Build Your Own Pen Testing Lab

Join Cybrary

Begin Learning Cyber Security for FREE Now!

Already a Member Login Here
< Back to S3SS10NS

Build Your Own Pen Testing Lab

Published: March 2, 2016 | By: Dean Pompilio | Views: 15491
This post has been saved to your profile

This Weeks S3SS10N Wednesday

You must be a Cybrary member to view this S3SS10N Wednesday Video .. Login or Join for Free Now

Whiteboard Notes

Click Image to View a Larger Version
< Back to S3SS10NS

About This S3SS10N Wednesday's Contributor

Dean Pompilio
Dean Pompilio has been in the IT field since 1989 and has both US and international experience working in the banking and credit card industries. After spending most of this life in Chicago, he came to the Washington, DC area in 2005 and has worked with the Department of Justice as well as the State Department in senior analyst roles as well as The World Bank.
Enjoy this S3SS10N Wednesday? Want more Cybytes?
Invite a Friend
and share now
Facebook Twitter LinkedIn Email
Join Cybrary
  1. great explanation on the network setup…

  2. Thank-you Dean for the short, to-the-point, and thorough video. Very nicely done!

    I’ve been having to do some forensics and thinking of creating a LAB environment for that purpose; is it ok to have a forensics lab and a pen-test labs in the same machine? I understand the resource constraints, but still interested in your opinion.

    How do I can CPE credits for the courses or sessions? may be this is not the right place to ask this question.

  3. A nice and useful presentation!

  4. Just great, and thanks for the tip on using host only mode when testing. The explanation of the three networking options was clear and to the point.

Page 2 of 4«1234»
Comment on This

You must be logged in to post a comment.

Our Revolution

We believe Cyber Security training should accessible for everyone, everywhere. Everyone deserves the OPPORTUNITY to learn, begin and grow a career in this fascinating field. Therefore, Cybrary is the world's largest community where people, companies and training come together to give everyone the ability to collaborate in an open source way that is revolutionizing the cyber security educational experience.

We recommend always using caution when following any link

Are you sure you want to continue?