Equipment
• Workstations (or laptop) with ability to run VM
• Firewall
• IDS/IPS
• Servers
Software
• Windows operating systems
- Commando VM
• Linux operating systems - Kali
• Open-source UTM appliance
• Metasploitable
• SIEM - Greylog
- ELK
- Splunk
• TCPDump
• Wireshark
• Vulnerability scanner (i.e., OpenVAS)
• Nessus
• Access to cloud instances - Azure
- AWS
- GCP
