Start Here
Most people get stuck because they jump between random courses. Start with the roadmap, move in order, and use the course library after that when you want to explore.
Start with Foundations
Linux, terminal, networking, then practical cyber.
Follow the order
Each track builds on the previous one.
Explore later
Use the full library once you know the path.
Guided Order
Build core fundamentals before moving to specialized tracks.
Command line mastery, Linux internals, permissions, and tooling.
Protocols, DNS, packet captures, and traffic inspection.
Scanning, enumeration, exploitation, and offensive techniques with Kali Linux.
Détection d'intrusion, analyse de logs, durcissement système, SIEM et forensique.
Active Directory, Pass-the-Hash, Kerberoasting, Golden Ticket, DCSync et techniques avancées de compromission d'infrastructure Windows.
Start With
Hacking Windows & Active Directory: Pass-the-Hash, Mimikatz, and Pivoting
Open first course →If you already know what you want to learn, browse all courses by track below.
Quick Wins
Short focused courses built around concrete scenarios. 3 lessons, one skill, zero fluff.
Track
Build core fundamentals before moving to specialized tracks.
Track
Command line mastery, Linux internals, permissions, and tooling.
Track
Protocols, DNS, packet captures, and traffic inspection.
Track
Scanning, enumeration, exploitation, and offensive techniques with Kali Linux.
Track
Détection d'intrusion, analyse de logs, durcissement système, SIEM et forensique.
Track
Active Directory, Pass-the-Hash, Kerberoasting, Golden Ticket, DCSync et techniques avancées de compromission d'infrastructure Windows.