Cybersecurity Tutorials
Our cybersecurity tutorials offer a comprehensive way to learn digital defense strategies and techniques. They cover various aspects of information security, suitable for both beginners and security professionals. Through hands - on labs and practical examples, you'll gain experience in threat detection, prevention, and mitigation. Our secure playground allows you to practice cybersecurity techniques in a controlled environment.
Other Skill Trees
Kali Vulnerability Scanning with Nikto
In this lab, you will learn web vulnerability scanning using Nikto on Kali Linux. Explore how to run scans, identify security issues, analyze results, and export reports. Gain hands-on experience with Nikto's command-line interface through structured steps in the LabEx VM, building skills in web security assessments.
Kali Linux
Kali Web Testing with Burp Suite
In this lab, you'll master web application security testing using Burp Suite on Kali Linux in the LabEx VM. Learn to configure Burp Proxy, capture web traffic, test for XSS vulnerabilities, and generate detailed reports. Gain essential skills for securing web apps through structured, hands-on steps in a Kali Linux container environment.
Kali Linux
Kali SQL Injection with sqlmap
In this lab, explore SQL injection vulnerabilities using Kali Linux and sqlmap. Learn to detect injectable URLs, enumerate databases, dump table data, and save results for analysis in a secure LabEx VM environment. Master both manual and automated techniques for web application security testing.
Kali Linux
Secure SSH in Red Hat Enterprise Linux
In this lab, you will gain hands-on experience with configuring and securing SSH connections, a fundamental skill for managing remote Linux systems. You will learn to access remote systems, generate and use SSH key pairs, manage keys with ssh-agent, troubleshoot connections, customize client configurations, and secure OpenSSH server by disabling root login and password authentication.
Red Hat Enterprise Linux
Encrypt and Decrypt Files with GPG in Linux
In this lab, you will learn to encrypt and decrypt files in Linux using GPG. You'll generate a key pair, encrypt/decrypt files, exchange and sign public keys, and perform key maintenance like backups and creating revocation certificates to secure your data and communications.
CompTIALinux
Install Configure and Analyze Network Traffic with Wireshark
In this lab, you will learn how to install Wireshark, configure capture permissions, launch the application, and capture and analyze network traffic. This hands-on experience will provide you with the skills to effectively use Wireshark for network troubleshooting and security analysis.
Wireshark
Implement Hard Links in Linux
Create and manipulate hard links in a Linux file system, understanding their properties and behavior. Explore how hard links share the same inode and content across multiple file names.
Red Hat Enterprise Linux
Using Netcat for Simple Network Communication
In this lab, you will learn how to use Netcat for basic network communication. You'll cover installation, port understanding, file transfer, and encrypted communication implementation. Enhance your cybersecurity skills with this hands-on experience.
Linux
Connect to a Remote Linux Server Using SSH
In this lab, you will learn to connect to and manage a remote Linux server using SSH. You will install and configure the OpenSSH server, obtain its IP address, establish an interactive shell session, and execute single commands remotely for scripting and automation.
LinuxCompTIA
Receive Messages Using Netcat
In this challenge, you'll learn how to use Netcat to receive messages. You'll create a script to intercept and display incoming messages, gaining practical experience in network communication and cybersecurity fundamentals.
Linux
Implement an Ansible Playbook on RHEL
In this lab, you will implement a complete Ansible playbook to deploy an Apache web server on a RHEL system. You will create an inventory file, configure the Ansible environment, write a multi-task playbook to install Apache, deploy a web page, configure the firewall, and test the deployment.
AnsibleRed Hat Enterprise Linux
File System and Disk Management
Learn essential Linux file system and disk management skills in this hands-on lab. Learn to use key commands like df, du, dd, and fdisk to monitor disk usage, manage virtual disks, and maintain file system integrity. This lab provides practical experience in tasks crucial for system administrators and power users.
Linux
Kali Reconnaissance with Nmap and DNS
In this lab, explore reconnaissance techniques using Kali Linux with a focus on network scanning and DNS querying. Learn to identify open ports and services with Nmap, enumerate services using scripts, query DNS records with dnsrecon, and save output for analysis, all within a secure LabEx VM environment.
Kali Linux
DAY 04: The Fortress Guardian
In this challenge, you'll act as a system administrator to secure a new project directory by managing users, groups, and advanced file permissions in Linux.
Linux
Linux which Command: Command Locating
Learn how to use the 'which' command in Linux to locate executable files, handle non-existent commands, discover multiple installations, understand PATH priority, and create custom commands.
Linux
Basic Files Operations
In this lab, you will learn to use some basic operation command that allows you to perform actions such as list files, change the current directory, and move/copy/delete files and directories.
Linux
Treasure Island Networking Adventure
In this challenge, embark on a Treasure Island Networking Adventure using Docker! Learn to set up communication between your crew members (containers) and navigate the treacherous waters of network configuration. Master Docker networking skills in this hands-on lab.
Linux
Create Shell Scripts With Loops
In this challenge, you will learn how to create a simple shell script that uses looping constructs to process file or command-line input.
Red Hat Enterprise Linux
- Prev
- 1
- 2
- 3
- 4
- 5
- 6
- ...
- 194
- Next