Skip to content

Free Cybersecurity tutorials for beginners with 405 interactive lessons. Easy-to-follow programming guides with hands-on practice exercises.

Notifications You must be signed in to change notification settings

labex-labs/cybersecurity-free-tutorials

Repository files navigation

Practice Cybersecurity Free Tutorials

Languages

🇨🇳 简体中文 🇯🇵 日本語 🇪🇸 Español 🇫🇷 Français 🇩🇪 Deutsch 🇷🇺 Русский 🇰🇷 한국어 🇧🇷 Português 🇺🇸 English

In our increasingly interconnected world, cybersecurity is of utmost importance. This Skill Tree offers a comprehensive learning path for those aspiring to become security professionals. Beginning with the fundamentals, it leads you through a well - structured roadmap that encompasses network security, cryptography, and ethical hacking. Hands - on, non - video courses and practical exercises in a secure playground environment ensure you acquire real - world cybersecurity skills.

Index Name Difficulty Tutorial Link
01 📖 Using Hydra to Crack Passwords ★★☆ 🔗 View
02 📖 Network Scanning with Nmap ★☆☆ 🔗 View
03 📖 Introduction to Encryption with OpenSSL ★☆☆ 🔗 View
04 📖 Using Netcat for Simple Network Communication ★☆☆ 🔗 View
05 📖 Network Analysis with Wireshark ★★☆ 🔗 View
06 📖 Brute Force SSH in Hydra ★★☆ 🔗 View
07 📖 Setting Up Your Kali Linux Environment ★★☆ 🔗 View
08 📖 Navigating and Managing Files in Kali ★☆☆ 🔗 View
09 📖 Basic Networking Tools in Kali ★☆☆ 🔗 View
10 📖 Exploring Kali’s Security Tools ★☆☆ 🔗 View
11 📖 Managing Users and System in Kali ★☆☆ 🔗 View
12 📖 Learn Nmap Installation and Basic Usage ★★☆ 🔗 View
13 📖 Learn Nmap Basic Command Syntax ★☆☆ 🔗 View
14 📖 Learn Nmap Scanning and Output Analysis ★☆☆ 🔗 View
15 📖 Learn Target Specification Techniques in Nmap ★☆☆ 🔗 View
16 📖 Explore Nmap Verbosity Levels for Network Scanning ★☆☆ 🔗 View
17 📖 Conduct Nmap SYN Scans for Network Security ★☆☆ 🔗 View
18 📖 Perform UDP Port Scanning with Nmap ★☆☆ 🔗 View
19 📖 Learn Nmap OS and Version Detection Techniques ★☆☆ 🔗 View
20 📖 Install Configure and Analyze Network Traffic with Wireshark ★★☆ 🔗 View
21 📖 Explore and Customize Wireshark Interface ★☆☆ 🔗 View
22 📖 Capture and Analyze Network Traffic with Wireshark ★★☆ 🔗 View
23 📖 Analyze Network Traffic with Wireshark Display Filters ★★☆ 🔗 View
24 📖 Apply Wireshark Capture Filters for Network Traffic Analysis ★★☆ 🔗 View
25 📖 Create and Apply Colorizing Rules in Wireshark ★☆☆ 🔗 View
26 📖 Analyze TCP Traffic with Wireshark Follow TCP Stream Feature ★☆☆ 🔗 View
27 📖 Export Packets from Wireshark ★☆☆ 🔗 View
28 📖 Analyze IPv6 Traffic with Wireshark ★☆☆ 🔗 View
29 📖 Use Tshark for Network Traffic Analysis ★☆☆ 🔗 View
30 📖 Install and Verify Hydra ★★☆ 🔗 View
31 📖 Learn Basic Hydra Commands ★★☆ 🔗 View
32 📖 Attack HTTP Services with Hydra ★★☆ 🔗 View
33 📖 Attack FTP Services with Hydra ★★☆ 🔗 View
34 📖 Attack Telnet Services with Hydra ★☆☆ 🔗 View
35 📖 Adjust Hydra Attack Speed and Threads ★☆☆ 🔗 View
36 📖 Upgrade Simple Shell to Interactive Shell in Nmap ★☆☆ 🔗 View
37 📖 Explore Privilege Escalation via /etc/passwd File in Nmap ★★☆ 🔗 View
38 📖 Escalate Privileges Using /etc/shadow File in Linux ★☆☆ 🔗 View
39 📖 Exploit SUID Binaries for Privilege Escalation in Linux ★☆☆ 🔗 View
40 📖 Learn Cron Jobs and Privilege Escalation in Nmap ★☆☆ 🔗 View
41 📖 Perform Wildcard Injection in Nmap for Privilege Escalation ★☆☆ 🔗 View
42 📖 Learn Sudo Privilege Escalation Methods in Nmap ★☆☆ 🔗 View
43 📖 Find and Exploit Sensitive Config Files for Privilege Escalation in Nmap ★☆☆ 🔗 View
44 📖 Escalate Privileges to Root via Intermediate User in Nmap ★☆☆ 🔗 View
45 📖 Brute Force Root Password in Linux with Sucrack and Hydra ★☆☆ 🔗 View
46 📖 Explore Linux Privilege Escalation Tools in Nmap ★☆☆ 🔗 View
47 📖 Perform Penetration Testing with Nmap in Kali Linux ★☆☆ 🔗 View
48 📖 Perform Penetration Testing with Nmap and Metasploit ★☆☆ 🔗 View
49 📖 Perform Information Gathering with Nmap ★☆☆ 🔗 View
50 📖 Explore Metasploit Framework Basics ★☆☆ 🔗 View
51 📖 Use Nmap and Metasploit for Network Scanning and Vulnerability Analysis ★☆☆ 🔗 View
52 📖 Use Nmap to Scan and Exploit Target Host Vulnerabilities ★☆☆ 🔗 View
53 📖 Perform Vulnerability Scanning and Penetration Testing with Nmap in Kali Linux ★☆☆ 🔗 View
54 📖 Develop a Metasploit Scanner in Nmap ★☆☆ 🔗 View
55 📖 Exploit Ingreslock Vulnerability with Nmap ★☆☆ 🔗 View
56 📖 Exploit Samba Vulnerability on Metasploitable2 with Nmap ★☆☆ 🔗 View
57 📖 Exploit Unreal IRCd Vulnerability with Nmap and Metasploit ★☆☆ 🔗 View
58 📖 Perform Brute-Force Attacks on SSH and VNC with Metasploit in Nmap ★☆☆ 🔗 View
59 📖 Conduct Penetration Testing on Metasploitable2 with Nmap ★☆☆ 🔗 View
60 📖 Perform Privilege Escalation on Linux Machine with Nmap ★☆☆ 🔗 View
61 📖 Exploit Tomcat Vulnerabilities with Nmap in Kali Linux ★☆☆ 🔗 View
62 📖 Exploit NFS Misconfiguration for Root Access with Nmap ★☆☆ 🔗 View
63 📖 Exploit FTP Service Vulnerabilities with Nmap and Metasploit ★☆☆ 🔗 View
64 📖 Exploit Telnet Service Vulnerability with Metasploit ★☆☆ 🔗 View
65 📖 Inject Windows Backdoor into Adobe PDF in Nmap ★☆☆ 🔗 View
66 📖 Create Backdoor and Clear Traces on Target Machine in Nmap ★☆☆ 🔗 View
67 📖 Exploit SQL Injection Vulnerabilities in Nmap ★★☆ 🔗 View
68 📖 Perform SQL Injection Experiments in Nmap ★☆☆ 🔗 View
69 📖 Understand File Inclusion Vulnerabilities in Web Applications ★☆☆ 🔗 View
70 📖 Exploit File Inclusion Vulnerabilities with Nmap ★☆☆ 🔗 View
71 📖 Conduct XSS Vulnerability Experiments with Hackbar ★☆☆ 🔗 View
72 📖 Exploit File Upload Vulnerabilities with Nmap ★☆☆ 🔗 View
73 📖 Understand and Exploit Command Injection Vulnerabilities in Nmap ★☆☆ 🔗 View
74 📖 Explore Code Injection Vulnerabilities in Web Applications ★☆☆ 🔗 View

More

About

Free Cybersecurity tutorials for beginners with 405 interactive lessons. Easy-to-follow programming guides with hands-on practice exercises.

Topics

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published