7.3: Tor and the Dark Web

Surf the web anonymously using the Tor browser. Deploy a hidden onion service.
82 min Updated Dec 12, 2022

7.1: Binary exploitation and defense

Exploit memory corruption vulnerabilities and prevent them using DEP, ASLR, and stack canaries.
86 min Updated Apr 11, 2023

3.1: Encoding and hashes

Perform encoding and cryptographic hashes with OpenSSL. Crack hashes with hashcat and John the Ripper.
28 min Updated Feb 28, 2023

3.2: Encryption

Experiment with symmetric and asymmetric encryption using OpenSSL
32 min Updated Oct 10, 2022

3.3: Digital signatures

Experiment with digital signatures and certificates using OpenSSL
82 min Updated Jun 1, 2023

2.1: Linux file system

Learn basic file system navigation in Linux
99 min Updated Oct 11, 2023

2.2: Linux security

Learn basic, security-related Linux concepts and commands
58 min Updated Feb 28, 2023

5.1: Network forensics

Analyze network traces using Wireshark
50 min Updated Sep 14, 2022

5.2: Scanning

Scan networks with nmap, filter traffic with iptables, and reduce network attack surface on servers.
180 min Updated Mar 17, 2023

5.3: Virtual Private Networks

Run a VPN access server on Google Cloud Platform to access the Internet.
36 min Updated Dec 12, 2022

5.4: Network OSINT

Investigate network addresses using open-source intelligence tools.
53 min Updated Dec 12, 2022

5.5: DNS and user OSINT

Collect DNS and user information using open-source intelligence tools.
72 min Updated May 30, 2023

6.1: Privilege escalation and lateral movement

Compromise hosts via privilege escalation and lateral movement
70 min Updated Sep 14, 2022

6.2: File system backup and encryption

Experiment with Linux tools to backup and encrypt files
36 min Updated Jun 5, 2023

6.3 Host forensics

Perform forensic analysis on hosts and examine methods for log tampering
64 min Updated Feb 2, 2023

1.1: Setup

Setup course accounts and VMs
123 min Updated Mar 8, 2024

7.2: Supply-chain security

Generate a software bill of materials (SBOM) to analyze a software supply chain for vulnerabilities.
43 min Updated Nov 26, 2022

4.1: Authentication

Examine issues with password-based authentication
65 min Updated Feb 28, 2023

4.2: Phishing and social engineering

Practice identifying phishing and social engineering attacks
105 min Updated Sep 14, 2022
Loading Codelabs, please wait...