

Cybersecurity Courses
Explore the basics of cyber security through 20 interactive, beginner-friendly labs. Get hands-on experience with ethical hacking, network analysis, encryption, and web security fundamentals. Perfect for complete newcomers looking to understand key cyber security concepts using industry tools like Hydra, Nmap, OpenSSL, and Wireshark.
Completed 0 of 19 Labs
Using Hydra to Crack Passwords
Cracking a Specific User Account
Network Scanning with Nmap
Scanning Subnet with Nmap
Introduction to Encryption with OpenSSL
Decrypting Top Secret Document
Using Netcat for Simple Network Communication
Receive Messages Using Netcat
Network Analysis with Wireshark
Capture Google Traffic with Wireshark
Brute Force SSH in Hydra
Scan Vulnerabilities in Nmap
Encrypt Files in OpenSSL
Filter Traffic in Wireshark
Crack ZIP Passwords in John the Ripper
Monitor Files in Tripwire
Scan Ports with Masscan
Hide Data in Steghide
Scan Web Servers in Nikto
In this course, you'll dive into the exciting world of Capture The Flag (CTF) challenges. Learn fundamental cybersecurity concepts and practical techniques through hands-on labs covering hidden files, weak passwords, open ports, misconfigurations, log analysis, directory traversal, environment variable leaks, script analysis, network exploits, and web vulnerabilities.
Completed 0 of 10 Labs
In this course, learn the fundamentals of Kali Linux. Explore basic navigation, networking tools, security tools, and system management. Perfect for beginners!
Completed 0 of 15 Labs
In this course, you will learn about Nmap, a powerful network scanning tool that is used to discover hosts and services on a computer network.
Completed 0 of 15 Labs
In this course, you will learn how to use Wireshark to capture and analyze network traffic. You will learn how to install Wireshark, capture packets, and analyze them. You will also learn how to use Wireshark to troubleshoot network issues, analyze network traffic, and secure your network.
Completed 0 of 20 Labs
In this course, learn the fundamentals of using Hydra, a powerful password cracking tool. Explore installation, basic commands, and attack various services like SSH, HTTP, FTP, and Telnet.
Completed 0 of 12 Labs
In this course, learn the fundamentals of using Hashcat, a powerful password cracking tool. Explore installation, hash types, dictionary attacks, brute-force attacks, and session management.
Completed 0 of 5 Labs
In this course, learn the fundamentals of using Metasploit, a powerful penetration testing framework. Explore installation, console navigation, module usage, scanning techniques, exploit execution, and post-exploitation.
Completed 0 of 6 Labs
In this course, learn the fundamentals of cryptography, including symmetric and asymmetric encryption, hashing, digital signatures, and key exchange protocols. Master essential cryptographic concepts and tools through hands-on practice.
Completed 0 of 10 Labs
Test your skills in this challenge-based course covering essential penetration testing techniques. Each challenge requires you to independently discover and exploit vulnerabilities using industry-standard tools like Nmap, FTP, SMB, Telnet, Rsync, RDP, HTTP, and SSH. Perfect your reconnaissance and enumeration skills through self-guided exploration in a safe, controlled environment.
Completed 0 of 8 Labs
Master essential networking concepts and skills with hands-on labs. This course covers network fundamentals, implementation, operations, security, and troubleshooting, preparing you for the CompTIA Network+ certification (N10-009).
Completed 0 of 20 Labs
In this course, you will learn about privilege escalation techniques on Linux. It is a beginner level course and will cover various techniques to escalate privileges on Linux systems.
Completed 0 of 11 Labs
In this course, you will learn about the most common web vulnerabilities and how to exploit them. You will learn about SQL Injection, File Inclusion, Cross-Site Scripting (XSS), File Upload, Command Injection, and Directory Traversal vulnerabilities. You will also learn how to exploit these vulnerabilities using various techniques and tools.
Completed 0 of 8 Labs



















