Hands-on cybersecurity focused on offensive and defensive security practices
Sign up Log in
Offensive Security
Pentesting, exploitation, Active Directory labs, and offensive security techniques based on real-world scenarios.
Defensive Security
SOC operations, incident response, threat hunting, hardening, and vulnerability management.
Security Automation
Scripts and automation to improve detection, response, and security operations.
Last updated 11 days ago