👨‍💻
f3dai blog
  • 🧑about
  • Articles
    • ✨Artificial Intelligence
      • Using Gemini to query MITRE ATT&CK
      • Mapping AI safety regulation
      • Poisoning Models
      • Threat modelling generative AI
      • o1 coding capabilities
      • Multi-agent adversarial AI systems
      • Deep reinforcement learning for red teaming
    • ⚙️ICS / OT
      • Consequence-driven Cyber-informed Engineering (CCE)
      • Energy plant cyber simulation
      • OT threat landscape
    • ☁️Cyber engineering
      • Building a cyber lab
        • 1️⃣Design
        • 2️⃣Deploy
        • 3️⃣Test
        • 4️⃣Automating
      • Threat modelling
      • Automating incident response
    • 🚩Capture The Flag
      • Hackthebox - Golfer - Reversing
      • Hackthebox - Behind the Scenes - Reversing
      • Hackthebox - Bypass - Reversing
      • Harder - TryHackMe Walkthrough
    • 🎓Career
      • Domains and roles
Powered by GitBook
On this page

Was this helpful?

  1. Articles
  2. Cyber engineering

Building a cyber lab

As the name suggests, I'll be going over how you can build your own cyber security lab for purple team operations, including different architectural approaching like on prem and cloud based

What is a cyber lab

The cyber lab will be some virtual machines and an internal network (virtual).

The lab should have:

  1. Offensive security capability (red team)

  2. Monitoring capability (blue team)

  3. Networking infrastructure such as firewalls and subnets

And should be able to perform security activities such as

  • Penetration Testing

  • Forensics

  • Monitoring, Detection, Response (MDR, like a SOC)

  • Research and Development

PreviousCyber engineeringNextDesign

Last updated 1 year ago

Was this helpful?

☁️