This quick reference page provides a summary of the specifications of this topology. For a complete reference including installation details, please refer to the RING Cybersecurity Exploration Pod Planning and Installation Guide .

The RING Cybersecurity Exploration Pod is designed to have internet access.
Due to the security and legal implications regarding accessing the Internet from within the pod, we require that NETLAB+ customers indicate their acceptance of the NETLAB+ Pod Internet Access and Use Agreement prior to obtaining access to the pod or content for this course.

Lab Topology


Virtual Machines

The virtual machines in the pod are listed in the table below.

Virtual Machine
Kali Linux
Metasploitable 3
Windows 2019 Server