Explore All Rooms
Browse and search through all available cybersecurity rooms. 18 rooms available
Linux Security Fundamentals & Hardening
Master Linux security concepts including file permissions, SELinux, firewall configuration, and secure Linux administration techniques.
- Linux File Permissions & Ownership
- SELinux Configuration
- Firewall with iptables
- System Hardening Techniques
Threat Intelligence & OSINT Techniques
Learn threat intelligence methodologies, OSINT techniques, and how to analyze and respond to security threats effectively.
- Threat Intelligence Lifecycle
- OSINT Techniques & Tools
- Threat Actor Analysis
- Indicator of Compromise (IOC)
Malware Analysis Fundamentals
Learn static and dynamic malware analysis techniques to identify, analyze, and understand malicious software behavior.
- Static Analysis Techniques
- Dynamic Analysis in Sandbox
- Malware Behavior Analysis
- Reverse Engineering Basics
Incident Response & Handling
Master incident response procedures, evidence collection, and handling security incidents according to best practices.
- Incident Response Lifecycle
- Evidence Collection Procedures
- Containment Strategies
- Recovery & Lessons Learned
Web Application Security & OWASP Top 10
Learn web application security vulnerabilities, OWASP Top 10, and how to secure web applications against common attacks.
- OWASP Top 10 Vulnerabilities
- SQL Injection Prevention
- Cross-Site Scripting (XSS)
- Security Testing Techniques
Cryptography Fundamentals
Understand cryptographic principles, algorithms, and implementations for securing data in transit and at rest.
- Symmetric & Asymmetric Encryption
- Hash Functions & Digital Signatures
- Public Key Infrastructure (PKI)
- Cryptographic Protocols
Cloud Security Fundamentals
Learn cloud security concepts, shared responsibility model, and security best practices for cloud environments.
- Cloud Security Architecture
- Shared Responsibility Model
- Identity & Access Management
- Cloud Monitoring & Logging
Penetration Testing Methodology
Learn ethical hacking methodology, penetration testing phases, and tools for authorized security assessments.
- Penetration Testing Phases
- Reconnaissance Techniques
- Vulnerability Assessment
- Reporting & Documentation
SIEM Fundamentals & Log Analysis
Learn Security Information and Event Management (SIEM) concepts, log analysis, and security monitoring techniques.
- SIEM Architecture & Components
- Log Collection & Normalization
- Correlation Rules Creation
- Incident Detection & Alerting