7.3: Tor and the Dark Web
Surf the web anonymously using the Tor browser. Deploy a hidden onion service.
82 min
Updated Dec 12, 2022
7.1: Binary exploitation and defense
Exploit memory corruption vulnerabilities and prevent them using DEP, ASLR, and stack canaries.
86 min
Updated Apr 11, 2023
3.1: Encoding and hashes
Perform encoding and cryptographic hashes with OpenSSL. Crack hashes with hashcat and John the Ripper.
28 min
Updated Feb 28, 2023
3.2: Encryption
Experiment with symmetric and asymmetric encryption using OpenSSL
32 min
Updated Oct 10, 2022
3.3: Digital signatures
Experiment with digital signatures and certificates using OpenSSL
72 min
Updated Feb 28, 2023
2.2: Linux security
Learn basic, security-related Linux concepts and commands
58 min
Updated Feb 28, 2023
2.1: Linux file system
Learn basic file system navigation in Linux
99 min
Updated Oct 6, 2022
5.5: DNS and user OSINT
Collect DNS and user information using open-source intelligence tools.
72 min
Updated Dec 12, 2022
5.1: Network forensics
Analyze network traces using Wireshark
50 min
Updated Sep 14, 2022
5.2: Scanning
Scan networks with nmap, filter traffic with iptables, and reduce network attack surface on servers.
180 min
Updated Mar 17, 2023
5.3: Virtual Private Networks
Run a VPN access server on Google Cloud Platform to access the Internet.
36 min
Updated Dec 12, 2022
5.4: Network OSINT
Investigate network addresses using open-source intelligence tools.
53 min
Updated Dec 12, 2022
6.1: Privilege escalation and lateral movement
Compromise hosts via privilege escalation and lateral movement
70 min
Updated Sep 14, 2022
6.2: File system backup and encryption
Experiment with Linux tools to backup and encrypt files
36 min
Updated Sep 15, 2022
6.3 Host forensics
Perform forensic analysis on hosts and examine methods for log tampering
64 min
Updated Feb 2, 2023
1.1: Setup
Setup course accounts and VMs
123 min
Updated Apr 14, 2023
7.2: Supply-chain security
Generate a software bill of materials (SBOM) to analyze a software supply chain for vulnerabilities.
43 min
Updated Nov 26, 2022
4.2: Phishing and social engineering
Practice identifying phishing and social engineering attacks
105 min
Updated Sep 14, 2022
4.1: Authentication
Examine issues with password-based authentication
65 min
Updated Feb 28, 2023
Loading Codelabs, please wait...