
Manage Linux Partitions and Filesystems
In this lab, you will learn to manage disk partitions and filesystems in Linux. You'll use fdisk to create a new partition, format it with ext4, mount it, configure persistent mounting in /etc/fstab, and create a swap partition, all on a safe secondary virtual disk.
CompTIALinux

The Joker's Trick
In this challenge, you will try to manage the user account in the Linux platform, such as creating new user accounts, modifying the user account management, and deleting a user account.
Linux

Hashcat Potfiles and Output Files
In this lab, you will learn how to manage and interpret the results of a Hashcat cracking session, focusing on the potfile, showing cracked passwords, and isolating uncracked hashes.
Linux

Find Exposed Login Credentials
In this challenge, you will use Wireshark to analyze network traffic and identify exposed login credentials. Learn how to filter packets and inspect data to uncover sensitive information transmitted in clear text.
Wireshark

Extracting Mails and Numbers
In this challenge, you will learn how to use grep and regular expressions to extract email addresses and numbers from a file, demonstrating essential Linux text processing skills.
Linux

User Account Creation
In this lab, you will learn the fundamental Linux commands for user account management, including creating, modifying, and deleting user accounts, and granting administrative privileges.
Linux

DAY 04: The Fortress Guardian
In this challenge, you'll act as a system administrator to secure a new project directory by managing users, groups, and advanced file permissions in Linux.
Linux

DAY 03: The Log Investigator
In this challenge, you'll step into the shoes of a DevOps engineer to diagnose a failing application by analyzing various Linux logs and configuration files using essential command-line tools.
Linux

Network Traffic Analysis and Secure Remote Access
In this lab, you will learn fundamental network analysis and security practices on Linux. You'll use tools like netstat, ss, tcpdump, ssh, and dig to inspect connections, capture traffic, establish secure remote sessions, and verify DNS security.
CompTIALinux

Digital Forensics Evidence Acquisition and Integrity
In this lab, you will learn the fundamental principles of digital forensics, focusing on evidence acquisition using the `dd` command and ensuring data integrity with cryptographic hashes.
CompTIALinux

Introduction to Container Security with Docker
In this lab, you will learn the fundamentals of container security by installing Docker, running a basic container, and inspecting its processes and security properties like resource limits.
CompTIALinuxDocker

DAY 05: The Keeper of the Keys
In this challenge, you will take on the role of a System Administrator to manage user accounts on a Linux system, including creating, modifying, and disabling users.
Linux

Implementing Data Resilience Backups and File Integrity
In this lab, you will learn the fundamentals of data resilience by creating file backups using tar, simulating data loss, restoring from the backup, and verifying file integrity with checksums.
CompTIALinux

DAY 10: The Script Artisan
In this challenge, you will step into the role of a system administrator to write a powerful shell script that automates file management tasks, learning about variables, conditionals, and loops along the way.
Linux

DAY 01: The Lay of the Land
In this challenge, you will practice fundamental Linux commands to survey a new system. You'll check the environment, identify users, gather system details, monitor performance, and generate a status report, simulating a sysadmin's initial reconnaissance.
Linux

DAY 02: The Digital Architect
In this challenge, you'll step into the role of a Digital Architect, tasked with organizing a chaotic project structure using essential Linux file and directory management commands.
Linux

Managing User Identities and Access Controls in Linux
In this lab, you will learn the fundamentals of managing user identities and access controls in a Linux environment, including creating users, setting permissions, and configuring sudo access.
CompTIALinux

Hardening a Linux Endpoint with Firewall and Service Management
In this lab, you will learn how to harden a Linux system by identifying and disabling unnecessary services and configuring the Uncomplicated Firewall (UFW) to control network traffic.
CompTIALinux