Where to train your skills

We want to help you grow and develop your skills within cyber security. There is a lot of different material that you can learn a lot from, and we have tried to compile a bunch of the material here. Use the tags to find the material/exercises that can help you, with the skills you want to train.

FE-Challenges

FE-Challenges

TECHNICAL

Reverse Engineering Theory

Reverse Engineering Theory

SOFTWARE, TECHNICAL

Reverse Engineering Practice

Reverse Engineering Practice

SOFTWARE, TECHNICAL

Code Analysis

Code Analysis

SOFTWARE, TECHNICAL

APR Spoofing

APR Spoofing

NETWORKS, TECHNICAL

Fundamentals of Metasploit

Fundamentals of Metasploit

NETWORKS, SOFTWARE, TECHNICAL

Metasploit and MSFVenom

Metasploit and MSFVenom

NETWORKS, SOFTWARE, TECHNICAL

Regulation and Cyber Security 1

Regulation and Cyber Security 1

BEGINNER, LEGAL

Regulation and Cyber Security 2

Regulation and Cyber Security 2

LEGAL

Phishing intro

Phishing intro

BEGINNER, TECHNICAL

Phishing prevention

Phishing prevention

BEGINNER, LEGAL

Phishing Techniques

Phishing Techniques

NETWORKS, TECHNICAL

Linux Command Line & Kali

Linux Command Line & Kali

BEGINNER, TECHNICAL

SQL Injection

SQL Injection

SOFTWARE, TECHNICAL, WEB SECURITY

Network Scanning

Network Scanning

BEGINNER, NETWORKS, TECHNICAL

Cross-Site Scripting

Cross-Site Scripting

NETWORKS, SOFTWARE, TECHNICAL, WEB SECURITY

Cross-Site Request Forgery

Cross-Site Request Forgery

NETWORKS, TECHNICAL, WEB SECURITY