haname@tryhackme:~$ cat journey_info.txt
→ Approche: Random Rooms & Challenges
→ Focus: Practical Skills & Real-World Scenarios
→ Documentation: Write-ups & Notes pour chaque room
→ Status: Active learning...

Rooms & Write-ups

Honeypots

Introduction To Honeypots

Learn about honeypots and how they can be used to detect and analyze malicious activity in a network environment.

Done
Docker

Introduction to Docker

Learn the basics of Docker containerization, understand core concepts, and get hands-on experience with containers.

Done
IoT Pentesting

Intro to IoT Pentesting

Discover the fundamentals of IoT security and learn penetration testing techniques for Internet of Things devices.

Done
Cryptography Basics

Cryptography Basics

Learn the basics of cryptography and symmetric encryption.

Done
Public Key Cryptography

Public Key Cryptography Basics

Discover how public key ciphers such as RSA work and explore their role in applications such as SSH.

Done
Hashing Basics

Hashing Basics

Learn about hashing functions and their uses in password verification and file integrity checking.

Done
John the Ripper

John the Ripper: The Basics

Learn how to use John the Ripper, a powerful and adaptable hash-cracking tool.

Done
Tor

Tor

A beginner orienteered guide on using the Tor network

Done
Governance & Regulation

Governance & Regulation

Explore policies and frameworks vital for regulating cyber security in an organisation.

Done
Junior Security Analyst

Junior Security Analyst Intro

Play through a day in the life of a Security Analyst and experience their everyday duties.

Done
SOC Role

SOC Role in Blue Team

Discover security roles and learn how to advance your SOC career, starting from the L1 analyst.

Done
Humans as Attack Vectors

Humans as Attack Vectors

Learn how attackers exploit vulnerable and misconfigured systems, and how you can protect them.

Done
Systems as Attack Vectors

Systems as Attack Vectors

Understand why and how people are targeted in cyber attacks and how the SOC helps defend them.

Done
SOC L1 Alert Triage

SOC L1 Alert Triage

Learn more about SOC alerts and build a systematic approach to efficiently triaging them.

Done
SOC L1 Alert Reporting

SOC L1 Alert Reporting

Learn how to properly report, escalate, and communicate about high-risk SOC alerts.

Done
SOC Workbooks

SOC Workbooks and Lookups

Discover useful corporate resources to help you structure and simplify L1 alert triage.

Done
First Shift CTF

First Shift CTF

The first SOC shift won't be that challenging, right?

32% Progress
cURL Exploitation

Wireshark: The Basics

Learn the basics of Wireshark and how to analyse protocols and PCAPs.

Done
Security Principles

Security Principles

Learn about the security triad and common security models and principles.

Done
Security Engineer

Security Engineer Intro

What does a day in the life of a security engineer look like?

Done
Cryptography

Introduction to Cryptography

Learn about encryption algorithms such as AES, Diffie-Hellman key exchange, hashing, PKI, and TLS.

Done
Cryptography

Identity and Access Management

Learn about identification, authentication, authorisation, accounting, and identity management.

Done
Cryptography

Vulnerability Management

Learn how to identify, detect, mitigate and report a vulnerability effectively.

Done
Secure Network Architecture

Secure Network Architecture

Learn about and implement security best practices for network environments.

Done
Secure Network Architecture

Risk Management

Learn about framing, assessing, responding, and monitoring risk.

Done
Secure Network Architecture

Virtualisation Basics

Learn why virtualisation powers modern IT, improving efficiency and safely isolating environments.

Done
Secure Network Architecture

OWASP Top 10 2025: IAAA Failures

Learn about A01, A07, and A09 in how they related to failures in the applied IAAA model..

Done