What's New?Most RecentNo Replies YetNo Solutions YetLabs Live Ever felt totally stuck with a lab? Getting frustrated? Maybe you could have used the helpful guidance of an expert? Introducing Labs Live, a groundbreaking community webinar series from Imm...The Human Connection Challenge Lab 4: Linux Official Walkthrough Guide6 MIN READ Time’s Up! Congratulations to everyone who completed Lab 4: Linux from the Human Connection Challenge: Season 1. In this walkthrough, I'll share some strategies for efficiently completing the lab b...Coding Black Females in Bristol: Pathways & Connections We're proud to partner with Coding Black Females to host an inspiring evening of connection and career insights at Immersive's Bristol Office. Whether you’re considering a career in tech, pivoting ...Windows Basics: Ep.3 – Registry Roadblock I've figured out the rest of this lab, but I'm having trouble with questions 3-5. I've navigated to that part of the registry and poked around, but I'm not having any luck. Any tips? Secure Code Comments: One Easy Way to Steward Your Application Security Culture5 MIN READ While traditional code comments focus on explaining the code's functionality, security-focused comments are crucial to promoting secure coding practices throughout the development lifecycle (SDLC). ...AWS Security Hub: Integrations and Custom Actions Hi everyone! Q10 (create a rule called SecHub-tickets) on this lab is not completing. After I click create rule (Step 5) on the EventBridge, I got an error: Access denied to iam:CreateRole You do...The Human Connection Challenge Lab 5: Windows Official Walkthrough Guide5 MIN READ Time’s Up! Congratulations to everyone who completed Lab 5: Windows from the Human Connection Challenge: Season 1. In this walkthrough, I'll share some strategies for efficiently completing the lab...Need help on question 10 in "Wizard Spider DFIR: Ep.2 – Ransomware Analysis" lab Based on the name of the .html files, file hash and the behavior observed, what is the name of the ransomware used by the attackers? How can I approach the search for the above task on elastic se...CSM Tip: CPD/CPE Credits Signed Certificate – Yes Please! Did You Know? Well, well, well. I know many of you look for opportunities to earn CPD/CPE credits that you can submit for your annual renewals with various organizations each year. Did you know, the Immersive pl...Community Newsletter - April 20252 MIN READ Hello from Immersive HQ in Bristol UK where last week we hosted our first ever in-person community meetup. Ever since we launched this community last September we've been keen to find ways to ...
Tagshelp & support148defensive cyber60cyber pro58cyber threat intelligence53application security45cloud security36getting started35offensive cyber35cyber crisis simulations32tips & tricks32