The initial set of lab exercises have been defined by the National Cyber Security Student Association for building a Cyber Lab. in their by leveraging cloud based, hardware independent configurations.

Recommended Pre-Reqs

  1. Learn about how to install a virtual machine (and a hypervisor) in Microsoft Hyper-V, Oracle VirtualBox, or VMWare Workstation/Fusion.
  2. Develop a networking diagram to track virtual machines and connections
  3. Set up a attacking machine (Kali box) or download a pre-built image from OffensiveSecurity:
  4. Learn about firewalls and pfSense ( can be a good start.
  5. Follow the guides that you can find in the Internet or books to install the other machines that will expand your lab environment.

References Books

  • Advanced Penetration Testing for Highly-Secured Environments – Second Edition” (By: Lee Allen, Kevin Cardwell)
  • The Hacker Playbook 2: Practical Guide To Penetration Testing” (By: Peter Kim).

Lab Exercises (work-in-progress)

The following online portals are the primary labs used to practice cyber security skills:

  1. picoCTF – CTF practice competition; no linux distribution required.
  2. – Bandit wargames ; Linux disribution required.
  3. National Cyber League (NCL) – Gym practice portal available for practice during spring and fall competion windows.

These are additional labs available (optional):

  1. Root Me – Over 200 hacking challenges and 50 virtual environments allowing you to practice your hacking skills across a variety of scenarios.
  2. Hack This Site, URL: Training for web applications.
  3. google-gruyere.appspot – Web Application Exploits and Defenses
  4. Infosec CTF – Infosec Institute CTF – their very own CTF Labs