Featured Content8 MIN READRole for Initiative: Mapping Cybersecurity Jobs to D&D Classes (PART 2)The Human Connection Blog8 MIN READRole for Initiative: Mapping Cybersecurity Jobs to D&D Classes (PART 1)The Human Connection BlogWant to design a CTF lab to share? 🤩🖥️Community Forum3 MIN READGrow Your Career Leaning Into a New Tool Your Manager Will Rely OnThe Human Connection Blog
8 MIN READRole for Initiative: Mapping Cybersecurity Jobs to D&D Classes (PART 2)The Human Connection Blog
8 MIN READRole for Initiative: Mapping Cybersecurity Jobs to D&D Classes (PART 1)The Human Connection Blog
3 MIN READGrow Your Career Leaning Into a New Tool Your Manager Will Rely OnThe Human Connection Blog
Investigating IAM Incidents in AWS: Preparation - Question 7 For the question: The ‘MetrolioQA’ IAM role in your account grants write access to a ‘metrolio’ role from another account. What is the full name of the external principle? I can't seem to find insi...Immersive Labs – APT29: Threat Hunting with Splunk Hi everyone, I’m currently working through the Immersive Labs – APT29: Threat Hunting with Splunk lab and got stuck on Question 10. Question: A PowerShell script was initially executed to extract ...Mobile Malware: Anubis Malware (Offensive) - Question 8,9 despite obtaining the encrypted value, seems like RC4 decryption doesn't work with zanubis as the password. I am wondering where should I pivot into? For question 9: where should I look int...Modern Encryption Issue I'm on the last training under Modern Encryption training. I'm getting this error: ─$ openssl enc -des-ede3-cbc -d -pbkdf2 -nosalt -in encrypted_file_3DES.enc -out DES3 enter des-ede3-cbc decrypti...Lab not getting complete even it is correct I am working on C# / ASP.NET API from the I am doing ASP.NET Core API: Username Enumeration lab, this lab task 1 is always showing incomplete even after I am generating correct results [HttpPost("...Want to design a CTF lab to share? 🤩🖥️ For this year's Community Challenge Series of labs, we want to see what you can make! Our Lab Builder allows users to build custom labs with the help of ai tooling. We'll give some guidance on...Webinar – Vishing & Deepfakes: Anatomy of a Multi-Vector Attack Registration is required. Clicking attend in the Community only sets a reminder. Social engineering has evolved from simple scams into sophisticated omni-channel attacks. As AI tools acceler...Virtual Crisis Sim – The AI Trend-Maker: Echo of the Puppetmaster Registration is required. Clicking attend in the Community only sets a reminder. Has the notorious Puppetmaster returned? Or is there a sinister copycat on the loose? Join us for a crisis...Lesson 7: Windows File Permissions I need help with question 4: The answer is clearly Administrators based on the screenshot. I would greatly appreciate assistance on this. Role for Initiative: Mapping Cybersecurity Jobs to D&D Classes (PART 2)8 MIN READ Continuing on from the roles in the previous blog... Defensive Cyber D&D Class: The Fighter Saves: Strength and Constitution D&D Class Description: A master of all arms and armor. Reliab...Resilience Starts Where Training Ends: Why Compliance Is Not the Same as Resilience Cybersecurity has gone from being a technical challenge to a business imperative, with boards and regulators demanding proof of readiness. Meeting this demand requires a new vision. But h...Role for Initiative: Mapping Cybersecurity Jobs to D&D Classes (PART 1)8 MIN READ Introduction Welcome, weary traveler. The realm before you is vast and often misunderstood, filled with winding roads, hidden passageways, and ever-present threats moving through the shadows. ...
Tagshelp & support292immersive labs156challenges110defensive cyber99cyber threat intelligence84offensive cyber70application security68questions & feedback65cloud security62tips & tricks59