Introduction to Cyber Security
1
+
Network Fundamentals
5
+
WHAT IS NETWORKING
-
INTRO TO LAN LAB
-
OSI MODEL LAB
-
PACKETS & FRAMES LAB
-
EXTENDING YOUR NETWORK LAB
-
How the Web Works
4
+
Linux Fundamentals
3
+
Windows Fundamentals
3
+
Start Your Cyber Security Journey
1
+
AD Fundamentals
1
+
Command Line
3
+
Networking
7
+
NETWORKING CONCEPTS LAB
-
NETWORKING ESSENTIALS
-
NETWORKING CORE PROTOCOLS LAB
-
NETWORKING SECURE PROTOCOLS LAB
-
WIRESHARK: THE BASICS LAB
-
TCPDUMP: THE BASICS LAB
-
NMAP: THE BASICS LAB
-
Cryptography
4
+
CRYPTOGRAPHY BASICS
-
PUBLIC KEY CRYPTOGRAPHY BASIC LAB
-
HASHING BASICS LAB
-
JOHN THE RIPPER: THE BASICS LAB
-
Exploitation Basics
3
+
Web Hacking
4
+
WEB APPLICATION BASICS
-
JAVASCRIPT ESSENTIALS
-
SQL FUNDAMENTALS LAB
-
BURP SUITE: THE BASICS LAB
-
Offensive Security Tool
4
+
Defensive Security
4
+
SOC FUNDAMENTALS
-
DIGITAL FORENSICS FUNDAMENTALS LAB
-
INCIDENT RESPONSE FUNDAMENTALS LAB
-
LOGS FUNDAMENTALS LAB
-
Security Solutions
4
+
Defensive Security Tool
2
+
Build Your Cyber Security Career
2
+
Cyber Defence Frameworks
6
+
JUNIOR SECURITY ANALYST INTRO
-
PYRAMID OF PAIN
-
CYBER KILL CHAIN
-
UNIFIED KILL CHAIN
-
DIAMOND MODEL
-
MITRE
-
Cyber Threat Intelligence
5
+
Network Security and Traffic Analysis
8
+
TRAFFIC ANALYSIS ESSENTIALS
-
SNORT LAB
-
NETWORK MINER LAB
-
ZEEK LAB
-
ZUI LAB
-
WIRESHARK: PACKET OPERATIONS LAB
-
TSHARK: THE BASICS LAB
-
TSHARK: CLI WIRESHARK FEATURES LAB
-
Endpoint Security Monitoring
7
+
INTRO TO ENDPOINT SECURITY
-
CORE WINDOWS PROCESSES
-
SYSINTERNALS LAB
-
WINDOWS EVENT LOGS LAB
-
SYSMON LAB
-
OSQUERY: THE BASICS LAB
-
WAZUH LAB
-
Security Information and Event Management
3
+
Digital Forensics and Incident Response
9
+
DFIR: INTRODUCTION
-
WINDOWS FORENSICS PART 1 LAB
-
WINDOWS FORENSICS PART 2 LAB
-
LINUX FORENSICS LAB
-
KAPE LAB
-
AUTOPSY LAB
-
REDLINE LAB
-
VOLATILITY LAB
-
VELOCIRAPTOR LAB
-
Phishing
4
+
Introduction to Pentesting
2
+
Introduction to Web Hacking
9
+
WALKING AN APPLICATION LAB
-
SUBDOMAIN ENUMERATION
-
AUTHENTICATION BYPASS LAB
-
IDOR LAB
-
FILE INCLUSION LAB
-
INTRO TO SSRF LAB
-
INTRO TO XSS LAB
-
COMMAND INJECTION LAB
-
SQL INJECTION LAB
-
Burp Suite
4
+
BURP SUITE: REPEATER LAB
-
BURP SUITE: INTRUDER LAB
-
BURP SUITE: OTHER MODULES LAB
-
BURP SUITE: EXTENSIONS
-
Network Security
4
+
PASSIVE RECONNAISSANCE
-
ACTIVE RECONNAISSANCE
-
NMAP: LIVE HOST DISCOVERY LAB
-
NMAP: BASIC PORT SCANS LAB
-
Vulnerability Research
2
+
Authentication
5
+
ENUMERATION & BRUTE FORCE LAB
-
SESSION MANAGEMENT LAB
-
JWT SECURITY LAB
-
OAUTH VULNERABILITIES LAB
-
MULTI-FACTOR AUTHENTICATION LAB
-
Injection Attacks
6
+
ADVANCED SQL INJECTION LAB
-
NOSQL INJECTION LAB
-
XXE INJECTION LAB
-
SERVER-SIDE TEMPLATE INJECTION LAB
-
LDAP INJECTION LAB
-
ORM INJECTION LAB
-
Advanced Server-Side Attacks
5
+
INSECURE DESERIALIZATION LAB
-
SSRF LAB
-
FILE INCLUSION & PATH TRAVERSAL LAB
-
RACE CONDITIONS LAB
-
PROTOTYPE POLLUTION LAB
-
Advanced Client-Side Attacks
3
+
HTTP Request Smuggling
1
+
Introduction to Security Engineering
1
+
Identity and Access Management (IAM)
1
+
Threats and Risks
4
+
Network and System Security
5
+
SECURE NETWORK ARCHITECTURE
-
LINUX SYSTEM HARDENING LAB
-
MICROSOFT WINDOWS HARDENING LAB
-
ACTIVE DIRECTORY HARDENING LAB
-
NETWORK SECURITY PROTOCOLS
-
Virtualization & Containers
2
+
Software Security
1
+
Managing Incidents
4
+
Software Secure Development
3
+
Security of the Pipeline
2
+
Security in the Pipeline
3
+
Container Security
4
+
INTRO TO DOCKER LAB
-
INTRO TO KUBERNETES LAB
-
CONTAINER VULNERABILITIES LAB
-
CONTAINER HARDENING LAB
-
Infrastructure as Code
3
+

