Cybersecurity Fundamentals: Monitoring, Detection, and Lab Setup

About Course
This course provides a practical, hands-on introduction to cybersecurity, monitoring, and ethical hacking using a safe, self-contained lab environment. You will learn how to design and deploy your own security lab where you can practice launching cyberattacks, verifying vulnerabilities, analyzing logs, and building defensive strategies without putting production systems at risk.
Through real-world exercises, you will gain experience with:
-
Converting images to EVE-NG qcow2 (with multiple methods).
-
Installing and configuring Windows, Linux, pfSense, and VMware Workstation.
-
Deploying vulnerable systems such as Metasploitable, DVWA, Mutillidae, and OWASP projects.
-
Setting up attacker systems like Kali Linux.
-
Integrating monitoring tools such as Splunk and Security Onion for log collection, analysis, and threat detection.
By the end of this course, you will be able to confidently build your own cybersecurity lab, simulate real-world attacks, and monitor them through professional-grade security tools.
Course Content
Getting Started
-
Camera basics – 1
-
Camera basics – 2
-
Focal length
-
Types of shots
-
Tools used for making films