7.3: Tor and the Dark Web

Surf the web anonymously using the Tor browser. Deploy a hidden onion service.
82 min Updated Dec 12, 2022

7.1: Binary exploitation and defense

Exploit memory corruption vulnerabilities and prevent them using DEP, ASLR, and stack canaries.
86 min Updated Nov 23, 2022

3.1: Encoding and hashes

Perform encoding and cryptographic hashes with OpenSSL. Crack hashes with hashcat and John the Ripper.
28 min Updated Oct 5, 2022

3.2: Encryption

Experiment with symmetric and asymmetric encryption using OpenSSL
32 min Updated Oct 10, 2022

3.3: Digital signatures

Experiment with digital signatures and certificates using OpenSSL
72 min Updated Oct 21, 2022

2.2: Linux security

Learn basic, security-related Linux concepts and commands
58 min Updated Sep 28, 2022

2.1: Linux file system

Learn basic file system navigation in Linux
99 min Updated Oct 6, 2022

5.5: DNS and user OSINT

Collect DNS and user information using open-source intelligence tools.
72 min Updated Dec 12, 2022

5.1: Network forensics

Analyze network traces using Wireshark
50 min Updated Sep 14, 2022

5.2: Scanning

Scan networks with nmap, filter traffic with iptables, and reduce network attack surface on servers.
180 min Updated Dec 12, 2022

5.3: Virtual Private Networks

Run a VPN access server on Google Cloud Platform to access the Internet.
36 min Updated Dec 12, 2022

5.4: Network OSINT

Investigate network addresses using open-source intelligence tools.
53 min Updated Dec 12, 2022

6.1: Privilege escalation and lateral movement

Compromise hosts via privilege escalation and lateral movement
70 min Updated Sep 14, 2022

6.2: File system backup and encryption

Experiment with Linux tools to backup and encrypt files
36 min Updated Sep 15, 2022

6.3 Host forensics

Perform forensic analysis on hosts and examine methods for log tampering
49 min Updated Nov 19, 2022

1.1: Setup

Setup course accounts and VMs
148 min Updated Oct 21, 2022

7.2: Supply-chain security

Generate a software bill of materials (SBOM) to analyze a software supply chain for vulnerabilities.
43 min Updated Nov 26, 2022

4.2: Phishing and social engineering

Practice identifying phishing and social engineering attacks
105 min Updated Sep 14, 2022

4.1: Authentication

Examine issues with password-based authentication
65 min Updated Sep 14, 2022
Loading Codelabs, please wait...