Master cybersecurity through hands-on missions. Each module builds critical skills with real-world scenarios and live lab environments.
MODULE 01
Network Recon
Information gathering and network mapping fundamentals
nmapwiresharkosint
MODULE 02
Web Exploitation
OWASP Top 10 vulnerabilities and web application security
sqlixsscsrfssrf
MODULE 03
System Exploitation
Buffer overflows, privilege escalation, and post-exploitation
buffer-overflowprivescshells
MODULE 04
Wireless Security
WiFi attacks, Bluetooth exploitation, and radio frequency analysis
wifibluetoothrfid
MODULE 05
Cryptography
Encryption algorithms, hash functions, and cryptographic attacks
aesrsahashingpki
MODULE 06
Social Engineering
Human psychology, phishing campaigns, and physical security
phishingpretextingosint
MODULE 07
Mobile Security
iOS and Android application security testing
androidiosfrida
MODULE 08
Cloud Security
AWS, Azure, and GCP security misconfigurations
awsazurek8sdocker
MODULE 09
Malware Analysis
Reverse engineering and dynamic analysis techniques
ida-proghidrasandbox
MODULE 10
Digital Forensics
Incident response and evidence collection procedures
volatilityautopsytimeline
MODULE 11
Red Team Operations
Advanced persistent threats and stealth techniques
c2evasionpersistence
MODULE 12
Blue Team Defense
Detection engineering and security monitoring
siemsigmayarathreat-hunting
Prerequisites & Recommendations
• Basic Linux command line proficiency
• Understanding of TCP/IP networking fundamentals
• Programming experience (Python, C, or JavaScript preferred)
• Virtual machine setup capability (VMware/VirtualBox)