Cyber Security Lab Environment in EVE-NG Lab Files
    .
  • Creating Cyber Security Lab Environment in EVE-NG Workbook
    .
5
1 Ratings

Student Reviews

  • Akil Chisty
    17/03/2023
    Awesome.

Other related courses

EVE-NG Basics Course
03:48:29 Hours
15 Lectures
Beginner

Navid Yahyapour

$10$6

EVE-NG Deep Dive Course
07:47:24 Hours
30 Lectures
Intermediate

Navid Yahyapour

$40$24

About instructor

Ahmad Ali

Cyber Security Consultant & Certified Trainer

105 Reviews | 227 Students | 15 Courses
Cyber Security Network Security Firewalls Cisco Firepower Cisco ASA Checkpoint Fortinet Firewalls Palo Alto Firewall CCNP Security CCNP Enterprise VPN CEH F5
I am Cyber Security Consultant and Cisco Certified Trainer with several years of experience. Teaching part time for more than 10 years’ providing classroom, on-site and online trai...
Preview this Course

Includes:
  • 10:09:32 Hours On demand videos
  • 49 Lessons
  • Study Group Participation
  • Acces the Content Anywhere, Anytime
  • Certificate of Completion - Signed by Orhan Ergun
  • Compare this course with other