Cybersecurity is critical in protecting digital assets. Learn why mastering Cybersecurity is essential, its booming job market, and how it can secure your career. We offer numerous exercises and projects to help you become proficient in this vital field.
5hrs average
Learn how to install Windows on a VirtualBox virtual machine in this interactive tutorial. Set up VirtualBox, create a virtual machine, and install Windows 10 step by step. This hands-on guide helps you experiment with different operating systems in a controlled environment without affecting your main system.
2hrs average
In this lab, you'll analyze a website for poor development practices, discover exposed credentials, and access via SSH to retrieve a flag.
Explore how to turn open data into actionable intelligence to prevent threats and support cybersecurity decisions
Strategic planning, backups, and drills to maintain operational resilience after cybersecurity incidents
🔍 Exploring the 'Identify' function to understand threats, vulnerabilities, and critical assets in cybersecurity management
Learn the core principles of digital forensics to investigate incidents, preserve evidence, and strengthen the cybersecurity posture of any organization.
3hrs average
This project aims to guide students in developing a ransomware incident response plan using the NIST cybersecurity framework. The exercise focuses on a case study of a fictitious company named TechCo, exploring the areas of identification, protection, detection, response, and recovery in the event of a ransomware attack.
🚨 Applying monitoring, forensic analysis, and response plans to strengthen resilience against cyber threats
2hrs average
In this lab, you'll analyze a website for poor development practices, discover exposed credentials, and access via SSH to retrieve a flag.
2hrs average
Learn to exploit a vulnerable file upload form to deploy a reverse shell, gain control of the server, and capture a flag. This lab provides a realistic simulation of a common initial access technique used by attackers and highlights the importance of implementing proper security controls on file upload features.
🛡️ Implementing security controls, access management, vendor oversight, and contingency plans as part of the NIST Framework's 'Protect' function