Build your Pentest Lab with KVM, QEMU and LibVirt - Pentestmag
Sale!

Build your Pentest Lab with KVM, QEMU and LibVirt

Original price was: $790.00.Current price is: $399.00.


Get the access to all our courses via Subscription

Subscribe

Categories: ,

Description

Why Virtualization is a Must-Have Skill for IT Security Professionals

Ready to Elevate Your Cybersecurity Skills?

In today’s cybersecurity landscape, virtualization is no longer optional—it’s a necessity. Whether you’re testing defenses, training teams, or analyzing exploits, virtualization provides:

  • Safe Environments: Isolated systems for real-world testing without risks.
  • Infinite Flexibility: Build, break, and rebuild networks and systems in minutes.
  • Cost Efficiency: Simulate enterprise setups without the expense of physical hardware.


Who Should Take This Course?

  • Cybersecurity Enthusiasts: Build the skills that set you apart in penetration testing and exploit development.
  • IT Security Professionals: Stay ahead of attackers by mastering tools and environments they exploit.
  • Red Teamers and SOC Analysts: Simulate attack scenarios and train teams in dynamic virtual environments.
  • Reverse Engineers: Analyze malware safely within isolated virtual labs.


Gain the Edge:

Master Virtualization for Security

Security experts who master virtualization gain a critical edge, enabling them to:

  • Simulate attacks on complex networks.
  • Reverse-engineer malware safely.
  • Create scalable, reusable labs for continuous learning and testing.

This course teaches you everything you need to know about virtualization for security.

100% Labs. No Theory. Pure, actionable skills.


Why Choose This Course?

  • Hands-On and Practical: No slides, no lectures—just labs. Every lesson is designed to help you learn by doing.
  • Stay Ahead: Gain lifetime access to course updates and extensions, keeping your skills sharp as technology evolves.
  • Real-World Application: Learn to use virtualization tools like a professional—applying them directly to penetration testing, exploitation, red teaming, and beyond.
  • Built for All Skill Levels: Whether you’re new to virtualization or looking to deepen your expertise, this course guides you step-by-step.


What You’ll Learn

This course focuses on real-world, hands-on labs that guide you through:

  • Setting up and configuring QEMU, KVM, and Libvirt.
  • Building advanced virtualized environments with multi-tiered networks.
  • Automating lab setups for efficiency and consistency.
  • Using snapshots and cloning to save and rollback environments.
  • Simulating realistic attack surfaces for:
    • Exploitation and penetration testing.
    • Red team training.
    • Reverse engineering and malware analysis.

Module 1: Introduction to QEMU

  • Lab 1: Running a “Hello, World!” Program with QEMU in User Mode
  • Lab 2: Check and Prepare KVM
  • Lab 3: Introduction to QEMU System Mode
  • Lab 4: Intro to Networking with QEMU: Using -nic user
  • Lab 5: Intro to running Ubuntu on QEMU

Module 2: Understanding KVM

  • Lab 6: Introduction to KVM and QEMU

Module 3: Managing QEMU Images

  • Lab 7: Types of System Images
  • Lab 7: Base a New Image on a System Image
  • Lab 8: Making Offline Snapshots
  • Lab 9: Connecting to VM image for debugging
  • Lab 10: Creating a Custom Ubuntu Image with GCC and Cloud-Init

Module 4: Managing VMs with Cloud-Init

  • Lab 11: Setting Users Using Cloud-Init
  • Lab 12: Advanced User and Groups Configuration Using Cloud-Init
  • Lab 13: Install packages with Cloud-Init
  • Lab 14: Writing files with Cloud-Init
  • Lab 15: Running Commands with Cloud-Init
  • Lab 16: Using Instance Metadata Service with Cloud-Init
  • Lab 17: Debugging Cloud-Init

Module 5: QEMU Networking

  • Lab 18: Understanding and Configuring Bridges
  • Lab 19: Setting Up VMs with a Bridge and TAP Devices
  • Lab 20: Configuring VMs with Cloud-Init for Networking
  • Lab 21: Configuring VMs with Netplan and Network-Config
  • Lab 22: Networking Lab: Configuring VMs with a Bridge and DHCP Server
  • Lab 23: Using QEMU Scripts to Manage TAP Devices

Module 6: Using QEMU Monitor and GDB

  • Lab 24: Introduction to QEMU Monitor
  • Lab 25: QEMU Monitor: Creating and Managing Snapshots
  • Lab 26: QEMU Monitor: Memory Forensics
  • Lab 27: QEMU Monitor: Advanced SaveVM and LoadVM
  • Lab 28: QEMU Monitor: Using QMP (QEMU Machine Protocol)
  • Lab 29: Debugging and Saving Memory of Guest Processes with GDB

Module 7: Introduction to Libvirt

  • Lab 30: Introduction to Libvirt: Setting Up and Running a Simple VM
  • Lab 31: Libvirt Default Network
  • Lab 32: VM configuration with virsh edit
  • Lab 33: File Sharing Between Host and Guest Using VirtioFS
  • Lab 34: Libvirt: Advanced Save and Restore Snapshots
  • Lab 35: Libvirt: Memory Forensics with QEMU HMP
  • Lab 36: Libvirt: Exploring QEMU Guest Agent Features

Module 8: Networking with Libvirt

  • Lab 37: Libvirt: Customizing the default network
  • Lab 38: Libvirt: Using Static IPs
  • Lab 39: Libvirt: Using Custom and Default Networks
  • Lab 40: Enhancing Network Security with Libvirt’s Network Filters
  • Lab 41: Enhancing Network Security with iptables
  • Lab 42: Secure Private Network with Internet Access to Safe Ports Only
  • Lab 43: Exposing a VM to the Internet Using Macvtap


Meet Your Instructor

Pawel Marciniak

Founder and Director of Hakin9 Media

Pawel Marciniak has been in the IT security game since 1995, diving deep into penetration testing, security research, and protecting critical systems. Over the years, he’s tackled everything from securing Poland’s Election Network—keeping presidential elections and national referendums (including the EU membership vote) safe—to running hundreds of pen tests for banks, the military, and industry giants.

If it’s about breaking into systems to make them stronger, Pawel’s done it. He’s been sharing his knowledge for years as an educator, speaker, and hands-on trainer. These days, he’s all in on creating the best, no-fluff, hands-on training for offensive security pros.

As the Founder of Hakin9 Media, Pawel’s mission is simple: help security experts level up with practical skills they can use in the real world. Whether you’re in the trenches or just starting out, Pawel’s work is about making sure you’re ready for whatever the cyber world throws at you.

Reviews

There are no reviews yet.

Only logged in customers who have purchased this product may leave a review.

© HAKIN9 MEDIA SP. Z O.O. SP. K. 2023