Cybersecurity • Home Lab • In Progress

Dedicated Cybersecurity Home Lab

This project documents the buildout of my dedicated cybersecurity home lab hosted on a personal server. The lab is being built to practice virtualization, network isolation, Windows and Linux administration, traffic analysis, logging, and hands-on cybersecurity fundamentals in a safe, isolated environment.

Overview

I created this home lab to build hands-on experience in cybersecurity and IT using a dedicated server-based environment. The goal is to create a realistic practice space where I can work with Windows and Linux systems, network traffic analysis, system hardening, logging, and foundational security workflows.

This lab also serves as a long-term project that supports my technical portfolio. It will connect multiple lab exercises into one environment and document both the build process and the skills developed along the way.

Goals

  • Build a dedicated virtualization-based cybersecurity lab on a personal server
  • Practice safely in an isolated environment
  • Strengthen Linux and Windows administration skills
  • Develop experience with network analysis, logging, and troubleshooting
  • Document the project clearly for portfolio and GitHub presentation

Hardware & Platform

This section will be updated with the final server specifications once the hardware details are confirmed.

  • Server: Personal dedicated server
  • Hypervisor: ESXi
  • Status: Planning and build preparation
  • Purpose: Dedicated home lab host for cybersecurity practice

Lab Architecture

The lab will be built around a dedicated Proxmox host with multiple virtual machines connected through an isolated lab network. The environment is designed to support safe testing, system administration practice, traffic analysis, and future security-focused expansions.

Proxmox VE Virtualization Network Isolation Windows Linux Traffic Analysis Logging

Virtual Machine Inventory

These are the planned core virtual machines for the first version of the lab.

VM Name Operating System Purpose Resources Status
LAB-UBUNTU-SRV-01 Ubuntu Server Linux administration, SSH, services, logging, and firewall practice 2 vCPU / 16 GB RAM / 25 GB disk Planned
LAB-KALI-01 Kali Linux Enumeration, packet capture, and security analysis workstation 2 vCPU / 16 GB RAM / 80 GB disk Planned
LAB-WIN11-CLIENT-01 Windows 11 Event Viewer, Defender, PowerShell, firewall rules, and endpoint practice 2 vCPU / 16 GB RAM / 96 GB disk Planned
LAB-METASPLOITABLE2-01 Metasploitable 2 Intentionally vulnerable target for controlled internal-lab testing 1 vCPU / 1 GB RAM / 20 GB disk Future Add

Build Progress

This section tracks the major phases of the home lab build.

Phase 1

Server Preparation

Confirm server specifications, back up any needed data, and prepare the machine to become a dedicated hypervisor host.

Phase 2

Proxmox Installation

Install Proxmox VE, configure management access, and prepare the environment for virtualization and isolated networking.

Phase 3

Network Configuration

Build an isolated lab network for VM-to-VM traffic and keep vulnerable systems separated from the main home network.

Phase 4

Core VM Deployment

Create Ubuntu Server, Kali Linux, and Windows 11 virtual machines and verify connectivity and basic functionality.

Phase 5

Lab Validation

Test connectivity, SSH access, Windows administration tools, basic scanning, and packet capture in the isolated environment.

Phase 6

Future Expansion

Add vulnerable targets, logging improvements, and additional systems such as Active Directory, centralized logs, or a SIEM.

Labs Built in This Environment

This home lab is designed to support multiple hands-on exercises and technical writeups over time.

  • Windows logging and Event Viewer practice
  • Windows Defender Firewall configuration
  • Wireshark traffic analysis
  • Linux administration and SSH
  • Basic enumeration and network validation
  • Future vulnerable target practice in an isolated environment

Skills Demonstrated

Virtualization Proxmox Windows Administration Linux Administration Network Segmentation Packet Analysis Logging Documentation Troubleshooting System Hardening

Screenshots

Screenshot placeholders for this project will include the Proxmox dashboard, VM list, network configuration, VM consoles, packet captures, and operating system configuration screens.

  • Proxmox dashboard overview
  • Virtual machine inventory view
  • Bridge and network configuration
  • Ubuntu Server terminal and SSH access
  • Kali Linux scanning and analysis screenshots
  • Windows 11 Event Viewer and firewall configuration

Lessons Learned

This section will be updated throughout the build to reflect what I learn about virtualization, networking, system configuration, and troubleshooting while expanding the lab.

Planned Improvements

  • Add exact server specifications and final resource allocation
  • Create a simple network diagram for the site and GitHub
  • Add Metasploitable 2 after the core environment is stable
  • Expand into centralized logging or SIEM-style monitoring
  • Consider future additions like Active Directory or pfSense