Loading...

Profile-based and customizable assessments

Screenshot of the Pentester assessment screen showing difficulty, question count, duration, language, question types, and categories included.

Based on predefined Profiles

A type of assessment that allows you to take advantage of dynamic assessment suites without having to select categories. Our experts have prepared ready-made profiles corresponding to the most popular job positions in IT. Each profile is a combination of various categories appropriate to a given job position, based on which the platform generates unique assessment. All questions are scored automatically and the user who orders the assessment sees a detailed final report.

An icon that illustrates high quality content

High quality content

Thoughtfully prepared by our experts.

An icon that illustrates full automation

Full automation

To save your money and time.

An icon that illustrates convenient workflow

Convenient workflow

Just a few steps to achieve your goals.

An icon that illustrates predefined profiles prepared by experts

Predefined Profiles prepared by experts

Covering most popular job positions.

An icon that illustrates low cost

Low cost

To avoid draining your budget.


An icon that illustrates detailed report with summary

Detailed report with summary

For an overview or details.

Screenshot of a custom assessment screen showing question count, duration, language, question types, and categories included.

Based on custom Profiles

A solution based on our huge database of questions divided into specific categories. The user selects the categories he is interested in and the number of questions in these categories, and the platform creates a unique set of questions. This approach works well both in the case of positions that combine different responsibilities as well as when the user wants to have control over which areas of knowledge are to be verified during the assessment. All questions are scored automatically and the user who orders the assessment sees a detailed final report.

An icon that illustrates high quality content

High quality content

Thoughtfully prepared by our experts.

An icon that illustrates full automation

Full automation

To save your money and time.

An icon that illustrates convenient workflow

Convenient workflow

Just a few steps to achieve your goals.

An icon that illustrates flexible topics combination according to your needs

Flexible topics combination according to your needs

To tailor the assessment to your needs.

An icon that illustrates low cost

Low cost

To avoid draining your budget.


An icon that illustrates detailed report with summary

Detailed report with summary

For an overview or details.

Profile groups

19 profiles

Defensive Cybersecurity

AD, AWS, Azure, GCP, Crypto, SIEM, SOC, SOAR, Threat huntings, Incident Response, Forensic, Malware Analysis

25 profiles

Software Development

Frontend, Backend, Fullstack - Python, C#, Ruby, Java, PHP, React, Angular, Vue.js, JavaScript

4 profiles

Databases

MS SQL, MySQL, PostgreSQL, Oracle

8 profiles

Cloud

Amazon AWS, Microsoft Azure, Google Google Cloud Platform

All Profiles

The assessment profiles we have created were built for the most popular IT job positions found in companies around the world. Each profile covers multiple topics that are closely related to a given position. The profiles were created as a result of content analyzes of hundreds of job advertisements and improved using our extensive practical experience with technology. If you think that any additional profile should appear on this list, please let us know!

Proficiency level: Entry

Category configuration:

40%
25%
15%
10%
5%
5%

Proficiency level: Regular

Category configuration:

40%
25%
15%
10%
5%
5%

Proficiency level: Senior

Category configuration:

40%
25%
15%
10%
5%
5%

Proficiency level: Entry

Category configuration:

30%
20%
15%
10%
10%
5%
5%
5%

Proficiency level: Regular

Category configuration:

30%
20%
15%
10%
10%
5%
5%
5%

Proficiency level: Senior

Category configuration:

30%
20%
15%
10%
10%
5%
5%
5%

Proficiency level: Entry

Category configuration:

30%
15%
15%
10%
10%
5%
5%
5%
5%

Proficiency level: Regular

Category configuration:

30%
15%
15%
10%
10%
5%
5%
5%
5%

Proficiency level: Senior

Category configuration:

30%
15%
15%
10%
10%
5%
5%
5%
5%

Proficiency level: Entry

Category configuration:

25%
15%
15%
10%
10%
10%
5%
5%
5%

Proficiency level: Regular

Category configuration:

25%
15%
15%
10%
10%
10%
5%
5%
5%

Proficiency level: Senior

Category configuration:

25%
15%
15%
10%
10%
10%
5%
5%
5%

Proficiency level: Entry

Category configuration:

35%
15%
10%
10%
10%
5%
5%
5%
5%

Proficiency level: Regular

Category configuration:

35%
15%
10%
10%
10%
5%
5%
5%
5%

Proficiency level: Senior

Category configuration:

35%
15%
10%
10%
10%
5%
5%
5%
5%

Proficiency level: Entry

Category configuration:

40%
20%
10%
10%
5%
5%
5%
5%

Proficiency level: Regular

Category configuration:

40%
20%
10%
10%
5%
5%
5%
5%

Proficiency level: Senior

Category configuration:

40%
20%
10%
10%
5%
5%
5%
5%

Proficiency level: Entry

Category configuration:

35%
15%
10%
10%
10%
5%
5%
5%
5%

Proficiency level: Regular

Category configuration:

35%
15%
10%
10%
10%
5%
5%
5%
5%

Proficiency level: Senior

Category configuration:

35%
15%
10%
10%
10%
5%
5%
5%
5%

Proficiency level: Entry

Category configuration:

40%
20%
10%
10%
5%
5%
5%
5%

Proficiency level: Regular

Category configuration:

40%
20%
10%
10%
5%
5%
5%
5%

Proficiency level: Senior

Category configuration:

40%
20%
10%
10%
5%
5%
5%
5%

Proficiency level: Entry

Category configuration:

30%
15%
10%
10%
5%
5%
5%
5%
5%
5%
5%

Proficiency level: Regular

Category configuration:

30%
15%
10%
10%
5%
5%
5%
5%
5%
5%
5%

Proficiency level: Senior

Category configuration:

30%
15%
10%
10%
5%
5%
5%
5%
5%
5%
5%

Proficiency level: Entry

Category configuration:

30%
15%
10%
10%
5%
5%
5%
5%
5%
5%
5%

Proficiency level: Regular

Category configuration:

30%
15%
10%
10%
5%
5%
5%
5%
5%
5%
5%

Proficiency level: Senior

Category configuration:

30%
15%
10%
10%
5%
5%
5%
5%
5%
5%
5%

Proficiency level: Entry

Category configuration:

30%
15%
10%
10%
5%
5%
5%
5%
5%
5%
5%

Proficiency level: Regular

Category configuration:

30%
15%
10%
10%
5%
5%
5%
5%
5%
5%
5%

Proficiency level: Senior

Category configuration:

30%
15%
10%
10%
5%
5%
5%
5%
5%
5%
5%

Proficiency level: Entry

Category configuration:

30%
15%
10%
10%
5%
5%
5%
5%
5%
5%
5%

Proficiency level: Regular

Category configuration:

30%
15%
10%
10%
5%
5%
5%
5%
5%
5%
5%

Proficiency level: Senior

Category configuration:

30%
15%
10%
10%
5%
5%
5%
5%
5%
5%
5%

Proficiency level: Entry

Category configuration:

30%
15%
10%
10%
5%
5%
5%
5%
5%
5%
5%

Proficiency level: Regular

Category configuration:

30%
15%
10%
10%
5%
5%
5%
5%
5%
5%
5%

Proficiency level: Senior

Category configuration:

30%
15%
10%
10%
5%
5%
5%
5%
5%
5%
5%

Proficiency level: Entry

Category configuration:

30%
15%
10%
10%
5%
5%
5%
5%
5%
5%
5%

Proficiency level: Regular

Category configuration:

30%
15%
10%
10%
5%
5%
5%
5%
5%
5%
5%

Proficiency level: Senior

Category configuration:

30%
15%
10%
10%
5%
5%
5%
5%
5%
5%
5%

Proficiency level: Entry

Category configuration:

30%
15%
10%
10%
5%
5%
5%
5%
5%
5%
5%

Proficiency level: Regular

Category configuration:

30%
15%
10%
10%
5%
5%
5%
5%
5%
5%
5%

Proficiency level: Senior

Category configuration:

30%
15%
10%
10%
5%
5%
5%
5%
5%
5%
5%

Proficiency level: Entry

Category configuration:

30%
15%
10%
10%
5%
5%
5%
5%
5%
5%
5%

Proficiency level: Regular

Category configuration:

30%
15%
10%
10%
5%
5%
5%
5%
5%
5%
5%

Proficiency level: Senior

Category configuration:

30%
15%
10%
10%
5%
5%
5%
5%
5%
5%
5%

Proficiency level: Entry

Category configuration:

30%
15%
10%
10%
5%
5%
5%
5%
5%
5%
5%

Proficiency level: Regular

Category configuration:

30%
15%
10%
10%
5%
5%
5%
5%
5%
5%
5%

Proficiency level: Senior

Category configuration:

30%
15%
10%
10%
5%
5%
5%
5%
5%
5%
5%

Proficiency level: Entry

Category configuration:

20%
10%
10%
10%
10%
10%
10%
10%
5%
5%

Proficiency level: Regular

Category configuration:

20%
10%
10%
10%
10%
10%
10%
10%
5%
5%

Proficiency level: Senior

Category configuration:

20%
10%
10%
10%
10%
10%
10%
10%
5%
5%

Proficiency level: Entry

Category configuration:

40%
25%
15%
10%
5%
5%

Proficiency level: Regular

Category configuration:

40%
25%
15%
10%
5%
5%

Proficiency level: Senior

Category configuration:

40%
25%
15%
10%
5%
5%

Proficiency level: Entry

Category configuration:

40%
25%
15%
10%
5%
5%

Proficiency level: Regular

Category configuration:

40%
25%
15%
10%
5%
5%

Proficiency level: Senior

Category configuration:

40%
25%
15%
10%
5%
5%

Proficiency level: Entry

Category configuration:

10%
10%
10%
10%
10%
10%
5%
5%
5%
5%
5%
5%
5%
5%

Proficiency level: Regular

Category configuration:

10%
10%
10%
10%
10%
10%
5%
5%
5%
5%
5%
5%
5%
5%

Proficiency level: Senior

Category configuration:

10%
10%
10%
10%
10%
10%
5%
5%
5%
5%
5%
5%
5%
5%

Proficiency level: Entry

Category configuration:

10%
10%
10%
10%
10%
10%
10%
5%
5%
5%
5%
5%
5%

Proficiency level: Regular

Category configuration:

10%
10%
10%
10%
10%
10%
10%
5%
5%
5%
5%
5%
5%

Proficiency level: Senior

Category configuration:

10%
10%
10%
10%
10%
10%
10%
5%
5%
5%
5%
5%
5%

Proficiency level: Entry

Category configuration:

40%
15%
15%
10%
10%
5%
5%

Proficiency level: Regular

Category configuration:

40%
15%
15%
10%
10%
5%
5%

Proficiency level: Senior

Category configuration:

40%
15%
15%
10%
10%
5%
5%

Proficiency level: Entry

Category configuration:

30%
20%
15%
10%
10%
5%
5%
5%

Proficiency level: Regular

Category configuration:

30%
20%
15%
10%
10%
5%
5%
5%

Proficiency level: Senior

Category configuration:

30%
20%
15%
10%
10%
5%
5%
5%

Proficiency level: Entry

Category configuration:

15%
15%
10%
10%
10%
10%
10%
5%
5%
5%
5%

Proficiency level: Regular

Category configuration:

15%
15%
10%
10%
10%
10%
10%
5%
5%
5%
5%

Proficiency level: Senior

Category configuration:

15%
15%
10%
10%
10%
10%
10%
5%
5%
5%
5%

Proficiency level: Entry

Category configuration:

25%
15%
10%
10%
10%
10%
5%
5%
5%
5%

Proficiency level: Regular

Category configuration:

25%
15%
10%
10%
10%
10%
5%
5%
5%
5%

Proficiency level: Senior

Category configuration:

25%
15%
10%
10%
10%
10%
5%
5%
5%
5%

Proficiency level: Entry

Category configuration:

20%
10%
10%
10%
10%
10%
10%
10%
5%
5%

Proficiency level: Regular

Category configuration:

20%
10%
10%
10%
10%
10%
10%
10%
5%
5%

Proficiency level: Senior

Category configuration:

20%
10%
10%
10%
10%
10%
10%
10%
5%
5%

Proficiency level: Entry

Category configuration:

25%
20%
10%
10%
10%
10%
5%
5%
5%

Proficiency level: Regular

Category configuration:

25%
20%
10%
10%
10%
10%
5%
5%
5%

Proficiency level: Senior

Category configuration:

25%
20%
10%
10%
10%
10%
5%
5%
5%

Proficiency level: Entry

Category configuration:

20%
10%
10%
10%
10%
10%
10%
5%
5%
5%
5%

Proficiency level: Regular

Category configuration:

20%
10%
10%
10%
10%
10%
10%
5%
5%
5%
5%

Proficiency level: Senior

Category configuration:

20%
10%
10%
10%
10%
10%
10%
5%
5%
5%
5%

Proficiency level: Entry

Category configuration:

20%
10%
10%
10%
10%
10%
10%
5%
5%
5%
5%

Proficiency level: Regular

Category configuration:

20%
10%
10%
10%
10%
10%
10%
5%
5%
5%
5%

Proficiency level: Senior

Category configuration:

20%
10%
10%
10%
10%
10%
10%
5%
5%
5%
5%

Proficiency level: Entry

Category configuration:

20%
10%
10%
10%
10%
10%
10%
5%
5%
5%
5%

Proficiency level: Regular

Category configuration:

20%
10%
10%
10%
10%
10%
10%
5%
5%
5%
5%

Proficiency level: Senior

Category configuration:

20%
10%
10%
10%
10%
10%
10%
5%
5%
5%
5%

Proficiency level: Entry

Category configuration:

15%
15%
10%
10%
5%
5%
5%
5%
5%
5%
5%
5%
5%
5%

Proficiency level: Regular

Category configuration:

15%
15%
10%
10%
5%
5%
5%
5%
5%
5%
5%
5%
5%
5%

Proficiency level: Senior

Category configuration:

15%
15%
10%
10%
5%
5%
5%
5%
5%
5%
5%
5%
5%
5%

Proficiency level: Entry

Category configuration:

15%
15%
10%
10%
5%
5%
5%
5%
5%
5%
5%
5%
5%
5%

Proficiency level: Regular

Category configuration:

15%
15%
10%
10%
5%
5%
5%
5%
5%
5%
5%
5%
5%
5%

Proficiency level: Senior

Category configuration:

15%
15%
10%
10%
5%
5%
5%
5%
5%
5%
5%
5%
5%
5%

Proficiency level: Entry

Category configuration:

15%
15%
10%
10%
5%
5%
5%
5%
5%
5%
5%
5%
5%
5%

Proficiency level: Regular

Category configuration:

15%
15%
10%
10%
5%
5%
5%
5%
5%
5%
5%
5%
5%
5%

Proficiency level: Senior

Category configuration:

15%
15%
10%
10%
5%
5%
5%
5%
5%
5%
5%
5%
5%
5%

Proficiency level: Entry

Category configuration:

15%
15%
10%
10%
5%
5%
5%
5%
5%
5%
5%
5%
5%
5%

Proficiency level: Regular

Category configuration:

15%
15%
10%
10%
5%
5%
5%
5%
5%
5%
5%
5%
5%
5%

Proficiency level: Senior

Category configuration:

15%
15%
10%
10%
5%
5%
5%
5%
5%
5%
5%
5%
5%
5%

Proficiency level: Entry

Category configuration:

15%
15%
10%
10%
5%
5%
5%
5%
5%
5%
5%
5%
5%
5%

Proficiency level: Regular

Category configuration:

15%
15%
10%
10%
5%
5%
5%
5%
5%
5%
5%
5%
5%
5%

Proficiency level: Senior

Category configuration:

15%
15%
10%
10%
5%
5%
5%
5%
5%
5%
5%
5%
5%
5%

Proficiency level: Entry

Category configuration:

15%
15%
10%
10%
5%
5%
5%
5%
5%
5%
5%
5%
5%
5%

Proficiency level: Regular

Category configuration:

15%
15%
10%
10%
5%
5%
5%
5%
5%
5%
5%
5%
5%
5%

Proficiency level: Senior

Category configuration:

15%
15%
10%
10%
5%
5%
5%
5%
5%
5%
5%
5%
5%
5%

Proficiency level: Entry

Category configuration:

15%
15%
10%
10%
5%
5%
5%
5%
5%
5%
5%
5%
5%
5%

Proficiency level: Regular

Category configuration:

15%
15%
10%
10%
5%
5%
5%
5%
5%
5%
5%
5%
5%
5%

Proficiency level: Senior

Category configuration:

15%
15%
10%
10%
5%
5%
5%
5%
5%
5%
5%
5%
5%
5%

Proficiency level: Entry

Category configuration:

15%
15%
10%
10%
5%
5%
5%
5%
5%
5%
5%
5%
5%
5%

Proficiency level: Regular

Category configuration:

15%
15%
10%
10%
5%
5%
5%
5%
5%
5%
5%
5%
5%
5%

Proficiency level: Senior

Category configuration:

15%
15%
10%
10%
5%
5%
5%
5%
5%
5%
5%
5%
5%
5%

Proficiency level: Entry

Category configuration:

15%
15%
10%
10%
5%
5%
5%
5%
5%
5%
5%
5%
5%
5%

Proficiency level: Regular

Category configuration:

15%
15%
10%
10%
5%
5%
5%
5%
5%
5%
5%
5%
5%
5%

Proficiency level: Senior

Category configuration:

15%
15%
10%
10%
5%
5%
5%
5%
5%
5%
5%
5%
5%
5%

Proficiency level: Entry

Category configuration:

15%
15%
10%
10%
5%
5%
5%
5%
5%
5%
5%
5%
5%
5%

Proficiency level: Regular

Category configuration:

15%
15%
10%
10%
5%
5%
5%
5%
5%
5%
5%
5%
5%
5%

Proficiency level: Senior

Category configuration:

15%
15%
10%
10%
5%
5%
5%
5%
5%
5%
5%
5%
5%
5%

Proficiency level: Entry

Category configuration:

15%
15%
10%
10%
5%
5%
5%
5%
5%
5%
5%
5%
5%
5%

Proficiency level: Regular

Category configuration:

15%
15%
10%
10%
5%
5%
5%
5%
5%
5%
5%
5%
5%
5%

Proficiency level: Senior

Category configuration:

15%
15%
10%
10%
5%
5%
5%
5%
5%
5%
5%
5%
5%
5%

Proficiency level: Entry

Category configuration:

15%
15%
10%
10%
5%
5%
5%
5%
5%
5%
5%
5%
5%
5%

Proficiency level: Regular

Category configuration:

15%
15%
10%
10%
5%
5%
5%
5%
5%
5%
5%
5%
5%
5%

Proficiency level: Senior

Category configuration:

15%
15%
10%
10%
5%
5%
5%
5%
5%
5%
5%
5%
5%
5%

Proficiency level: Entry

Category configuration:

15%
15%
10%
10%
5%
5%
5%
5%
5%
5%
5%
5%
5%
5%

Proficiency level: Regular

Category configuration:

15%
15%
10%
10%
5%
5%
5%
5%
5%
5%
5%
5%
5%
5%

Proficiency level: Senior

Category configuration:

15%
15%
10%
10%
5%
5%
5%
5%
5%
5%
5%
5%
5%
5%

Proficiency level: Entry

Category configuration:

15%
15%
10%
10%
5%
5%
5%
5%
5%
5%
5%
5%
5%
5%

Proficiency level: Regular

Category configuration:

15%
15%
10%
10%
5%
5%
5%
5%
5%
5%
5%
5%
5%
5%

Proficiency level: Senior

Category configuration:

15%
15%
10%
10%
5%
5%
5%
5%
5%
5%
5%
5%
5%
5%

Proficiency level: Entry

Category configuration:

15%
15%
10%
10%
5%
5%
5%
5%
5%
5%
5%
5%
5%
5%

Proficiency level: Regular

Category configuration:

15%
15%
10%
10%
5%
5%
5%
5%
5%
5%
5%
5%
5%
5%

Proficiency level: Senior

Category configuration:

15%
15%
10%
10%
5%
5%
5%
5%
5%
5%
5%
5%
5%
5%

Proficiency level: Entry

Category configuration:

15%
15%
10%
10%
5%
5%
5%
5%
5%
5%
5%
5%
5%
5%

Proficiency level: Regular

Category configuration:

15%
15%
10%
10%
5%
5%
5%
5%
5%
5%
5%
5%
5%
5%

Proficiency level: Senior

Category configuration:

15%
15%
10%
10%
5%
5%
5%
5%
5%
5%
5%
5%
5%
5%

Proficiency level: Entry

Category configuration:

15%
15%
10%
10%
5%
5%
5%
5%
5%
5%
5%
5%
5%
5%

Proficiency level: Regular

Category configuration:

15%
15%
10%
10%
5%
5%
5%
5%
5%
5%
5%
5%
5%
5%

Proficiency level: Senior

Category configuration:

15%
15%
10%
10%
5%
5%
5%
5%
5%
5%
5%
5%
5%
5%

Proficiency level: Entry

Category configuration:

15%
15%
10%
10%
5%
5%
5%
5%
5%
5%
5%
5%
5%
5%

Proficiency level: Regular

Category configuration:

15%
15%
10%
10%
5%
5%
5%
5%
5%
5%
5%
5%
5%
5%

Proficiency level: Senior

Category configuration:

15%
15%
10%
10%
5%
5%
5%
5%
5%
5%
5%
5%
5%
5%

Proficiency level: Entry

Category configuration:

15%
15%
10%
10%
5%
5%
5%
5%
5%
5%
5%
5%
5%
5%

Proficiency level: Regular

Category configuration:

15%
15%
10%
10%
5%
5%
5%
5%
5%
5%
5%
5%
5%
5%

Proficiency level: Senior

Category configuration:

15%
15%
10%
10%
5%
5%
5%
5%
5%
5%
5%
5%
5%
5%

Proficiency level: Entry

Category configuration:

15%
15%
10%
10%
5%
5%
5%
5%
5%
5%
5%
5%
5%
5%

Proficiency level: Regular

Category configuration:

15%
15%
10%
10%
5%
5%
5%
5%
5%
5%
5%
5%
5%
5%

Proficiency level: Senior

Category configuration:

15%
15%
10%
10%
5%
5%
5%
5%
5%
5%
5%
5%
5%
5%

Proficiency level: Entry

Category configuration:

15%
15%
10%
10%
5%
5%
5%
5%
5%
5%
5%
5%
5%
5%

Proficiency level: Regular

Category configuration:

15%
15%
10%
10%
5%
5%
5%
5%
5%
5%
5%
5%
5%
5%

Proficiency level: Senior

Category configuration:

15%
15%
10%
10%
5%
5%
5%
5%
5%
5%
5%
5%
5%
5%

Proficiency level: Entry

Category configuration:

15%
15%
10%
10%
5%
5%
5%
5%
5%
5%
5%
5%
5%
5%

Proficiency level: Regular

Category configuration:

15%
15%
10%
10%
5%
5%
5%
5%
5%
5%
5%
5%
5%
5%

Proficiency level: Senior

Category configuration:

15%
15%
10%
10%
5%
5%
5%
5%
5%
5%
5%
5%
5%
5%

Proficiency level: Entry

Category configuration:

15%
15%
10%
10%
5%
5%
5%
5%
5%
5%
5%
5%
5%
5%

Proficiency level: Regular

Category configuration:

15%
15%
10%
10%
5%
5%
5%
5%
5%
5%
5%
5%
5%
5%

Proficiency level: Senior

Category configuration:

15%
15%
10%
10%
5%
5%
5%
5%
5%
5%
5%
5%
5%
5%

Proficiency level: Entry

Category configuration:

15%
15%
10%
10%
5%
5%
5%
5%
5%
5%
5%
5%
5%
5%

Proficiency level: Regular

Category configuration:

15%
15%
10%
10%
5%
5%
5%
5%
5%
5%
5%
5%
5%
5%

Proficiency level: Senior

Category configuration:

15%
15%
10%
10%
5%
5%
5%
5%
5%
5%
5%
5%
5%
5%

Proficiency level: Entry

Category configuration:

15%
15%
10%
10%
5%
5%
5%
5%
5%
5%
5%
5%
5%
5%

Proficiency level: Regular

Category configuration:

15%
15%
10%
10%
5%
5%
5%
5%
5%
5%
5%
5%
5%
5%

Proficiency level: Senior

Category configuration:

15%
15%
10%
10%
5%
5%
5%
5%
5%
5%
5%
5%
5%
5%

Proficiency level: Entry

Category configuration:

15%
15%
10%
10%
5%
5%
5%
5%
5%
5%
5%
5%
5%
5%

Proficiency level: Regular

Category configuration:

15%
15%
10%
10%
5%
5%
5%
5%
5%
5%
5%
5%
5%
5%

Proficiency level: Senior

Category configuration:

15%
15%
10%
10%
5%
5%
5%
5%
5%
5%
5%
5%
5%
5%

Proficiency level: Entry

Category configuration:

15%
15%
10%
10%
5%
5%
5%
5%
5%
5%
5%
5%
5%
5%

Proficiency level: Regular

Category configuration:

15%
15%
10%
10%
5%
5%
5%
5%
5%
5%
5%
5%
5%
5%

Proficiency level: Senior

Category configuration:

15%
15%
10%
10%
5%
5%
5%
5%
5%
5%
5%
5%
5%
5%

Proficiency level: Entry

Category configuration:

35%
15%
10%
10%
10%
5%
5%
5%
5%

Proficiency level: Regular

Category configuration:

35%
15%
10%
10%
10%
5%
5%
5%
5%

Proficiency level: Senior

Category configuration:

35%
15%
10%
10%
10%
5%
5%
5%
5%

Proficiency level: Entry

Category configuration:

40%
20%
10%
10%
5%
5%
5%
5%

Proficiency level: Regular

Category configuration:

40%
20%
10%
10%
5%
5%
5%
5%

Proficiency level: Senior

Category configuration:

40%
20%
10%
10%
5%
5%
5%
5%

Proficiency level: Entry

Category configuration:

30%
15%
10%
10%
5%
5%
5%
5%
5%
5%
5%

Proficiency level: Regular

Category configuration:

30%
15%
10%
10%
5%
5%
5%
5%
5%
5%
5%

Proficiency level: Senior

Category configuration:

30%
15%
10%
10%
5%
5%
5%
5%
5%
5%
5%

Proficiency level: Entry

Category configuration:

40%
25%
15%
10%
10%

Proficiency level: Regular

Category configuration:

40%
25%
15%
10%
10%

Proficiency level: Senior

Category configuration:

40%
25%
15%
10%
10%

Proficiency level: Entry

Category configuration:

40%
25%
15%
10%
5%
5%

Proficiency level: Regular

Category configuration:

40%
25%
15%
10%
5%
5%

Proficiency level: Senior

Category configuration:

40%
25%
15%
10%
5%
5%

Proficiency level: Entry

Category configuration:

40%
15%
15%
10%
5%
5%
5%
5%

Proficiency level: Regular

Category configuration:

40%
15%
15%
10%
5%
5%
5%
5%

Proficiency level: Senior

Category configuration:

40%
15%
15%
10%
5%
5%
5%
5%

Proficiency level: Entry

Category configuration:

35%
25%
15%
10%
5%
5%
5%

Proficiency level: Regular

Category configuration:

35%
25%
15%
10%
5%
5%
5%

Proficiency level: Senior

Category configuration:

35%
25%
15%
10%
5%
5%
5%

Proficiency level: Entry

Category configuration:

30%
15%
15%
10%
10%
10%
5%
5%

Proficiency level: Regular

Category configuration:

30%
15%
15%
10%
10%
10%
5%
5%

Proficiency level: Senior

Category configuration:

30%
15%
15%
10%
10%
10%
5%
5%

Proficiency level: Entry

Category configuration:

30%
30%
10%
10%
5%
5%
5%
5%

Proficiency level: Regular

Category configuration:

30%
30%
10%
10%
5%
5%
5%
5%

Proficiency level: Senior

Category configuration:

30%
30%
10%
10%
5%
5%
5%
5%

Proficiency level: Entry

Category configuration:

20%
20%
20%
20%
5%
5%
5%
5%

Proficiency level: Regular

Category configuration:

20%
20%
20%
20%
5%
5%
5%
5%

Proficiency level: Senior

Category configuration:

20%
20%
20%
20%
5%
5%
5%
5%

Proficiency level: Entry

Category configuration:

30%
30%
10%
10%
5%
5%
5%
5%

Proficiency level: Regular

Category configuration:

30%
30%
10%
10%
5%
5%
5%
5%

Proficiency level: Senior

Category configuration:

30%
30%
10%
10%
5%
5%
5%
5%

Proficiency level: Entry

Category configuration:

30%
15%
15%
10%
10%
10%
5%
5%

Proficiency level: Entry

Category configuration:

30%
15%
15%
10%
10%
10%
5%
5%

Proficiency level: Senior

Category configuration:

30%
15%
15%
10%
10%
10%
5%
5%

Proficiency level: Entry

Category configuration:

30%
15%
15%
10%
10%
10%
5%
5%

Proficiency level: Regular

Category configuration:

30%
15%
15%
10%
10%
10%
5%
5%

Proficiency level: Senior

Category configuration:

30%
15%
15%
10%
10%
10%
5%
5%

Proficiency level: Entry

Category configuration:

25%
20%
15%
10%
10%
10%
5%
5%

Proficiency level: Regular

Category configuration:

25%
20%
15%
10%
10%
10%
5%
5%

Proficiency level: Senior

Category configuration:

25%
20%
15%
10%
10%
10%
5%
5%

Proficiency level: Entry

Category configuration:

25%
20%
15%
10%
10%
10%
5%
5%

Proficiency level: Regular

Category configuration:

25%
20%
15%
10%
10%
10%
5%
5%

Proficiency level: Senior

Category configuration:

25%
20%
15%
10%
10%
10%
5%
5%

Proficiency level: Entry

Category configuration:

20%
20%
10%
10%
10%
10%
10%
10%

Proficiency level: Regular

Category configuration:

20%
20%
10%
10%
10%
10%
10%
10%

Proficiency level: Senior

Category configuration:

20%
20%
10%
10%
10%
10%
10%
10%

Proficiency level: Entry

Category configuration:

20%
20%
10%
10%
10%
10%
10%
10%

Proficiency level: Regular

Category configuration:

20%
20%
10%
10%
10%
10%
10%
10%

Proficiency level: Senior

Category configuration:

20%
20%
10%
10%
10%
10%
10%
10%

Proficiency level: Entry

Category configuration:

40%
15%
10%
5%
5%
5%
5%
5%
5%
5%

Proficiency level: Regular

Category configuration:

40%
15%
10%
5%
5%
5%
5%
5%
5%
5%

Proficiency level: Senior

Category configuration:

40%
15%
10%
5%
5%
5%
5%
5%
5%
5%

Proficiency level: Entry

Category configuration:

25%
15%
15%
15%
5%
5%
5%
5%
5%
5%

Proficiency level: Regular

Category configuration:

25%
15%
15%
15%
5%
5%
5%
5%
5%
5%

Proficiency level: Senior

Category configuration:

25%
15%
15%
15%
5%
5%
5%
5%
5%
5%

Proficiency level: Entry

Category configuration:

15%
15%
10%
10%
10%
10%
10%
10%
5%
5%

Proficiency level: Regular

Category configuration:

15%
15%
10%
10%
10%
10%
10%
10%
5%
5%

Proficiency level: Senior

Category configuration:

15%
15%
10%
10%
10%
10%
10%
10%
5%
5%

Proficiency level: Entry

Category configuration:

20%
20%
10%
10%
10%
10%
10%
10%

Proficiency level: Regular

Category configuration:

20%
20%
10%
10%
10%
10%
10%
10%

Proficiency level: Senior

Category configuration:

20%
20%
10%
10%
10%
10%
10%
10%

Proficiency level: Entry

Category configuration:

25%
20%
15%
10%
10%
5%
5%
5%
5%

Proficiency level: Regular

Category configuration:

25%
20%
15%
10%
10%
5%
5%
5%
5%

Proficiency level: Senior

Category configuration:

25%
20%
15%
10%
10%
5%
5%
5%
5%

Proficiency level: Entry

Category configuration:

25%
15%
15%
15%
10%
5%
5%
5%
5%

Proficiency level: Regular

Category configuration:

25%
15%
15%
15%
10%
5%
5%
5%
5%

Proficiency level: Senior

Category configuration:

25%
15%
15%
15%
10%
5%
5%
5%
5%

Proficiency level: Entry

Category configuration:

40%
25%
15%
10%
5%
5%

Proficiency level: Regular

Category configuration:

40%
25%
15%
10%
5%
5%

Proficiency level: Senior

Category configuration:

40%
25%
15%
10%
5%
5%

Proficiency level: Regular

Category configuration:

20%
15%
15%
15%
15%
10%
10%

Proficiency level: Entry

Category configuration:

10%
10%
10%
10%
10%
10%
5%
5%
5%
5%
5%
5%
5%
5%

Proficiency level: Regular

Category configuration:

10%
10%
10%
10%
10%
10%
5%
5%
5%
5%
5%
5%
5%
5%

Proficiency level: Senior

Category configuration:

10%
10%
10%
10%
10%
10%
5%
5%
5%
5%
5%
5%
5%
5%

Proficiency level: Entry

Category configuration:

20%
20%
10%
10%
10%
10%
10%
10%

Proficiency level: Regular

Category configuration:

20%
20%
10%
10%
10%
10%
10%
10%

Proficiency level: Senior

Category configuration:

20%
20%
10%
10%
10%
10%
10%
10%

Proficiency level: Entry

Category configuration:

25%
15%
10%
10%
10%
10%
10%
5%
5%

Proficiency level: Regular

Category configuration:

25%
15%
10%
10%
10%
10%
10%
5%
5%

Proficiency level: Senior

Category configuration:

25%
15%
10%
10%
10%
10%
10%
5%
5%

Proficiency level: Entry

Category configuration:

50%
25%
15%
10%

Proficiency level: Regular

Category configuration:

50%
25%
15%
10%

Proficiency level: Senior

Category configuration:

50%
25%
15%
10%

Proficiency level: Entry

Category configuration:

40%
15%
10%
10%
5%
5%
5%
5%
5%

Proficiency level: Regular

Category configuration:

40%
15%
10%
10%
5%
5%
5%
5%
5%

Proficiency level: Senior

Category configuration:

40%
15%
10%
10%
5%
5%
5%
5%
5%

Proficiency level: Entry

Category configuration:

20%
15%
15%
10%
10%
10%
10%
5%
5%

Proficiency level: Regular

Category configuration:

20%
15%
15%
10%
10%
10%
10%
5%
5%

Proficiency level: Senior

Category configuration:

20%
15%
15%
10%
10%
10%
10%
5%
5%

Proficiency level: Entry

Category configuration:

40%
10%
10%
5%
5%
5%
5%
5%
5%
5%
5%

Proficiency level: Regular

Category configuration:

40%
10%
10%
5%
5%
5%
5%
5%
5%
5%
5%

Proficiency level: Senior

Category configuration:

40%
10%
10%
5%
5%
5%
5%
5%
5%
5%
5%

Proficiency level: Entry

Category configuration:

100%

Proficiency level: Entry

Category configuration:

30%
15%
10%
10%
5%
5%
5%
5%
5%
5%
5%

Proficiency level: Regular

Category configuration:

30%
15%
10%
10%
5%
5%
5%
5%
5%
5%
5%

Proficiency level: Senior

Category configuration:

30%
15%
10%
10%
5%
5%
5%
5%
5%
5%
5%

Proficiency level: Entry

Category configuration:

30%
10%
10%
10%
10%
5%
5%
5%
5%
5%
5%

Proficiency level: Regular

Category configuration:

30%
10%
10%
10%
10%
5%
5%
5%
5%
5%
5%

Proficiency level: Senior

Category configuration:

30%
10%
10%
10%
10%
5%
5%
5%
5%
5%
5%

Proficiency level: Entry

Category configuration:

15%
15%
15%
10%
10%
10%
10%
5%
5%
5%

Proficiency level: Regular

Category configuration:

15%
15%
15%
10%
10%
10%
10%
5%
5%
5%

Proficiency level: Senior

Category configuration:

15%
15%
15%
10%
10%
10%
10%
5%
5%
5%

Proficiency level: Entry

Category configuration:

15%
15%
15%
10%
10%
10%
10%
5%
5%
5%

Proficiency level: Regular

Category configuration:

15%
15%
15%
10%
10%
10%
10%
5%
5%
5%

Proficiency level: Senior

Category configuration:

15%
15%
15%
10%
10%
10%
10%
5%
5%
5%

Proficiency level: Entry

Category configuration:

40%
10%
10%
5%
5%
5%
5%
5%
5%
5%
5%

Proficiency level: Regular

Category configuration:

40%
10%
10%
5%
5%
5%
5%
5%
5%
5%
5%

Proficiency level: Senior

Category configuration:

40%
10%
10%
5%
5%
5%
5%
5%
5%
5%
5%

Proficiency level: Entry

Category configuration:

25%
15%
15%
15%
10%
10%
5%
5%

Proficiency level: Regular

Category configuration:

25%
15%
15%
15%
10%
10%
5%
5%

Proficiency level: Senior

Category configuration:

25%
15%
15%
15%
10%
10%
5%
5%

Proficiency level: Entry

Category configuration:

50%
15%
10%
10%
5%
5%
5%

Proficiency level: Regular

Category configuration:

50%
15%
10%
10%
5%
5%
5%

Proficiency level: Senior

Category configuration:

50%
15%
10%
10%
5%
5%
5%

Proficiency level: Entry

Category configuration:

40%
15%
10%
10%
5%
5%
5%
5%
5%

Proficiency level: Regular

Category configuration:

40%
15%
10%
10%
5%
5%
5%
5%
5%

Proficiency level: Senior

Category configuration:

40%
15%
10%
10%
5%
5%
5%
5%
5%

Proficiency level: Entry

Category configuration:

25%
15%
15%
10%
10%
5%
5%
5%
5%
5%

Proficiency level: Regular

Category configuration:

25%
15%
15%
10%
10%
5%
5%
5%
5%
5%

Proficiency level: Senior

Category configuration:

25%
15%
15%
10%
10%
5%
5%
5%
5%
5%

Proficiency level: Entry

Category configuration:

30%
15%
15%
10%
10%
5%
5%
5%
5%

Proficiency level: Regular

Category configuration:

30%
15%
15%
10%
10%
5%
5%
5%
5%

Proficiency level: Senior

Category configuration:

30%
15%
15%
10%
10%
5%
5%
5%
5%

Proficiency level: Entry

Category configuration:

25%
20%
15%
10%
10%
5%
5%
5%
5%

Proficiency level: Regular

Category configuration:

25%
20%
15%
10%
10%
5%
5%
5%
5%

Proficiency level: Senior

Category configuration:

25%
20%
15%
10%
10%
5%
5%
5%
5%

Covered topics

5G Networks Small icon for 5G Networks category

5G networks are the fifth generation of wireless technology, offering faster speeds, lower latency, and higher capacity compared to previous generations. They enable advanced applications like IoT, smart cities, and real-time connectivity for devices and services.

API mocking and virtualization Small icon for API mocking and virtualization category

API mocking and virtualization involve creating simulated API responses to test applications without relying on a live backend. This helps developers and testers work in parallel, improving efficiency and ensuring reliable testing in various scenarios.

API testing tools (Postman, SoapUI) Small icon for API testing tools (Postman, SoapUI) category

API testing tools like Postman and SoapUI are used to validate the functionality, performance, and security of APIs by sending requests and analyzing responses. These tools help developers and testers automate testing, detect bugs, and ensure seamless API communication.

ASP.NET Core Small icon for ASP.NET Core category

ASP.NET Core is a cross-platform, high-performance framework for building modern, cloud-based, and web applications with .NET.

AWS administration Small icon for AWS administration category

AWS administration involves managing and maintaining Amazon Web Services (AWS) cloud infrastructure, including tasks such as provisioning resources, configuring services, monitoring performance, and ensuring security and compliance.

AWS security Small icon for AWS security category

AWS security refers to the comprehensive measures, protocols, and tools implemented to safeguard data, applications, and infrastructure within Amazon Web Services (AWS) cloud environment. It encompasses various layers of protection, including identity management, encryption, network security, and continuous monitoring, ensuring robust defense against potential threats and unauthorized access.

Accessibility standards and compliance (WCAG) Small icon for Accessibility standards and compliance (WCAG) category

Accessibility standards and compliance, such as WCAG (Web Content Accessibility Guidelines), ensure that digital products are usable by people with disabilities. These guidelines focus on making web and app content perceivable, operable, understandable, and robust for inclusive user experiences.

Active Directory administration Small icon for Active Directory administration category

Active Directory administration involves managing and maintaining Microsoft's Active Directory services, including user accounts, groups, permissions, and network resources to ensure secure and efficient access control within an organization.

Active Directory security Small icon for Active Directory security category

Active Directory is a directory service developed by Microsoft for Windows domain networks. Windows Server operating systems include it as a set of processes and services.

Active Record ORM Small icon for Active Record ORM category

Active Record ORM is a Ruby on Rails feature that maps database tables to Ruby objects, enabling developers to interact with the database using object-oriented methods.

Adversary emulation Small icon for Adversary emulation category

Adversary emulation is a cybersecurity assessment method that aims to test an organization's security controls against the tactics, techniques, and procedures (TTPs) used by threat actors posing the greatest risk to its industry.

Agile project management Small icon for Agile project management category

Agile project management is an iterative approach that focuses on flexibility, collaboration, and continuous improvement to deliver projects efficiently. It emphasizes adaptive planning, rapid feedback, and incremental progress through frameworks like Scrum and Kanban.

Android OS security Small icon for Android OS security category

Android is a mobile operating system based on a modified version of the Linux kernel and other open-source software, designed primarily for touchscreen mobile devices such as smartphones and tablets. Android is developed by a consortium of developers known as the Open Handset Alliance, though its most widely used version is primarily developed by Google.

Android application development Small icon for Android application development category

Android application development is the process of creating software applications for devices running the Android operating system. It involves using tools like Android Studio and programming languages such as Java or Kotlin to design, build, and deploy mobile apps.

Android application security Small icon for Android application security category

Android is a mobile operating system based on a modified version of the Linux kernel and other open-source software, designed primarily for touchscreen mobile devices such as smartphones and tablets. Android is developed by a consortium of developers known as the Open Handset Alliance, though its most widely used version is primarily developed by Google.

Angular Framework Small icon for Angular Framework category

Angular Framework is a TypeScript-based framework for building dynamic, single-page web applications with a robust architecture and powerful tools.

Apache Spark (core, streaming, SQL) Small icon for Apache Spark (core, streaming, SQL) category

Apache Spark is a fast, distributed computing framework for big data processing, offering components like Spark Core for general execution, Spark Streaming for real-time data processing, and Spark SQL for structured data queries. It enables scalable, in-memory computing to accelerate data analytics and machine learning tasks.

Axum Framework Small icon for Axum Framework category

Axum is a web framework for the Rust programming language that focuses on ergonomics, performance, and safety. It leverages Rust's strong type system and async capabilities to build scalable and secure web applications with minimal boilerplate.

Azure administration Small icon for Azure administration category

Azure administration involves managing and maintaining Microsoft Azure cloud services, including tasks such as provisioning resources, configuring services, monitoring performance, and ensuring security and compliance within the Azure environment.

Azure security Small icon for Azure security category

Azure Security refers to security tools and capabilities available on Microsoft’s Azure cloud platform.

Bash - code challenges Small icon for Bash - code challenges category

Understanding the source code, the ability to make modifications and create new code is an important skill in many IT areas. This opens up the possibility of working more effectively and solving a very wide range of problems.

Big Data Analytics Small icon for Big Data Analytics category

Big Data Analytics is the process of examining large and complex datasets to uncover patterns, trends, and insights for informed decision-making. It utilizes advanced techniques like machine learning, statistical analysis, and data mining to extract meaningful information.

Budget and resource management Small icon for Budget and resource management category

Budget and resource management involve planning, allocating, and controlling financial and material resources to ensure a project's success. Effective management optimizes costs, prevents overspending, and ensures the efficient use of personnel, time, and materials.

C# - code challenges Small icon for C# - code challenges category

Understanding the source code, the ability to make modifications and create new code is an important skill in many IT areas. This opens up the possibility of working more effectively and solving a very wide range of problems.

C# programming language Small icon for C# programming language category

C# is a modern, object-oriented programming language developed by Microsoft for building a wide range of applications, including web, desktop, and mobile. It is known for its versatility, strong typing, and integration with the .NET framework for enhanced productivity and scalability.

C++ - code challenges Small icon for C++ - code challenges category

C++ is a high-performance programming language that supports multiple paradigms, including object-oriented, procedural, and generic programming. It is widely used for developing applications requiring efficiency, such as games, operating systems, and embedded systems.

C++ programming language Small icon for C++ programming language category

C++ is a high-performance programming language that supports multiple paradigms, including object-oriented, procedural, and generic programming. It is widely used for developing applications requiring efficiency, such as games, operating systems, and embedded systems.

CI/CD Small icon for CI/CD category

Continuous Integration and Continuous Delivery (CI/CD) is a software development practice that automates the process of integrating code changes, running tests, and deploying updates to ensure rapid, reliable, and consistent delivery of applications.

COMSEC system engineering Small icon for COMSEC system engineering category

COMSEC is used to protect both classified and unclassified traffic on military communications networks, including voice, video, and data. It is used for both analog and digital applications, and both wired and wireless links.

CSS3 Small icon for CSS3 category

CSS3 is the latest version of Cascading Style Sheets, used to define the look and layout of web pages with advanced styling features and effects.

Check Point configuration and administration Small icon for Check Point configuration and administration category

Check Point configuration and administration involve setting up and managing Check Point Software's cybersecurity appliances, including firewalls and security gateways, to secure network traffic, enforce policies, and protect against threats.

Cisco configuration and administration Small icon for Cisco configuration and administration category

Cisco network devices are hardware solutions, such as routers, switches, and firewalls, designed to enable and optimize data communication within networks. They provide reliable connectivity, advanced security, and scalable networking solutions for businesses and enterprises.

Cloud Small icon for Cloud category

Cloud computing is the delivery of computing services—including servers, storage, databases, networking, software, analytics, and intelligence—over the internet (“the cloud”) to offer faster innovation, flexible resources, and economies of scale.

Cloud Forensics Small icon for Cloud Forensics category

Cloud Forensics involves examining and analyzing data and activities in cloud environments to investigate and address security incidents or legal issues.

Computer networks Small icon for Computer networks category

Computer Networking is the practice of connecting computers together to enable communication and data exchange between them.

Conflict resolution and team dynamics Small icon for Conflict resolution and team dynamics category

Conflict resolution and team dynamics involve managing disagreements and fostering collaboration to maintain a productive work environment. Effective strategies, such as active listening, mediation, and clear communication, help teams build trust and work efficiently toward common goals.

Containerization technologies Small icon for Containerization technologies category

Containerization technologies package applications and their dependencies into isolated, lightweight containers, ensuring consistent performance across different environments and simplifying deployment and scaling.

Continuous improvement techniques (Kaizen, retrospectives) Small icon for Continuous improvement techniques (Kaizen, retrospectives) category

Continuous improvement techniques, such as Kaizen and retrospectives, focus on regularly evaluating and enhancing processes, products, or workflows. Kaizen promotes small, incremental changes, while retrospectives in Agile encourage teams to reflect on past work and implement improvements in future iterations.

Contract testing (Pact, Spring Cloud Contract) Small icon for Contract testing (Pact, Spring Cloud Contract) category

Contract testing, using tools like Pact and Spring Cloud Contract, ensures that services in a microservices architecture communicate correctly by verifying API agreements between consumers and providers. It helps prevent integration issues by testing expected request-response interactions in isolation.

Cryptography Small icon for Cryptography category

Cryptography is the process of hiding or coding information so that only the person a message was intended for can read it. The art of cryptography has been used to code messages for thousands of years and continues to be used in bank cards, computer passwords, and ecommerce.

Data Engineering Small icon for Data Engineering category

Data engineering focuses on designing, building, and maintaining systems that collect, store, and process large volumes of data efficiently. It involves developing data pipelines, optimizing databases, and ensuring data quality for analytics and machine learning applications.

Data Governance Small icon for Data Governance category

Data governance is the framework of policies, processes, and standards that ensure the effective management, quality, and security of an organization's data. It helps maintain data integrity, compliance, and accessibility for better decision-making and regulatory adherence.

Data Science Small icon for Data Science category

Data Science is an interdisciplinary field that uses statistical methods, machine learning, and data analysis to extract insights and knowledge from structured and unstructured data. It combines programming, mathematics, and domain expertise to solve complex problems and drive data-driven decisions.

Data Visualization (Tableau, Power BI, matplotlib) Small icon for Data Visualization (Tableau, Power BI, matplotlib) category

Data visualization involves transforming raw data into graphical representations to identify patterns, trends, and insights effectively. Tools like Tableau, Power BI, and Matplotlib help create interactive dashboards and charts for better data-driven decision-making.

Data lake design and optimization Small icon for Data lake design and optimization category

Data lake design and optimization involve structuring large-scale storage systems to efficiently store, manage, and process raw and structured data. Optimization techniques include schema enforcement, indexing, and data partitioning to enhance performance, accessibility, and cost-efficiency.

Database Design and Normalization Small icon for Database Design and Normalization category

Database Design involves structuring a database to efficiently store and manage data according to user needs and performance goals, while Normalization is the process of organizing this data to reduce redundancy and dependency by dividing it into related tables and defining the relationships between them.

Deep learning frameworks (TensorFlow, PyTorch) Small icon for Deep learning frameworks (TensorFlow, PyTorch) category

Deep learning frameworks like TensorFlow and PyTorch provide tools and libraries for building, training, and deploying neural networks efficiently. They enable researchers and developers to create advanced AI models for tasks such as image recognition, natural language processing, and autonomous systems.

Demo lab Small icon for Demo lab category

A collection of practical lab tasks to demonstrate live labs feature.

DevOps Small icon for DevOps category

DevOps is a collaborative approach that combines development and IT operations to improve efficiency, accelerate software delivery, and enhance the quality of applications through automation and continuous integration/continuous delivery (CI/CD) practices.

Diesel ORM for Rust Small icon for Diesel ORM for Rust category

Diesel is a type-safe, high-performance ORM for Rust that allows developers to interact with databases using Rust’s strong type system. It provides compile-time query validation, ensuring safety and efficiency while reducing runtime errors in database operations.

Digital forensics Small icon for Digital forensics category

Digital forensics refers to the process of collecting, preserving, analyzing, and presenting digital evidence from computer systems, networks, and digital devices to investigate cybercrimes, security incidents, and data breaches. Digital forensics enables cybersecurity professionals and law enforcement agencies to uncover the root causes of security incidents, identify perpetrators, and gather evidence for legal proceedings and incident response activities.

Digital forensics lab Small icon for Digital forensics lab category

A collection of practical lab tasks on Digital forensics. Digital forensics refers to the process of collecting, preserving, analyzing, and presenting digital evidence from computer systems, networks, and digital devices to investigate cybercrimes, security incidents, and data breaches. Digital forensics enables cybersecurity professionals and law enforcement agencies to uncover the root causes of security incidents, identify perpetrators, and gather evidence for legal proceedings and incident response activities.

Distributed data processing architectures Small icon for Distributed data processing architectures category

Distributed data processing architectures divide large datasets across multiple computing nodes to process data in parallel, improving performance and scalability. They are commonly used in big data frameworks like Hadoop and Apache Spark to handle complex computations efficiently.

Django Framework Small icon for Django Framework category

Django is a high-level Python framework for building web applications quickly, with a focus on simplicity, scalability, and built-in features for security and database management.

Django ORM Small icon for Django ORM category

Django ORM (Object-Relational Mapping) is a feature of the Django framework that allows developers to interact with a database using Python objects instead of raw SQL queries.

Docker containers Small icon for Docker containers category

Docker containers are lightweight, standalone, and portable software packages that encapsulate applications and their dependencies, allowing them to run reliably and consistently across different computing environments. They enable efficient deployment, scaling, and isolation of applications, promoting flexibility and ease of development.

Drogon Framework Small icon for Drogon Framework category

Drogon is a high-performance, asynchronous web framework for C++ designed for building fast and scalable web applications and APIs. It supports modern C++ features, routing, middleware, and database integration, making it efficient for real-time and high-concurrency applications.

ETL Development Small icon for ETL Development category

ETL (Extract, Transform, Load) development involves designing processes to extract data from various sources, transform it into a usable format, and load it into a target system, such as a data warehouse. It ensures data consistency, quality, and readiness for analysis and reporting.

Eloquent ORM Small icon for Eloquent ORM category

Eloquent ORM is Laravel's built-in Object-Relational Mapping tool that simplifies database interactions by allowing developers to use PHP objects for querying and managing data.

Embedded systems programming Small icon for Embedded systems programming category

Embedded systems programming involves developing software for specialized computing devices that operate within larger systems, such as IoT devices, automotive controls, and medical equipment. It requires optimizing code for performance, reliability, and resource constraints using languages like C and C++.

Entity Framework Core Small icon for Entity Framework Core category

Entity Framework Core is a cross-platform ORM for .NET that simplifies database access by mapping .NET objects to database tables and providing an abstraction for data operations.

Feature engineering and data preprocessing Small icon for Feature engineering and data preprocessing category

Feature engineering and data preprocessing involve transforming raw data into a suitable format for machine learning models by selecting, creating, and optimizing relevant features. These steps improve model accuracy and performance through techniques like normalization, handling missing values, and encoding categorical data.

File System Analysis Small icon for File System Analysis category

File System Analysis in Digital Forensics involves examining file structures and metadata to recover, identify, and interpret digital evidence related to data storage and manipulation.

GCP administration Small icon for GCP administration category

Google Cloud Platform administration involves managing and maintaining GCP resources, configuring services, monitoring performance, and ensuring security and compliance within Google's cloud infrastructure.

GCP security Small icon for GCP security category

Google Cloud Platform security administration involves managing and implementing security measures to protect GCP resources, including configuring access controls, monitoring for threats, and ensuring compliance with security policies.

GORM ORM for Go Small icon for GORM ORM for Go category

GORM is a powerful and flexible ORM for Go that simplifies database interactions by providing an intuitive, developer-friendly API. It supports features like automatic migrations, associations, transactions, and query building while maintaining performance and scalability.

Gin Framework Small icon for Gin Framework category

Gin is a lightweight and high-performance web framework for Golang, designed for building fast and scalable web applications and APIs. It features a minimalistic design with middleware support, routing, and JSON validation, making it ideal for efficient request handling.

Git Small icon for Git category

Git is a distributed version control system that tracks changes in source code during software development, enabling multiple developers to collaborate efficiently and manage project history.

Go - code challenges Small icon for Go - code challenges category

Go, or Golang, is a statically typed, compiled programming language designed by Google for simplicity, performance, and scalability. It is ideal for building modern distributed systems, offering features like concurrency and garbage collection.

Go programming language Small icon for Go programming language category

Go, or Golang, is a statically typed, compiled programming language designed by Google for simplicity, performance, and scalability. It is ideal for building modern distributed systems, offering features like concurrency and garbage collection.

GraphQL API testing Small icon for GraphQL API testing category

GraphQL API testing involves validating queries, mutations, and responses to ensure correct functionality, performance, and security. It focuses on testing schema structure, data retrieval, and error handling to optimize API efficiency and reliability.

HTML5 Small icon for HTML5 category

HTML5 is the latest version of the Hypertext Markup Language used for structuring and presenting content on the web, offering new elements and features for richer web applications.

HTTP Protocol Small icon for HTTP Protocol category

The HTTP protocol is a communication protocol used for transmitting data over the web, allowing web browsers and servers to exchange information.

Hadoop ecosystem (HDFS, MapReduce, Hive) Small icon for Hadoop ecosystem (HDFS, MapReduce, Hive) category

The Hadoop ecosystem is a collection of open-source tools for processing and managing big data, with HDFS for distributed storage, MapReduce for parallel data processing, and Hive for SQL-based querying. These components work together to enable scalable and efficient handling of large datasets.

Hibernate ORM Small icon for Hibernate ORM category

Hibernate ORM is a Java framework that simplifies database interactions by mapping Java objects to database tables and handling data persistence with object-oriented methods.

ISTQB Certified Tester Small icon for ISTQB Certified Tester category

ISTQB Certified Tester is a professional qualification for software testers, validating their knowledge and skills in software testing principles, techniques, and best practices.

ITIL Service Operation Small icon for ITIL Service Operation category

ITIL Service Operation focuses on delivering and managing IT services to ensure they run smoothly and efficiently, including incident management, problem management, and operational control.

IaaC Small icon for IaaC category

Infrastructure as Code (IaaC) is the practice of managing and provisioning computing infrastructure through machine-readable configuration files, enabling automated and consistent deployment of resources.

Incident handling Small icon for Incident handling category

Incident handling in cybersecurity is the process of identifying, managing, and responding to security breaches or threats to minimize damage and restore normal operations.

Incident response Small icon for Incident response category

Incident response refers to the structured process of identifying, managing, and mitigating security incidents and breaches within an organization's IT infrastructure. It involves a coordinated effort by security teams to detect, analyze, contain, eradicate, and recover from cybersecurity incidents in order to minimize the impact on the organization's operations, assets, and reputation.

Industrial Control Systems (ICS) and SCADA Small icon for Industrial Control Systems (ICS) and SCADA category

Industrial Control Systems (ICS) are integrated hardware and software solutions used to monitor and control industrial processes in sectors like manufacturing, energy, and water treatment. SCADA (Supervisory Control and Data Acquisition) is a subset of ICS that enables real-time data collection, remote control, and automation of critical infrastructure.

Industrial Control Systems (ICS) and SCADA security Small icon for Industrial Control Systems (ICS) and SCADA security category

Industrial Control Systems (ICS) and SCADA security focus on protecting critical infrastructure from cyber threats, unauthorized access, and operational disruptions. It involves implementing measures like network segmentation, encryption, and intrusion detection to ensure the reliability and safety of industrial processes.

Industrial network protocols (MODBUS, DNP3, PROFINET) Small icon for Industrial network protocols (MODBUS, DNP3, PROFINET) category

Industrial network protocols like MODBUS, DNP3, and PROFINET enable communication between devices in industrial automation and control systems. They facilitate data exchange, remote monitoring, and real-time control in sectors such as manufacturing, energy, and utilities.

Interaction design principles Small icon for Interaction design principles category

Interaction design principles focus on creating intuitive, efficient, and enjoyable user interactions with digital products. Key principles include consistency, feedback, simplicity, and usability to enhance user engagement and experience.

Java - code challenges Small icon for Java - code challenges category

Understanding the source code, the ability to make modifications and create new code is an important skill in many IT areas. This opens up the possibility of working more effectively and solving a very wide range of problems.

Java programming language Small icon for Java programming language category

Java is a versatile, object-oriented programming language designed for cross-platform compatibility, allowing code to run on any device with a Java Virtual Machine (JVM). It is widely used for building web, mobile, and enterprise applications due to its reliability and scalability.

JavaScript - code challenges Small icon for JavaScript - code challenges category

Understanding the source code, the ability to make modifications and create new code is an important skill in many IT areas. This opens up the possibility of working more effectively and solving a very wide range of problems.

Juniper configuration and administration Small icon for Juniper configuration and administration category

Juniper configuration and administration involve setting up and managing Juniper Networks' networking and security devices, including routers, switches, and firewalls, to ensure efficient and secure network operations.

Kafka and real-time data streaming Small icon for Kafka and real-time data streaming category

Kafka is a distributed event streaming platform designed for high-throughput, real-time data processing and messaging. It enables scalable, fault-tolerant data streaming between applications, making it ideal for event-driven architectures and big data analytics.

Kanban methodologies Small icon for Kanban methodologies category

Kanban methodologies focus on visualizing workflow, limiting work in progress, and optimizing efficiency in project management. Using a Kanban board, teams track tasks through stages, enabling continuous delivery and adaptive process improvements.

Laravel Framework Small icon for Laravel Framework category

Laravel is a PHP framework for web development that provides an elegant syntax, powerful tools, and a robust ecosystem for building modern, scalable applications.

Linux administration Small icon for Linux administration category

Linux is an open source operating system (OS). An operating system is the software that directly manages a system's hardware and resources, like CPU, memory, and storage. Linux is most popular Operating System for servers and smartphones (as Android OS is build upon Linux).

Linux administration lab Small icon for Linux administration lab category

A collection of practical lab tasks on Linux administration. Linux is an open source operating system (OS). An operating system is the software that directly manages a system's hardware and resources, like CPU, memory, and storage. Linux is most popular Operating System for servers and smartphones (as Android OS is build upon Linux).

Linux malware analysis lab Small icon for Linux malware analysis lab category

A collection of practical lab tasks on Linux malware analysis. Linux malware analysis is the process of examining malicious software (malware) designed to target Linux systems. This involves identifying, dissecting, and understanding the malware's behavior, functionality, and impact. The analysis helps in detecting infections, determining how the malware operates, and developing strategies for mitigation, prevention, and remediation on Linux-based environments.

Linux security Small icon for Linux security category

Linux is an open source operating system (OS). An operating system is the software that directly manages a system's hardware and resources, like CPU, memory, and storage. Linux is most popular Operating System for servers and smartphones (as Android OS is build upon Linux).

Linux security lab Small icon for Linux security lab category

A collection of practical lab tasks on Linux security. Linux is an open source operating system (OS). An operating system is the software that directly manages a system's hardware and resources, like CPU, memory, and storage. Linux is most popular Operating System for servers and smartphones (as Android OS is build upon Linux).

Load testing for APIs Small icon for Load testing for APIs category

Load testing for APIs evaluates an API’s performance under different levels of traffic to ensure stability and scalability. It helps identify bottlenecks, response times, and system limits by simulating real-world usage conditions.

MLOps Small icon for MLOps category

MLOps (Machine Learning Operations) is a set of practices that streamline the deployment, monitoring, and management of machine learning models in production. It combines DevOps, data engineering, and machine learning to ensure model reliability, scalability, and continuous improvement.

MS SQL Database administration Small icon for MS SQL Database administration category

MS SQL Database Administration involves managing and maintaining Microsoft SQL Server databases, including tasks such as installation, configuration, performance tuning, and security management to ensure optimal operation and data integrity.

MS SQL Database backup and recovery Small icon for MS SQL Database backup and recovery category

MS SQL Database Backup and Recovery is the process of creating copies of database data to protect against loss and restoring that data from backups in case of failure or corruption.

MS SQL Database high availability and clustering Small icon for MS SQL Database high availability and clustering category

MS SQL Database High Availability and Clustering involve configuring systems to ensure continuous database access and minimize downtime by using redundant servers and failover mechanisms.

MS SQL Database performance tuning and monitoring Small icon for MS SQL Database performance tuning and monitoring category

MS SQL Database Performance Tuning and Monitoring involves adjusting and optimizing database settings and queries to enhance performance and continuously tracking system metrics to ensure efficient operation and identify potential issues.

MS SQL Database security and user management Small icon for MS SQL Database security and user management category

MS SQL Database Security and User Management involves implementing measures to protect database data from unauthorized access and managing user roles and permissions to control access and maintain security.

Machine Learning Algorithms Small icon for Machine Learning Algorithms category

Machine learning algorithms are computational methods that enable systems to learn patterns from data and make predictions or decisions without explicit programming. They include supervised, unsupervised, and reinforcement learning techniques for tasks like classification, clustering, and recommendation.

Malware dynamic analysis in Linux OS Small icon for Malware dynamic analysis in Linux OS category

Malware dynamic analysis in Linux OS involves executing malicious software in a controlled environment to observe its behavior, analyze its actions in real-time, and identify potential security risks or threats specific to Linux-based systems.

Malware dynamic analysis in Windows OS Small icon for Malware dynamic analysis in Windows OS category

Malware dynamic analysis in Windows OS involves executing malicious software in a controlled environment to observe its behavior, analyze its actions, and identify potential threats or vulnerabilities.

Malware static analysis in Linux OS Small icon for Malware static analysis in Linux OS category

Malware static analysis in Linux OS involves examining the code and structure of malicious software without executing it, aiming to understand its behavior, identify patterns, and develop detection and mitigation strategies specific to Linux environments.

Malware static analysis in Windows OS Small icon for Malware static analysis in Windows OS category

Malware static analysis in Windows OS involves examining the code and structure of malicious software without executing it, aiming to understand its behavior, identify indicators of compromise (IOCs), and develop detection and prevention strategies.

Memory Forensics Small icon for Memory Forensics category

Memory Forensics involves analyzing a computer's volatile memory (RAM) to uncover evidence of malicious activity, running processes, and system states.

Microservices Architecture Small icon for Microservices Architecture category

Microservices Architecture is a design approach where applications are composed of small, independent services that communicate over networks, allowing for flexible and scalable development.

Mobile Device Forensics Small icon for Mobile Device Forensics category

Mobile Device Forensics is the process of retrieving and analyzing data from mobile devices to investigate and gather evidence for legal or security purposes.

Modern JavaScript Small icon for Modern JavaScript category

Modern JavaScript refers to the latest standards and features of JavaScript, including ES6 and beyond, which enhance the language with new syntax, functions, and capabilities.

Modern software development fundamentals Small icon for Modern software development fundamentals category

Modern software development fundamentals encompass agile methodologies, continuous integration/continuous delivery (CI/CD), version control, automated testing, and collaborative tools to enhance efficiency, quality, and responsiveness in software creation.

Modern software testing fundamentals Small icon for Modern software testing fundamentals category

Modern software testing fundamentals encompass agile testing methodologies, test automation, continuous integration and continuous delivery (CI/CD), exploratory testing, and integration of testing into the software development lifecycle (SDLC) to ensure software quality and efficiency.

MySQL Database administration Small icon for MySQL Database administration category

MySQL Database Administration involves managing and maintaining MySQL databases, including tasks such as installation, configuration, performance tuning, and security to ensure optimal operation and data integrity.

MySQL Database backup and recovery Small icon for MySQL Database backup and recovery category

MySQL Database Backup and Recovery involves creating and managing backups of MySQL data to protect against loss and restoring that data from backups in case of failure or corruption.

MySQL Database performance tuning and monitoring Small icon for MySQL Database performance tuning and monitoring category

MySQL Database Performance Tuning and Monitoring involves optimizing database queries and configurations to enhance performance and tracking system metrics to ensure efficient operation and detect issues.

MySQL Database security and user management Small icon for MySQL Database security and user management category

MySQL Database Security and User Management involves safeguarding database access through authentication and authorization, and managing user roles and permissions to ensure data protection and control.

NATO security policies and procedures Small icon for NATO security policies and procedures category

Security policies and procedures are formal guidelines and instructions designed to protect an organization's information, assets, and operations from threats and vulnerabilities.

Natural Language Processing (NLP) Small icon for Natural Language Processing (NLP) category

Natural Language Processing (NLP) is a branch of artificial intelligence that enables computers to understand, interpret, and generate human language. It powers applications like chatbots, sentiment analysis, and machine translation by leveraging linguistic algorithms and machine learning.

Network Forensics Small icon for Network Forensics category

Network Forensics involves monitoring and analyzing network traffic to detect, investigate, and respond to security incidents and unauthorized activities.

Network security Small icon for Network security category

Network security is a critical aspect of modern cybersecurity, and covers a wide range of topics, including firewall configurations, intrusion detection and prevention, secure network design, VPN implementation, access controls, and more.

Network security logs analysis Small icon for Network security logs analysis category

Network security logs analysis in the context of cybersecurity involves the examination and interpretation of logs generated by various network devices and systems to identify potential security threats, anomalies, and malicious activities. Network security logs provide valuable insights into the behavior of network traffic, user activities, and system events, helping organizations detect and respond to cybersecurity incidents effectively.

Network traffic capture analysis Small icon for Network traffic capture analysis category

Network traffic capture analysis, also known as packet analysis, is a process used in cybersecurity to examine and interpret the data packets transmitted over a network. It involves capturing network traffic in real-time or from stored packet capture files and analyzing the contents of the packets to gain insights into network behavior and identify security threats.

ODB ORM for C++ Small icon for ODB ORM for C++ category

ODB is an object-relational mapping (ORM) framework for C++ that enables seamless database integration by mapping C++ objects to relational database tables. It automates query generation, schema evolution, and transaction management while maintaining high performance and type safety.

Operating Systems Forensics Small icon for Operating Systems Forensics category

Operating Systems Forensics involves analyzing and investigating operating systems to uncover and evaluate evidence related to security incidents, system breaches, or unauthorized activities.

Oracle Database administration Small icon for Oracle Database administration category

Oracle Database Administration involves managing and maintaining Oracle databases, including installation, configuration, performance tuning, and security to ensure optimal operation and data integrity.

Oracle Database backup and recovery Small icon for Oracle Database backup and recovery category

Oracle Database Backup and Recovery involves creating backups of Oracle data to prevent loss and restoring that data from backups in case of failure or corruption.

Oracle Database performance tuning and monitoring Small icon for Oracle Database performance tuning and monitoring category

Oracle Database Performance Tuning and Monitoring involves optimizing queries and system settings to enhance performance and tracking metrics to ensure efficient operation and identify issues.

Oracle Database security and user management Small icon for Oracle Database security and user management category

Oracle Database Security and User Management involves safeguarding data through access controls and managing user roles and permissions to ensure secure and authorized access.

PHP - code challenges Small icon for PHP - code challenges category

Understanding the source code, the ability to make modifications and create new code is an important skill in many IT areas. This opens up the possibility of working more effectively and solving a very wide range of problems.

PHP8 programming language Small icon for PHP8 programming language category

PHP 8 is a major version of the PHP scripting language used primarily for web development, offering improved performance and modern features. It introduces innovations like the Just-In-Time (JIT) compiler and union types for more efficient and flexible coding.

PLC programming and configuration Small icon for PLC programming and configuration category

PLC (Programmable Logic Controller) programming and configuration involve developing and setting up control logic for industrial automation systems. Using languages like ladder logic and structured text, PLCs execute real-time operations in manufacturing, robotics, and process control.

Palo Alto configuration and administration Small icon for Palo Alto configuration and administration category

Palo Alto configuration and administration involve setting up and managing Palo Alto Networks' firewall and cybersecurity devices to ensure secure network operations, including policies, rules, and threat prevention configurations.

Pentesting lab Small icon for Pentesting lab category

A collection of practical lab tasks on Pentesting. Pentesting, or penetration testing, is the practice of simulating cyberattacks on a system, network, or application to identify vulnerabilities that could be exploited by attackers. The goal is to assess the security of the target by discovering weaknesses and providing insights for improving defenses before real threats can exploit them.

Play Framework Small icon for Play Framework category

Play Framework is a high-performance, reactive web framework for building scalable applications using the Scala and Java programming languages. It follows a lightweight, asynchronous, and MVC-based architecture, making it ideal for modern web and API development.

PostgreSQL Database administration Small icon for PostgreSQL Database administration category

PostgreSQL Database Administration involves managing and maintaining PostgreSQL databases, including tasks such as installation, configuration, performance tuning, and security to ensure optimal operation and data integrity.

PostgreSQL Database backup and recovery Small icon for PostgreSQL Database backup and recovery category

PostgreSQL Database Backup and Recovery involves creating backups of PostgreSQL data to protect against loss and restoring that data from backups in case of failure or corruption.

PostgreSQL Database performance tuning and monitoring Small icon for PostgreSQL Database performance tuning and monitoring category

PostgreSQL Database Performance Tuning and Monitoring involves optimizing queries and settings to enhance performance and tracking system metrics to ensure efficient operation and detect issues.

PostgreSQL Database security and user management Small icon for PostgreSQL Database security and user management category

PostgreSQL Database Security and User Management involves protecting data through authentication and authorization, and managing user roles and permissions to control access and ensure security.

PowerShell - code challenges Small icon for PowerShell - code challenges category

Understanding the source code, the ability to make modifications and create new code is an important skill in many IT areas. This opens up the possibility of working more effectively and solving a very wide range of problems.

Product - Ansible Small icon for Product - Ansible category

Ansible is an open-source automation tool used for configuration management, application deployment, and task automation across multiple systems, simplifying IT operations.

Product - Splunk Small icon for Product - Splunk category

Splunk is a powerful software platform used for searching, monitoring, and analyzing machine-generated big data via a web-style interface. It collects and indexes data from various sources, allowing users to generate reports, visualize data, and gain real-time insights into their IT infrastructure, security systems, and business processes.

Product - Tenable Nessus Small icon for Product - Tenable Nessus category

Tenable Nessus is a widely used vulnerability scanning tool that helps identify and assess security issues within networks and systems, offering comprehensive insights and remediation guidance to enhance overall cybersecurity posture.

Project lifecycle management Small icon for Project lifecycle management category

Project lifecycle management involves overseeing a project from initiation to completion, ensuring it meets objectives, timelines, and budget constraints. It includes key phases such as planning, execution, monitoring, and closure to ensure successful delivery and continuous improvement.

Prototyping tools (Figma, Sketch) Small icon for Prototyping tools (Figma, Sketch) category

Prototyping tools like Figma and Sketch allow UX/UI designers to create interactive and visual representations of digital products before development. These tools enable collaboration, user testing, and iterative design to refine the user experience efficiently.

Python - code challenges Small icon for Python - code challenges category

Understanding the source code, the ability to make modifications and create new code is an important skill in many IT areas. This opens up the possibility of working more effectively and solving a very wide range of problems.

Python3 programming language Small icon for Python3 programming language category

Python 3 is a versatile, high-level programming language known for its simplicity and readability, widely used in web development, data analysis, artificial intelligence, and more. It offers modern features, enhanced performance, and consistent syntax compared to earlier versions.

Quality assurance and control processes Small icon for Quality assurance and control processes category

Quality assurance and control processes ensure that products or services meet defined standards through systematic testing and monitoring. While quality assurance focuses on preventing defects through process improvements, quality control involves identifying and correcting defects in the final output.

RESTful API Development Small icon for RESTful API Development category

RESTful API Development involves creating web services that use HTTP requests to access and manipulate resources in a stateless, scalable, and standardized manner.

React JS Framework Small icon for React JS Framework category

React JS is a JavaScript library for building user interfaces with a component-based architecture and efficient rendering.

Real-time systems and automation Small icon for Real-time systems and automation category

Real-time systems and automation involve computing solutions that process and respond to inputs within strict time constraints to ensure precise and reliable operations. These systems are widely used in industries like manufacturing, robotics, and transportation to enable seamless automation and control.

Real-time systems development Small icon for Real-time systems development category

Real-time systems development focuses on designing software that processes data and responds to inputs within strict time constraints. These systems are used in applications like aerospace, automotive, and industrial automation, where timing and reliability are critical.

Red Teaming Small icon for Red Teaming category

A red team plays the role of the attacker by trying to find vulnerabilities and break through cybersecurity defenses by using advanced techniques, tactics and procedures.

Requirements gathering and documentation Small icon for Requirements gathering and documentation category

Requirements gathering and documentation involve identifying, analyzing, and recording the needs and expectations of stakeholders for a project. Clear and structured documentation ensures alignment, reduces misunderstandings, and serves as a reference throughout the development process.

Responsive web design Small icon for Responsive web design category

Responsive web design is an approach to creating web pages that adapt seamlessly to different screen sizes and devices for an optimal user experience.

Reverse engineering lab Small icon for Reverse engineering lab category

A collection of practical lab tasks on Reverse engineering. Reverse engineering is the process of analyzing a system, software, or device to understand its structure, functionality, and operation. By deconstructing the original product, reverse engineering aims to uncover how it was designed or how it works, often to replicate, modify, or enhance it, or to identify vulnerabilities. This technique is commonly used in software analysis, hardware design, and cybersecurity.

Risk assessments Small icon for Risk assessments category

Risk assessments in cybersecurity are evaluations of potential threats and vulnerabilities to determine the likelihood and impact of security incidents on an organization's assets.

Risk management Small icon for Risk management category

Risk management involves identifying, assessing, and mitigating potential threats and vulnerabilities to protect digital assets and information. It encompasses strategies and processes to analyze risks, prioritize them based on their potential impact, and implement measures to reduce or mitigate these risks, ensuring proactive protection and resilience against cybersecurity threats.

Ruby - code challenges Small icon for Ruby - code challenges category

Understanding the source code, the ability to make modifications and create new code is an important skill in many IT areas. This opens up the possibility of working more effectively and solving a very wide range of problems.

Ruby on Rails Framework Small icon for Ruby on Rails Framework category

Ruby on Rails is a web application framework written in Ruby that emphasizes convention over configuration, allowing for rapid development with a focus on simplicity and productivity.

Ruby3 programming language Small icon for Ruby3 programming language category

Ruby 3 is a dynamic, object-oriented programming language focused on simplicity and productivity, commonly used for web development. It introduces performance improvements, concurrency features like Ractor, and enhanced developer tools while maintaining its elegant and readable syntax.

Rust - code challenges Small icon for Rust - code challenges category

Rust is a systems programming language focused on memory safety, performance, and concurrency. It prevents common bugs like null pointer dereferencing and data races without using a garbage collector.

Rust programming language Small icon for Rust programming language category

Rust is a systems programming language focused on memory safety, performance, and concurrency. It prevents common bugs like null pointer dereferencing and data races without using a garbage collector.

SQL Indexing Strategies Small icon for SQL Indexing Strategies category

SQL Indexing Strategies involve creating and managing indexes on database tables to speed up data retrieval and improve query performance by reducing the amount of data scanned.

SQL Query Optimization Small icon for SQL Query Optimization category

SQL Query Optimization is the process of improving the performance and efficiency of a database query by refining its structure and execution plan to reduce response time and resource consumption.

Scala - code challenges Small icon for Scala - code challenges category

Scala is a programming language that combines object-oriented and functional programming paradigms. It is designed for scalability, interoperability with Java, and concise, expressive code.

Scala programming language Small icon for Scala programming language category

Scala is a programming language that combines object-oriented and functional programming paradigms. It is designed for scalability, interoperability with Java, and concise, expressive code.

Scrum framework (roles, artifacts, ceremonies) Small icon for Scrum framework (roles, artifacts, ceremonies) category

The Scrum framework is an Agile methodology that organizes work into sprints, with defined roles such as Scrum Master, Product Owner, and Development Team. It includes key artifacts like the Product Backlog, Sprint Backlog, and Increment, along with ceremonies such as Sprint Planning, Daily Standups, Sprint Review, and Sprint Retrospective to ensure continuous progress and improvement.

Secure network design for OT environments Small icon for Secure network design for OT environments category

Secure network design for OT (Operational Technology) environments involves implementing robust architectures to protect industrial control systems from cyber threats. It includes network segmentation, intrusion detection, and access control to ensure the safety, reliability, and resilience of critical infrastructure.

Secure web design and development Small icon for Secure web design and development category

Secure web design and development refers to the process of creating websites and web applications with security considerations integrated into every stage of the development lifecycle. It involves implementing best practices, adopting secure coding techniques, and leveraging security controls to protect against common web vulnerabilities and cyber threats.

Security Information and Event Management (SIEM) Small icon for Security Information and Event Management (SIEM) category

Security Information and Event Management (SIEM) products are software solutions designed to provide organizations with comprehensive visibility into their IT infrastructure's security posture. SIEM systems collect, analyze, and correlate security-related data from various sources across the organization, including network devices, servers, endpoints, applications, and security tools. The primary goal of SIEM is to help organizations detect and respond to security threats in real-time, as well as to facilitate compliance reporting and forensic analysis.

Security Operations Center (SOC) Small icon for Security Operations Center (SOC) category

A Security Operations Center (SOC) is a centralized unit within an organization responsible for monitoring, detecting, analyzing, and responding to cybersecurity incidents and threats. It serves as a nerve center for cybersecurity activities, providing real-time monitoring, threat intelligence, incident analysis, and incident response capabilities.

Security architecture Small icon for Security architecture category

Security architecture in cybersecurity refers to the design, structure, and arrangement of security controls, protocols, and systems within an organization. It involves the planning and implementation of comprehensive strategies to protect digital assets, networks, and data from potential threats, ensuring a robust defense framework encompassing preventive, detective, and responsive measures against cyberattacks and vulnerabilities.

Security audit Small icon for Security audit category

A security audit is a systematic assessment and examination of an organization's systems, networks, and policies to identify vulnerabilities, compliance gaps, and potential risks. It involves a thorough review of security controls, configurations, and practices to ensure they align with established security standards, regulations, and best practices, aiming to enhance overall security posture and mitigate potential threats.

Security awareness Small icon for Security awareness category

Security awareness is the knowledge and attitude members of an organization possess regarding the protection of the physical, and especially informational, assets of that organization.

Security governance Small icon for Security governance category

Security governance in cybersecurity refers to the framework, policies, and processes implemented to guide and oversee an organization's security efforts. It involves defining responsibilities, establishing controls, and setting strategic directions to ensure that security measures align with business objectives, comply with regulations, and effectively mitigate risks across the entire organization.

Security logs analysis Small icon for Security logs analysis category

Security logs analysis in cybersecurity is the process of examining log data to detect, investigate, and respond to security incidents and threats.

Security, Orchestrations, Automation and Response (SOAR) Small icon for Security, Orchestrations, Automation and Response (SOAR) category

Security, Orchestration, Automation, and Response (SOAR) is a cybersecurity term that refers to a set of technologies, processes, and practices designed to streamline and automate the management of security operations. SOAR platforms integrate security orchestration and automation capabilities with incident response workflows to improve the efficiency, consistency, and effectiveness of cybersecurity operations.

Slick ORM for Scala Small icon for Slick ORM for Scala category

Slick is a functional relational mapping (FRM) library for Scala that enables type-safe, composable database interactions. It provides an expressive API for querying databases using Scala code, eliminating the need for raw SQL while maintaining performance and scalability.

Spring Framework Small icon for Spring Framework category

Spring Framework is a comprehensive Java framework that provides tools and libraries for building enterprise-level applications with features for dependency injection, aspect-oriented programming, and more.

Stakeholder management Small icon for Stakeholder management category

Stakeholder management involves identifying, engaging, and communicating with individuals or groups affected by a project to ensure their needs and expectations are met. Effective stakeholder management builds trust, reduces risks, and enhances project success through collaboration and transparency.

Statistics and probability for data analysis Small icon for Statistics and probability for data analysis category

Statistics and probability for data analysis involve mathematical techniques to summarize, interpret, and make predictions from data. These concepts help identify patterns, measure uncertainty, and support decision-making in various analytical applications.

Swift - code challenges Small icon for Swift - code challenges category

Swift is a powerful and intuitive programming language developed by Apple for building iOS, macOS, watchOS, and tvOS applications. It combines performance and safety with modern features, making it easy to write and maintain code.

Testing modern web applications Small icon for Testing modern web applications category

Testing modern web applications involves evaluating their functionality, performance, security, and usability to ensure they meet specified requirements and perform well across different devices and browsers.

Threat hunting Small icon for Threat hunting category

Threat hunting is a crucial aspect of modern cybersecurity, requiring a proactive and analytical mindset.

Tools for project management Small icon for Tools for project management category

Project management tools, such as Jira, Trello, and Asana, help teams plan, track, and manage tasks efficiently. They provide features like task assignments, progress tracking, and collaboration to improve workflow and productivity.

TypeScript Small icon for TypeScript category

TypeScript is a superset of JavaScript that adds static typing and advanced features to improve code quality and development efficiency.

Usability testing methodologies Small icon for Usability testing methodologies category

Usability testing methodologies involve evaluating a digital product by observing real users as they complete tasks to identify pain points and areas for improvement. Common methods include moderated testing, A/B testing, and remote usability tests to enhance user experience and functionality.

User experience research methods Small icon for User experience research methods category

User experience research methods involve techniques like interviews, usability testing, surveys, and analytics to understand user behaviors, needs, and motivations. These methods help design intuitive and user-centered interfaces that enhance usability and satisfaction.

VMWare administration Small icon for VMWare administration category

VMware is a leading virtualization technology company providing software that enables the creation, management, and deployment of virtual machines and cloud infrastructure, enhancing efficiency, scalability, and flexibility in IT environments.

Virtualization technologies Small icon for Virtualization technologies category

Virtualization is technology that you can use to create virtual representations of servers, storage, networks, and other physical machines. Virtual software mimics the functions of physical hardware to run multiple virtual machines simultaneously on a single physical machine.

Vue.js Framework Small icon for Vue.js Framework category

Vue.js is a progressive JavaScript framework for building user interfaces with a focus on simplicity and ease of integration.

Vulnerability assessment Small icon for Vulnerability assessment category

A vulnerability assessment is a systematic review and analysis process used to identify, quantify, and prioritize weaknesses within a system, network, or infrastructure to anticipate and mitigate potential security risks.

Web API security Small icon for Web API security category

Web API security involves implementing measures to protect the integrity, confidentiality, and availability of data exchanged between web applications and APIs, safeguarding against unauthorized access, data breaches, and other security threats.

Web application development fundamentals Small icon for Web application development fundamentals category

Web application development fundamentals cover the basic principles and practices for designing, building, and deploying web applications, including client-server architecture, coding, and user interface design.

Web application pentesting lab Small icon for Web application pentesting lab category

A collection of practical lab tasks on Web application pentesting. Web application security is critical as these applications often serve as prime targets for cyberattacks. It covers a comprehensive range of topics, including secure coding practices, input validation, session management, SQL injection prevention, cross-site scripting (XSS) mitigation, and other common vulnerabilities.

Web application security Small icon for Web application security category

Web application security is critical as these applications often serve as prime targets for cyberattacks. It covers a comprehensive range of topics, including secure coding practices, input validation, session management, SQL injection prevention, cross-site scripting (XSS) mitigation, and other common vulnerabilities.

Web application security - code challenges Small icon for Web application security - code challenges category

Understanding the source code, the ability to make modifications and create new code is an important skill in many IT areas. This opens up the possibility of working more effectively and solving a very wide range of problems.

Windows administration Small icon for Windows administration category

Windows is most popular Operating System for workstations in largest corporations and one of most popular Operating System for servers. It is crucial to understand its internals and be able to provide necessary configuration changes.

Windows administration lab Small icon for Windows administration lab category

A collection of practical lab tasks on Windows administration. Windows is most popular Operating System for workstations in largest corporations and one of most popular Operating System for servers. It is crucial to understand its internals and be able to provide necessary configuration changes.

Windows malware analysis lab Small icon for Windows malware analysis lab category

A collection of practical lab tasks on Windows malware analysis. Windows malware analysis is the process of examining and understanding malicious software that targets Windows operating systems. This involves identifying, dissecting, and analyzing the malware to determine its behavior, functionality, and potential impact. The goal is to detect infections, understand how the malware operates, and develop strategies to mitigate, prevent, and remove it from Windows systems.

Windows security Small icon for Windows security category

Windows is most popular Operating System for workstations in largest corporations and one of most popular Operating System for servers. It is crucial to understand its internals and be able to provide necessary configuration changes.

Windows security lab Small icon for Windows security lab category

A collection of practical lab tasks on Windows security. Windows is most popular Operating System for workstations in largest corporations and one of most popular Operating System for servers. It is crucial to understand its internals and be able to provide necessary configuration changes.

iOS OS security Small icon for iOS OS security category

iOS is a mobile operating system developed by Apple Inc. exclusively for its hardware. It is the operating system that powers many of the company's mobile devices, including the iPhone; the term also includes the system software for iPads (predating iPadOS, which was introduced in 2019) as well as on the iPod Touch devices. It is the world's second-most widely installed mobile operating system, after Android.

iOS application development Small icon for iOS application development category

iOS application development is the process of creating apps for Apple's iOS platform, which runs on iPhones, iPads, and other Apple devices. It uses tools like Xcode and programming languages such as Swift or Objective-C to design, build, and optimize apps for the Apple ecosystem.

iOS application security Small icon for iOS application security category

iOS is a mobile operating system developed by Apple Inc. exclusively for its hardware. It is the operating system that powers many of the company's mobile devices, including the iPhone; the term also includes the system software for iPads (predating iPadOS, which was introduced in 2019) as well as on the iPod Touch devices. It is the world's second-most widely installed mobile operating system, after Android.

Question formats

Single choice

The Single Choice Question format is a popular and straightforward method of testing knowledge and understanding. In this format, participants are presented with a question and a set of multiple-choice options, but they are required to choose only one correct answer among the choices provided. This format encourages focused decision-making and tests the participant's ability to identify the most accurate response from the given options.

Status: Ready to use
Type: Theory

Multiple choice

The Multiple Choice Question format is a widely used and versatile method for assessing knowledge and understanding. In this format, participants are presented with a question and a set of options, typically consisting of three or more choices. Participants are required to select the most appropriate or correct answer(s) from the given options.

Status: Ready to use
Type: Theory

Categorization

The Categorization Question format involves assigning elements to different categories based on their attributes, characteristics, or relationships. In this format, participants are presented with a list of elements or items and a set of categories. Their task is to carefully analyze each element and assign it to the appropriate category or categories based on their own understanding.

Status: Ready to use
Type: Theory

True/False

The True/False Question format is a straightforward and concise method of assessing knowledge and understanding. In this format, participants are presented with a statement, and they are required to determine whether the statement is true or false. Participants must carefully evaluate the statement based on their knowledge and understanding of the topic at hand.

Status: Ready to use
Type: Theory

Explain Code

In this format, participants are presented with a piece of source code and given multiple options that describe what the code is expected to do. Their task is to carefully examine the code and select the most accurate option that represents the expected outcome or behavior of the given code snippet.

Status: Ready to use
Type: Practice
Supported languages: No limitations

Vulnerable Code Analysis

In this format, participants are presented with a piece of code and are required to assess its security implications, identifying potential weaknesses or vulnerabilities that could be exploited by attackers.

Status: Ready to use
Type: Practice
Supported languages: No limitations

Phishing Recognition

In this format, participants are presented with an email and are required to assess whether it is example of phishing attempt or not.

Status: Ready to use
Type: Practice

Write code

In this format, participants are provided with a problem statement or a task, along with any necessary input and output specifications. Their task is to write a concise and correct function in the specified programming language to accomplish the desired task.

Status: Ready to use
Type: Practice
Supported languages: Python3, PHP8, Bash, PowerShell7, Java, JavaScript, C++, C#, Rust, Swift, Scala, Perl and Ruby

Fix vulnerability

In this format, participants receive a snippet of source code along with any necessary input and output specifications. Their task is to make such changes to the presented code that security vulnerabilities are removed, but the basic functionality is preserved.

Status: Ready to use
Type: Practice
Supported languages: Python3, PHP8, Bash, PowerShell7, Java, JavaScript, C++, C#, Rust, Swift, Scala, Perl and Ruby

Practical laboratories

In this format, participants are provided with access to one or more virtual machines and set of tasks to perform in this environments.

Status: Ready to use
Type: Practice

Practical web application pentesting

In this format, participants are provided with access to web application with unknown set of vulnerabilities to perform real pentest in this environment to find as many vulnerabilities as possible.

Status: Under development
Type: Practice
Expected release date: Fall 2025

Practical pentesting

In this format, participants are provided with access to infrastructure with unknown set of vulnerabilities to perform real pentest in this environment to find as many vulnerabilities as possible.

Status: Under development
Type: Practice
Expected release date: Fall 2025
Top Scroll top