Fundamentals
Google Dorking
Explaining how Search Engines work and leveraging them into finding hidden content!

Virtualisation Basics
Learn why virtualisation powers modern IT, improving efficiency and safely isolating environments.
Cloud Computing Fundamentals
Discover how cloud computing helps businesses move faster, do more, and scale with less effort.
Cloud Security Pitfalls
Explore the risks companies face when migrating to the cloud, and learn how to address them in a SOC.
Bash Scripting
A Walkthrough room to teach you the basics of bash scripting

Red Team
Red Team Fundamentals
Learn about the basics of a red engagement, the main components and stakeholders involved, and how red teaming differs from other cyber security engagements.
Pentesting Fundamentals
Learn the important ethics and methodologies behind every pentest.
The Hacker Methodology
Introduction to the Hacker Methodology

Writing Pentest Reports
Learn how to write professional pentesting reports that communicate risk to business stakeholders.
DVWA
Basic room for testing exploits against the Damn Vulnerable Web Application box

OWASP Broken Access Control
Exploit Broken Access Control: Number 1 of the Top 10 web security risks.

Enumeration \u0026 Brute Force
Enumerate and brute force authentication mechanisms.
ffuf
Enumeration, fuzzing, and directory brute forcing using ffuf

Shodan.io
Learn about Shodan.io and how to use it for devices enumeration - is your coffee machine publicly accessible?

Nessus
Learn how to set up and use Nessus, a popular vulnerability scanner.

Hydra
Learn about and use Hydra, a fast network logon cracker, to bruteforce and obtain a website’s credentials.

Intro To Pwntools
An introductory room for the binary exploit toolkit Pwntools.

Nmap
An in depth look at scanning with Nmap, a powerful network scanning tool.

Metasploit: Introduction
An introduction to the main components of the Metasploit Framework.
Phishing - Merry Clickmas
Learn how to use the Social-Engineer Toolkit to send phishing emails.
Exploitation with cURL - Hoperation Eggsploit
The evil Easter bunnies operate a web control panel that holds the wormhole open. Using cURL, identify the endpoints, send the required requests, and shut the wormhole once and for all.
Custom Tooling Using Python
Creating custom tooling for application testing using Python.
SQLMAP
Learn about and use Sqlmap to exploit the web application

Blue Team
SOC Fundamentals
Learn about the SOC team and their processes.
Intro to Log Analysis
An intro to log analysis, best practices, and essential tools for effective detection and response.
KQL (Kusto): Introduction
This room introduces you to Kusto Query Language and provides an overview of Microsoft Sentinel.
Introduction to SIEM
Learn the fundamentals of SIEM and explore its features and functionality.
Splunk Basics - Did you SIEM?
Learn how to ingest and parse custom log data using Splunk.
DFIR: An Introduction
Introductory room for the DFIR module
Introduction to EDR
Learn the fundamentals of EDR and explore its features and working.





























