Learn the basics of offensive and defensive cybersecurity as well as more advanced techniques from world-class professionals.
Cyber Cup Challenge participants: Watch this video to learn about the tools and machines you'll have access to within the Haiku Cyber Range when participating in the challenge.
Add and remove users in the Linux environment within the Haiku Cyber Range.
Add and remove users in the Windows environment within the Haiku Cyber Range.
The difference between Su and Sudo Linux command functions and how they affect a user's privileges.
Run a simple scan of your environment on Metasploit to keep a database of the assets scanned.
Run a scan to get more information on hosts, services, and vulnerabilities.
Exploit a vulnerability and gain access to the remote host.
Troubleshoot host-to-host communication by identifying currently listening ports and connections on a machine.
Navigate directories and view files in Linux through the command line interface.
Configure windows firewall settings to troubleshoot connectivity and deny/allow certain ports, protocols, and applications.
Using ZAP - A pentest tool that helps you identify weakness in web apps and allow you to exploit a web application.