Chapter 13. Building a Complete Cyber Range
In this chapter, we will put all of the components together and discuss the architecture that can support the scenarios we have covered throughout the book. We will be discussing the following topics:
- Creating the layered architecture
- Integrating decoys and honeypots
- Attacking the cyber range
- Recording the attack data for further training and analysis
This chapter will provide us with a complete architecture that we can use to perform our testing. This design will allow us to plug in any required components that we might have. Furthermore, it will provide you with the capability to test all types of testing that you might need.
Creating the layered architecture
As we have discussed throughout the book, the ...
Get Building Virtual Pentesting Labs for Advanced Penetration Testing - Second Edition now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.