Blue Team



Detection, response, and defense: SIEM, EDR, threat hunting, and incident response.

  • SIEM & Log Analysis
    SPL / KQL, dashboards, use cases
    View Roadmap
  • Endpoint Detection
    EDR, hunting, YARA
    View Roadmap
  • Incident Response
    Triage, memory & disk forensics
    View Roadmap
Start Blue Team Path

Red Team



Offensive techniques: pentesting, AD, exploitation, and post-exploitation.

  • Web App Exploits
    XSS, SQLi, SSRF, Burp practice
    View Roadmap
  • AD & Lateral Movement
    Kerberoast, Pass-the-Hash, BloodHound
    View Roadmap
  • Post-Exploitation
    Mimikatz, persistence
    View Roadmap
Start Red Team Path