CYBERSECURITY
Learning Journey & Room Notes
→ Approche: Random Rooms & Challenges
→ Focus: Practical Skills & Real-World Scenarios
→ Documentation: Write-ups & Notes pour chaque room
→ Status: Active learning...
Rooms & Write-ups
Introduction To Honeypots
Learn about honeypots and how they can be used to detect and analyze malicious activity in a network environment.
Introduction to Docker
Learn the basics of Docker containerization, understand core concepts, and get hands-on experience with containers.
Intro to IoT Pentesting
Discover the fundamentals of IoT security and learn penetration testing techniques for Internet of Things devices.
Cryptography Basics
Learn the basics of cryptography and symmetric encryption.
Public Key Cryptography Basics
Discover how public key ciphers such as RSA work and explore their role in applications such as SSH.
Hashing Basics
Learn about hashing functions and their uses in password verification and file integrity checking.
John the Ripper: The Basics
Learn how to use John the Ripper, a powerful and adaptable hash-cracking tool.
Tor
A beginner orienteered guide on using the Tor network
Governance & Regulation
Explore policies and frameworks vital for regulating cyber security in an organisation.
Junior Security Analyst Intro
Play through a day in the life of a Security Analyst and experience their everyday duties.
SOC Role in Blue Team
Discover security roles and learn how to advance your SOC career, starting from the L1 analyst.
Humans as Attack Vectors
Learn how attackers exploit vulnerable and misconfigured systems, and how you can protect them.
Systems as Attack Vectors
Understand why and how people are targeted in cyber attacks and how the SOC helps defend them.
SOC L1 Alert Triage
Learn more about SOC alerts and build a systematic approach to efficiently triaging them.
SOC L1 Alert Reporting
Learn how to properly report, escalate, and communicate about high-risk SOC alerts.
SOC Workbooks and Lookups
Discover useful corporate resources to help you structure and simplify L1 alert triage.
First Shift CTF
The first SOC shift won't be that challenging, right?
Wireshark: The Basics
Learn the basics of Wireshark and how to analyse protocols and PCAPs.
Security Principles
Learn about the security triad and common security models and principles.
Security Engineer Intro
What does a day in the life of a security engineer look like?
Introduction to Cryptography
Learn about encryption algorithms such as AES, Diffie-Hellman key exchange, hashing, PKI, and TLS.
Identity and Access Management
Learn about identification, authentication, authorisation, accounting, and identity management.
Vulnerability Management
Learn how to identify, detect, mitigate and report a vulnerability effectively.
Secure Network Architecture
Learn about and implement security best practices for network environments.
Risk Management
Learn about framing, assessing, responding, and monitoring risk.
Virtualisation Basics
Learn why virtualisation powers modern IT, improving efficiency and safely isolating environments.
OWASP Top 10 2025: IAAA Failures
Learn about A01, A07, and A09 in how they related to failures in the applied IAAA model..