// rooms.php // Standalone Rooms List Page - Simplified version ?> CYBRIXEN - Cybersecurity Training Platform
Home All Rooms

Explore All Rooms

Browse and search through all available cybersecurity rooms. 18 rooms available

Linux Security Fundamentals & Hardening

Master Linux security concepts including file permissions, SELinux, firewall configuration, and secure Linux administration techniques.

  • Linux File Permissions & Ownership
  • SELinux Configuration
  • Firewall with iptables
  • System Hardening Techniques

Threat Intelligence & OSINT Techniques

Learn threat intelligence methodologies, OSINT techniques, and how to analyze and respond to security threats effectively.

  • Threat Intelligence Lifecycle
  • OSINT Techniques & Tools
  • Threat Actor Analysis
  • Indicator of Compromise (IOC)

Malware Analysis Fundamentals

Learn static and dynamic malware analysis techniques to identify, analyze, and understand malicious software behavior.

  • Static Analysis Techniques
  • Dynamic Analysis in Sandbox
  • Malware Behavior Analysis
  • Reverse Engineering Basics

Incident Response & Handling

Master incident response procedures, evidence collection, and handling security incidents according to best practices.

  • Incident Response Lifecycle
  • Evidence Collection Procedures
  • Containment Strategies
  • Recovery & Lessons Learned

Web Application Security & OWASP Top 10

Learn web application security vulnerabilities, OWASP Top 10, and how to secure web applications against common attacks.

  • OWASP Top 10 Vulnerabilities
  • SQL Injection Prevention
  • Cross-Site Scripting (XSS)
  • Security Testing Techniques

Cryptography Fundamentals

Understand cryptographic principles, algorithms, and implementations for securing data in transit and at rest.

  • Symmetric & Asymmetric Encryption
  • Hash Functions & Digital Signatures
  • Public Key Infrastructure (PKI)
  • Cryptographic Protocols

Cloud Security Fundamentals

Learn cloud security concepts, shared responsibility model, and security best practices for cloud environments.

  • Cloud Security Architecture
  • Shared Responsibility Model
  • Identity & Access Management
  • Cloud Monitoring & Logging

Penetration Testing Methodology

Learn ethical hacking methodology, penetration testing phases, and tools for authorized security assessments.

  • Penetration Testing Phases
  • Reconnaissance Techniques
  • Vulnerability Assessment
  • Reporting & Documentation

SIEM Fundamentals & Log Analysis

Learn Security Information and Event Management (SIEM) concepts, log analysis, and security monitoring techniques.

  • SIEM Architecture & Components
  • Log Collection & Normalization
  • Correlation Rules Creation
  • Incident Detection & Alerting
Previous
1 2
Next
Page 2 of 2