Cybersecurity Engineer Tutorials

Manage Linux Partitions and Filesystems

Manage Linux Partitions and Filesystems

In this lab, you will learn to manage disk partitions and filesystems in Linux. You'll use fdisk to create a new partition, format it with ext4, mount it, configure persistent mounting in /etc/fstab, and create a swap partition, all on a safe secondary virtual disk.
CompTIALinux
The Joker's Trick

The Joker's Trick

In this challenge, you will try to manage the user account in the Linux platform, such as creating new user accounts, modifying the user account management, and deleting a user account.
Linux
Hashcat Potfiles and Output Files

Hashcat Potfiles and Output Files

In this lab, you will learn how to manage and interpret the results of a Hashcat cracking session, focusing on the potfile, showing cracked passwords, and isolating uncracked hashes.
Linux
Find Exposed Login Credentials

Find Exposed Login Credentials

In this challenge, you will use Wireshark to analyze network traffic and identify exposed login credentials. Learn how to filter packets and inspect data to uncover sensitive information transmitted in clear text.
Wireshark
Extracting Mails and Numbers

Extracting Mails and Numbers

In this challenge, you will learn how to use grep and regular expressions to extract email addresses and numbers from a file, demonstrating essential Linux text processing skills.
Linux
User Account Creation

User Account Creation

In this lab, you will learn the fundamental Linux commands for user account management, including creating, modifying, and deleting user accounts, and granting administrative privileges.
Linux
DAY 04: The Fortress Guardian

DAY 04: The Fortress Guardian

In this challenge, you'll act as a system administrator to secure a new project directory by managing users, groups, and advanced file permissions in Linux.
Linux
DAY 03: The Log Investigator

DAY 03: The Log Investigator

In this challenge, you'll step into the shoes of a DevOps engineer to diagnose a failing application by analyzing various Linux logs and configuration files using essential command-line tools.
Linux
Network Traffic Analysis and Secure Remote Access

Network Traffic Analysis and Secure Remote Access

In this lab, you will learn fundamental network analysis and security practices on Linux. You'll use tools like netstat, ss, tcpdump, ssh, and dig to inspect connections, capture traffic, establish secure remote sessions, and verify DNS security.
CompTIALinux
Digital Forensics Evidence Acquisition and Integrity

Digital Forensics Evidence Acquisition and Integrity

In this lab, you will learn the fundamental principles of digital forensics, focusing on evidence acquisition using the `dd` command and ensuring data integrity with cryptographic hashes.
CompTIALinux
Introduction to Container Security with Docker

Introduction to Container Security with Docker

In this lab, you will learn the fundamentals of container security by installing Docker, running a basic container, and inspecting its processes and security properties like resource limits.
CompTIALinuxDocker
DAY 05: The Keeper of the Keys

DAY 05: The Keeper of the Keys

In this challenge, you will take on the role of a System Administrator to manage user accounts on a Linux system, including creating, modifying, and disabling users.
Linux
Implementing Data Resilience Backups and File Integrity

Implementing Data Resilience Backups and File Integrity

In this lab, you will learn the fundamentals of data resilience by creating file backups using tar, simulating data loss, restoring from the backup, and verifying file integrity with checksums.
CompTIALinux
DAY 10: The Script Artisan

DAY 10: The Script Artisan

In this challenge, you will step into the role of a system administrator to write a powerful shell script that automates file management tasks, learning about variables, conditionals, and loops along the way.
Linux
DAY 01: The Lay of the Land

DAY 01: The Lay of the Land

In this challenge, you will practice fundamental Linux commands to survey a new system. You'll check the environment, identify users, gather system details, monitor performance, and generate a status report, simulating a sysadmin's initial reconnaissance.
Linux
DAY 02: The Digital Architect

DAY 02: The Digital Architect

In this challenge, you'll step into the role of a Digital Architect, tasked with organizing a chaotic project structure using essential Linux file and directory management commands.
Linux
Managing User Identities and Access Controls in Linux

Managing User Identities and Access Controls in Linux

In this lab, you will learn the fundamentals of managing user identities and access controls in a Linux environment, including creating users, setting permissions, and configuring sudo access.
CompTIALinux
Hardening a Linux Endpoint with Firewall and Service Management

Hardening a Linux Endpoint with Firewall and Service Management

In this lab, you will learn how to harden a Linux system by identifying and disabling unnecessary services and configuring the Uncomplicated Firewall (UFW) to control network traffic.
CompTIALinux
  • Prev
  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • ...
  • 195
  • Next