This is LabEx’s experimental Cybersecurity Engineer Skill Tree, from Zero to Cybersecurity Engineer. Learn security fundamentals, penetration testing, ethical hacking, and digital forensics through hands-on labs and real scenarios.
228 Skills|43 Courses
Linux Terminal Basics
Cybersecurity Engineer Courses
Linux Terminal Basics
Beginner
devops-engineerlinuxdevops
Master the fundamentals of Linux terminal operations in this comprehensive beginner's course. Learn everything from accessing your Linux environment to navigating the filesystem and getting help through hands-on labs and engaging challenges. Perfect for anyone starting their Linux journey.
Master essential Linux file system operations in this comprehensive course. Learn to navigate directory structures, list files, create and manage files and directories, copy and move files, and use wildcards for efficient file operations through hands-on labs and engaging challenges. Perfect for anyone looking to become proficient in Linux file management.
Completed 0 of 7 Labs
Viewing, Searching, and Editing Files
Beginner
devops-engineerlinuxdevops
Master the essential skills of viewing, searching, and editing files in Linux. Learn to efficiently read file contents with cat, head, and tail, navigate large files with less, finding data with grep, and edit text using Nano and Vim. This module provides the foundation for text processing and system administration tasks.
Completed 0 of 8 Labs
Shell Redirection and Pipelines
Beginner
devops-engineerlinuxdevops
Master the power of shell redirection and pipelines in Linux. Learn to redirect standard input, output, and error streams, chain commands together using pipes, manage command history, and process text data with sort and uniq. This module teaches you how to combine simple commands into powerful data processing workflows.
Completed 0 of 7 Labs
Shell Environment and Variables
Beginner
devops-engineerlinuxdevops
Learn how to manage and customize your shell environment. This module covers environment variables, the PATH variable, creating custom variables, shell configuration persistence, and command substitution techniques.
Completed 0 of 6 Labs
Users, Groups, and Permissions
Beginner
devops-engineerlinuxdevops
Master Linux user and group management, file ownership, and permissions. Learn how to control access to files and directories using symbolic and octal modes, understand sudo privileges, and configure default permissions with umask.
Completed 0 of 7 Labs
Processes and Job Control
Beginner
devops-engineerlinuxdevops
Master Linux process management and job control. Learn to monitor system activity, manage foreground and background jobs, terminate unresponsive processes, and control process priority using nice and renice.
Completed 0 of 6 Labs
System Information and Resource Monitoring
Beginner
devops-engineerdevopslinux
Learn to monitor system resources and gather system information. Master tools for checking CPU load, memory usage, disk space, and system identity. Learn to use the watch command for continuous monitoring.
Completed 0 of 6 Labs
System Rescue And Initialization
Beginner
devops-engineerlinuxdevops
In this hands-on project, you step into the role of a Junior SRE to stabilize a neglected server environment. You will practice filesystem cleanup, process mitigation, security hardening, and environment standardization through a series of real-world challenges.
Completed 0 of 4 Labs
Disk Filesystems and Storage Management
Beginner
devops-engineerlinuxdevops
Master Linux storage management. Learn about block devices, partitions, filesystems, and LVM. Practice mounting filesystems, analyzing disk usage, and configuring persistent mounts using fstab.
Completed 0 of 8 Labs
Linux Networking Fundamentals
Beginner
devops-engineerlinuxdevops
Learn the basics of Linux networking. Master tools for inspecting network interfaces, testing connectivity, troubleshooting DNS, and identifying listening ports. Learn to download files from the CLI and manually configure IP addresses.
Completed 0 of 7 Labs
Remote Access and Secure File Transfer
Beginner
devops-engineerlinuxdevops
Learn Remote Access And Secure File Transfer. This module covers Connecting via SSH, SSH Key Authentication, Secure File Copy with SCP and RSYNC, Interactive File Transfer with SFTP, SSH Config and Aliases. You will master these essential Linux skills through hands-on labs and real-world challenges.
Completed 0 of 6 Labs
Software Package Management
Beginner
devops-engineerlinuxdevops
Learn Software Package Management. This module covers Package Managers APT and DNF, Searching for Packages, Installing and Removing Software, System Updates and Upgrades, Managing Repositories. You will master these essential Linux skills through hands-on labs and real-world challenges.
Completed 0 of 6 Labs
Packet Analysis with tcpdump
Intermediate
cybersecurity-engineercybersecuritywireshark
Master network traffic analysis using tcpdump. Learn to capture live packets, apply Berkeley Packet Filters (BPF), inspect raw payloads, and manage PCAP files for forensic investigations.
Completed 0 of 5 Labs
Protocol Analysis with Tshark
Intermediate
cybersecurity-engineercybersecuritywireshark
Explore tshark for advanced protocol analysis. Learn to reconstruct TCP/UDP streams, extract specific protocol fields, and automate traffic analysis for threat hunting and malware detection.
Completed 0 of 4 Labs
Host-Based Security & Auditing
Intermediate
cybersecurity-engineercybersecurityhydrakali
Strengthen host security with AIDE for file integrity monitoring and auditd for low-level system auditing. Learn to parse system logs to detect brute-force attacks and privilege escalation.
Completed 0 of 4 Labs
Network Intrusion Detection with Snort
Intermediate
cybersecurity-engineercybersecurity
Deploy and configure Snort IDS to defend network perimeters. Learn to write custom rules for signature matching, detect malicious patterns like SQL injection, and analyze intrusion alerts.
Completed 0 of 5 Labs
SOC Foundations Review
Intermediate
cybersecurity-engineercybersecuritywireshark
A challenge-only capstone for the first security operations phase. Review packet analysis, host auditing, and Snort-based network defense through realistic SOC investigation workflows.
Completed 0 of 3 Labs
Open Source Intelligence (OSINT) & Passive Recon
Intermediate
cybersecurity-engineercybersecuritynmaplinux
Conduct passive reconnaissance using OSINT techniques. Master domain enumeration, DNS intelligence gathering, and public data harvesting to map an organization's external attack surface.
Completed 0 of 4 Labs
Nmap Host Discovery & Port Scanning
Intermediate
cybersecurity-engineercybersecuritynmaplinux
Master the industry-standard Nmap for network mapping. Learn stealthy host discovery techniques, execute various TCP/UDP scan types, and optimize performance for large-scale enterprise environments.
Completed 0 of 5 Labs
Nmap Fingerprinting & The Scripting Engine
Intermediate
cybersecurity-engineercybersecuritynmaplinux
Elevate your Nmap skills with service versioning and OS fingerprinting. Leverage the Nmap Scripting Engine (NSE) to automate vulnerability detection and audit network services for critical flaws.
Completed 0 of 5 Labs
Vulnerability Assessment & Management
Intermediate
cybersecurity-engineercybersecuritykalilinux
Bridge the gap between discovery and exploitation. Use searchsploit, Nikto, and Nuclei to identify known vulnerabilities, misconfigurations, and CVEs across web and network infrastructure.
Completed 0 of 4 Labs
External Attack Surface Assessment
Intermediate
cybersecurity-engineercybersecuritynmaplinux
A challenge-only review project for reconnaissance and vulnerability assessment. Practice passive profiling, network mapping, and vulnerability prioritization through a staged external assessment workflow.
Completed 0 of 3 Labs
Web Recon & Intercepting Proxies
Intermediate
cybersecurity-engineercybersecuritynmaplinux
Discover hidden web assets through directory fuzzing and virtual host enumeration. Master HTTP interception to analyze raw requests and interact with REST APIs using command-line tools.
Completed 0 of 5 Labs
Injection Vulnerabilities
Intermediate
cybersecurity-engineercybersecuritykalilinux
Explore critical web injection flaws including Command Injection and SQL Injection (SQLi). Learn manual exploitation techniques and automate database compromise using the powerful sqlmap tool.
Completed 0 of 5 Labs
Client-Side Attacks & Authentication
Intermediate
cybersecurity-engineercybersecurityhydrakali
Master client-side exploitation and authentication bypasses. Learn to identify XSS vulnerabilities, perform web brute-force attacks with Hydra, and exploit Insecure Direct Object References (IDOR).
Completed 0 of 5 Labs
Server-Side Web Attacks
Intermediate
cybersecurity-engineercybersecurity
Server-Side Web Attacks. Tackle advanced server-side vulnerabilities including SSRF, XXE, and JWT manipulation. Learn to chain flaws together to read sensitive files and forge administrative tokens.
Completed 0 of 4 Labs
Web Application Breach Simulation
Intermediate
cybersecurity-engineercybersecurity
A challenge-only web security project that consolidates hidden surface discovery, injection-based data extraction, and chained account takeover scenarios.
Completed 0 of 3 Labs
Metasploit Framework Fundamentals
Intermediate
cybersecurity-engineercybersecuritynmaplinux
Master the core architecture and workflow of Metasploit. Learn to manage workspaces, use auxiliary modules for recon, and deploy various payloads including bind and reverse shells.
Completed 0 of 5 Labs
Meterpreter & Post-Exploitation Operations
Intermediate
cybersecurity-engineercybersecuritykalilinux
Leverage the powerful Meterpreter payload for post-exploitation. Master process migration, credential dumping, and local system manipulation to solidify your foothold on a compromised host.
Completed 0 of 4 Labs
Lateral Movement & Pivoting
Intermediate
cybersecurity-engineercybersecuritykalilinux
Navigate through isolated network segments using advanced pivoting techniques. Master SSH tunneling, dynamic port forwarding with Proxychains, and Metasploit autorouting to reach internal targets.
Completed 0 of 4 Labs
Linux Privilege Escalation
Intermediate
cybersecurity-engineercybersecuritylinux
Elevate your access from standard user to root. Learn to identify misconfigured SUID binaries, abuse sudo permissions, hijack cron jobs, and automate enumeration using LinPEAS.
Completed 0 of 5 Labs
Internal Compromise And Privilege Escalation
Advanced
cybersecurity-engineercybersecuritykalilinux
A challenge-only exploitation project covering Metasploit-driven initial access, post-exploitation intelligence gathering, and pivot-to-root compromise workflows.
Completed 0 of 3 Labs
Cryptography Essentials
Intermediate
cybersecurity-engineercybersecurity
Understand the practical application of cryptography in security. Master encoding vs. encryption, identify cryptographic hash types, and use OpenSSL and GPG for symmetric and asymmetric encryption.
Completed 0 of 5 Labs
Offline Password Cracking
Intermediate
cybersecurity-engineercybersecurity
Recover lost credentials using high-speed cracking techniques. Master John the Ripper and Hashcat, generate custom wordlists with Crunch and Cewl, and apply mutation rules to crack complex hashes.
Completed 0 of 5 Labs
Secret Recovery And Password Audit
Intermediate
cybersecurity-engineercybersecurity
A challenge-only cryptography and password audit project focused on crypto triage, enterprise credential recovery, and policy weakness analysis.
Completed 0 of 3 Labs
Digital Forensics Basics
Intermediate
cybersecurity-engineercybersecurity
Learn the fundamentals of digital forensics. Practice bit-by-bit imaging with dd, perform file carving with Foremost to recover deleted data, and analyze metadata to build incident timelines.
Completed 0 of 4 Labs
Memory Forensics Basics
Intermediate
cybersecurity-engineercybersecurity
Extract critical evidence from volatile RAM. Learn to capture memory dumps and use the Volatility Framework to analyze processes, network connections, and hidden malicious artifacts.
Completed 0 of 4 Labs
Malware Analysis Basics
Intermediate
cybersecurity-engineercybersecurity
Safely dissect malicious binaries. Combine static analysis to extract strings and headers with dynamic analysis using strace and ltrace to monitor system and library calls during execution.
Completed 0 of 4 Labs
Incident Response And Malware Triage
Advanced
cybersecurity-engineercybersecuritynmaplinux
A challenge-only DFIR project covering disk evidence review, live memory triage, and malware behavior reconstruction.
Completed 0 of 3 Labs
Python for Security Operations
Intermediate
cybersecurity-engineercybersecurity
Automate security tasks with Python. Learn to build custom socket tools for banner grabbing, script web interactions with the requests library, and parse massive log files using regular expressions.
Completed 0 of 4 Labs
Building Custom Security Tools
Intermediate
cybersecurity-engineercybersecuritywireshark
Develop your own arsenal of security tools in Python. Build a multithreaded port scanner, forge custom network packets with Scapy, and create a high-performance web directory fuzzer.
Completed 0 of 4 Labs
Python Security Automation Capstone
Advanced
cybersecurity-engineercybersecuritynmaplinux
A challenge-only automation project focused on reconnaissance collection, log hunting utility design, and unified Python security tooling workflows.