Summary
During the course of this chapter, you have discovered the importance and benefits of building your personal lab environment for learning and gaining hands-on experience when learning about various cybersecurity topics. Additionally, you have learned how to set up a virtualized environment and network, how to deploy Kali Linux and OSINT VM, and how to set up vulnerable systems for security testing.
I hope this chapter has been informative for you and helpful in your journey in the cybersecurity industry. In the next chapter, Understanding Passive Reconnaissance, you will learn about the fundamentals and importance of using passive reconnaissance techniques to discover organizations’ assets that are exposed on the internet.