Cybersecurity is critical in protecting digital assets. Learn why mastering Cybersecurity is essential, its booming job market, and how it can secure your career. We offer numerous exercises and projects to help you become proficient in this vital field.
5hrs average
Learn how to install Windows on a VirtualBox virtual machine in this interactive tutorial. Set up VirtualBox, create a virtual machine, and install Windows 10 step by step. This hands-on guide helps you experiment with different operating systems in a controlled environment without affecting your main system.
2hrs average
In this project, students will perform the exploitation phase on the vulnerable machine The Lovers. The goal is to use the reconnaissance findings to gain access, explore the system, and escalate privileges to full control. Students must include evidence of the exploitation, obtained credentials, exploration findings, escalation techniques, and the discovered flags in their final report.
In this lab, you will take on the role of a forensic analyst facing a compromised Linux system in real time. You will learn to apply live incident response methodologies, collect volatile evidence, analyze malicious persistence, and neutralize threats without alerting the attacker. An advanced exercise where even an image of the Mona Lisa may hide a persistent access mechanism.
This challenge puts you face to face with one of the most painful scenarios in cybersecurity: database corruption. You'll learn practical techniques to recover information from damaged SQLite files using command-line tools, Python scripts, and forensic approaches. Here, it's not just about data, but about resilience and analysis under adverse conditions. A first step toward recovering what seemed lost.
Sometimes, a single quote is enough to bring down a system. In this practical and responsible guide, you'll learn how SQL injection is exploited and how to crack passwords via hashes, using tools like SQLMap, John the Ripper, and Hashcat. Because understanding vulnerabilities is the first step to protecting them.
1hrs average
In this project, students will perform the web reconnaissance phase on the vulnerable machine The Lovers. The goal is to explore the initial web page, identify the login form, and use tools like Gobuster or Dirb with SecLists to enumerate hidden directories and files. No exploitation will be performed yet; the results will serve as input for later phases.
In this challenge, you will learn to observe network traffic like a professional analyst. You’ll discover how an HTTP request flows, how messages are encoded, and how tools like Wireshark and curl let you capture, interpret, and decode information traveling with every click. An exercise to train your technical eye, develop your investigative intuition, and get closer to the reality of network forensic analysis.
In this challenge, you'll put your analytical skills and keen eye to the test to detect hidden threats. You'll explore a seemingly innocent PHP site that conceals a reverse shell payload. Your mission: discover its exact location and understand how this technique is used by attackers to gain covert remote access.
1hrs average
This project introduces students to the reconnaissance phase on the vulnerable machine The Lovers. Students will discover the target's IP address, scan open ports and services with Nmap, identify the operating system, and confirm the existence of an HTTP service as preparation for further enumeration and exploitation phases.
Sometimes the enemy is not outside... sometimes it's a file within your own system. Invisible, silent, hidden behind functions that seem harmless. In this challenge, you'll face malware written in C#, dissecting its logic, identifying suspicious functions, and neutralizing its behavior. You'll learn about the Windows registry, hidden processes, fake files, and debugging techniques, using real tools like x64dbg, Ghidra, and Process Explorer. Your mission: break the malware's logic and free the flag trapped behind its malicious code.
In this article, you dive into the art of reading code as a tool for cyber defense. It's not just about finding errors, but about detecting subtle alterations that could indicate an attack. You will learn the fundamentals of Python, understand how attackers manipulate scripts, and train your mind to restore the original intent of the code. This is an exercise in analysis, logic, and active listening: code also speaks, if you know how to read it.