Our website teaches users real life techniques and skills that are utilized in Cyber Security jobs. Regardless of background, any user from beginner to advanced has the opportunity to learn and gain knowledge about how to perform tasks like a Red Team would.

The Linux Basics, Steganography, Phishing, and Brute Force challenges are placed into Docker containers. Docker containers are lightweight, standalone, executable package of software that includes everything needed to run an application: code, runtime, system tools, system libraries and settings.


Andy Schuster

Steven Coll

Nadia Guidry

Mike Schmitt