close

Cybersecurity Tutorials

Our cybersecurity tutorials offer a comprehensive way to learn digital defense strategies and techniques. They cover various aspects of information security, suitable for both beginners and security professionals. Through hands - on labs and practical examples, you'll gain experience in threat detection, prevention, and mitigation. Our secure playground allows you to practice cybersecurity techniques in a controlled environment.

Create and Apply Colorizing Rules in Wireshark

Create and Apply Colorizing Rules in Wireshark

In this lab, you will learn how to create and apply colorizing rules in Wireshark to highlight specific network traffic. You'll explore existing rules, create new ones, modify existing rules, and import coloring rule sets for efficient packet analysis.
Wireshark
Metasploit Installation and Initial Setup

Metasploit Installation and Initial Setup

In this lab, you will learn how to install and perform the initial setup of the Metasploit Framework on an Ubuntu system.
Linux
Verify Wireshark Installation

Verify Wireshark Installation

In this challenge, you will verify your Wireshark installation. This hands-on exercise ensures that Wireshark is properly installed and ready for network traffic analysis. Confirm successful installation and prepare for more advanced Wireshark challenges.
Wireshark
Perform Information Gathering with Nmap

Perform Information Gathering with Nmap

In this lab, you will learn how to perform information gathering using Nmap. You will scan open ports, obtain basic host information, and identify network services running on the target site. This hands-on experience will enhance your understanding of network reconnaissance techniques.
Nmap
DAY 04: The Fortress Guardian

DAY 04: The Fortress Guardian

In this challenge, you'll act as a system administrator to secure a new project directory by managing users, groups, and advanced file permissions in Linux.
Linux
Linux which Command: Command Locating

Linux which Command: Command Locating

Learn how to use the 'which' command in Linux to locate executable files, handle non-existent commands, discover multiple installations, understand PATH priority, and create custom commands.
Linux
Configuring Storage Devices

Configuring Storage Devices

In this lab, you will learn the fundamental steps of configuring a new storage device in a Linux environment, including attaching, formatting, mounting, and unmounting a virtual disk.
Linux
DAY 03: The Log Investigator

DAY 03: The Log Investigator

In this challenge, you'll step into the shoes of a DevOps engineer to diagnose a failing application by analyzing various Linux logs and configuration files using essential command-line tools.
Linux
Setting Up Your Kali Linux Environment

Setting Up Your Kali Linux Environment

In this lab, you'll learn to set up a Kali Linux environment using Docker in the LabEx VM. You'll launch the image, verify the container, explore the terminal, review how Kali package management works in this environment, and inspect version and system information.
Kali Linux
DAY 05: The Keeper of the Keys

DAY 05: The Keeper of the Keys

In this challenge, you will take on the role of a System Administrator to manage user accounts on a Linux system, including creating, modifying, and disabling users.
Linux
Manage Variables and Facts in RHEL with Ansible

Manage Variables and Facts in RHEL with Ansible

In this lab, you will learn to manage variables, facts, and secrets in Ansible on RHEL. You'll deploy an Apache web server, use built-in and custom facts for configuration, and secure sensitive data like passwords with Ansible Vault to create a system user.
AnsibleRed Hat Enterprise Linux
Permissions of Files

Permissions of Files

In this lab, we will learn how to use the chown, touch, and chmod commands in Linux to manage file permissions. These commands are essential for managing access to files and directories on a Linux system.
LinuxShell
Display User and Group Information

Display User and Group Information

In this challenge, you need to use the Linux command to display user and group information.
LinuxShell
File System Explorer

File System Explorer

In this challenge, you'll create a simple file system explorer script that demonstrates your understanding of basic file and directory operations in shell scripting. You'll implement functions to check the existence, type, and permissions of files and directories, enhancing your skills in file system manipulation and conditional testing in bash.
ShellLinux
Implement Hard Links in Linux

Implement Hard Links in Linux

Create and manipulate hard links in a Linux file system, understanding their properties and behavior. Explore how hard links share the same inode and content across multiple file names.
Red Hat Enterprise Linux
Diagnose and Correct File Permission Problems

Diagnose and Correct File Permission Problems

In this challenge, you will learn how to diagnose and correct file permission problems on a Linux system.
Red Hat Enterprise Linux
User Account Creation

User Account Creation

In this lab, you will learn the fundamental Linux commands for user account management, including creating, modifying, and deleting user accounts, and granting administrative privileges.
Linux
Find and Retrieve Container Images From a Remote Registry

Find and Retrieve Container Images From a Remote Registry

In this challenge, you will learn how to find and retrieve container images from a remote registry, which is a crucial skill for managing containers in a production environment.
Red Hat Enterprise Linux
  • Prev
  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • ...
  • 195
  • Next