There are 3 main requirements to create a cyber security lab environment. These are:
In this article, we have listed free tools / resources that you can use to create your own lab environment.
Additionally, if you are looking for a blue team online lab, you can visit letsdefend.io
It is better to create a virtual environment in order not to create costs than to set up a physical environment. Therefore, the following virtualization applications can be used:
To detect an attack, the attack must first occur, if you have time and want to do the attacks yourself, PentestWiki will help you.
If you want to focus on detection, you can use the following open source tools that will automatically perform attacks.