Hands-on cybersecurity focused on offensive and defensive security practices
Sign up Log in
Offensive Security
Pentesting, exploitation, Active Directory labs, and offensive security techniques based on real-world scenarios.
Defensive Security
SOC operations, incident response, threat hunting, hardening, and vulnerability management.
Security Automation
Scripts and automation to improve detection, response, and security operations.
Last updated 5 days ago