LiveLab Red Team & Blue Team Cybersecurity Fundamentals
duration: 20 hours |
access duration: 180 days |

Details
In this LiveLab, you will explore the fundamentals of cyber security and discover how to protect IT systems from common cyber attacks. During the first 15 modules of the lab, you gain hands-on experience applying fundamental Red Team Blue Team cybersecurity practices, while the last 5 modules introduce specific exploits.
Each module consists of two exercises. During the first (Red Team) exercise, you execute an exploit, in the second (Blue Team) exercise, you apply preventive measures to avoid that exploit. The first Red Team exploit can then be repeated to verify that the measures you took were successful. The lab environment can be reset multiple times so you can test what worked and what didn't. And once you feel confident, you can practice without following the steps described in the lab.
Result
After attending this LiveLab, you will have gained an understanding of the basics of cyber security and how to protect IT systems from common cyber attacks. This knowledge will also help you prepare for Capture the Flag (CTF) events using cyber ranks.
Prerequisites
Basic knowledge of cybersecurity is recommended.
Target audience
Security Specialist
Content
LiveLab Red Team & Blue Team Cybersecurity Fundamentals
IP Addressing Concepts
- Introduction
- Lab Topology
- Exercise 1 - Identify a Host’s IP Address Configuration
- Exercise 2 - Identify the Scope of IP Addresses Available on the Network
- Review
Initiate a Denial of Service Attack on a Server
- Introduction
- Lab Topology
- Exercise 1 - Initiate a Denial of Service (DoS) Attack
- Exercise 2 - Prevent a Denial of Service (DoS) Attack
- Review
SMB Exploit with Responder
- Introduction
- Lab Topology
- Exercise 1 - Exploit an SMB File Share Using Responder
- Exercise 2 - Prevent an SMB Exploit
- Review
Red Team - Introduction to Kali Linux
- Introduction
- Lab Topology
- Exercise 1 - Installing Kali Linux
- Exercise 2 - Configuring Kali Linux
- Exercise 3 - Configuring Kali Linux for Red Team Exercises
- Review
Blue Team - Server Firewall Configuration
- Introduction
- Lab Topology
- Exercise 1 - Configuring a Windows Firewall
- Exercise 2 - Configuring a Linux Firewall
- Review
Blue Team - Malware protection and Antivirus protection
- Introduction
- Lab Topology
- Exercise 1 - Configure Windows Security Center
- Exercise 2 - Install and configure a Linux anti-virus application
- Review
Red Team - Wireshark Essentials
- Introduction
- Lab Topology
- Exercise 1 - Capturing Network Traffic Using Wireshark
- Review
Red Team - Man in the Middle Exploits
- Introduction
- Lab Topology
- Exercise 1 - MITM Attack Initiation Using Ettercap
- Exercise 2 - MITM Attack Using ARPspoof
- Review
Blue Team - Network Monitoring Tools in Server Operating Systems
- Introduction
- Lab Topology
- Exercise 1 - Monitoring Network Traffic Using Microsoft Networking Tools
- Exercise 2 - Monitoring Network Traffic Using Linux Networking Tools
- Review
Blue Team - Patch Management and Software Updates
- Introduction
- Lab Topology
- Exercise 1 - Updating Microsoft operating systems
- Exercise 2 - Perform Patch Updates on a Linux System
- Review
Red Team - Credential Harvesting Tools
- Introduction
- Lab Topology
- Exercise 1 - Harvest User Credentials
- Exercise 2 - Use a Password Cracking Tool
- Review
Introduction to Cyber Ranges
- Introduction
- Lab Topology
- Exercise 1 - Introduction to Cyber Ranges
- Review
Introduction to Red Team and Blue Team Fundamentals
- Introduction
- Lab Topology
- Exercise 1 - Red Team Fundamentals
- Exercise 2 - Blue Team Fundamentals
- Exercise 3 - Module Explanation for the Red Team and Blue Team Practice Lab
- Review
Blue Team - Server Operating System Basics
- Introduction
- Lab Topology
- Exercise 1 - Firewall Fundamentals
- Exercise 2 - Checking Windows for Updates
- Exercise 3 - Dynamic Host Configuration (DHCP) Protocol Settings
- Exercise 4 - Implementing a Backup Strategy
- Exercise 5 - Reviewing Log Files
- Review
Red Team - Nmap Network Scanning Techniques
- Introduction
- Lab Topology
- Exercise 1 - Discover Hosts on the Network Using Zenmap
- Exercise 2 - Reconnaissance of the Network Using Nmap
- Review
Blue Team - Securing Servers with Policies
- Introduction
- Lab Topology
- Exercise 1 - Implement Security Policies on a Microsoft Server
- Exercise 2 - Implement Security Policies on a Linux Server
- Review
Performing a Brute Force Password Attack
- Introduction
- Lab Topology
- Exercise 1 - Perform a Brute Force Password Attack
- Exercise 2 - Prevent a Brute Force Attack
- Review
Red Team - Introduction to Metasploit
- Introduction
- Lab Topology
- Exercise 1 - Exploring the Metasploit Framework
- Review
Exploit Windows with Metasploit (Eternal Blue)
- Introduction
- Lab Topology
- Exercise 1 - Exploit Windows with Metasploit (Eternal Blue)
- Exercise 2 - Prevent an Eternal Blue Metasploit exploit
- Review
Protocols and Ports Used for Exploits
- Introduction
- Lab Topology
- Exercise 1 - Determine Open Ports on a Windows Machine
- Exercise 2 - Determine Open Ports on a Linux Machine
- Review
Exploiting Telnet Vulnerabilities
- Introduction
- Lab Topology
- Exercise 1 - Exploit a Telnet Vulnerability
- Exercise 2 - Prevent a Telnet Vulnerability
- Review
Course options
We offer several optional training products to enhance your learning experience. If you are planning to use our training course in preperation for an official exam then whe highly recommend using these optional training products to ensure an optimal learning experience. Sometimes there is only a practice exam or/and practice lab available.
Optional practice exam (trial exam)
To supplement this training course you may add a special practice exam. This practice exam comprises a number of trial exams which are very similar to the real exam, both in terms of form and content. This is the ultimate way to test whether you are ready for the exam.
Optional practice lab
To supplement this training course you may add a special practice lab. You perform the tasks on real hardware and/or software applicable to your Lab. The labs are fully hosted in our cloud. The only thing you need to use our practice labs is a web browser. In the LiveLab environment you will find exercises which you can start immediately. The lab enviromentconsist of complete networks containing for example, clients, servers,etc. This is the ultimate way to gain extensive hands-on experience.
Sign In
WHY_ICTTRAININGEN
Via ons opleidingsconcept bespaar je tot 80% op trainingen
Start met leren wanneer je wilt. Je bepaalt zelf het gewenste tempo
Spar met medecursisten en profileer je als autoriteit in je vakgebied.
Ontvang na succesvolle afronding van je cursus het officiële certificaat van deelname van Icttrainingen.nl
Krijg inzicht in uitgebreide voortgangsinformatie van jezelf of je medewerkers
Kennis opdoen met interactieve e-learning en uitgebreide praktijkopdrachten door gecertificeerde docenten
Orderproces
Once we have processed your order and payment, we will give you access to your courses. If you still have any questions about our ordering process, please refer to the button below.
read more about the order process
Een zakelijk account aanmaken
Wanneer u besteld namens uw bedrijf doet u er goed aan om aan zakelijk account bij ons aan te maken. Tijdens het registratieproces kunt u hiervoor kiezen. U heeft vervolgens de mogelijkheden om de bedrijfsgegevens in te voeren, een referentie en een afwijkend factuuradres toe te voegen.
Betaalmogelijkheden
U heeft bij ons diverse betaalmogelijkheden. Bij alle betaalopties ontvangt u sowieso een factuur na de bestelling. Gaat uw werkgever betalen, dan kiest u voor betaling per factuur.

Cursisten aanmaken
Als u een zakelijk account heeft aangemaakt dan heeft u de optie om cursisten/medewerkers aan te maken onder uw account. Als u dus meerdere trainingen koopt, kunt u cursisten aanmaken en deze vervolgens uitdelen aan uw collega’s. De cursisten krijgen een e-mail met inloggegevens wanneer zij worden aangemaakt en wanneer zij een training hebben gekregen.
Voortgangsinformatie
Met een zakelijk account bent u automatisch beheerder van uw organisatie en kunt u naast cursisten ook managers aanmaken. Beheerders en managers kunnen tevens voortgang inzien van alle cursisten binnen uw organisatie.
What is included?
Certificate of participation | No |
Monitor Progress | Yes |
Mobile ready | Yes |
Sharing knowledge | Unlimited access to our IT professionals community |
Study advice | Our consultants are here for you to advice about your study career and options |
Study materials | Certified teachers with in depth knowledge about the subject. |
Service | World's best service |
Platform
Na bestelling van je training krijg je toegang tot ons innovatieve leerplatform. Hier vind je al je gekochte (of gevolgde) trainingen, kan je eventueel cursisten aanmaken en krijg je toegang tot uitgebreide voortgangsinformatie.

FAQ
Niet gevonden wat je zocht? Bekijk alle vragen of neem contact op.