Discover and join cybersecurity labs, challenges, and training exercises
This lab provides comprehensive hands-on training in Nmap, the industry-standard network scanning tool. You will learn t...
This hands-on lab simulates a real-world penetration test against a WordPress-based target system. You will perform netw...
Enumerate the SMB service and exploit it. Dive into an exciting, hands-on cybersecurity lab designed to teach you the fu...
Welcome to the Metasploitable3 lab! This virtual machine is purposely designed with known vulnerabilities for you to exp...
Dive into the administrative core of Linux — the layer where the most consequential security decisions happen. This lab covers the full lifecycle of user accounts and group privileges, authentication log analysis, process inspection and control, service hardening with systemd, and scheduled task aud...
Extend your Linux terminal skills into the networking domain — a critical layer in both offensive and defensive security operations. This lab covers how to inspect network interfaces and routing tables, trace packet paths, perform DNS analysis, monitor live connections and captured traffic, and esta...
Building on foundational Linux knowledge, this lab takes your terminal skills to the next level with focused, security-driven practice across five core areas: advanced file and directory management, permissions and ownership, pipes and redirection, searching and text processing, and composing multi-...
Gain the essential Linux skills that underpin nearly every role in cybersecurity — from SOC analysis and incident response to penetration testing and digital forensics. This lab walks you through the Linux filesystem, terminal navigation, file operations, log analysis, network inspection, and permis...
Get familiar with one of the most widely referenced frameworks in the cybersecurity industry. This lab walks you through the core concepts behind the MITRE ATT&CK framework — from understanding the structure of tactics and techniques to exploring how organizations use it to map their defensive cover...
This lab provides comprehensive hands-on training in Nmap, the industry-standard network scanning tool. You will learn to discover live hosts, identify open ports and services, detect operating systems, and leverage advanced scanning techniques. By the end, you will be able to conduct professional-g...
This lab introduces PowerShell from a security analyst's perspective, covering how commands are structured, how to chain them together using the pipeline, and how to save and run scripts. You'll also explore execution policy — what it means, how to audit it, and why its configuration matters during...
Logs are the backbone of every security investigation — and knowing how to read them is an essential skill for any blue team role. This beginner-friendly lab walks you through the core concepts of log analysis, from understanding log structure and severity levels to locating event records across Lin...
This tutorial introduces the essential skills needed to navigate and interpret network traffic captures. You'll explore how to examine protocol structures, apply display filters, and use built-in statistics views to understand what's happening across a network. Covering ICMP, TCP, HTTP, and TLS traf...
Windows Event Logs are among the most valuable sources of evidence available to security analysts — yet many practitioners don't know how to use them effectively. This beginner-friendly lab walks you through the structure of Windows logging, the significance of key security event categories, and how...
Resolving real-world alerting gaps by diving deep into live network traffic. Across three interconnected investigations, you'll expose a rogue Active Directory network harboring malware, trace an actively infected Windows host communicating with an external command-and-control server, and gather evi...
Step into a real-world incident response scenario at a financial institution where anomalous outbound connections have triggered security alerts. This investigation challenges you to decrypt encrypted network traffic, identify malicious file downloads, and trace command-and-control communications li...
Discover how to leverage native Windows capabilities for effective digital forensics and incident response. This hands-on lab introduces you to powerful scripting techniques for collecting system artifacts, analyzing user activity, and extracting critical evidence from Windows environments. You'll b...
Analyze a real-world ransomware incident by examining volatile memory artifacts from an infected system. In this investigation, you'll uncover malicious processes, trace encryption activity, identify persistence mechanisms, and reconstruct the complete attack timeline. Through hands-on RAM analysis,...
Investigate compromised Windows systems by analyzing volatile memory dumps to recover evidence that disappears when systems power down. This hands-on lab teaches you to extract running processes, active network connections, credential information, and command history from RAM snapshots. You'll uncov...
Explore the essential techniques for recognizing fraudulent emails in this foundational exercise. You'll examine email headers, understand authentication protocols like SPF, DKIM, and DMARC, and learn how attackers craft deceptive messages. By analyzing a real-world example, you'll develop practical...
Dive into security operations by investigating SSH authentication activity within a corporate network environment. This lab guides you through analyzing authentication logs to uncover failed login patterns, identify brute-force attempts, detect reconnaissance behavior, and correlate indicators of po...
Analyzing web server traffic to identify potential threats and suspicious activities. Through this investigation, you'll master the art of querying enterprise log data, detecting attack patterns through user behavior analysis, identifying server misconfigurations, and uncovering indicators of data e...
Investigate a compromised workstation by analyzing its volatile memory to uncover what traditional forensics might miss. This hands-on tutorial guides you through analyzing volatile memory to uncover hidden malicious processes, extract suspicious artifacts, and decode obfuscated data that adversarie...
Step into the role of a digital investigator tasked with recovering vital information from a compromised system's volatile memory. This hands-on tutorial teaches you how to identify system profiles, enumerate running processes, and extract hidden artifacts including encrypted databases, browser acti...
A digital forensics analyst responding to a potential insider threat incident. This hands-on investigation teaches you how to examine captured network communications to uncover what a suspicious user accessed, downloaded, and attempted to hide.
Step into the role of a security consultant investigating a real-world data breach scenario. This tutorial challenges you to correlate evidence across network traffic captures, authentication records, intrusion detection alerts, and system logs to build a complete attack timeline.
Act as security analyst investigating a multi-stage cyber attack on a Windows workstation. This hands-on tutorial guides you through analyzing 31 distinct malicious activities—from initial compromise to persistence establishment—teaching you how to write effective detection queries, correlate attack...
Learn the art of memory forensics by investigating a real Zeus banking trojan infection. This comprehensive investigation teaches you to analyze memory dumps, detect process injection, trace network connections, and uncover sophisticated evasion techniques. You'll develop critical skills in malware...