CLOUD//RANGES

// LAB CATALOG

ALL LABS

34 active hands-on labs from the database, with catalog pricing pulled from each lab record.

34 labs
01Intermediate

Hacking Azure

Azure hacking labs are specialized environments designed to simulate attacks on Microsoft’s cloud infrastructure. Unlike traditional labs, these focus on cloud-specific vulnerabilities such as Entra ID (formerly Azure AD) misconfigurations, insecure storage blobs, and overly permissive IAM roles

2h· 0 objectivesAzure
#azure#hacking#cybersecurity
Individual access$12
GET ACCESS - $12
02Unrated

Testing Lab

For test purposes

2h session· 0 objectivesCloud
Individual access$1
GET ACCESS - $1
03Beginner

AWS IAM Foundations and Least Privilege

Build a secure IAM baseline with users, groups, roles, permission boundaries, MFA, and policy simulation. Students practice least-privilege design and review common identity risks.

55 min· 0 objectivesCloud
#aws#iam#security#least-privilege
Individual access$29Group $59
GET ACCESS - $29
04Intermediate

AWS VPC Security, Routing, and Network Controls

Design a secure VPC using public and private subnets, security groups, NACLs, route tables, VPC endpoints, and flow logs. Includes validation of inbound and outbound traffic paths.

1h 10m· 0 objectivesCloud
#aws#vpc#network-security#cloud
Individual access$39Group $79
GET ACCESS - $39
05Intermediate

AWS Data Protection with S3, KMS, and CloudTrail

Protect data with S3 block public access, bucket policies, KMS keys, object encryption, access logging, and CloudTrail monitoring. Students identify and fix exposed storage configurations.

1h 5m· 0 objectivesCloud
#aws#s3#kms#cloudtrail
Individual access$39Group $79
GET ACCESS - $39
06Advanced

AWS GuardDuty Threat Detection and Response

Enable GuardDuty, generate realistic findings, investigate suspicious activity, and document containment actions. Students connect detection events to practical incident response steps.

1h 20m· 0 objectivesCloud
#aws#guardduty#incident-response#soc
Individual access$49Group $89
GET ACCESS - $49
07Beginner

Azure RBAC, Management Groups, and Policy

Configure Azure role assignments, custom roles, management groups, and Azure Policy. Students enforce governance controls and verify compliance across subscriptions.

1h· 0 objectivesAzure
#azure#rbac#policy#governance
Individual access$29Group $59
GET ACCESS - $29
08Intermediate

Azure Network Security and Microsoft Defender for Cloud

Secure virtual networks with NSGs, private endpoints, Azure Firewall concepts, and Defender for Cloud recommendations. Students remediate prioritized cloud security findings.

1h 15m· 0 objectivesAzure
#azure#network-security#defender-for-cloud#firewall
Individual access$39Group $79
GET ACCESS - $39
09Intermediate

Azure Key Vault and Secrets Operations

Create vaults, store secrets, configure access policies and RBAC, rotate keys, and audit secret usage. Students learn secure application secret handling in Azure.

1h 5m· 0 objectivesAzure
#azure#key-vault#secrets#encryption
Individual access$39Group $79
GET ACCESS - $39
10Advanced

Microsoft Sentinel Detection Engineering

Connect log sources, write KQL detections, investigate incidents, and build an analyst dashboard in Microsoft Sentinel. Includes alert triage and response notes.

1h 30m· 0 objectivesAzure
#azure#sentinel#kql#siem
Individual access$49Group $89
GET ACCESS - $49
11Beginner

Google Cloud IAM and Organization Policy

Configure IAM roles, service accounts, conditional access, and organization policies. Students reduce over-permissioned identities and validate secure access patterns.

1h· 0 objectivesGCP
#gcp#iam#organization-policy#security
Individual access$29Group $59
GET ACCESS - $29
12Intermediate

Google Cloud VPC, Firewall Rules, and Private Access

Build secure VPC networks with subnets, firewall rules, routes, Private Google Access, and VPC Flow Logs. Students test traffic restrictions and monitoring.

1h 10m· 0 objectivesGCP
#gcp#vpc#firewall#network-security
Individual access$39Group $79
GET ACCESS - $39
13Intermediate

Google Cloud Armor and Web App Protection

Protect web workloads with Cloud Armor policies, WAF rules, IP restrictions, and rate limiting. Students validate controls against common web attack patterns.

1h 15m· 0 objectivesGCP
#gcp#cloud-armor#waf#web-security
Individual access$39Group $79
GET ACCESS - $39
14Advanced

Security Command Center Investigation

Use Security Command Center to identify misconfigurations, prioritize findings, and document remediation. Students handle a guided cloud incident investigation.

1h 25m· 0 objectivesGCP
#gcp#security-command-center#incident-response#cloud-security
Individual access$49Group $89
GET ACCESS - $49
15Intermediate

Kubernetes RBAC and Network Policy

Secure a Kubernetes cluster with namespaces, service accounts, RBAC roles, and network policies. Students restrict workload privileges and pod-to-pod traffic.

1h 15m· 0 objectivesCloud
#kubernetes#rbac#network-policy#devsecops
Individual access$39Group $79
GET ACCESS - $39
16Intermediate

Container Image Security and Registry Controls

Scan container images, fix vulnerable packages, enforce registry controls, and sign images. Students build a secure image promotion workflow.

1h 10m· 0 objectivesCloud
#containers#image-scanning#registry#supply-chain
Individual access$39Group $79
GET ACCESS - $39
17Advanced

Kubernetes Secrets, Admission Control, and Policy

Protect Kubernetes secrets, apply admission policies, and prevent risky deployments. Students enforce baseline controls with policy-as-code concepts.

1h 20m· 0 objectivesCloud
#kubernetes#secrets#admission-control#policy-as-code
Individual access$49Group $89
GET ACCESS - $49
18Advanced

Kubernetes Runtime Threat Detection

Detect suspicious container behavior using runtime security signals. Students investigate privilege escalation, shell activity, and unexpected network connections.

1h 30m· 0 objectivesCloud
#kubernetes#runtime-security#threat-detection#soc
Individual access$49Group $89
GET ACCESS - $49
19Beginner

SOC Analyst Log Triage Fundamentals

Analyze authentication, endpoint, DNS, and web logs to separate normal activity from suspicious behavior. Students practice alert notes and escalation criteria.

55 min· 0 objectivesCloud
#soc#log-analysis#blue-team#triage
Individual access$29Group $59
GET ACCESS - $29
20Beginner

Phishing Investigation and Email Security

Investigate a phishing case using email headers, URLs, attachments, and user reports. Students classify the threat and recommend containment actions.

1h· 0 objectivesCloud
#soc#phishing#email-security#incident-response
Individual access$29Group $59
GET ACCESS - $29
21Intermediate

SIEM Detection Rules and Alert Tuning

Write detection rules, tune false positives, map alerts to MITRE ATT&CK, and build a simple dashboard. Students learn practical SOC engineering habits.

1h 15m· 0 objectivesCloud
#soc#siem#detection-engineering#mitre-attack
Individual access$39Group $79
GET ACCESS - $39
22Intermediate

Incident Handling Tabletop and Evidence Collection

Walk through a practical incident workflow: scope, contain, preserve evidence, communicate status, and close with lessons learned.

1h 20m· 0 objectivesCloud
#soc#incident-handling#forensics#blue-team
Individual access$39Group $79
GET ACCESS - $39
23Beginner

Ethical Hacking Reconnaissance and Scanning

Perform authorized OSINT, host discovery, port scanning, service enumeration, and vulnerability prioritization against a controlled target range.

1h 5m· 0 objectivesCloud
#ethical-hacking#reconnaissance#nmap#vulnerability-assessment
Individual access$39Group $79
GET ACCESS - $39
24Intermediate

Web App Testing with OWASP Top 10

Test a vulnerable web application for SQL injection, XSS, IDOR, broken authentication, and insecure configuration. Includes remediation guidance.

1h 25m· 0 objectivesCloud
#ethical-hacking#web-security#owasp#application-security
Individual access$49Group $89
GET ACCESS - $49
25Advanced

Linux and Windows Privilege Escalation

Escalate from limited access to administrative control in safe lab systems. Students analyze misconfigurations, weak permissions, and exposed credentials.

1h 30m· 0 objectivesCloud
#ethical-hacking#privilege-escalation#linux#windows
Individual access$49Group $89
GET ACCESS - $49
26Intermediate

Penetration Test Reporting and Remediation

Convert technical findings into a professional report with severity, evidence, impact, and remediation. Students write executive and technical summaries.

1h· 0 objectivesCloud
#ethical-hacking#reporting#risk#remediation
Individual access$29Group $59
GET ACCESS - $29
27Intermediate

Zero Trust Identity and Conditional Access

Implement zero trust identity controls with MFA, conditional access concepts, device trust, and privileged access review.

1h 5m· 0 objectivesCloud
#zero-trust#identity#conditional-access#security-architecture
Individual access$39Group $79
GET ACCESS - $39
28Intermediate

Zero Trust Network Segmentation

Design segmentation controls for users, workloads, and management planes. Students map trust boundaries and validate access decisions.

1h 15m· 0 objectivesCloud
#zero-trust#network-security#segmentation#architecture
Individual access$39Group $79
GET ACCESS - $39
29Advanced

Zero Trust Monitoring and Continuous Verification

Build monitoring signals for identity, endpoint, network, and cloud activity. Students connect policy decisions to detection and response workflows.

1h 20m· 0 objectivesCloud
#zero-trust#monitoring#detection#continuous-verification
Individual access$49Group $89
GET ACCESS - $49
30Beginner

Zero Trust Roadmap and Maturity Assessment

Assess current controls, define target maturity, and create an implementation roadmap. Students prepare a business-ready zero trust plan.

55 min· 0 objectivesCloud
#zero-trust#strategy#maturity-assessment#governance
Individual access$29Group $59
GET ACCESS - $29
31Beginner

Next-Generation Firewall Policy Basics

Create zones, interfaces, NAT, address objects, and security policies on a virtual firewall. Students test safe allow and deny rules.

1h· 0 objectivesCloud
#network-security#firewall#ngfw#policy
Individual access$29Group $59
GET ACCESS - $29
32Intermediate

Site-to-Site VPN and Remote Access Controls

Configure secure VPN connectivity, authentication settings, tunnel policies, and logging. Students verify encrypted connectivity and troubleshoot failures.

1h 15m· 0 objectivesCloud
#network-security#vpn#firewall#remote-access
Individual access$39Group $79
GET ACCESS - $39
33Intermediate

IPS, URL Filtering, and Threat Prevention

Enable threat profiles, URL filtering, IPS signatures, and logging on a virtual firewall. Students test controls against simulated malicious traffic.

1h 20m· 0 objectivesCloud
#network-security#ips#url-filtering#threat-prevention
Individual access$49Group $89
GET ACCESS - $49
34Advanced

Firewall Operations, Logging, and Change Review

Review policy changes, analyze firewall logs, troubleshoot blocked traffic, and document operational controls for production firewall environments.

1h 25m· 0 objectivesCloud
#network-security#firewall-operations#logging#change-management
Individual access$49Group $89
GET ACCESS - $49