Four rooms covering the tools and concepts I use at work. Built for people who want to understand what is happening under the hood, not just pass a certification exam.
How to build a detection pipeline that catches real threats. Full Wazuh + Elastic setup, writing your own detection rules, and learning how to triage and hunt.
Windows is the dominant target in most environments. This room covers the internals you need to understand to defend it and recognize when something is wrong.
Servers run Linux. Attacker tooling runs on Linux. Most detection gaps I have seen in the field are on systems people assumed were safe by default.
Most attacks move over a network. If you do not understand the protocols, you will miss the indicators. This room covers what actually matters for detection and defense.