Technical Foundations. Analyze attacks. Read the logs. Defend the network.
In this level, we shift from "Awareness" to "Action". Students learn how attackers think and how systems record their tracks. We dive into real tools (Linux CLI, Packet Analyzers) to investigate phishing emails and network traffic, preparing them for the role of a Blue Team defender.
Deep dive into email headers to trace scam origins.
How data moves? Using Wireshark (simulated) to capture traffic.
Solve multi-scenario puzzles under time pressure.