Loading...

Profile-based and customizable assessments

Screenshot of the Pentester assessment screen showing difficulty, question count, duration, language, question types, and categories included.

Based on predefined Profiles

A type of assessment that allows you to take advantage of dynamic assessment suites without having to select categories. Our experts have prepared ready-made profiles corresponding to the most popular job positions in IT. Each profile is a combination of various categories appropriate to a given job position, based on which the platform generates unique assessment. All questions are scored automatically and the user who orders the assessment sees a detailed final report.

An icon that illustrates high quality content

High quality content

Thoughtfully prepared by our experts.

An icon that illustrates full automation

Full automation

To save your money and time.

An icon that illustrates convenient workflow

Convenient workflow

Just a few steps to achieve your goals.

An icon that illustrates predefined profiles prepared by experts

Predefined Profiles prepared by experts

Covering most popular job positions.

An icon that illustrates low cost

Low cost

To avoid draining your budget.


An icon that illustrates detailed report with summary

Detailed report with summary

For an overview or details.

Screenshot of a custom assessment screen showing question count, duration, language, question types, and categories included.

Based on custom Profiles

A solution based on our huge database of questions divided into specific categories. The user selects the categories he is interested in and the number of questions in these categories, and the platform creates a unique set of questions. This approach works well both in the case of positions that combine different responsibilities as well as when the user wants to have control over which areas of knowledge are to be verified during the assessment. All questions are scored automatically and the user who orders the assessment sees a detailed final report.

An icon that illustrates high quality content

High quality content

Thoughtfully prepared by our experts.

An icon that illustrates full automation

Full automation

To save your money and time.

An icon that illustrates convenient workflow

Convenient workflow

Just a few steps to achieve your goals.

An icon that illustrates flexible topics combination according to your needs

Flexible topics combination according to your needs

To tailor the assessment to your needs.

An icon that illustrates low cost

Low cost

To avoid draining your budget.


An icon that illustrates detailed report with summary

Detailed report with summary

For an overview or details.

Profile groups

19 profiles

Defensive Cybersecurity

AD, AWS, Azure, GCP, Crypto, SIEM, SOC, SOAR, Threat huntings, Incident Response, Forensic, Malware Analysis

25 profiles

Software Development

Frontend, Backend, Fullstack - Python, C#, Ruby, Java, PHP, React, Angular, Vue.js, JavaScript

4 profiles

Databases

MS SQL, MySQL, PostgreSQL, Oracle

8 profiles

Cloud

Amazon AWS, Microsoft Azure, Google Google Cloud Platform

All Profiles

The assessment profiles we have created were built for the most popular IT job positions found in companies around the world. Each profile covers multiple topics that are closely related to a given position. The profiles were created as a result of content analyzes of hundreds of job advertisements and improved using our extensive practical experience with technology. If you think that any additional profile should appear on this list, please let us know!

Proficiency level: Entry

Category configuration:

30%
20%
15%
10%
10%
5%
5%
5%

Proficiency level: Regular

Category configuration:

30%
20%
15%
10%
10%
5%
5%
5%

Proficiency level: Senior

Category configuration:

30%
20%
15%
10%
10%
5%
5%
5%

Proficiency level: Entry

Category configuration:

30%
15%
15%
10%
10%
5%
5%
5%
5%

Proficiency level: Regular

Category configuration:

30%
15%
15%
10%
10%
5%
5%
5%
5%

Proficiency level: Senior

Category configuration:

30%
15%
15%
10%
10%
5%
5%
5%
5%

Proficiency level: Entry

Category configuration:

35%
15%
10%
10%
10%
5%
5%
5%
5%

Proficiency level: Regular

Category configuration:

35%
15%
10%
10%
10%
5%
5%
5%
5%

Proficiency level: Senior

Category configuration:

35%
15%
10%
10%
10%
5%
5%
5%
5%

Proficiency level: Entry

Category configuration:

40%
20%
10%
10%
5%
5%
5%
5%

Proficiency level: Regular

Category configuration:

40%
20%
10%
10%
5%
5%
5%
5%

Proficiency level: Senior

Category configuration:

40%
20%
10%
10%
5%
5%
5%
5%

Proficiency level: Entry

Category configuration:

35%
15%
10%
10%
10%
5%
5%
5%
5%

Proficiency level: Regular

Category configuration:

35%
15%
10%
10%
10%
5%
5%
5%
5%

Proficiency level: Senior

Category configuration:

35%
15%
10%
10%
10%
5%
5%
5%
5%

Proficiency level: Entry

Category configuration:

40%
20%
10%
10%
5%
5%
5%
5%

Proficiency level: Regular

Category configuration:

40%
20%
10%
10%
5%
5%
5%
5%

Proficiency level: Senior

Category configuration:

40%
20%
10%
10%
5%
5%
5%
5%

Proficiency level: Entry

Category configuration:

35%
15%
10%
10%
5%
5%
5%
5%
5%
5%

Proficiency level: Regular

Category configuration:

35%
15%
10%
10%
5%
5%
5%
5%
5%
5%

Proficiency level: Senior

Category configuration:

35%
15%
10%
10%
5%
5%
5%
5%
5%
5%

Proficiency level: Entry

Category configuration:

35%
15%
10%
10%
5%
5%
5%
5%
5%
5%

Proficiency level: Regular

Category configuration:

35%
15%
10%
10%
5%
5%
5%
5%
5%
5%

Proficiency level: Senior

Category configuration:

35%
15%
10%
10%
5%
5%
5%
5%
5%
5%

Proficiency level: Entry

Category configuration:

35%
15%
10%
10%
5%
5%
5%
5%
5%
5%

Proficiency level: Regular

Category configuration:

35%
15%
10%
10%
5%
5%
5%
5%
5%
5%

Proficiency level: Senior

Category configuration:

35%
15%
10%
10%
5%
5%
5%
5%
5%
5%

Proficiency level: Entry

Category configuration:

35%
15%
10%
10%
5%
5%
5%
5%
5%
5%

Proficiency level: Regular

Category configuration:

35%
15%
10%
10%
5%
5%
5%
5%
5%
5%

Proficiency level: Senior

Category configuration:

35%
15%
10%
10%
5%
5%
5%
5%
5%
5%

Proficiency level: Entry

Category configuration:

35%
15%
10%
10%
5%
5%
5%
5%
5%
5%

Proficiency level: Regular

Category configuration:

35%
15%
10%
10%
5%
5%
5%
5%
5%
5%

Proficiency level: Senior

Category configuration:

35%
15%
10%
10%
5%
5%
5%
5%
5%
5%

Proficiency level: Entry

Category configuration:

40%
25%
15%
10%
5%
5%

Proficiency level: Regular

Category configuration:

40%
25%
15%
10%
5%
5%

Proficiency level: Senior

Category configuration:

40%
25%
15%
10%
5%
5%

Proficiency level: Entry

Category configuration:

10%
10%
10%
10%
10%
10%
5%
5%
5%
5%
5%
5%
5%
5%

Proficiency level: Regular

Category configuration:

10%
10%
10%
10%
10%
10%
5%
5%
5%
5%
5%
5%
5%
5%

Proficiency level: Senior

Category configuration:

10%
10%
10%
10%
10%
10%
5%
5%
5%
5%
5%
5%
5%
5%

Proficiency level: Entry

Category configuration:

10%
10%
10%
10%
10%
10%
10%
5%
5%
5%
5%
5%
5%

Proficiency level: Regular

Category configuration:

10%
10%
10%
10%
10%
10%
10%
5%
5%
5%
5%
5%
5%

Proficiency level: Senior

Category configuration:

10%
10%
10%
10%
10%
10%
10%
5%
5%
5%
5%
5%
5%

Proficiency level: Entry

Category configuration:

40%
15%
15%
10%
10%
5%
5%

Proficiency level: Regular

Category configuration:

40%
15%
15%
10%
10%
5%
5%

Proficiency level: Senior

Category configuration:

40%
15%
15%
10%
10%
5%
5%

Proficiency level: Entry

Category configuration:

25%
15%
10%
10%
10%
10%
5%
5%
5%
5%

Proficiency level: Regular

Category configuration:

25%
15%
10%
10%
10%
10%
5%
5%
5%
5%

Proficiency level: Senior

Category configuration:

25%
15%
10%
10%
10%
10%
5%
5%
5%
5%

Proficiency level: Entry

Category configuration:

20%
10%
10%
10%
10%
10%
10%
10%
5%
5%

Proficiency level: Regular

Category configuration:

20%
10%
10%
10%
10%
10%
10%
10%
5%
5%

Proficiency level: Senior

Category configuration:

20%
10%
10%
10%
10%
10%
10%
10%
5%
5%

Proficiency level: Entry

Category configuration:

20%
10%
10%
10%
10%
10%
10%
5%
5%
5%
5%

Proficiency level: Regular

Category configuration:

20%
10%
10%
10%
10%
10%
10%
5%
5%
5%
5%

Proficiency level: Senior

Category configuration:

20%
10%
10%
10%
10%
10%
10%
5%
5%
5%
5%

Proficiency level: Entry

Category configuration:

20%
10%
10%
10%
10%
10%
10%
5%
5%
5%
5%

Proficiency level: Regular

Category configuration:

20%
10%
10%
10%
10%
10%
10%
5%
5%
5%
5%

Proficiency level: Senior

Category configuration:

20%
10%
10%
10%
10%
10%
10%
5%
5%
5%
5%

Proficiency level: Entry

Category configuration:

20%
10%
10%
10%
10%
10%
10%
5%
5%
5%
5%

Proficiency level: Regular

Category configuration:

20%
10%
10%
10%
10%
10%
10%
5%
5%
5%
5%

Proficiency level: Senior

Category configuration:

20%
10%
10%
10%
10%
10%
10%
5%
5%
5%
5%

Proficiency level: Entry

Category configuration:

20%
20%
10%
5%
5%
5%
5%
5%
5%
5%
5%
5%
5%

Proficiency level: Regular

Category configuration:

20%
20%
10%
5%
5%
5%
5%
5%
5%
5%
5%
5%
5%

Proficiency level: Senior

Category configuration:

20%
20%
10%
5%
5%
5%
5%
5%
5%
5%
5%
5%
5%

Proficiency level: Entry

Category configuration:

20%
20%
10%
5%
5%
5%
5%
5%
5%
5%
5%
5%
5%

Proficiency level: Regular

Category configuration:

20%
20%
10%
5%
5%
5%
5%
5%
5%
5%
5%
5%
5%

Proficiency level: Senior

Category configuration:

20%
20%
10%
5%
5%
5%
5%
5%
5%
5%
5%
5%
5%

Proficiency level: Entry

Category configuration:

20%
20%
10%
5%
5%
5%
5%
5%
5%
5%
5%
5%
5%

Proficiency level: Regular

Category configuration:

20%
20%
10%
5%
5%
5%
5%
5%
5%
5%
5%
5%
5%

Proficiency level: Senior

Category configuration:

20%
20%
10%
5%
5%
5%
5%
5%
5%
5%
5%
5%
5%

Proficiency level: Entry

Category configuration:

20%
20%
10%
5%
5%
5%
5%
5%
5%
5%
5%
5%
5%

Proficiency level: Regular

Category configuration:

20%
20%
10%
5%
5%
5%
5%
5%
5%
5%
5%
5%
5%

Proficiency level: Senior

Category configuration:

20%
20%
10%
5%
5%
5%
5%
5%
5%
5%
5%
5%
5%

Proficiency level: Entry

Category configuration:

20%
20%
10%
5%
5%
5%
5%
5%
5%
5%
5%
5%
5%

Proficiency level: Regular

Category configuration:

20%
20%
10%
5%
5%
5%
5%
5%
5%
5%
5%
5%
5%

Proficiency level: Senior

Category configuration:

20%
20%
10%
5%
5%
5%
5%
5%
5%
5%
5%
5%
5%

Proficiency level: Entry

Category configuration:

20%
20%
10%
5%
5%
5%
5%
5%
5%
5%
5%
5%
5%

Proficiency level: Regular

Category configuration:

20%
20%
10%
5%
5%
5%
5%
5%
5%
5%
5%
5%
5%

Proficiency level: Senior

Category configuration:

20%
20%
10%
5%
5%
5%
5%
5%
5%
5%
5%
5%
5%

Proficiency level: Entry

Category configuration:

20%
20%
10%
5%
5%
5%
5%
5%
5%
5%
5%
5%
5%

Proficiency level: Regular

Category configuration:

20%
20%
10%
5%
5%
5%
5%
5%
5%
5%
5%
5%
5%

Proficiency level: Senior

Category configuration:

20%
20%
10%
5%
5%
5%
5%
5%
5%
5%
5%
5%
5%

Proficiency level: Entry

Category configuration:

20%
20%
10%
5%
5%
5%
5%
5%
5%
5%
5%
5%
5%

Proficiency level: Regular

Category configuration:

20%
20%
10%
5%
5%
5%
5%
5%
5%
5%
5%
5%
5%

Proficiency level: Senior

Category configuration:

20%
20%
10%
5%
5%
5%
5%
5%
5%
5%
5%
5%
5%

Proficiency level: Entry

Category configuration:

20%
20%
10%
5%
5%
5%
5%
5%
5%
5%
5%
5%
5%

Proficiency level: Regular

Category configuration:

20%
20%
10%
5%
5%
5%
5%
5%
5%
5%
5%
5%
5%

Proficiency level: Senior

Category configuration:

20%
20%
10%
5%
5%
5%
5%
5%
5%
5%
5%
5%
5%

Proficiency level: Entry

Category configuration:

20%
20%
10%
5%
5%
5%
5%
5%
5%
5%
5%
5%
5%

Proficiency level: Regular

Category configuration:

20%
20%
10%
5%
5%
5%
5%
5%
5%
5%
5%
5%
5%

Proficiency level: Senior

Category configuration:

20%
20%
10%
5%
5%
5%
5%
5%
5%
5%
5%
5%
5%

Proficiency level: Entry

Category configuration:

20%
20%
10%
5%
5%
5%
5%
5%
5%
5%
5%
5%
5%

Proficiency level: Regular

Category configuration:

20%
20%
10%
5%
5%
5%
5%
5%
5%
5%
5%
5%
5%

Proficiency level: Senior

Category configuration:

20%
20%
10%
5%
5%
5%
5%
5%
5%
5%
5%
5%
5%

Proficiency level: Entry

Category configuration:

20%
20%
10%
5%
5%
5%
5%
5%
5%
5%
5%
5%
5%

Proficiency level: Regular

Category configuration:

20%
20%
10%
5%
5%
5%
5%
5%
5%
5%
5%
5%
5%

Proficiency level: Senior

Category configuration:

20%
20%
10%
5%
5%
5%
5%
5%
5%
5%
5%
5%
5%

Proficiency level: Entry

Category configuration:

20%
20%
10%
5%
5%
5%
5%
5%
5%
5%
5%
5%
5%

Proficiency level: Regular

Category configuration:

20%
20%
10%
5%
5%
5%
5%
5%
5%
5%
5%
5%
5%

Proficiency level: Senior

Category configuration:

20%
20%
10%
5%
5%
5%
5%
5%
5%
5%
5%
5%
5%

Proficiency level: Entry

Category configuration:

20%
20%
10%
5%
5%
5%
5%
5%
5%
5%
5%
5%
5%

Proficiency level: Regular

Category configuration:

20%
20%
10%
5%
5%
5%
5%
5%
5%
5%
5%
5%
5%

Proficiency level: Senior

Category configuration:

20%
20%
10%
5%
5%
5%
5%
5%
5%
5%
5%
5%
5%

Proficiency level: Entry

Category configuration:

20%
20%
10%
5%
5%
5%
5%
5%
5%
5%
5%
5%
5%

Proficiency level: Regular

Category configuration:

20%
20%
10%
5%
5%
5%
5%
5%
5%
5%
5%
5%
5%

Proficiency level: Senior

Category configuration:

20%
20%
10%
5%
5%
5%
5%
5%
5%
5%
5%
5%
5%

Proficiency level: Entry

Category configuration:

35%
15%
10%
10%
10%
5%
5%
5%
5%

Proficiency level: Regular

Category configuration:

35%
15%
10%
10%
10%
5%
5%
5%
5%

Proficiency level: Senior

Category configuration:

35%
15%
10%
10%
10%
5%
5%
5%
5%

Proficiency level: Entry

Category configuration:

40%
20%
10%
10%
5%
5%
5%
5%

Proficiency level: Regular

Category configuration:

40%
20%
10%
10%
5%
5%
5%
5%

Proficiency level: Senior

Category configuration:

40%
20%
10%
10%
5%
5%
5%
5%

Proficiency level: Entry

Category configuration:

30%
15%
10%
10%
5%
5%
5%
5%
5%
5%
5%

Proficiency level: Regular

Category configuration:

30%
15%
10%
10%
5%
5%
5%
5%
5%
5%
5%

Proficiency level: Senior

Category configuration:

30%
15%
10%
10%
5%
5%
5%
5%
5%
5%
5%

Proficiency level: Entry

Category configuration:

40%
25%
15%
10%
10%

Proficiency level: Regular

Category configuration:

40%
25%
15%
10%
10%

Proficiency level: Senior

Category configuration:

40%
25%
15%
10%
10%

Proficiency level: Entry

Category configuration:

40%
25%
15%
10%
5%
5%

Proficiency level: Regular

Category configuration:

40%
25%
15%
10%
5%
5%

Proficiency level: Senior

Category configuration:

40%
25%
15%
10%
5%
5%

Proficiency level: Entry

Category configuration:

40%
15%
15%
10%
5%
5%
5%
5%

Proficiency level: Regular

Category configuration:

40%
15%
15%
10%
5%
5%
5%
5%

Proficiency level: Senior

Category configuration:

40%
15%
15%
10%
5%
5%
5%
5%

Proficiency level: Entry

Category configuration:

35%
25%
15%
10%
5%
5%
5%

Proficiency level: Regular

Category configuration:

35%
25%
15%
10%
5%
5%
5%

Proficiency level: Senior

Category configuration:

35%
25%
15%
10%
5%
5%
5%

Proficiency level: Entry

Category configuration:

30%
30%
10%
10%
5%
5%
5%
5%

Proficiency level: Regular

Category configuration:

30%
30%
10%
10%
5%
5%
5%
5%

Proficiency level: Senior

Category configuration:

30%
30%
10%
10%
5%
5%
5%
5%

Proficiency level: Entry

Category configuration:

20%
20%
20%
20%
5%
5%
5%
5%

Proficiency level: Regular

Category configuration:

20%
20%
20%
20%
5%
5%
5%
5%

Proficiency level: Senior

Category configuration:

20%
20%
20%
20%
5%
5%
5%
5%

Proficiency level: Entry

Category configuration:

30%
30%
10%
10%
5%
5%
5%
5%

Proficiency level: Regular

Category configuration:

30%
30%
10%
10%
5%
5%
5%
5%

Proficiency level: Senior

Category configuration:

30%
30%
10%
10%
5%
5%
5%
5%

Proficiency level: Entry

Category configuration:

25%
20%
15%
10%
10%
10%
5%
5%

Proficiency level: Regular

Category configuration:

25%
20%
15%
10%
10%
10%
5%
5%

Proficiency level: Senior

Category configuration:

25%
20%
15%
10%
10%
10%
5%
5%

Proficiency level: Entry

Category configuration:

25%
20%
15%
10%
10%
10%
5%
5%

Proficiency level: Regular

Category configuration:

25%
20%
15%
10%
10%
10%
5%
5%

Proficiency level: Senior

Category configuration:

25%
20%
15%
10%
10%
10%
5%
5%

Proficiency level: Entry

Category configuration:

20%
20%
10%
10%
10%
10%
10%
10%

Proficiency level: Regular

Category configuration:

20%
20%
10%
10%
10%
10%
10%
10%

Proficiency level: Senior

Category configuration:

20%
20%
10%
10%
10%
10%
10%
10%

Proficiency level: Entry

Category configuration:

20%
20%
10%
10%
10%
10%
10%
10%

Proficiency level: Regular

Category configuration:

20%
20%
10%
10%
10%
10%
10%
10%

Proficiency level: Senior

Category configuration:

20%
20%
10%
10%
10%
10%
10%
10%

Proficiency level: Entry

Category configuration:

40%
15%
10%
5%
5%
5%
5%
5%
5%
5%

Proficiency level: Regular

Category configuration:

40%
15%
10%
5%
5%
5%
5%
5%
5%
5%

Proficiency level: Senior

Category configuration:

40%
15%
10%
5%
5%
5%
5%
5%
5%
5%

Proficiency level: Entry

Category configuration:

25%
15%
15%
15%
5%
5%
5%
5%
5%
5%

Proficiency level: Regular

Category configuration:

25%
15%
15%
15%
5%
5%
5%
5%
5%
5%

Proficiency level: Senior

Category configuration:

25%
15%
15%
15%
5%
5%
5%
5%
5%
5%

Proficiency level: Entry

Category configuration:

15%
15%
10%
10%
10%
10%
10%
10%
5%
5%

Proficiency level: Regular

Category configuration:

15%
15%
10%
10%
10%
10%
10%
10%
5%
5%

Proficiency level: Senior

Category configuration:

15%
15%
10%
10%
10%
10%
10%
10%
5%
5%

Proficiency level: Entry

Category configuration:

20%
20%
10%
10%
10%
10%
10%
10%

Proficiency level: Regular

Category configuration:

20%
20%
10%
10%
10%
10%
10%
10%

Proficiency level: Senior

Category configuration:

20%
20%
10%
10%
10%
10%
10%
10%

Proficiency level: Entry

Category configuration:

40%
25%
15%
10%
5%
5%

Proficiency level: Regular

Category configuration:

40%
25%
15%
10%
5%
5%

Proficiency level: Senior

Category configuration:

40%
25%
15%
10%
5%
5%

Proficiency level: Regular

Category configuration:

20%
15%
15%
15%
15%
10%
10%

Proficiency level: Entry

Category configuration:

20%
20%
10%
10%
10%
10%
10%
10%

Proficiency level: Regular

Category configuration:

20%
20%
10%
10%
10%
10%
10%
10%

Proficiency level: Senior

Category configuration:

20%
20%
10%
10%
10%
10%
10%
10%

Proficiency level: Entry

Category configuration:

50%
25%
15%
10%

Proficiency level: Regular

Category configuration:

50%
25%
15%
10%

Proficiency level: Senior

Category configuration:

50%
25%
15%
10%

Proficiency level: Entry

Category configuration:

40%
15%
10%
10%
5%
5%
5%
5%
5%

Proficiency level: Regular

Category configuration:

40%
15%
10%
10%
5%
5%
5%
5%
5%

Proficiency level: Senior

Category configuration:

40%
15%
10%
10%
5%
5%
5%
5%
5%

Proficiency level: Entry

Category configuration:

40%
10%
10%
5%
5%
5%
5%
5%
5%
5%
5%

Proficiency level: Regular

Category configuration:

40%
10%
10%
5%
5%
5%
5%
5%
5%
5%
5%

Proficiency level: Senior

Category configuration:

40%
10%
10%
5%
5%
5%
5%
5%
5%
5%
5%

Proficiency level: Entry

Category configuration:

100%

Proficiency level: Entry

Category configuration:

30%
15%
10%
10%
5%
5%
5%
5%
5%
5%
5%

Proficiency level: Regular

Category configuration:

30%
15%
10%
10%
5%
5%
5%
5%
5%
5%
5%

Proficiency level: Senior

Category configuration:

30%
15%
10%
10%
5%
5%
5%
5%
5%
5%
5%

Proficiency level: Entry

Category configuration:

30%
10%
10%
10%
10%
5%
5%
5%
5%
5%
5%

Proficiency level: Regular

Category configuration:

30%
10%
10%
10%
10%
5%
5%
5%
5%
5%
5%

Proficiency level: Senior

Category configuration:

30%
10%
10%
10%
10%
5%
5%
5%
5%
5%
5%

Proficiency level: Entry

Category configuration:

15%
15%
15%
10%
10%
10%
10%
5%
5%
5%

Proficiency level: Regular

Category configuration:

15%
15%
15%
10%
10%
10%
10%
5%
5%
5%

Proficiency level: Senior

Category configuration:

15%
15%
15%
10%
10%
10%
10%
5%
5%
5%

Proficiency level: Entry

Category configuration:

40%
10%
10%
5%
5%
5%
5%
5%
5%
5%
5%

Proficiency level: Regular

Category configuration:

40%
10%
10%
5%
5%
5%
5%
5%
5%
5%
5%

Proficiency level: Senior

Category configuration:

40%
10%
10%
5%
5%
5%
5%
5%
5%
5%
5%

Proficiency level: Entry

Category configuration:

50%
15%
10%
10%
5%
5%
5%

Proficiency level: Regular

Category configuration:

50%
15%
10%
10%
5%
5%
5%

Proficiency level: Senior

Category configuration:

50%
15%
10%
10%
5%
5%
5%

Proficiency level: Entry

Category configuration:

40%
15%
10%
10%
5%
5%
5%
5%
5%

Proficiency level: Regular

Category configuration:

40%
15%
10%
10%
5%
5%
5%
5%
5%

Proficiency level: Senior

Category configuration:

40%
15%
10%
10%
5%
5%
5%
5%
5%

Proficiency level: Entry

Category configuration:

25%
15%
15%
10%
10%
5%
5%
5%
5%
5%

Proficiency level: Regular

Category configuration:

25%
15%
15%
10%
10%
5%
5%
5%
5%
5%

Proficiency level: Senior

Category configuration:

25%
15%
15%
10%
10%
5%
5%
5%
5%
5%

Proficiency level: Entry

Category configuration:

30%
15%
15%
10%
10%
5%
5%
5%
5%

Proficiency level: Regular

Category configuration:

30%
15%
15%
10%
10%
5%
5%
5%
5%

Proficiency level: Senior

Category configuration:

30%
15%
15%
10%
10%
5%
5%
5%
5%

Proficiency level: Entry

Category configuration:

25%
20%
15%
10%
10%
5%
5%
5%
5%

Proficiency level: Regular

Category configuration:

25%
20%
15%
10%
10%
5%
5%
5%
5%

Proficiency level: Senior

Category configuration:

25%
20%
15%
10%
10%
5%
5%
5%
5%

Covered topics

ASP.NET Core Small icon for ASP.NET Core category

ASP.NET Core is a cross-platform, high-performance framework for building modern, cloud-based, and web applications with .NET.

AWS administration Small icon for AWS administration category

AWS administration involves managing and maintaining Amazon Web Services (AWS) cloud infrastructure, including tasks such as provisioning resources, configuring services, monitoring performance, and ensuring security and compliance.

AWS security Small icon for AWS security category

AWS security refers to the comprehensive measures, protocols, and tools implemented to safeguard data, applications, and infrastructure within Amazon Web Services (AWS) cloud environment. It encompasses various layers of protection, including identity management, encryption, network security, and continuous monitoring, ensuring robust defense against potential threats and unauthorized access.

Active Directory administration Small icon for Active Directory administration category

Active Directory administration involves managing and maintaining Microsoft's Active Directory services, including user accounts, groups, permissions, and network resources to ensure secure and efficient access control within an organization.

Active Directory security Small icon for Active Directory security category

Active Directory is a directory service developed by Microsoft for Windows domain networks. Windows Server operating systems include it as a set of processes and services.

Active Record ORM Small icon for Active Record ORM category

Active Record ORM is a Ruby on Rails feature that maps database tables to Ruby objects, enabling developers to interact with the database using object-oriented methods.

Adversary emulation Small icon for Adversary emulation category

Adversary emulation is a cybersecurity assessment method that aims to test an organization's security controls against the tactics, techniques, and procedures (TTPs) used by threat actors posing the greatest risk to its industry.

Android OS security Small icon for Android OS security category

Android is a mobile operating system based on a modified version of the Linux kernel and other open-source software, designed primarily for touchscreen mobile devices such as smartphones and tablets. Android is developed by a consortium of developers known as the Open Handset Alliance, though its most widely used version is primarily developed by Google.

Android application security Small icon for Android application security category

Android is a mobile operating system based on a modified version of the Linux kernel and other open-source software, designed primarily for touchscreen mobile devices such as smartphones and tablets. Android is developed by a consortium of developers known as the Open Handset Alliance, though its most widely used version is primarily developed by Google.

Angular Framework Small icon for Angular Framework category

Angular Framework is a TypeScript-based framework for building dynamic, single-page web applications with a robust architecture and powerful tools.

Azure administration Small icon for Azure administration category

Azure administration involves managing and maintaining Microsoft Azure cloud services, including tasks such as provisioning resources, configuring services, monitoring performance, and ensuring security and compliance within the Azure environment.

Azure security Small icon for Azure security category

Azure Security refers to security tools and capabilities available on Microsoft’s Azure cloud platform.

Bash - code challenges Small icon for Bash - code challenges category

Understanding the source code, the ability to make modifications and create new code is an important skill in many IT areas. This opens up the possibility of working more effectively and solving a very wide range of problems.

C# - code challenges Small icon for C# - code challenges category

Understanding the source code, the ability to make modifications and create new code is an important skill in many IT areas. This opens up the possibility of working more effectively and solving a very wide range of problems.

CI/CD Small icon for CI/CD category

Continuous Integration and Continuous Delivery (CI/CD) is a software development practice that automates the process of integrating code changes, running tests, and deploying updates to ensure rapid, reliable, and consistent delivery of applications.

COMSEC system engineering Small icon for COMSEC system engineering category

COMSEC is used to protect both classified and unclassified traffic on military communications networks, including voice, video, and data. It is used for both analog and digital applications, and both wired and wireless links.

CSS3 Small icon for CSS3 category

CSS3 is the latest version of Cascading Style Sheets, used to define the look and layout of web pages with advanced styling features and effects.

Check Point configuration and administration Small icon for Check Point configuration and administration category

Check Point configuration and administration involve setting up and managing Check Point Software's cybersecurity appliances, including firewalls and security gateways, to secure network traffic, enforce policies, and protect against threats.

Cloud Small icon for Cloud category

Cloud computing is the delivery of computing services—including servers, storage, databases, networking, software, analytics, and intelligence—over the internet (“the cloud”) to offer faster innovation, flexible resources, and economies of scale.

Cloud Forensics Small icon for Cloud Forensics category

Cloud Forensics involves examining and analyzing data and activities in cloud environments to investigate and address security incidents or legal issues.

Computer networks Small icon for Computer networks category

Computer Networking is the practice of connecting computers together to enable communication and data exchange between them.

Containerization technologies Small icon for Containerization technologies category

Containerization technologies package applications and their dependencies into isolated, lightweight containers, ensuring consistent performance across different environments and simplifying deployment and scaling.

Cryptography Small icon for Cryptography category

Cryptography is the process of hiding or coding information so that only the person a message was intended for can read it. The art of cryptography has been used to code messages for thousands of years and continues to be used in bank cards, computer passwords, and ecommerce.

Database Design and Normalization Small icon for Database Design and Normalization category

Database Design involves structuring a database to efficiently store and manage data according to user needs and performance goals, while Normalization is the process of organizing this data to reduce redundancy and dependency by dividing it into related tables and defining the relationships between them.

Demo lab Small icon for Demo lab category

A collection of practical lab tasks to demonstrate live labs feature.

DevOps Small icon for DevOps category

DevOps is a collaborative approach that combines development and IT operations to improve efficiency, accelerate software delivery, and enhance the quality of applications through automation and continuous integration/continuous delivery (CI/CD) practices.

Digital forensics Small icon for Digital forensics category

Digital forensics refers to the process of collecting, preserving, analyzing, and presenting digital evidence from computer systems, networks, and digital devices to investigate cybercrimes, security incidents, and data breaches. Digital forensics enables cybersecurity professionals and law enforcement agencies to uncover the root causes of security incidents, identify perpetrators, and gather evidence for legal proceedings and incident response activities.

Digital forensics lab Small icon for Digital forensics lab category

A collection of practical lab tasks on Digital forensics. Digital forensics refers to the process of collecting, preserving, analyzing, and presenting digital evidence from computer systems, networks, and digital devices to investigate cybercrimes, security incidents, and data breaches. Digital forensics enables cybersecurity professionals and law enforcement agencies to uncover the root causes of security incidents, identify perpetrators, and gather evidence for legal proceedings and incident response activities.

Django Framework Small icon for Django Framework category

Django is a high-level Python framework for building web applications quickly, with a focus on simplicity, scalability, and built-in features for security and database management.

Django ORM Small icon for Django ORM category

Django ORM (Object-Relational Mapping) is a feature of the Django framework that allows developers to interact with a database using Python objects instead of raw SQL queries.

Docker containers Small icon for Docker containers category

Docker containers are lightweight, standalone, and portable software packages that encapsulate applications and their dependencies, allowing them to run reliably and consistently across different computing environments. They enable efficient deployment, scaling, and isolation of applications, promoting flexibility and ease of development.

Eloquent ORM Small icon for Eloquent ORM category

Eloquent ORM is Laravel's built-in Object-Relational Mapping tool that simplifies database interactions by allowing developers to use PHP objects for querying and managing data.

Entity Framework Core Small icon for Entity Framework Core category

Entity Framework Core is a cross-platform ORM for .NET that simplifies database access by mapping .NET objects to database tables and providing an abstraction for data operations.

File System Analysis Small icon for File System Analysis category

File System Analysis in Digital Forensics involves examining file structures and metadata to recover, identify, and interpret digital evidence related to data storage and manipulation.

GCP administration Small icon for GCP administration category

Google Cloud Platform administration involves managing and maintaining GCP resources, configuring services, monitoring performance, and ensuring security and compliance within Google's cloud infrastructure.

GCP security Small icon for GCP security category

Google Cloud Platform security administration involves managing and implementing security measures to protect GCP resources, including configuring access controls, monitoring for threats, and ensuring compliance with security policies.

Git Small icon for Git category

Git is a distributed version control system that tracks changes in source code during software development, enabling multiple developers to collaborate efficiently and manage project history.

HTML5 Small icon for HTML5 category

HTML5 is the latest version of the Hypertext Markup Language used for structuring and presenting content on the web, offering new elements and features for richer web applications.

HTTP Protocol Small icon for HTTP Protocol category

The HTTP protocol is a communication protocol used for transmitting data over the web, allowing web browsers and servers to exchange information.

Hibernate ORM Small icon for Hibernate ORM category

Hibernate ORM is a Java framework that simplifies database interactions by mapping Java objects to database tables and handling data persistence with object-oriented methods.

ISTQB Certified Tester Small icon for ISTQB Certified Tester category

ISTQB Certified Tester is a professional qualification for software testers, validating their knowledge and skills in software testing principles, techniques, and best practices.

ITIL Service Operation Small icon for ITIL Service Operation category

ITIL Service Operation focuses on delivering and managing IT services to ensure they run smoothly and efficiently, including incident management, problem management, and operational control.

IaaC Small icon for IaaC category

Infrastructure as Code (IaaC) is the practice of managing and provisioning computing infrastructure through machine-readable configuration files, enabling automated and consistent deployment of resources.

Incident handling Small icon for Incident handling category

Incident handling in cybersecurity is the process of identifying, managing, and responding to security breaches or threats to minimize damage and restore normal operations.

Incident response Small icon for Incident response category

Incident response refers to the structured process of identifying, managing, and mitigating security incidents and breaches within an organization's IT infrastructure. It involves a coordinated effort by security teams to detect, analyze, contain, eradicate, and recover from cybersecurity incidents in order to minimize the impact on the organization's operations, assets, and reputation.

Java - code challenges Small icon for Java - code challenges category

Understanding the source code, the ability to make modifications and create new code is an important skill in many IT areas. This opens up the possibility of working more effectively and solving a very wide range of problems.

JavaScript - code challenges Small icon for JavaScript - code challenges category

Understanding the source code, the ability to make modifications and create new code is an important skill in many IT areas. This opens up the possibility of working more effectively and solving a very wide range of problems.

Juniper configuration and administration Small icon for Juniper configuration and administration category

Juniper configuration and administration involve setting up and managing Juniper Networks' networking and security devices, including routers, switches, and firewalls, to ensure efficient and secure network operations.

Laravel Framework Small icon for Laravel Framework category

Laravel is a PHP framework for web development that provides an elegant syntax, powerful tools, and a robust ecosystem for building modern, scalable applications.

Linux administration Small icon for Linux administration category

Linux is an open source operating system (OS). An operating system is the software that directly manages a system's hardware and resources, like CPU, memory, and storage. Linux is most popular Operating System for servers and smartphones (as Android OS is build upon Linux).

Linux administration lab Small icon for Linux administration lab category

A collection of practical lab tasks on Linux administration. Linux is an open source operating system (OS). An operating system is the software that directly manages a system's hardware and resources, like CPU, memory, and storage. Linux is most popular Operating System for servers and smartphones (as Android OS is build upon Linux).

Linux malware analysis lab Small icon for Linux malware analysis lab category

A collection of practical lab tasks on Linux malware analysis. Linux malware analysis is the process of examining malicious software (malware) designed to target Linux systems. This involves identifying, dissecting, and understanding the malware's behavior, functionality, and impact. The analysis helps in detecting infections, determining how the malware operates, and developing strategies for mitigation, prevention, and remediation on Linux-based environments.

Linux security Small icon for Linux security category

Linux is an open source operating system (OS). An operating system is the software that directly manages a system's hardware and resources, like CPU, memory, and storage. Linux is most popular Operating System for servers and smartphones (as Android OS is build upon Linux).

Linux security lab Small icon for Linux security lab category

A collection of practical lab tasks on Linux security. Linux is an open source operating system (OS). An operating system is the software that directly manages a system's hardware and resources, like CPU, memory, and storage. Linux is most popular Operating System for servers and smartphones (as Android OS is build upon Linux).

MS SQL Database administration Small icon for MS SQL Database administration category

MS SQL Database Administration involves managing and maintaining Microsoft SQL Server databases, including tasks such as installation, configuration, performance tuning, and security management to ensure optimal operation and data integrity.

MS SQL Database backup and recovery Small icon for MS SQL Database backup and recovery category

MS SQL Database Backup and Recovery is the process of creating copies of database data to protect against loss and restoring that data from backups in case of failure or corruption.

MS SQL Database high availability and clustering Small icon for MS SQL Database high availability and clustering category

MS SQL Database High Availability and Clustering involve configuring systems to ensure continuous database access and minimize downtime by using redundant servers and failover mechanisms.

MS SQL Database performance tuning and monitoring Small icon for MS SQL Database performance tuning and monitoring category

MS SQL Database Performance Tuning and Monitoring involves adjusting and optimizing database settings and queries to enhance performance and continuously tracking system metrics to ensure efficient operation and identify potential issues.

MS SQL Database security and user management Small icon for MS SQL Database security and user management category

MS SQL Database Security and User Management involves implementing measures to protect database data from unauthorized access and managing user roles and permissions to control access and maintain security.

Malware dynamic analysis in Linux OS Small icon for Malware dynamic analysis in Linux OS category

Malware dynamic analysis in Linux OS involves executing malicious software in a controlled environment to observe its behavior, analyze its actions in real-time, and identify potential security risks or threats specific to Linux-based systems.

Malware dynamic analysis in Windows OS Small icon for Malware dynamic analysis in Windows OS category

Malware dynamic analysis in Windows OS involves executing malicious software in a controlled environment to observe its behavior, analyze its actions, and identify potential threats or vulnerabilities.

Malware static analysis in Linux OS Small icon for Malware static analysis in Linux OS category

Malware static analysis in Linux OS involves examining the code and structure of malicious software without executing it, aiming to understand its behavior, identify patterns, and develop detection and mitigation strategies specific to Linux environments.

Malware static analysis in Windows OS Small icon for Malware static analysis in Windows OS category

Malware static analysis in Windows OS involves examining the code and structure of malicious software without executing it, aiming to understand its behavior, identify indicators of compromise (IOCs), and develop detection and prevention strategies.

Memory Forensics Small icon for Memory Forensics category

Memory Forensics involves analyzing a computer's volatile memory (RAM) to uncover evidence of malicious activity, running processes, and system states.

Microservices Architecture Small icon for Microservices Architecture category

Microservices Architecture is a design approach where applications are composed of small, independent services that communicate over networks, allowing for flexible and scalable development.

Mobile Device Forensics Small icon for Mobile Device Forensics category

Mobile Device Forensics is the process of retrieving and analyzing data from mobile devices to investigate and gather evidence for legal or security purposes.

Modern JavaScript Small icon for Modern JavaScript category

Modern JavaScript refers to the latest standards and features of JavaScript, including ES6 and beyond, which enhance the language with new syntax, functions, and capabilities.

Modern software development fundamentals Small icon for Modern software development fundamentals category

Modern software development fundamentals encompass agile methodologies, continuous integration/continuous delivery (CI/CD), version control, automated testing, and collaborative tools to enhance efficiency, quality, and responsiveness in software creation.

Modern software testing fundamentals Small icon for Modern software testing fundamentals category

Modern software testing fundamentals encompass agile testing methodologies, test automation, continuous integration and continuous delivery (CI/CD), exploratory testing, and integration of testing into the software development lifecycle (SDLC) to ensure software quality and efficiency.

MySQL Database administration Small icon for MySQL Database administration category

MySQL Database Administration involves managing and maintaining MySQL databases, including tasks such as installation, configuration, performance tuning, and security to ensure optimal operation and data integrity.

MySQL Database backup and recovery Small icon for MySQL Database backup and recovery category

MySQL Database Backup and Recovery involves creating and managing backups of MySQL data to protect against loss and restoring that data from backups in case of failure or corruption.

MySQL Database performance tuning and monitoring Small icon for MySQL Database performance tuning and monitoring category

MySQL Database Performance Tuning and Monitoring involves optimizing database queries and configurations to enhance performance and tracking system metrics to ensure efficient operation and detect issues.

MySQL Database security and user management Small icon for MySQL Database security and user management category

MySQL Database Security and User Management involves safeguarding database access through authentication and authorization, and managing user roles and permissions to ensure data protection and control.

NATO security policies and procedures Small icon for NATO security policies and procedures category

Security policies and procedures are formal guidelines and instructions designed to protect an organization's information, assets, and operations from threats and vulnerabilities.

Network Forensics Small icon for Network Forensics category

Network Forensics involves monitoring and analyzing network traffic to detect, investigate, and respond to security incidents and unauthorized activities.

Network security Small icon for Network security category

Network security is a critical aspect of modern cybersecurity, and covers a wide range of topics, including firewall configurations, intrusion detection and prevention, secure network design, VPN implementation, access controls, and more.

Network security logs analysis Small icon for Network security logs analysis category

Network security logs analysis in the context of cybersecurity involves the examination and interpretation of logs generated by various network devices and systems to identify potential security threats, anomalies, and malicious activities. Network security logs provide valuable insights into the behavior of network traffic, user activities, and system events, helping organizations detect and respond to cybersecurity incidents effectively.

Network traffic capture analysis Small icon for Network traffic capture analysis category

Network traffic capture analysis, also known as packet analysis, is a process used in cybersecurity to examine and interpret the data packets transmitted over a network. It involves capturing network traffic in real-time or from stored packet capture files and analyzing the contents of the packets to gain insights into network behavior and identify security threats.

Operating Systems Forensics Small icon for Operating Systems Forensics category

Operating Systems Forensics involves analyzing and investigating operating systems to uncover and evaluate evidence related to security incidents, system breaches, or unauthorized activities.

Oracle Database administration Small icon for Oracle Database administration category

Oracle Database Administration involves managing and maintaining Oracle databases, including installation, configuration, performance tuning, and security to ensure optimal operation and data integrity.

Oracle Database backup and recovery Small icon for Oracle Database backup and recovery category

Oracle Database Backup and Recovery involves creating backups of Oracle data to prevent loss and restoring that data from backups in case of failure or corruption.

Oracle Database performance tuning and monitoring Small icon for Oracle Database performance tuning and monitoring category

Oracle Database Performance Tuning and Monitoring involves optimizing queries and system settings to enhance performance and tracking metrics to ensure efficient operation and identify issues.

Oracle Database security and user management Small icon for Oracle Database security and user management category

Oracle Database Security and User Management involves safeguarding data through access controls and managing user roles and permissions to ensure secure and authorized access.

PHP - code challenges Small icon for PHP - code challenges category

Understanding the source code, the ability to make modifications and create new code is an important skill in many IT areas. This opens up the possibility of working more effectively and solving a very wide range of problems.

Palo Alto configuration and administration Small icon for Palo Alto configuration and administration category

Palo Alto configuration and administration involve setting up and managing Palo Alto Networks' firewall and cybersecurity devices to ensure secure network operations, including policies, rules, and threat prevention configurations.

Pentesting lab Small icon for Pentesting lab category

A collection of practical lab tasks on Pentesting. Pentesting, or penetration testing, is the practice of simulating cyberattacks on a system, network, or application to identify vulnerabilities that could be exploited by attackers. The goal is to assess the security of the target by discovering weaknesses and providing insights for improving defenses before real threats can exploit them.

PostgreSQL Database administration Small icon for PostgreSQL Database administration category

PostgreSQL Database Administration involves managing and maintaining PostgreSQL databases, including tasks such as installation, configuration, performance tuning, and security to ensure optimal operation and data integrity.

PostgreSQL Database backup and recovery Small icon for PostgreSQL Database backup and recovery category

PostgreSQL Database Backup and Recovery involves creating backups of PostgreSQL data to protect against loss and restoring that data from backups in case of failure or corruption.

PostgreSQL Database performance tuning and monitoring Small icon for PostgreSQL Database performance tuning and monitoring category

PostgreSQL Database Performance Tuning and Monitoring involves optimizing queries and settings to enhance performance and tracking system metrics to ensure efficient operation and detect issues.

PostgreSQL Database security and user management Small icon for PostgreSQL Database security and user management category

PostgreSQL Database Security and User Management involves protecting data through authentication and authorization, and managing user roles and permissions to control access and ensure security.

PowerShell - code challenges Small icon for PowerShell - code challenges category

Understanding the source code, the ability to make modifications and create new code is an important skill in many IT areas. This opens up the possibility of working more effectively and solving a very wide range of problems.

Product - Ansible Small icon for Product - Ansible category

Ansible is an open-source automation tool used for configuration management, application deployment, and task automation across multiple systems, simplifying IT operations.

Product - Splunk Small icon for Product - Splunk category

Splunk is a powerful software platform used for searching, monitoring, and analyzing machine-generated big data via a web-style interface. It collects and indexes data from various sources, allowing users to generate reports, visualize data, and gain real-time insights into their IT infrastructure, security systems, and business processes.

Product - Tenable Nessus Small icon for Product - Tenable Nessus category

Tenable Nessus is a widely used vulnerability scanning tool that helps identify and assess security issues within networks and systems, offering comprehensive insights and remediation guidance to enhance overall cybersecurity posture.

Python - code challenges Small icon for Python - code challenges category

Understanding the source code, the ability to make modifications and create new code is an important skill in many IT areas. This opens up the possibility of working more effectively and solving a very wide range of problems.

RESTful API Development Small icon for RESTful API Development category

RESTful API Development involves creating web services that use HTTP requests to access and manipulate resources in a stateless, scalable, and standardized manner.

React JS Framework Small icon for React JS Framework category

React JS is a JavaScript library for building user interfaces with a component-based architecture and efficient rendering.

Red Teaming Small icon for Red Teaming category

A red team plays the role of the attacker by trying to find vulnerabilities and break through cybersecurity defenses by using advanced techniques, tactics and procedures.

Responsive web design Small icon for Responsive web design category

Responsive web design is an approach to creating web pages that adapt seamlessly to different screen sizes and devices for an optimal user experience.

Reverse engineering lab Small icon for Reverse engineering lab category

A collection of practical lab tasks on Reverse engineering. Reverse engineering is the process of analyzing a system, software, or device to understand its structure, functionality, and operation. By deconstructing the original product, reverse engineering aims to uncover how it was designed or how it works, often to replicate, modify, or enhance it, or to identify vulnerabilities. This technique is commonly used in software analysis, hardware design, and cybersecurity.

Risk assessments Small icon for Risk assessments category

Risk assessments in cybersecurity are evaluations of potential threats and vulnerabilities to determine the likelihood and impact of security incidents on an organization's assets.

Risk management Small icon for Risk management category

Risk management involves identifying, assessing, and mitigating potential threats and vulnerabilities to protect digital assets and information. It encompasses strategies and processes to analyze risks, prioritize them based on their potential impact, and implement measures to reduce or mitigate these risks, ensuring proactive protection and resilience against cybersecurity threats.

Ruby - code challenges Small icon for Ruby - code challenges category

Understanding the source code, the ability to make modifications and create new code is an important skill in many IT areas. This opens up the possibility of working more effectively and solving a very wide range of problems.

Ruby on Rails Framework Small icon for Ruby on Rails Framework category

Ruby on Rails is a web application framework written in Ruby that emphasizes convention over configuration, allowing for rapid development with a focus on simplicity and productivity.

SQL Indexing Strategies Small icon for SQL Indexing Strategies category

SQL Indexing Strategies involve creating and managing indexes on database tables to speed up data retrieval and improve query performance by reducing the amount of data scanned.

SQL Query Optimization Small icon for SQL Query Optimization category

SQL Query Optimization is the process of improving the performance and efficiency of a database query by refining its structure and execution plan to reduce response time and resource consumption.

Secure web design and development Small icon for Secure web design and development category

Secure web design and development refers to the process of creating websites and web applications with security considerations integrated into every stage of the development lifecycle. It involves implementing best practices, adopting secure coding techniques, and leveraging security controls to protect against common web vulnerabilities and cyber threats.

Security Information and Event Management (SIEM) Small icon for Security Information and Event Management (SIEM) category

Security Information and Event Management (SIEM) products are software solutions designed to provide organizations with comprehensive visibility into their IT infrastructure's security posture. SIEM systems collect, analyze, and correlate security-related data from various sources across the organization, including network devices, servers, endpoints, applications, and security tools. The primary goal of SIEM is to help organizations detect and respond to security threats in real-time, as well as to facilitate compliance reporting and forensic analysis.

Security Operations Center (SOC) Small icon for Security Operations Center (SOC) category

A Security Operations Center (SOC) is a centralized unit within an organization responsible for monitoring, detecting, analyzing, and responding to cybersecurity incidents and threats. It serves as a nerve center for cybersecurity activities, providing real-time monitoring, threat intelligence, incident analysis, and incident response capabilities.

Security architecture Small icon for Security architecture category

Security architecture in cybersecurity refers to the design, structure, and arrangement of security controls, protocols, and systems within an organization. It involves the planning and implementation of comprehensive strategies to protect digital assets, networks, and data from potential threats, ensuring a robust defense framework encompassing preventive, detective, and responsive measures against cyberattacks and vulnerabilities.

Security audit Small icon for Security audit category

A security audit is a systematic assessment and examination of an organization's systems, networks, and policies to identify vulnerabilities, compliance gaps, and potential risks. It involves a thorough review of security controls, configurations, and practices to ensure they align with established security standards, regulations, and best practices, aiming to enhance overall security posture and mitigate potential threats.

Security awareness Small icon for Security awareness category

Security awareness is the knowledge and attitude members of an organization possess regarding the protection of the physical, and especially informational, assets of that organization.

Security governance Small icon for Security governance category

Security governance in cybersecurity refers to the framework, policies, and processes implemented to guide and oversee an organization's security efforts. It involves defining responsibilities, establishing controls, and setting strategic directions to ensure that security measures align with business objectives, comply with regulations, and effectively mitigate risks across the entire organization.

Security logs analysis Small icon for Security logs analysis category

Security logs analysis in cybersecurity is the process of examining log data to detect, investigate, and respond to security incidents and threats.

Security, Orchestrations, Automation and Response (SOAR) Small icon for Security, Orchestrations, Automation and Response (SOAR) category

Security, Orchestration, Automation, and Response (SOAR) is a cybersecurity term that refers to a set of technologies, processes, and practices designed to streamline and automate the management of security operations. SOAR platforms integrate security orchestration and automation capabilities with incident response workflows to improve the efficiency, consistency, and effectiveness of cybersecurity operations.

Spring Framework Small icon for Spring Framework category

Spring Framework is a comprehensive Java framework that provides tools and libraries for building enterprise-level applications with features for dependency injection, aspect-oriented programming, and more.

Testing modern web applications Small icon for Testing modern web applications category

Testing modern web applications involves evaluating their functionality, performance, security, and usability to ensure they meet specified requirements and perform well across different devices and browsers.

Threat hunting Small icon for Threat hunting category

Threat hunting is a crucial aspect of modern cybersecurity, requiring a proactive and analytical mindset.

TypeScript Small icon for TypeScript category

TypeScript is a superset of JavaScript that adds static typing and advanced features to improve code quality and development efficiency.

VMWare administration Small icon for VMWare administration category

VMware is a leading virtualization technology company providing software that enables the creation, management, and deployment of virtual machines and cloud infrastructure, enhancing efficiency, scalability, and flexibility in IT environments.

Virtualization technologies Small icon for Virtualization technologies category

Virtualization is technology that you can use to create virtual representations of servers, storage, networks, and other physical machines. Virtual software mimics the functions of physical hardware to run multiple virtual machines simultaneously on a single physical machine.

Vue.js Framework Small icon for Vue.js Framework category

Vue.js is a progressive JavaScript framework for building user interfaces with a focus on simplicity and ease of integration.

Vulnerability assessment Small icon for Vulnerability assessment category

A vulnerability assessment is a systematic review and analysis process used to identify, quantify, and prioritize weaknesses within a system, network, or infrastructure to anticipate and mitigate potential security risks.

Web API security Small icon for Web API security category

Web API security involves implementing measures to protect the integrity, confidentiality, and availability of data exchanged between web applications and APIs, safeguarding against unauthorized access, data breaches, and other security threats.

Web application development fundamentals Small icon for Web application development fundamentals category

Web application development fundamentals cover the basic principles and practices for designing, building, and deploying web applications, including client-server architecture, coding, and user interface design.

Web application pentesting lab Small icon for Web application pentesting lab category

A collection of practical lab tasks on Web application pentesting. Web application security is critical as these applications often serve as prime targets for cyberattacks. It covers a comprehensive range of topics, including secure coding practices, input validation, session management, SQL injection prevention, cross-site scripting (XSS) mitigation, and other common vulnerabilities.

Web application security Small icon for Web application security category

Web application security is critical as these applications often serve as prime targets for cyberattacks. It covers a comprehensive range of topics, including secure coding practices, input validation, session management, SQL injection prevention, cross-site scripting (XSS) mitigation, and other common vulnerabilities.

Web application security - code challenges Small icon for Web application security - code challenges category

Understanding the source code, the ability to make modifications and create new code is an important skill in many IT areas. This opens up the possibility of working more effectively and solving a very wide range of problems.

Windows administration Small icon for Windows administration category

Windows is most popular Operating System for workstations in largest corporations and one of most popular Operating System for servers. It is crucial to understand its internals and be able to provide necessary configuration changes.

Windows administration lab Small icon for Windows administration lab category

A collection of practical lab tasks on Windows administration. Windows is most popular Operating System for workstations in largest corporations and one of most popular Operating System for servers. It is crucial to understand its internals and be able to provide necessary configuration changes.

Windows malware analysis lab Small icon for Windows malware analysis lab category

A collection of practical lab tasks on Windows malware analysis. Windows malware analysis is the process of examining and understanding malicious software that targets Windows operating systems. This involves identifying, dissecting, and analyzing the malware to determine its behavior, functionality, and potential impact. The goal is to detect infections, understand how the malware operates, and develop strategies to mitigate, prevent, and remove it from Windows systems.

Windows security Small icon for Windows security category

Windows is most popular Operating System for workstations in largest corporations and one of most popular Operating System for servers. It is crucial to understand its internals and be able to provide necessary configuration changes.

Windows security lab Small icon for Windows security lab category

A collection of practical lab tasks on Windows security. Windows is most popular Operating System for workstations in largest corporations and one of most popular Operating System for servers. It is crucial to understand its internals and be able to provide necessary configuration changes.

iOS OS security Small icon for iOS OS security category

iOS is a mobile operating system developed by Apple Inc. exclusively for its hardware. It is the operating system that powers many of the company's mobile devices, including the iPhone; the term also includes the system software for iPads (predating iPadOS, which was introduced in 2019) as well as on the iPod Touch devices. It is the world's second-most widely installed mobile operating system, after Android.

iOS application security Small icon for iOS application security category

iOS is a mobile operating system developed by Apple Inc. exclusively for its hardware. It is the operating system that powers many of the company's mobile devices, including the iPhone; the term also includes the system software for iPads (predating iPadOS, which was introduced in 2019) as well as on the iPod Touch devices. It is the world's second-most widely installed mobile operating system, after Android.

Question formats

Single choice

The Single Choice Question format is a popular and straightforward method of testing knowledge and understanding. In this format, participants are presented with a question and a set of multiple-choice options, but they are required to choose only one correct answer among the choices provided. This format encourages focused decision-making and tests the participant's ability to identify the most accurate response from the given options.

Status: Ready to use
Type: Theory

Multiple choice

The Multiple Choice Question format is a widely used and versatile method for assessing knowledge and understanding. In this format, participants are presented with a question and a set of options, typically consisting of three or more choices. Participants are required to select the most appropriate or correct answer(s) from the given options.

Status: Ready to use
Type: Theory

Categorization

The Categorization Question format involves assigning elements to different categories based on their attributes, characteristics, or relationships. In this format, participants are presented with a list of elements or items and a set of categories. Their task is to carefully analyze each element and assign it to the appropriate category or categories based on their own understanding.

Status: Ready to use
Type: Theory

True/False

The True/False Question format is a straightforward and concise method of assessing knowledge and understanding. In this format, participants are presented with a statement, and they are required to determine whether the statement is true or false. Participants must carefully evaluate the statement based on their knowledge and understanding of the topic at hand.

Status: Ready to use
Type: Theory

Explain Code

In this format, participants are presented with a piece of source code and given multiple options that describe what the code is expected to do. Their task is to carefully examine the code and select the most accurate option that represents the expected outcome or behavior of the given code snippet.

Status: Ready to use
Type: Practice
Supported languages: No limitations

Vulnerable Code Analysis

In this format, participants are presented with a piece of code and are required to assess its security implications, identifying potential weaknesses or vulnerabilities that could be exploited by attackers.

Status: Ready to use
Type: Practice
Supported languages: No limitations

Phishing Recognition

In this format, participants are presented with an email and are required to assess whether it is example of phishing attempt or not.

Status: Ready to use
Type: Practice

Write code

In this format, participants are provided with a problem statement or a task, along with any necessary input and output specifications. Their task is to write a concise and correct function in the specified programming language to accomplish the desired task.

Status: Ready to use
Type: Practice
Supported languages: Python3, PHP8, Bash, PowerShell7, Java, JavaScript, Perl and Ruby

Fix vulnerability

In this format, participants receive a snippet of source code along with any necessary input and output specifications. Their task is to make such changes to the presented code that security vulnerabilities are removed, but the basic functionality is preserved.

Status: Ready to use
Type: Practice
Supported languages: Python3, PHP8, Bash, PowerShell7, Java, JavaScript, Perl and Ruby

Practical laboratories

In this format, participants are provided with access to one or more virtual machines and set of tasks to perform in this environments.

Status: Ready to use
Type: Practice

Practical web application pentesting

In this format, participants are provided with access to web application with unknown set of vulnerabilities to perform real pentest in this environment to find as many vulnerabilities as possible.

Status: Under development
Type: Practice
Expected release date: Early 2025

Practical pentesting

In this format, participants are provided with access to infrastructure with unknown set of vulnerabilities to perform real pentest in this environment to find as many vulnerabilities as possible.

Status: Under development
Type: Practice
Expected release date: Spring 2025
Top Scroll top