{"status":"success","data":{"paths":[{"title":"AI Security","intro":"<p>AI is everywhere, and attackers know it. From poisoned training data to prompt injection, the threats targeting AI systems are real, evolving, and misunderstood. Whether you're defending an LLM-powered application or auditing an AI pipeline, this path gives you the knowledge to think like an AI security engineer.<p/>","banner":"https://tryhackme-images.s3.eu-west-1.amazonaws.com/path-icons/aisecurity.webp","image":"https://tryhackme-images.s3.eu-west-1.amazonaws.com/path-icons/aisecurity.webp","color":"#dddddd","taskNo":0,"description":"<p>AI is the new attack surface. Learn to break it, defend it, and secure it from the ground up.</p>\n<ul>\n  <li>Understand how AI systems are built and deployed</li>\n  <li>Attack and defend LLMs with prompt injection and jailbreaking</li>\n  <li>Secure AI supply chains and training data</li>\n  <li>Exploit OWASP LLM vulnerabilities against real agents</li>\n</ul>","summary":"Build a practical foundation in AI security. Learn how AI systems are built, where they break, and how to defend them.","code":"aisecurity","difficulty":"medium","rooms":0,"hours":0,"type":"regular","paid":false,"secondaryImage":"https://tryhackme-images.s3.eu-west-1.amazonaws.com/path-icons/aisecurity.webp","roomCodes":[],"created":"2026-04-30T11:01:09.240Z","id":"69d6511979a7e8db8bd9b87d","collaborator":[],"public":true},{"title":"Web Application Red Teaming","intro":"<p>So you have decided to venture into web application testing? You know the basics, you can find the vulnerabilities, but it still feels like something is missing. What you need, is a good exploitation methodology! Rather than simply finding vulnerabilities and calling it a day, this learning path teaches you the principles of practical exploitation or as we like to call it: Web Application Red Teaming. This path covers the key topics you need to understand in order to be able to take your web application pentesting methodology to that next level, such as:</p><ul><li>Advanced exploitation techniques</li><li>Creating custom tooling for exploits</li><li>Breaking through cryptographic layers</li><li>Chaining vulnerabilities to achieve a red team goal</li><li>Attacking LLMs and bypassing WAFs</li></ul><p>Completing this learning path will allow you to take your web application pentesting methodology to the next level and truly show the impact of discovered vulnerabilities.<p/>","banner":"https://assets.tryhackme.com/img/paths/web-application-red-teaming-learning.webp","image":"https://assets.tryhackme.com/img/paths/web-application-red-teaming-learning.webp","color":"#dddddd","taskNo":0,"description":"<p>Take your web pentesting to the next level by learning about practical exploitation and chains:</p><ul><li>Creating custom tooling for exploits</li><li>Breaking through cryptographic layers</li><li>Chaining vulnerabilities to achieve a red team goal</li><li>Attacking LLMs and Bypassing WAFs</li></ul>","summary":"Learn about the complex vulnerability chains and how to take your web application pentesting methodology from pure discovery to pure carnage through practical exploitation.","code":"webappredteaming","difficulty":"hard","rooms":0,"hours":0,"type":"regular","paid":false,"secondaryImage":"https://assets.tryhackme.com/img/paths/web-application-red-teaming-learning.webp","roomCodes":[],"created":"2026-04-30T11:01:09.240Z","id":"69209884c983731b982193e0","collaborator":[],"public":true},{"title":"Cyber Security 101","intro":"<p>This beginner-friendly path aims to give a solid introduction to the different areas in Computer Security. This path covers the fundamental concepts and applications in the following:</p>\n<ul>\n<li>Computer networking and cryptography</li>\n<li>MS Windows, Active Directory, and Linux basics</li>\n<li>Offensive security tools and system exploitation</li>\n<li>Defensive security solutions and tools</li>\n<li>Cyber security careers</li>\n</ul>","banner":"https://assets.tryhackme.com/img/paths/introtocybersecurity.png","image":"https://assets.tryhackme.com/img/paths/introtocybersecurity.svg","color":"#212C42","taskNo":0,"description":"<p>Learn everything you need to embark on a career path in offensive or defensive cyber security.</p><ul><li>Explore computer networking and cryptography</li><li>Learn the basics of Linux, Windows, and AD</li><li>Explore the world of offensive cyber security</li><li>Discover the techniques of defensive security</li></ul>","summary":"Are you new to cyber security and not sure where to start? This pathway will help you acquire the core skills required to start your cyber security journey.","code":"cybersecurity101","difficulty":"easy","rooms":0,"hours":0,"type":"regular","paid":false,"roomCodes":[],"created":"2024-10-10T20:21:04.785Z","id":"6708373055758b4d83f32880","collaborator":[],"public":true},{"title":"SOC Level 1","intro":"<p>The Security Operations Center (SOC) is a central hub for securing many large organizations, and junior analysts are among the most numerous and demanding roles in a SOC. In the analyst role, you will work with logs, triage and prioritize alerts, collaborate with your teammates and other departments, and be the first line of defense in reacting to cyber incidents. This comprehensive path covers the necessary technical and operational skills to make you a qualified, universal SOC analyst.</p>","banner":"https://assets.tryhackme.com/img/paths/SOCL1.svg","image":"https://assets.tryhackme.com/img/paths/SOCL1.svg","color":"#D6A60D","taskNo":0,"description":"<p>Learn the skills needed to jumpstart your career as a SOC Level 1 Analyst or Security Analyst.</p>\n<ul>\n<li style=\"text-align: left;\">Learn SOC tools and operations</li>\n<li style=\"text-align: left;\">Explore network and web attacks</li>\n<li style=\"text-align: left;\">Monitor endpoints for threats</li>\n<li style=\"text-align: left;\">Utilise SIEM to handle incidents</li>\n</ul>","summary":"This path introduces a wide array of essential defensive security topics and real-world analysis scenarios. By completing it, you will gain the knowledge and practical skills needed to become a successful SOC Level 1 Analyst, or to better structure your existing expertise if you are already working in the field.","code":"soclevel1","difficulty":"easy","rooms":0,"hours":0,"type":"regular","paid":false,"secondaryImage":"https://assets.tryhackme.com/img/paths/SOCL1.svg","roomCodes":[],"created":"2022-11-04T21:07:37.172Z","id":"6909de1cc0995784e118dba6","collaborator":[],"public":true},{"title":"Pre Security","intro":"To attack or defend any technology, you first need to understand what powers it. Explore computer basics, write your first lines of code, and discover how networking, the web, and real world cyber attacks all connect. Your cyber security journey starts here!","banner":"https://tryhackme.com/images/svgs/paths/presecuritynew.svg","image":"https://tryhackme.com/images/svgs/paths/presecuritynew.svg","color":"#212C42","taskNo":0,"description":"<p>Your first step into cyber. Learn how tech works, then think like an attacker and defender.</p><ul><li style=\"text-align: left;\">Explore how computers really work</li><li style=\"text-align: left;\">Write your first lines of code</li><li style=\"text-align: left;\">Step into networking and web basics</li><li style=\"text-align: left;\">Think like a hacker or defender</li></ul>","summary":"This path teaches you how technology works from the ground up, no prior experience needed. From computer basics and your first lines of code to networking, the web, and cyber attacks and defences, this is where your cyber security journey begins.","code":"presecurity","difficulty":"easy","rooms":0,"hours":0,"type":"regular","paid":false,"roomCodes":[],"created":"2026-02-19T10:25:06.970Z","id":"6996eb18cb59876fb6a16317","collaborator":[],"public":true},{"title":"Pre Security (Legacy)","intro":"<p>This path has been replaced by an expanded Pre Security path. We recommend switching to the new path for the best experience.</p>","banner":"https://tryhackme.com/images/svgs/paths/presecuritylegacy.svg","image":"https://tryhackme.com/images/svgs/paths/presecuritylegacy.svg","color":"#212C42","taskNo":0,"description":"<p>This path has been replaced by the new \"Pre Security\" learning path. Please enrol in the updated version. </p>","summary":"The original Pre Security path covered cyber security basics, networking, web technologies, and deep-dive Linux and Windows fundamentals. The new version is a major upgrade that starts earlier, teaching you how computers work from the inside out, and goes further with new modules on software fundamentals, introductory coding, and real-world attacks and defences. If you've already started or completed this path, your progress on shared modules is preserved. We encourage you to enrol in the updated Pre Security path for the best experience.","code":"presecuritylegacy","difficulty":"easy","rooms":0,"hours":0,"type":"regular","paid":false,"secondaryImage":"https://tryhackme.com/images/svgs/paths/presecuritylegacy.svg","roomCodes":[],"created":"2021-05-20T16:25:06.970Z","id":"60a68d627400860050984eaa","collaborator":[],"public":true},{"title":"Jr Penetration Tester","intro":"<p>This learning path covers the core technical skills that will allow you to succeed as a junior penetration tester. Upon completing this path, you will have the practical skills necessary to perform security assessments against web applications and enterprise infrastructure.</p>","banner":"https://assets.tryhackme.com/img/paths/jrpenetrationtester.png","image":"https://assets.tryhackme.com/img/paths/jrpenetrationtester.svg","color":"#3BBC1E","taskNo":0,"description":"<p>Learn the necessary skills to start a career as a penetration tester.</p><p></p><ul><li>Pentesting methodologies and tactics</li><li>Enumeration, exploitation and reporting</li><li>Realistic hands-on hacking exercises</li><li>Learn security tools used in the industry</li></ul>","summary":"Learn the practical skills required to start your career as a professional penetration tester.","code":"jrpenetrationtester","difficulty":"intermediate","rooms":0,"hours":0,"type":"regular","paid":false,"secondaryImage":"https://assets.tryhackme.com/img/paths/jrpenetrationtester.svg","roomCodes":[],"created":"2021-09-30T12:10:37.022Z","id":"6155a93d47b6d7004f305da9","collaborator":[],"public":true},{"title":"Red Teaming","intro":"<p>The aim of this pathway is to show you how to emulate a potential adversary attack in complex environments. Going beyond penetration testing, you will learn to conduct successful Red Team engagements and challenge the defence capability of your clients.</p><p>After completing this pathway, you will have the advanced skills needed to pursue new career opportunities in offensive security.<br></p>","banner":"https://assets.tryhackme.com/img/paths/redteaming.png","image":"https://assets.tryhackme.com/img/paths/redteaming.svg","color":"#3BBC1E","taskNo":0,"description":"<p>Learn the skills needed to become a Red Team Operator.</p><ul><li>Use diverse techniques for initial access</li><li>Enumerate and persist on targets</li><li>Evade security solutions</li><li>Exploit Active Directory</li></ul>","summary":"This learning path will teach you how to execute adversary attack emulations as a Red Team Operator.","code":"redteaming","difficulty":"hard","rooms":0,"hours":0,"type":"regular","paid":false,"secondaryImage":"https://assets.tryhackme.com/img/paths/redteaming.svg","roomCodes":[],"created":"2022-09-02T22:20:25.376Z","id":"631281a9c14d370049602171","collaborator":[],"public":true},{"title":"SOC Level 2","intro":"<p>The SOC Level 2 path aims to help you succeed in your SOC career. It will help you transition into a Level 2 position or strengthen the core technical skills you need to perform well in your current position, using hands-on, practical, and realistic scenarios.</p><ul><li>Through realistic scenarios, you will practice log analysis in-depth and acquire hands-on experience using various SIEM platforms.&nbsp;</li><li>The path will also cover detection engineering topics, allowing you to troubleshoot and fix detection, alerting, and logging issues.&nbsp;</li><li>Finally, you will learn essential technical skills to perform advanced Blue Teaming tasks, such as threat hunting and emulation, incident response, and malware analysis.&nbsp;<br></li></ul>","banner":"https://assets.tryhackme.com/img/paths/SOCL2-square.svg","image":"https://assets.tryhackme.com/img/paths/SOCL2-square.svg","color":"#D6A60D","taskNo":0,"description":"<div>Learn all the skills needed to take you to the next level in your SOC Analyst career.<br></div><ul>\n<li>Security operations</li>\n<li>Introductory incident response</li>\n<li>Malware analysis</li>\n<li>Threat hunting and threat emulation</li>\n</ul>","summary":"Completing this path will give you the technical skills required to succeed in and advance your Security Analyst career.","code":"soclevel2","difficulty":"intermediate","rooms":0,"hours":0,"type":"regular","paid":false,"secondaryImage":"https://assets.tryhackme.com/img/paths/SOCL2-square.svg","roomCodes":[],"created":"2023-10-02T13:43:07.182Z","id":"651ac8ebcf81cf6034a02e27","collaborator":[],"public":true},{"title":"Security Engineer","intro":"<p>Security Engineers are critical to every organization’s security.  Being a Security Engineer means designing secure systems, networks, and software, understanding threats and risks that can affect the organization, and being able to assist in responding to incidents. This path aims to give you an introduction to security engineering from various perspectives. No matter which speciality you choose as your cyber security career, understanding all elements is going to help you proactively identify and mitigate security risks, and play a crucial role in strengthening your company’s security posture. This path includes:</p><ol><li>Introductory topics, such as discussing career journeys available to Security Engineers and security fundamentals required to be successful in this role</li><li>Network, system, and software security engineering introductions, with a focus on security architecture, hardening, and understanding threats and vulnerabilities affecting these assets</li><li>Discussion on threats and risks, involving topics such as risk management and threat modelling, equipping you with the necessary analysis skills</li><li>Incident response skills important for Security Engineers, including understanding your role as a first responder and cyber crisis management.</li></ol>","banner":"https://assets.tryhackme.com/img/paths/security-engineer.png","image":"https://assets.tryhackme.com/img/paths/security-engineer.svg","color":"#D6A60D","taskNo":0,"description":"<div>Learn the skills required to jumpstart your career in security engineering.<br></div><ul>\n<li>Network security engineering</li>\n<li>System security engineering</li>\n<li>Software security engineering</li>\n<li>Risk management & responding to incidents</li>\n</ul>","summary":"Explore different areas of Security Engineering! Use this path to understand the foundations of building secure systems, networks, and software.","code":"security-engineer-training","difficulty":"easy","rooms":0,"hours":0,"type":"regular","paid":false,"secondaryImage":"https://assets.tryhackme.com/img/paths/security-engineer.svg","roomCodes":[],"created":"2023-09-11T12:39:10.033Z","id":"64ff0a6e487fd96e34ddea69","collaborator":[],"public":true},{"title":"DevSecOps","intro":"<p>TryHackMe's DevSecOps Learning Path focuses on securing pipelines and introducing Infrastructure as Code (IaC) and Containerisation security techniques. You’ll learn the tools and practices to ensure robust development processes and secure software deployment workflows. From fortifying pipelines to automating infrastructure management, you will gain practical insights into modern DevSecOps methodologies.</p>","banner":"https://assets.tryhackme.com/img/paths/devsecops.png","image":"https://assets.tryhackme.com/img/paths/devsecops.svg","color":"#1153E4","taskNo":0,"description":"<p>Acquire specialization in DevSecOps or broaden your understanding of product security.</p><ul><li>Hands-on CI/CD Pipeline Security</li><li>Introduction to Securing IaC</li><li>Containerisation Security</li><li>Applications of DevSecOps Frameworks</li></ul>","summary":"Learn how to secure modern software development environments with hands-on learning around secure deployments, CI/CD and automation security.","code":"devsecops","difficulty":"intermediate","rooms":0,"hours":0,"type":"regular","paid":false,"secondaryImage":"https://assets.tryhackme.com/img/paths/devsecops.svg","roomCodes":[],"created":"2024-02-26T22:56:35.135Z","id":"65dd1723afddaa6d54a424e5","collaborator":[],"public":true},{"title":"Advanced Endpoint Investigations","intro":"In this path, you’ll dive deep into advanced endpoint investigation techniques. You’ll gain practical experience conducting forensic investigations across Windows, Linux, macOS, and mobile devices using industry standard tools. Focusing on memory analysis, disk forensics, artifact extraction, and system triage, you’ll develop the skills needed to uncover attacker activity, trace persistence, and respond to complex threats. Through a mix of theoretical content and hands on labs, you’ll build cross platform investigative workflows that mirror real world incident response. By the end, you’ll be equipped with the technical confidence and forensic fluency needed to lead investigations across diverse environments.","banner":"https://assets.tryhackme.com/img/paths/advancedendpointinvestigations.png","image":"https://assets.tryhackme.com/img/paths/advancedendpointinvestigations.svg","color":"#1153E4","taskNo":0,"description":"<p>Investigate endpoint threats across Windows, Linux, macOS, and mobile platforms using memory, disk, and file system forensics.</p> <ul> <li style=\"text-align: left;\">Master Windows, Linux, macOS, mobile and disk investigation techniques</li> <li style=\"text-align: left;\">Investigate live memory and cold disk images for signs of compromise</li> <li style=\"text-align: left;\">Learn file system analysis and forensics with hands-on labs covering MBR, GPT, FAT32, NTFS, EXT and file carving </li> <li style=\"text-align: left;\">Use tools like Volatility, KAPE, SleuthKit, and ALEAPP in real world scenarios</li> </ul>","summary":"Modern threats don’t stop at logs and neither should you. This path prepares analysts to investigate across real world endpoints using disk images, memory dumps, and OS specific artifacts. With guided labs and challenge rooms, you’ll develop the skills to pivot between operating systems, uncover hidden attacker behavior, and respond with confidence under pressure.","code":"advancedendpointinvestigations","difficulty":"hard","rooms":0,"hours":0,"type":"regular","paid":false,"secondaryImage":"https://assets.tryhackme.com/img/paths/advancedendpointinvestigations.svg","roomCodes":[],"created":"2025-04-14T00:00:00.000Z","id":"6863de31ad9de6f999bc24eb","collaborator":[],"public":true},{"title":"Defending Azure","intro":"In this path, you'll dive deep into Microsoft Azure security. You'll gain practical experience with security operations using Microsoft Sentinel and Defender, focusing on threat detection, incident response, and vulnerability management. Through a mix of theoretical content and hands-on exercises, you'll develop the skills needed to protect Azure environments from a variety of attack vectors while honing your ability to both defend and assess the security of cloud infrastructures. By the end, you'll understand Azure security best practices and the tools needed to secure modern cloud environments.","banner":"https://assets.tryhackme.com/img/paths/azuresecurity.png","image":"https://assets.tryhackme.com/img/paths/azuresecurity.svg","color":"#1153E4","taskNo":0,"description":"<p>Master Azure security with hands-on exercises covering Azure-native security tooling.</p><ul><li style=\"text-align: left;\">Master KQL for threat detection and analysis</li><li style=\"text-align: left;\">Use Sentinel for security monitoring and response</li><li style=\"text-align: left;\">Leverage Defender for endpoint protection</li><li style=\"text-align: left;\">Use advanced Sentinel features for analysis</li></ul>","summary":"In this path, you'll gain hands-on experience with key Azure security tools, including Microsoft  Sentinel, KQL, and Defender. Through this training, you'll master essential skills to detect, prevent, and respond to security threats in Azure Cloud.","code":"azuresecurity","difficulty":"intermediate","rooms":0,"hours":0,"type":"cloud","paid":true,"secondaryImage":"https://assets.tryhackme.com/img/paths/azuresecurity.svg","roomCodes":[],"created":"2025-04-14T00:00:00.000Z","id":"67fce5fddf0b7e4b0f685f01","collaborator":[],"public":true},{"title":"Attacking and Defending AWS","intro":"<p>Amazon Web Services is the most popular cloud service provider in the world offering hundreds of services. With a large number of businesses adopting cloud technologies like AWS, cyber practitioners must understand the security implications of moving to the cloud.<br><br>This pathway will give you hands on access with common misconfigurations across AWS environments and understand defensive mitigations to prevent these attacks including</p><ul><li>identifying, enumerating and exploiting overly permissive IAM users, roles and policies</li><li>exploring serverless infrastructure and common attack vectors present within these services</li><li>exploiting weaknesses in the most common AWS services including S3, EC2, VPC and more</li></ul>","banner":"https://assets.tryhackme.com/img/paths/attacking-and-defending-aws.png","image":"https://assets.tryhackme.com/img/paths/aws-cloud-security-pathway-image-rectangle.svg","color":"#1153E4","taskNo":0,"description":"<p>Learn how attackers compromise AWS environments.</p><ul><li style=\"text-align: left;\">Compromise EC2 instances</li><li style=\"text-align: left;\">Reduce the privileges of policies</li><li style=\"text-align: left;\">Abuse Lambda Authorizers</li><li style=\"text-align: left;\">Enumerate IAM users</li></ul>","summary":"Emulate attackers’ tools and techniques to compromise AWS services and understand defensive mitigations to prevent these attacks.","code":"attackinganddefendingaws","difficulty":"intermediate","rooms":0,"hours":0,"type":"cloud","paid":true,"secondaryImage":"https://assets.tryhackme.com/img/paths/aws-cloud-security-pathway-image-rectangle.svg","roomCodes":[],"created":"2023-04-27T11:07:37.172Z","id":"644a5ff2840e1c385b1d925c","collaborator":[],"public":true},{"title":"Offensive Pentesting","intro":"<p>No matter where you are, the skills and requirements for a penetration tester will be the same. You’ll be required to have a good understanding of various aspects within information security including web applications, networks and sometimes even low level technology like assembly. A good understanding of these technologies is essential to learning how to exploit them.</p><p><span>The aim of this path is to make you ready for real world penetration testing by teaching you how to use industry standard tools along with a methodology to find vulnerabilities in machines. By the time you complete this path, you will be well prepared for interviews and jobs as a penetration tester. To complete this path you should have a basic to medium understanding of computing.</span><br></p><p>You can use this pathway to help you acquire the skills needed to go and get certified by well known certifiers in the security industry.<br></p>","banner":"https://assets.tryhackme.com/img/paths/offensivepentesting.png","image":"https://assets.tryhackme.com/img/paths/offensivepentesting.svg","color":"#3BBC1E","taskNo":0,"description":"<p>Prepare yourself for real world penetration testing.</p><ul><li>Utilise industry standard tools</li><li>Learn realistic attack scenarios</li><li>Train in offensive security</li><li>Supporting exercises &amp; resources</li></ul>","summary":"Acquire the skills needed to go and get certified by well known certifiers in the security industry. Learn about industry-used penetration testing tools and attain techniques to become a successful penetration tester.","code":"pentesting","difficulty":"intermediate","rooms":0,"hours":0,"type":"regular","paid":false,"secondaryImage":"https://assets.tryhackme.com/img/paths/offensivepentesting.svg","roomCodes":[],"created":"2019-07-25T14:55:01.665Z","id":"5d39c2c57c5b877bc8754cd4","collaborator":[],"public":true},{"title":"Web Fundamentals","intro":"<p>The aim of this path is to teach you how to attack web applications. To successfully attack and exploit web applications, you need to understand how they work. The first section (Web Fundamentals) will give you all the pre-requisite knowledge on this.&nbsp;</p><p>The second section (Security Tools) focuses on learning how to use Industry Standard tooling to interact with your targets.&nbsp;</p><p>The third section (Vulnerabilities) covers various vulnerabilities found in web applications today. This section will go over root causes of these vulnerabilities and give you hands on experience on exploiting them.</p><p>The final section (Practise Makes Perfect) will help you apply what you've learnt in previous sections.</p><p>After completing this path, you should be able to:</p><ul><li>understand how web applications work</li><li>utilise industry standard tooling when attacking web applications</li><li>explain and exploit common web vulnerabilities</li><li>apply this knowledge to other targets (be it within an interview or a professional web applications security assessment)</li></ul>","banner":"https://assets.tryhackme.com/img/paths/web.png","image":"https://assets.tryhackme.com/img/paths/web.svg","color":"#3BBC1E","taskNo":0,"description":"<p>A pathway to web application security.</p><ul><li style=\"text-align: left;\">Understand web fundamentals</li><li style=\"text-align: left;\">Major vulnerabilities explained</li><li style=\"text-align: left;\">Learn industry-used tools</li><li style=\"text-align: left;\">Web application assessments</li></ul>","summary":"Learn how to attack web applications through interactive and real-world exercises.","code":"web","difficulty":"easy","rooms":0,"hours":0,"type":"regular","paid":false,"secondaryImage":"https://assets.tryhackme.com/img/paths/web.svg","roomCodes":[],"created":"2019-04-07T21:07:37.172Z","id":"5caa669923e449437579974c","collaborator":[],"public":true},{"title":"Web Application Pentesting","intro":"<p>Every day you interact with web applications. Just reading the information here means you are using a web application! Understanding how to test web applications is a critical skill required by almost every pentester! Even if you want to specialise in testing other systems like networks or cloud, a solid baseline in web application testing will greatly assist you on this journey. This path covers key topics that you need to understand for web application testing, such as:</p>\n<ul>\n<li>Authentication Attacks</li>\n<li>Injection Attacks</li>\n<li>Advanced Server-Side Attacks</li>\n<li>Advanced Client-Side Attacks</li>\n<li>HTTP Request Smuggling</li>\n</ul>\n<p>Completing this learning path will allow you to learn and become a great web application penetration tester.</p>\n<!-- notionvc: 38021ca8-5fe1-4aed-bcdd-794a2416ec63 -->","banner":"https://assets.tryhackme.com/img/paths/webapppentesting.png","image":"https://assets.tryhackme.com/img/paths/webapppentesting.svg","color":"#801a2f","taskNo":0,"description":"<p>Learn how to perform security assessments of web applications.</p>\n<ul>\n<li>Learn about common web vulnerabilities</li>\n<li>Understand web authentication mechanisms</li>\n<li>Perform server- and client-side exploits</li>\n<li>Understand the remedies for web vulnerabilities</li>\n</ul>\n<!-- notionvc: 01f4aaa3-13fd-481e-b876-317606f786cf --><!-- notionvc: cf7c3ea7-cab3-44af-8c7b-b41efa087495 -->","summary":"Learn about the various vulnerabilities that can exist in web application and how to perform security assessments of web applications.","code":"webapppentesting","difficulty":"intermediate","rooms":0,"hours":0,"type":"regular","paid":false,"roomCodes":[],"created":"2024-11-12T19:39:49.243Z","id":"6733af054ee9e2fef4e6b11a","collaborator":[],"public":true},{"title":"CompTIA Pentest+","intro":"<p>This PenTest+ pathway allows individuals to practice the majority of practical skills required for the CompTIA PenTest+ exam. In this you will learn about</p><ul><li>Industry standard penetration testing tools</li><li>Identifying and exploiting different network services</li><li>Exploiting web applications through today’s most common vulnerabilities</li><li>Understanding Windows active directory and attacking Kerberos</li><li>Post exploitation techniques (with Powerview, Bloodhound and Mimikatz)</li></ul><p><a href=\"https://www.comptia.org/certifications/pentest?rel=tryhackme\" target=\"_blank\">CompTIA PenTest+</a> is for cybersecurity professionals tasked with penetration testing and vulnerability management.<br></p>","banner":"https://assets.tryhackme.com/img/paths/comptiapentest.png","image":"https://assets.tryhackme.com/img/paths/comptiapentest.svg","color":"#3BBC1E","taskNo":0,"description":"<p>Learn the practical skills and prepare to ace the Pentest+ exam.</p><ul><li>Hands-on exercises aligning to PenTest+ exam objectives</li><li>Practical exam preparation to help you with the Performance Based Questions</li></ul>","summary":"CompTIA PenTest+ is for cybersecurity professionals tasked with penetration testing and vulnerability management. Use this pathway as supporting content and pre-preparation for the CompTIA certification exam.","code":"pentestplus","difficulty":"novice","rooms":0,"hours":0,"type":"regular","paid":false,"secondaryImage":"https://assets.tryhackme.com/img/paths/comptiapentest.svg","roomCodes":[],"created":"2020-04-27T14:48:05.420Z","id":"5ea6f0a5b04f522dea750775","collaborator":[],"public":true}],"modules":[{"_id":"5fb8602304c12aa15e36064b","id":6,"title":"Windows Exploitation Basics","summary":"Hacking Windows is often daunting. Grasp the fundamentals of core Windows concepts and Active Directory vulnerabilities.","moduleURL":"hacking-windows-1","image":"https://assets.tryhackme.com/img/modules/hacking-windows.png","rooms":7,"tags":["fundamental"],"collaborator":[]},{"_id":"614e084c437056aee28b140a","id":1,"title":"Metasploit","summary":"Metasploit is the most widely used exploitation framework. Learn how to use it and unlock its full potential.","moduleURL":"metasploit","image":"https://assets.tryhackme.com/img/modules/metasploit.png","rooms":3,"tags":["offensive"],"collaborator":[]},{"_id":"61376da3437056aee2640c42","id":2,"title":"Introduction to Pentesting","summary":"Understand what a penetration test involves, including testing techniques and methodologies every pentester should know.","moduleURL":"introduction-to-offensive-pentesting","image":"https://assets.tryhackme.com/img/modules/intro-to-offensive-pentesting.png","rooms":2,"tags":["fundamental","offensive"],"collaborator":[]},{"_id":"5fb850f904c12aa15e2ae320","id":3,"title":"Network Exploitation Basics","summary":"Understand, enumerate and attack various networking services in real-world environments.","moduleURL":"intro-to-networking","image":"https://assets.tryhackme.com/img/modules/intro-to-networking.png","rooms":4,"tags":["offensive"],"collaborator":[]},{"_id":"5fb8600204c12aa15e35eb8a","id":5,"title":"Cryptography","summary":"Cryptography is essential in security. Learn how it's used to preserve integrity and confidentiality of sensitive information.","moduleURL":"cryptography","image":"https://assets.tryhackme.com/img/modules/cryptography.png","rooms":3,"tags":["fundamental"],"collaborator":[]},{"_id":"5ff4ea06c47755750aab8515","id":10,"title":"Security Operations & Monitoring","summary":"Learn how to configure and utilise tooling to ensure that suspicious activity is quickly identified and dealt within your environment.","moduleURL":"security-operations-and-monitoring","image":"https://assets.tryhackme.com/img/modules/security_operations_and_monitoring.png","rooms":7,"tags":["defensive"],"collaborator":[]},{"_id":"5ff4eb6cc47755750aacb921","id":11,"title":"Threat Emulation","summary":"The best way to understand how attackers work is to get hands-on experience with their techniques.","moduleURL":"threat-emulation-old","image":"https://assets.tryhackme.com/img/modules/threat-emulation.png","rooms":2,"tags":["defensive"],"collaborator":[]},{"_id":"60994876a2323e2d0e1252a1","id":2,"title":"How The Web Works","summary":"To become a better hacker it's vital to understand the underlying functions of the world wide web and what makes it work.","moduleURL":"how-the-web-works","image":"https://tryhackme-images.s3.amazonaws.com/modules/gamified-paths-module-3.png","rooms":4,"tags":["fundamental"],"collaborator":[]},{"_id":"5ff4ed45c47755750aae113a","id":13,"title":"Malware Analysis","summary":"Analyse malicious files to prevent malicious actions and identify attacks.","moduleURL":"malware-analysis-old","image":"https://assets.tryhackme.com/img/modules/malware-analysis.png","rooms":5,"tags":["defensive"],"collaborator":[]},{"_id":"60cf421a437056aee2bed66d","id":17,"title":"Network Fundamentals","summary":"Learn the core concepts of how computers communicate with each other and types of network weaknesses.","moduleURL":"network-fundamentals","image":"https://tryhackme-images.s3.amazonaws.com/modules/gamified-paths-module-2.png","rooms":5,"tags":["fundamental"],"collaborator":[]},{"_id":"5fb8607404c12aa15e363b84","id":8,"title":"Basic Computer Exploitation","summary":"Strengthen your skills by exploiting a range of different applications and services, from networking to web to privilege escalation.","moduleURL":"basic-computer-exploitation","image":"https://assets.tryhackme.com/img/modules/basic-computer-exploitation.png","rooms":4,"tags":["offensive"],"collaborator":[]},{"_id":"61bf657c437056aee27ab6f6","id":1,"title":"Phishing Analysis","summary":"Learn how to analyse and defend against phishing emails. Investigate real-world phishing attempts using a variety of techniques.","moduleURL":"phishing","image":"https://assets.tryhackme.com/img/modules/phishing.png","rooms":6,"tags":["defensive"],"collaborator":[]},{"_id":"5ff4ec77c47755750aad8452","id":12,"title":"Incident Response and Forensics","summary":"Incidents are inevitable. Learn how to identify and respond to them.","moduleURL":"incident-response-and-forensics","image":"https://assets.tryhackme.com/img/modules/incident-response-and-forensics.png","rooms":7,"tags":["defensive"],"collaborator":[]},{"_id":"60dbbd66437056aee2bcfcb3","id":19,"title":"Windows Fundamentals","summary":"Get hands-on access to Windows and it's security controls. These basics will help you in identifying, exploiting and defending Windows.","moduleURL":"windows-fundamentals","image":"https://tryhackme-images.s3.amazonaws.com/modules/gamified-paths-module-5.png","rooms":3,"tags":["fundamental"],"collaborator":[]},{"_id":"613a704d437056aee2c815e7","id":1,"title":"Burp Suite","summary":"Burp Suite is the industry standard tool for web application hacking, and is essential in any web penetration test.","moduleURL":"learn-burp-suite","image":"https://assets.tryhackme.com/img/modules/burp-suite.png","rooms":5,"tags":["offensive"],"collaborator":[]},{"_id":"5fb84d7104c12aa15e28a2e1","id":2,"title":"Linux Fundamentals","summary":"Many servers and security tools use Linux. Learn how to use the Linux operating system, a critical skill in cyber security.","moduleURL":"linux-fundamentals","image":"https://tryhackme-images.s3.eu-west-1.amazonaws.com/module-icons/1773338347203-linux.png","rooms":3,"tags":["fundamental"],"collaborator":[]},{"_id":"5fb85fe504c12aa15e35d704","id":4,"title":"Web Hacking Fundamentals","summary":"Understand the core security issues with web applications, and learn how to exploit them using industry tools and techniques.","moduleURL":"web-hacking-1","image":"https://assets.tryhackme.com/img/modules/web-hacking-fundamentals.png","rooms":7,"tags":["fundamental"],"collaborator":[]},{"_id":"616dde8b437056aee2073cff","id":2,"title":"Privilege Escalation","summary":"Learn the fundamental techniques that will allow you to elevate account privileges in Linux and windows systems.","moduleURL":"privilege-escalation","image":"https://assets.tryhackme.com/img/modules/privilege-escalation-and-shells.png","rooms":3,"tags":["offensive"],"collaborator":[]},{"_id":"5fb8604904c12aa15e361dae","id":7,"title":"Shells and Privilege Escalation","summary":"Once you have initial access on a machine, learn how to escalate your account privileges to root.","moduleURL":"privilege-escalation-and-shells","image":"https://assets.tryhackme.com/img/modules/privilege-escalation-and-shells.png","rooms":3,"tags":["offensive"],"collaborator":[]},{"_id":"6148aed0437056aee2a3eb7a","id":3,"title":"Vulnerability Research","summary":"Familiarise yourself with the skills, research methods, and resources used to exploit vulnerable applications and systems.","moduleURL":"vulnerability-research","image":"https://assets.tryhackme.com/img/modules/vuln-bug-1.png","rooms":3,"tags":["offensive"],"collaborator":[]},{"_id":"61643920437056aee2db9697","id":1,"title":"Network Security","summary":"Learn the basics of passive and active network reconnaissance. Understand how common protocols work and their attack vectors.","moduleURL":"network-security","image":"https://assets.tryhackme.com/img/modules/network-security.png","rooms":9,"tags":["offensive"],"collaborator":[]},{"_id":"5ff4e5cfc47755750aa7acb6","id":9,"title":"Threat and Vulnerability Management","summary":"Identify how attackers are developing their techniques to use in your defensive strategy.","moduleURL":"threat-and-vulnerability-management","image":"https://assets.tryhackme.com/img/modules/threat-and-vulnerability-management.png","rooms":6,"tags":["defensive"],"collaborator":[]},{"_id":"61032e9c437056aee2a35712","id":20,"title":"Scripting for Pentesters","summary":"Learn to use PowerShell and Python in different stages of a penetration test and take your pentesting craft to the next level.","moduleURL":"scripting-for-pentesters","image":"https://assets.tryhackme.com/img/modules/scripting-for-pentesters.png","rooms":4,"tags":["offensive"],"collaborator":[]},{"_id":"61578e98437056aee26ce851","id":1,"title":"Introduction to Web Hacking","summary":"Get hands-on, learn about and exploit some of the most popular web application vulnerabilities seen in the industry today.","moduleURL":"intro-to-web-hacking","image":"https://assets.tryhackme.com/img/modules/walking-the-web.png","rooms":11,"tags":["fundamental"],"collaborator":[]},{"_id":"61644ddc437056aee2f91e1e","id":1,"title":"Nmap","summary":"Learn how to leverage the Nmap network scanner to discover live hosts and open ports using basic and advanced scan options.","moduleURL":"nmap","image":"https://assets.tryhackme.com/img/modules/nmap.png","rooms":4,"tags":["offensive"],"collaborator":[]},{"_id":"61bb4f0e437056aee23ba4cf","id":1,"title":"Initial Access","summary":"Explore the different techniques to gain initial access to a target system and network from a Red Teamer’s perspective.","moduleURL":"red-team-initial-access","image":"https://assets.tryhackme.com/img/modules/initial-access.png","rooms":4,"tags":["offensive"],"collaborator":[]},{"_id":"6207c0f7437056aee2f374bc","id":3,"title":"Cyber Security Awareness","summary":"Become cyber aware and protect yourself from common security attacks by working through interactive real-world scenarios.","moduleURL":"cyber-security-awareness","image":"https://assets.tryhackme.com/img/modules/security-awareness.png","rooms":2,"tags":["fundamental"],"collaborator":[]},{"_id":"622737dc437056aee23e1359","id":1,"title":"Red Team Fundamentals","summary":"Learn the core components of a red team engagement, from threat intelligence to OPSEC and C2s.","moduleURL":"red-team-fundamentals","image":"https://assets.tryhackme.com/img/modules/red-team-fundamentals.png","rooms":5,"tags":["fundamental","offensive"],"collaborator":[]},{"_id":"6275542a437056aee20d1093","id":2,"title":"Network Security Evasion","summary":"Learn how to bypass and evade different security solutions used in the industry, such as firewalls and IDS/IPS.","moduleURL":"network-security-evasion","image":"https://assets.tryhackme.com/img/modules/network-security-evasions.png","rooms":3,"tags":["offensive"],"collaborator":[]},{"_id":"6266c18f437056aee2c357fd","id":1,"title":"Introduction to Offensive Security","summary":"Understand what Offensive Security entails, and practice breaking into computer systems by exploiting applications and networks.","moduleURL":"introduction-to-offensive-security","image":"https://assets.tryhackme.com/img/modules/intro-to-offensive.png","rooms":3,"tags":["fundamental","offensive"],"collaborator":[]},{"_id":"627c4edf437056aee25d7385","id":1,"title":"Introduction to Defensive Security","summary":"Learn Defensive Security by using digital forensics in an investigation and applying security operations to stop a live cyber attack.","moduleURL":"introduction-to-defensive-security","image":"https://assets.tryhackme.com/img/modules/intro-to-defensive.png","rooms":2,"tags":["fundamental"],"collaborator":[]},{"_id":"6272e508437056aee21567e4","id":5,"title":"Introduction to Cyber Security","summary":"Understand what is offensive and defensive security, and learn about careers available in cyber.","moduleURL":"introduction-to-cyber-security","image":"https://tryhackme-images.s3.amazonaws.com/modules/gamified-paths-module-1.png","rooms":3,"tags":["fundamental"],"collaborator":[]},{"_id":"626fd80f437056aee2f86791","id":1,"title":"Recent Threats","summary":"Learn about the latest industry threats. Get hands-on experience identifying, exploiting, and mitigating critical vulnerabilities.","moduleURL":"recent-threats","image":"https://assets.tryhackme.com/img/modules/web-vulnerabilities.png","rooms":30,"tags":["offensive","defensive"],"collaborator":[]},{"_id":"62c491d4437056aee2c41ff8","id":1,"title":"Compromising Active Directory","summary":"Learn and exploit Active Directory networks through core security issues stemming from misconfigurations.","moduleURL":"hacking-active-directory","image":"https://assets.tryhackme.com/img/modules/hacking-windows.png","rooms":7,"tags":["fundamental","offensive"],"collaborator":[]},{"_id":"62fb6d8f437056aee2b89b6d","id":2,"title":"Post Compromise","summary":"Learn about the steps taken by an attacker right after gaining an initial foothold on a network.","moduleURL":"post-compromise","image":"https://tryhackme.com/img/modules/post-exploitation.png","rooms":6,"tags":["offensive"],"collaborator":[]},{"_id":"63123002437056aee23a1f3c","id":1,"title":"Host Evasions","summary":"Understand the techniques behind host-based security and bypass the most common security products in Windows operating systems.","moduleURL":"host-evasions","image":"https://tryhackme.com/img/modules/host-evasions.png","rooms":11,"tags":["offensive"],"collaborator":[]},{"_id":"633c416466638c250cc6faeb","id":2,"title":"Cyber Defence Frameworks (legacy)","summary":"Discover frameworks and policies that help establish a good security posture. Learn how organisations use these in defensive strategies.","moduleURL":"cyber-defence-frameworks-legacy","image":"https://assets.tryhackme.com/img/modules/cyber-defence.png","rooms":8,"tags":["fundamental","defensive"],"collaborator":[]},{"_id":"634d86e866638c250c331df6","id":3,"title":"Cyber Threat Intelligence","summary":"Learn about identifying and using available security knowledge to mitigate and manage potential adversary actions.","moduleURL":"cyber-threat-intelligence","image":"https://assets.tryhackme.com/img/modules/cyber-threat-intelligence.png","rooms":7,"tags":["defensive"],"collaborator":[]},{"_id":"6365455666638c250c13c7d4","id":3,"title":"Network Security and Traffic Analysis","summary":"Understand the core concepts of Network Security and Traffic Analysis to spot and probe network anomalies using industry tools and techniques.","moduleURL":"network-security-and-traffic-analysis","image":"https://assets.tryhackme.com/img/modules/network-security-traffic-analysis.png","rooms":15,"tags":["fundamental","defensive"],"collaborator":[]},{"_id":"63498fa566638c250cce603a","id":2,"title":"Digital Forensics and Incident Response","summary":"Understand what forensic artifacts are present in the Windows and Linux Operating Systems, how to collect them, and leverage them to investigate security incidents.","moduleURL":"digital-forensics-and-incident-response","image":"https://assets.tryhackme.com/img/modules/digital-forensics-and-incident-response.png","rooms":15,"tags":["fundamental","defensive"],"collaborator":[]},{"_id":"634564b566638c250c28201c","id":2,"title":"Wireshark","summary":"Wireshark is the industry-standard tool for network protocol analysis and is essential in any kind of traffic investigation.","moduleURL":"wireshark","image":"https://assets.tryhackme.com/img/modules/wireshark.png","rooms":3,"tags":["fundamental"],"collaborator":[]},{"_id":"634d413766638c250c6bde61","id":12,"title":"Snort","summary":"Snort is the most widely used Open Source Intrusion Detection & Prevention System and is essential in defining malicious network activity.","moduleURL":"snort","image":"https://assets.tryhackme.com/img/modules/snort.png","rooms":3,"tags":["defensive"],"collaborator":[]},{"_id":"6365475666638c250c18e010","id":3,"title":"Security Information and Event Management","summary":"Understand how SIEM works and get comfortable creating simple and advanced search queries to look for specific answers from the ingested logs.","moduleURL":"security-information-event-management","image":"https://assets.tryhackme.com/img/modules/security-information-event-management.png","rooms":7,"tags":["fundamental","defensive"],"collaborator":[]},{"_id":"634ea01466638c250c80b571","id":2,"title":"Endpoint Security Monitoring","summary":"Monitoring activity on workstations is essential, as that’s where adversaries spend the most time trying to achieve their objectives.","moduleURL":"endpoint-security-monitoring","image":"https://assets.tryhackme.com/img/modules/endpoint-security-monitoring.png","rooms":9,"tags":["offensive"],"collaborator":[]},{"_id":"64494080840e1c385bd11238","id":1,"title":"Introduction to AWS","summary":"Learn about the unique characteristics associated with cloud technologies and core fundamentals required to use AWS.","moduleURL":"introduction-to-aws","image":"https://assets.tryhackme.com/img/intro-to-aws.png","rooms":2,"tags":["aws-introduction"],"collaborator":[]},{"_id":"644944e0840e1c385be42431","id":3,"title":"Attacking and Defending Core Services","summary":"Explore security misconfiguration on commonly used AWS services, including EC2, S3, VPC and more","moduleURL":"attacking-defending-core-services","image":"https://assets.tryhackme.com/img/core-services-icon.png","rooms":4,"tags":["aws-core-services"],"collaborator":[]},{"_id":"6449472d840e1c385bee00ac","id":5,"title":"IAM Privilege Escalation","summary":"Put your understanding of IAM to practice by covering key concepts required to enumerate, exploit and persist across IAM.","moduleURL":"iam-privilege-escalation","image":"https://assets.tryhackme.com/img/iam-priv-esc-icon.png","rooms":2,"tags":["iam-privilege-escalation"],"collaborator":[]},{"_id":"64494387840e1c385bdeaa92","id":1,"title":"Introduction to IAM","summary":"Understand the parts of the identity and access management service to set a good foundation for attacking and defending this service.","moduleURL":"introduction-to-iam","image":"https://assets.tryhackme.com/img/iam-module-icon.png","rooms":6,"tags":["iam-introduction"],"collaborator":[]},{"_id":"64494656840e1c385bea77ad","id":4,"title":"Attacking and Defending Serverless","summary":"Serverless technologies are popular when designing infrastructure. Work with various AWS components to understand how they can be exploited.","moduleURL":"attacking-defending-serverless","image":"https://assets.tryhackme.com/img/serverless-icon.png","rooms":3,"tags":["aws-serverless"],"collaborator":[]},{"_id":"649207d82a97f1193ed4856a","id":8,"title":"Detection Engineering","summary":"Understand various threat detection methodologies, rule syntax and tools, and learn how to apply them in a SOC environment.","moduleURL":"detection-engineering","image":"https://assets.tryhackme.com/img/modules/detection-engineering.png","rooms":7,"tags":["defensive"],"collaborator":[]},{"_id":"6494ac602a97f1193e6ff914","id":2,"title":"Software Security","summary":"Understand how security integrates into the development process of an application, and learn how to mitigate common vulnerabilities in web applications.","moduleURL":"software-security","image":"https://assets.tryhackme.com/img/modules/software-security.png","rooms":9,"tags":["fundamental"],"collaborator":[]},{"_id":"64d5142e2a97f1193e468e9a","id":6,"title":"Tools and Code Analysis","summary":"Explore penetration testing tools like Metasploit, Wireshark, and Burp Suite. Furthermore, discover using Python for penetration testing.","moduleURL":"tools-and-code-analysis","image":"https://assets.tryhackme.com/img/modules/tools-and-code-analysis.png","rooms":6,"tags":["fundamental"],"collaborator":[]},{"_id":"64d514262a97f1193e466964","id":6,"title":"Planning and Scoping","summary":"Start your journey by learning about penetration testing fundamentals and red team engagements.","moduleURL":"planning-and-scoping","image":"https://assets.tryhackme.com/img/modules/web-vulnerabilities.png","rooms":3,"tags":["fundamental"],"collaborator":[]},{"_id":"64d514382a97f1193e46add0","id":6,"title":"Information Gathering and Vulnerability Scanning","summary":"Explore passive and active reconnaissance, and discover how to use Nmap to collect information about your targets efficiently.","moduleURL":"information-gathering-and-vulnerability-scanning","image":"https://assets.tryhackme.com/img/modules/application-vulnerabilities.png","rooms":5,"tags":["fundamental"],"collaborator":[]},{"_id":"64d514412a97f1193e46da8c","id":6,"title":"Attacks and Exploits","summary":"Discover the various attacks and exploits that can be used against web applications, MS Windows, MS Active Directory, and Linux.","moduleURL":"attacks-and-exploits","image":"https://assets.tryhackme.com/img/modules/basic-computer-exploitation.png","rooms":11,"tags":["fundamental"],"collaborator":[]},{"_id":"64d81cf22a97f1193ea5d457","id":5,"title":"Introduction to Security Engineering","summary":"Acquire the foundations for security engineering. Learn about security principles, cryptography fundamentals, and identity management basics.","moduleURL":"introduction-to-security-engineering","image":"https://assets.tryhackme.com/img/modules/introduction-to-security-engineering.png","rooms":4,"tags":["fundamental"],"collaborator":[]},{"_id":"64ff03cc04e4d04278e2a045","id":3,"title":"Threats and Risks","summary":"Understand how security engineers help their organisations to identify threats and risks to better manage them.","moduleURL":"threats-and-risks","image":"https://assets.tryhackme.com/img/modules/threats-and-risks.png","rooms":4,"tags":["fundamental"],"collaborator":[]},{"_id":"64ff049e04e4d04278eaef7a","id":3,"title":"Network and System Security","summary":"Explore principles of network & system security, including secure protocols, hardening OS, cloud, and network devices using latest techniques.","moduleURL":"network-and-system-security","image":"https://assets.tryhackme.com/img/modules/network-and-system-security.png","rooms":9,"tags":["fundamental"],"collaborator":[]},{"_id":"64ff051d04e4d04278efcc8c","id":3,"title":"Managing Incidents","summary":"Understand how security engineers help their organisations during an incident to reduce the impact of the incident.","moduleURL":"managing-incidents","image":"https://assets.tryhackme.com/img/modules/managing-incidents.png","rooms":4,"tags":["fundamental"],"collaborator":[]},{"_id":"651ac18dfb7c83afc669b98b","id":2,"title":"Log Analysis","summary":"Log analysis is collecting, parsing and processing log files and turning data into actionable knowledge to detect security threats and anomalies and identify system performance issues.","moduleURL":"log-analysis","image":"https://assets.tryhackme.com/img/modules/log-analysis.png","rooms":3,"tags":["defensive"],"collaborator":[]},{"_id":"651ac1f9fb7c83afc66e0ec0","id":2,"title":"Advanced Splunk","summary":"Understand advanced Splunk capabilities to search data for anomalies by creating complex search queries, applying regex, and creating presentable reports and dashboards. ","moduleURL":"advanced-splunk","image":"https://assets.tryhackme.com/img/modules/splunk.png","rooms":5,"tags":["defensive"],"collaborator":[]},{"_id":"651ac260fb7c83afc6724bb5","id":2,"title":"Advanced ELK","summary":"Learn about the main components of the ELK stack by going through the installation and configuring process and linking them together to form an effective log analysis utility. ","moduleURL":"advanced-elk","image":"https://assets.tryhackme.com/img/modules/elk.png","rooms":4,"tags":["defensive"],"collaborator":[]},{"_id":"651ac3f9fb7c83afc685466f","id":2,"title":"Threat Hunting","summary":"Understand the fundamentals of threat hunting, and learn how to build your own methodology for effective hunting across your infrastructure.","moduleURL":"threat-hunting","image":"https://assets.tryhackme.com/img/modules/threat-hunting.png","rooms":6,"tags":["defensive"],"collaborator":[]},{"_id":"651ac48bfb7c83afc68bb268","id":2,"title":"Threat Emulation","summary":"Understand the core concepts of threat emulation and learn how to execute adversarial activity through different threat emulation frameworks.","moduleURL":"threat-emulation","image":"https://assets.tryhackme.com/img/modules/threat-emulation-socl2.png","rooms":6,"tags":["defensive"],"collaborator":[]},{"_id":"651ac54afb7c83afc694ac99","id":2,"title":"Incident Response","summary":"Understand the mindset behind effective response on security incidents, and apply them through real-world tactics and techniques.","moduleURL":"incident-response","image":"https://assets.tryhackme.com/img/modules/incident-response.png","rooms":6,"tags":["defensive"],"collaborator":[]},{"_id":"651ac706fb7c83afc6a9a7e1","id":2,"title":"Malware Analysis","summary":"Explore the world of malware and analyse how malware can infect systems and cause damage.","moduleURL":"malware-analysis","image":"https://assets.tryhackme.com/img/modules/malware-analysis-socl2.png","rooms":11,"tags":["defensive"],"collaborator":[]},{"_id":"65612777b444610e8bba6837","id":2,"title":"Secure Software Development","summary":"This module introduces DevSecOps, DevOps, and SDLC. Learn to integrate security into software development for enhanced protection.","moduleURL":"secure-software-development","image":"https://assets.tryhackme.com/img/modules/secure-software-development.png","rooms":3,"tags":["fundamental","offensive"],"collaborator":[]},{"_id":"65a187fe9a2615935f251c4c","id":99,"title":"AoC 2023 Side Quest","summary":"Help the Yeti accomplish his 2023 plans and find its way back into the Best Festival Company.","moduleURL":"aoc-2023-side-quest","image":"https://assets.tryhackme.com/img/modules/aoc-2023-side-quest.png","rooms":5,"tags":[],"collaborator":[]},{"_id":"65d9152176ff45e75f52473a","id":4,"title":"Security of the Pipeline","summary":"This module focuses on platform security, tooling, and the secure flow of code. Explore broader aspects of securing the code's journey through the development, testing, and deployment phases.","moduleURL":"security-of-the-pipeline","image":"https://assets.tryhackme.com/img/modules/security-of-the-pipeline.png","rooms":3,"tags":["offensive"],"collaborator":[]},{"_id":"65d9163a76ff45e75f5c6e46","id":4,"title":"Security in the Pipeline","summary":"Security in the Pipeline module focuses on securing the code, encompassing SAST, DAST, code analysis challenges, and dependency management for robust DevSecOps practices.","moduleURL":"security-in-the-pipeline","image":"https://assets.tryhackme.com/img/modules/security-in-the-pipeline.png","rooms":4,"tags":["offensive"],"collaborator":[]},{"_id":"65dd10c176ff45e75f99232d","id":4,"title":"Infrastructure as Code","summary":"Learn the Infrastructure as Code fundamentals and best security practices to follow as a DevSecOps Engineer.","moduleURL":"infrastructure-as-code","image":"https://assets.tryhackme.com/img/modules/infrastructure-as-code.png","rooms":3,"tags":["offensive"],"collaborator":[]},{"_id":"65dd12d176ff45e75fac9ac2","id":4,"title":"Container Security","summary":"Learn how containerisation works, its benefits, potential vulnerabilities, and the steps necessary to secure your container.","moduleURL":"container-security","image":"https://assets.tryhackme.com/img/modules/container-security.png","rooms":5,"tags":["offensive"],"collaborator":[]},{"_id":"6601b57f1ffbacb650985d8e","id":2,"title":"HTTP Request Smuggling","summary":"Learn to identify and exploit HTTP request smuggling, covering CL.TE, TE.CL, transfer-encoding obfuscation, browser desync, and HTTP2 smuggling.","moduleURL":"http-request-smuggling","image":"https://assets.tryhackme.com/img/modules/http-request-smuggling.png","rooms":5,"tags":["offensive"],"collaborator":[]},{"_id":"661911c2384615d09835e651","title":"TryHack3M Special","summary":"Celebrate 3 Million Users with TryHackMe by solving five 3-million-themed challenges. Topics range from supply chain attacks to threat hunting!","moduleURL":"three-million-special","image":"https://assets.tryhackme.com/img/modules/three-million-special.svg","rooms":5,"collaborator":[]},{"_id":"6650b067e416b79e6560997f","id":2,"title":"Advanced Client-Side Attacks","summary":"Through real-world scenarios, you will gain a detailed understanding of client-side attacks, including XSS, CSRF, DOM-based vectors, SOP, and CORS vulnerabilities.","moduleURL":"advanced-client-side-attacks","image":"https://assets.tryhackme.com/img/modules/advanced-client-side-attacks.png","rooms":5,"tags":["fundamental","offensive"],"collaborator":[]},{"_id":"666c1b2001e2e45514dadbc5","id":2,"title":"Advanced Server-Side Attacks","summary":"Master the skills of advanced server-side attacks, covering SSRF, File Inclusions, Deserialization, Race Conditions, and Prototype Pollution.","moduleURL":"advanced-server-side-attacks","image":"https://assets.tryhackme.com/img/modules/advanced-server-side-attacks.png","rooms":6,"tags":["offensive"],"collaborator":[]},{"_id":"6671c84e01e2e45514238329","id":1,"title":"Snyk","summary":"Secure your code and dependencies. Learn to detect, evaluate, and remediate vulnerabilities with Snyk.","moduleURL":"snyk","image":"https://assets.tryhackme.com/img/modules/synk.png","rooms":2,"tags":["offensive"],"collaborator":[{"_id":"667179ff255d8419c3db5ece","name":"snyk","imageDark":"https://assets.tryhackme.com/img/collaborators/snyk-logo-dark.png","imageLight":"https://assets.tryhackme.com/img/collaborators/snyk-logo-light.png"}]},{"_id":"66a0d5ed6149ee4eb8ea1729","id":8,"title":"SOC Level 1 Capstone Challenges","summary":"Investigate critical incidents and apply all the skills needed to be an effective SOC analyst while handling various artefacts.","moduleURL":"soclevel1-capstone","image":"https://assets.tryhackme.com/img/modules/L1-Capstone-Module-Icon.png","rooms":4,"tags":[],"collaborator":[]},{"_id":"66ad00c36d1189d28237d89d","id":6,"title":"Injection Attacks","summary":"Master the skills of injection attacks, covering Advanced SQL Injection, Server-Side Template Injection, XXE Injection, LDAP Injection, and NoSQL Injection.","moduleURL":"injection-attacks","image":"https://assets.tryhackme.com/img/modules/injection-attacks.png","rooms":7,"tags":["offensive"],"collaborator":[]},{"_id":"66e83124049bf9b18113d7b6","id":8,"title":"Windows Endpoint Investigation","summary":"Understand various aspects of Windows forensics and learn how to investigate the footprints of an attack on the Windows Endpoint.","moduleURL":"windows-endpoint-investigation","image":"https://assets.tryhackme.com/img/modules/windows-endpoint.svg","rooms":9,"tags":["defensive"],"collaborator":[]},{"_id":"66e8323a049bf9b1812965cf","id":8,"title":"Kubernetes Hardening","summary":"Kubernetes, the secure way. Learn how to securely build and maintain a Kubernetes environment.","moduleURL":"kubernetes-hardening","image":"https://assets.tryhackme.com/img/modules/kubernetes-hardening.svg","rooms":5,"tags":["offensive"],"collaborator":[]},{"_id":"66f6e522049bf9b181da4e47","id":6,"title":"Authentication","summary":"Master exploiting authentication mechanisms through real-world scenarios, covering enumeration and brute force, session management, OAuth, MFA/2FA and JWT vulnerabilities.","moduleURL":"authentication","image":"https://assets.tryhackme.com/img/modules/authentication.svg","rooms":6,"tags":["fundamental","offensive"],"collaborator":[]},{"_id":"67082ed9d1ae318c4dee66c9","title":"Start Your Cyber Security Journey","summary":"Explore offensive and defensive cyber security via interactive exercises and acquire the essential search skills to find information.","moduleURL":"start-your-cyber-security-journey","image":"https://tryhackme-images.s3.eu-west-1.amazonaws.com/module-icons/1773338342154-start.png","rooms":3,"tags":[],"collaborator":[]},{"_id":"670835aa7e8fef8f48d1356f","title":"Exploitation Basics","summary":"Discover the art of exploitation by leveraging a real-world vulnerability. Next, explore the exploitation features of the Metasploit framework.","moduleURL":"exploitation-basics","image":"https://tryhackme-images.s3.eu-west-1.amazonaws.com/module-icons/1773338374150-exploitation.png","rooms":5,"tags":[],"collaborator":[]},{"_id":"670835ef425de775b768921a","title":"Web Hacking","summary":"Learn about web applications, JavaScript, SQL and explore BurpSuite, a web application security testing platform.","moduleURL":"web-hacking","image":"https://tryhackme-images.s3.eu-west-1.amazonaws.com/module-icons/1773340401812-web-hacking.png","rooms":4,"tags":[],"collaborator":[]},{"_id":"67083620425de775b768a576","title":"Offensive Security Tooling","summary":"Explore three offensive tools; Hydra, Gobuster, and SQLMap are used for penetration testing passwords, directories, and databases respectively.","moduleURL":"offensive-security-tooling","image":"https://tryhackme-images.s3.eu-west-1.amazonaws.com/module-icons/1773338386212-offensive-security-tooling.png","rooms":4,"tags":[],"collaborator":[]},{"_id":"670836e255758b4d83f3050f","title":"Security Solutions","summary":"Explore fundamental defensive security solutions like firewalls, IDS, vulnerability scanners, and SIEM through different hands-on exercises.","moduleURL":"security-solutions","image":"https://tryhackme-images.s3.eu-west-1.amazonaws.com/module-icons/1773340352170-sec-solutions.png","rooms":4,"tags":[],"collaborator":[]},{"_id":"6708372855758b4d83f3205a","title":"Build Your Cyber Security Career","summary":"Study the security principles that set the foundation for everything related to cyber security and discover the available careers in cyber.","moduleURL":"building-your-cyber-security-career","image":"https://tryhackme-images.s3.eu-west-1.amazonaws.com/module-icons/1773338410931-build-your-cyber-security-career.png","rooms":3,"tags":[],"collaborator":[]},{"_id":"67083846c2fec3e92049c1dd","title":"Command Line","summary":"Learn the command line and MS PowerShell in Windows by practising various essential commands. Then, discover the use of Bash in the Linux OS.","moduleURL":"command-line","image":"https://tryhackme-images.s3.eu-west-1.amazonaws.com/module-icons/1773338356725-command.png","rooms":3,"tags":[],"collaborator":[]},{"_id":"6708385752d65da19023220d","title":"Networking","summary":"Learn about the OSI model and TCP/IP networking layers. Explore the different plaintext and secure networking protocols that we use every day.","moduleURL":"networking","image":"https://tryhackme-images.s3.eu-west-1.amazonaws.com/module-icons/1773338361889-network.png","rooms":7,"tags":[],"collaborator":[]},{"_id":"6708391f3b6c6ef7c12cb0cb","title":"Cryptography","summary":"Explore various symmetric and asymmetric encryption algorithms. Discover the usage of hashing algorithms in everyday systems.","moduleURL":"cryptography-101","image":"https://tryhackme-images.s3.eu-west-1.amazonaws.com/module-icons/1773340439210-crypto.png","rooms":4,"tags":[],"collaborator":[]},{"_id":"6708397b3b6c6ef7c12cf40d","title":"Defensive Security","summary":"This module will help you build your defensive security knowledge. It covers key topics such as SOC, digital forensics, and incident response.","moduleURL":"defensive-security","image":"https://tryhackme-images.s3.eu-west-1.amazonaws.com/module-icons/1773338391397-defensive-sec.png","rooms":5,"tags":[],"collaborator":[]},{"_id":"670839da5b3fa74aca87624e","title":"Defensive Security Tooling","summary":"Dive into various defensive security tools and distributions such as CyberChef, CAPA, REMnux, and FlareVM.","moduleURL":"defensive-security-tooling","image":"https://tryhackme-images.s3.eu-west-1.amazonaws.com/module-icons/1773340371951-defensive-sec-tooling.png","rooms":4,"tags":[],"collaborator":[]},{"_id":"6708eb5255ded89560b0f439","id":2,"title":"Linux Endpoint Investigation ","summary":"Unravel the mysteries of Linux forensics with a deep dive into live analysis, process scrutiny, and log investigations.","moduleURL":"linux-endpoint-investigation","image":"https://assets.tryhackme.com/img/modules/linux-endpoint-investigation.svg","rooms":5,"tags":["offensive"],"collaborator":[]},{"_id":"670fb780c4000ce068d9c535","title":"Windows and AD Fundamentals","summary":"Get hands-on access to Windows and it's security controls. These basics will help you in identifying, exploiting and defending Windows.","moduleURL":"windows-and-active-directory-fundamentals","image":"https://tryhackme-images.s3.eu-west-1.amazonaws.com/module-icons/1773338681561-windows.png","rooms":4,"tags":[],"collaborator":[]},{"_id":"676285b30836deba0e796919","id":"wonderland","title":"Wonderland","summary":"Designed to test your enumeration, privilege escalation, and CTF skills. Will you get lost in Wonderland, or manage to leave with the flags?","moduleURL":"wonderland","image":"https://assets.tryhackme.com/img/badges/wonderland.svg","rooms":2,"tags":[],"collaborator":[]},{"_id":"676285b30836deba0e79691a","id":"overpass","title":"Overpass","summary":"Follow the story of the Overpass company as they try to start a successful security software company. Covers basic web vulnerabilities, beginner cryptography, password cracking, PCAP forensics, and analysing source code.","moduleURL":"overpass","image":"https://assets.tryhackme.com/img/badges/overpass.svg","rooms":3,"tags":[],"collaborator":[]},{"_id":"676285b30836deba0e79691b","id":"newyear","title":"New Year","summary":"New Year is a time of turmoil with the world shifting and changing to match the systematic march of time. This series strives to follow that same ethos of orderly chaos. With a collection of targets varying in difficulty and linked only by their common names, can you see through the illusions and emerge triumphant?","moduleURL":"newyear","image":"https://assets.tryhackme.com/img/badges/newyear.svg","rooms":6,"tags":[],"collaborator":[]},{"_id":"676285b30836deba0e79691c","id":"starters","title":"Starters","summary":"A collection of fun independent challenges that should not be overlooked.","moduleURL":"starters","image":"https://assets.tryhackme.com/img/badges/starters.svg","rooms":10,"tags":[],"collaborator":[]},{"_id":"676285b30836deba0e79691d","id":"investigations","title":"Investigating Windows","summary":"You're a security analyst for a mid-size company. Its your job to investigate some previously attacked Windows machines to determine how and what the attacker did with minimal tools at your disposal. Do you have what it takes to solve these cyber defense challenges?","moduleURL":"investigations","image":"https://assets.tryhackme.com/img/badges/investigations.svg","rooms":3,"tags":[],"collaborator":[]},{"_id":"676285b40836deba0e79691e","id":"pentestingtools","title":"Pentesting Tools","summary":"Learn about and get experience with industry-standard offensive security tools.","moduleURL":"pentestingtools","image":"https://assets.tryhackme.com/img/badges/pentestingtools.svg","rooms":6,"tags":[],"collaborator":[]},{"_id":"676285b40836deba0e79691f","id":"windcorp","title":"WindCorp","summary":"Hack your way through WindCorp in this themed module of hands-on challenges that simulate real-world attacks across a fictional company's infrastructure.","moduleURL":"windcorp","image":"https://assets.tryhackme.com/img/badges/windcorp.svg","rooms":4,"tags":[],"collaborator":[]},{"_id":"676285b40836deba0e796920","id":"breakingwindows","title":"Breaking Windows","summary":"Almost all corporate networks use Windows, use this series to practice compromising Windows machines and Active Directory networks.","moduleURL":"breakingwindows","image":"https://assets.tryhackme.com/img/badges/breakingwindows.svg","rooms":5,"tags":[],"collaborator":[]},{"_id":"67812b9dc9239bc099f585e1","title":"DFIR Essentials","summary":"Gain insights into DFIR practices involving ethical approaches, and learn how to analyse forensic artefacts.","moduleURL":"dfir-essentials","image":"https://assets.tryhackme.com/img/modules/DFIR-essentials.svg","rooms":6,"tags":[],"collaborator":[]},{"_id":"67c7f99128de71b70d510354","id":1,"title":"KQL","summary":"Get hands-on with analysing security logs to detect and investigate threats efficiently using KQL.","moduleURL":"kql","image":"https://assets.tryhackme.com/img/modules/kql.png","rooms":3,"tags":["Detection Engineering","Log analysis","Threat Hunting","Cloud Security"],"collaborator":[]},{"_id":"67c7f9e228de71b70d510356","id":1,"title":"Microsoft Sentinel","summary":"Explore Microsoft Sentinel with an interactive guide on how to deploy, detect and investigate security threats.","moduleURL":"sentinel","image":"https://assets.tryhackme.com/img/modules/sentinel.png","rooms":5,"tags":["Microsoft Sentinel","Detection Engineering","SIEM","Security Operations","Security Analysis","Log Correlation","Cloud Security","Incident Response"],"collaborator":[]},{"_id":"67e691cd34f7cfec209050e7","title":"File System Analysis","summary":"Learn file system analysis and forensics with hands-on labs covering MBR, GPT, FAT32, NTFS, EXT and file carving.","moduleURL":"file-system-analysis","image":"https://assets.tryhackme.com/img/modules/file-system-analysis.svg","rooms":6,"tags":[],"collaborator":[]},{"_id":"67fcc011df0b7e4b0f685ee2","id":1,"title":"Microsoft Defender XDR","summary":"Explore how Microsoft Defender XDR detects and responds to real-world attack techniques—from initial access to lateral movement—using live lab scenarios.","moduleURL":"defender","image":"https://assets.tryhackme.com/img/modules/defender.svg","rooms":6,"tags":[],"collaborator":[]},{"_id":"67fcc067df0b7e4b0f685ee6","id":1,"title":"Azure Security Challenges","summary":"Test your skills across red and blue team scenarios in Azure. This challenge-based module covers a mix of offensive and defensive tasks designed to sharpen your real-world Azure security expertise.","moduleURL":"azurechallenges","image":"https://assets.tryhackme.com/img/modules/azurechallenges.svg","rooms":6,"tags":[],"collaborator":[]},{"_id":"67ff983f52458f9eda01f34c","title":"Cryptographic Failures","summary":"Learn to exploit cryptographic vulnerabilities, including ECB Oracles, Padding Oracles, Insecure Randomness, and Length Extension Attacks.","moduleURL":"cryptofailures","image":"https://assets.tryhackme.com/img/modules/cryptofailures.png","rooms":5,"tags":[],"collaborator":[]},{"_id":"681466d4bde53b5b4f43ea4b","title":"Disk Image Analysis","summary":"The disk holds the key to almost everything on a system. Learn disk image acquisition and analysis, then dive deep into a data exfiltration case covering Windows and Linux systems.","moduleURL":"disk-image-analysis","image":"https://assets.tryhackme.com/img/modules/disk-image-analysis.png","rooms":5,"tags":[],"collaborator":[]},{"_id":"681c69e43e4ef79aca568ece","title":"SOC Team Internals","summary":"Explore the essential SOC analyst skills to help you triage, classify, and escalate alerts in real-world SOC environments.","moduleURL":"soc-team-internals","image":"https://assets.tryhackme.com/img/modules/soc-team-internals.png","rooms":4,"tags":[],"collaborator":[]},{"_id":"682f4b3513121de268aaaeb0","title":"Mobile Analysis","summary":"Learn to acquire and analyse mobile data with practical tools and techniques used in Android and iOS forensic investigations.","moduleURL":"mobile-analysis","image":"https://assets.tryhackme.com/img/modules/mobile-analysis.png","rooms":3,"tags":[],"collaborator":[]},{"_id":"68406269955b27e09fb8b3ad","title":"macOS Forensics","summary":"Learn macOS forensics through artefact analysis, app investigations, and hands-on labs covering system and user activity traces.","moduleURL":"macos-forensics","image":"https://assets.tryhackme.com/img/modules/macos-forensics.png","rooms":4,"tags":[],"collaborator":[]},{"_id":"684a91f52d2c073ba52ea20f","title":"Memory Analysis","summary":"Learn how to analyse volatile memory to detect suspicious activity, track user behaviour, and investigate network threats through hands-on labs.","moduleURL":"memory-analysis","image":"https://assets.tryhackme.com/img/modules/memory-analysis.png","rooms":8,"tags":[],"collaborator":[]},{"_id":"685518dfb07634cd3419adfc","title":"Custom Tooling","summary":"Build and automate custom tools using Python, Burp Suite, and browser automation to exploit and test web applications efficiently.","moduleURL":"custom-tooling","image":"https://assets.tryhackme.com/img/modules/custom-tooling.png","rooms":4,"tags":[],"collaborator":[]},{"_id":"686bb99ffbbcdf709d68828d","title":"Defending AI","summary":"Learn how to detect and defend against adversarial attacks and use AI to supercharge investigations and enhance blue team operations.","moduleURL":"defensive-ai","image":"https://assets.tryhackme.com/img/modules/ai-module.svg","rooms":5,"tags":[],"collaborator":[]},{"_id":"6888ae0a890c9eda592e6b49","title":"Windows Security Monitoring","summary":"Learn how Windows logging works and how you can use it to detect common Windows attacks - all through real-world examples and challenging, hands-on threat detection labs.","moduleURL":"windows-security-monitoring","image":"https://tryhackme-images.s3.eu-west-1.amazonaws.com/modules/windows-security-monitoring-1753787914027.svg","rooms":4,"tags":[],"collaborator":[]},{"_id":"68c4166097e45c8513fb89a4","title":"Threat Analysis Tools","summary":"Understand how to leverage threat intelligence to detect, investigate and defend against adversaries. Gain practical skills in using threat data, enrichment techniques, and analysis workflows to strengthen SOC capabilities.","moduleURL":"threat-analysis-tools","image":"https://tryhackme-images.s3.eu-west-1.amazonaws.com/modules/threat-analysis-tools-1757684500027.svg","rooms":4,"tags":[],"collaborator":[]},{"_id":"68cd3391f41199346e4d53cb","title":"Web Security Monitoring","summary":"Learn how to protect and monitor the web, the ecosystem every organisation relies upon to deliver its services, all in a series of SOC-oriented labs and real-world scenarios.","moduleURL":"web-security-monitoring","image":"https://tryhackme-images.s3.eu-west-1.amazonaws.com/modules/web-security-monitoring-1758288631299.svg","rooms":4,"tags":[],"collaborator":[]},{"_id":"68f10fc449ebc9e3fcc600cf","title":"Chaining Vulnerabilities","summary":"Learn how to chain multiple vulnerabilities to compromise a system and test your chaining skills through advanced real-world challenges.","moduleURL":"chaining-vulnerabilities","image":"https://tryhackme-images.s3.eu-west-1.amazonaws.com/modules/chaining-vulnerabilities-1760628675510.svg","rooms":4,"tags":[],"collaborator":[]},{"_id":"68f9e767c983cf2ec3131549","title":"Network Security Monitoring","summary":"Learn about key fundamentals of Network Security, the importance of monitoring network perimeters and how to analyse the network traffic and logs for the footprints of potential network based attacks like MITM, network discovery and data exfiltration.","moduleURL":"network-security-monitoring","image":"https://tryhackme-images.s3.eu-west-1.amazonaws.com/modules/network-security-monitoring-1761208166852.svg","rooms":6,"tags":[],"collaborator":[]},{"_id":"68ff90bf8f6ea902bdf66ca6","title":"SIEM Triage for SOC","summary":"Explore how SIEM solutions help detect early signs of attacks, investigate SOC alerts, and correlate logs from multiple sources to build an incident timeline. These skills will be vital for you to identify and respond to real-world threats as a SOC analyst.","moduleURL":"siem-triage-for-soc","image":"https://tryhackme-images.s3.eu-west-1.amazonaws.com/modules/siem-triage-for-soc-1761579198544.svg","rooms":5,"tags":[],"collaborator":[]},{"_id":"69037fa479931654ebe1604a","title":"Core SOC Solutions","summary":"Understanding security solutions is key for SOC analysts. This module covers SIEM, EDR and SOAR, the core security solutions used in a SOC. ","moduleURL":"core-soc-solutions","image":"https://tryhackme-images.s3.eu-west-1.amazonaws.com/modules/core-soc-solutions-1761836963983.svg","rooms":5,"tags":[],"collaborator":[]},{"_id":"690390daa6ce34c608bb5d1c","title":"Malware Concepts for SOC","summary":"In this module, you’ll learn to identify common malware types, understand their purpose, analyse files and understand why living off the land attacks are becoming more common.","moduleURL":"malware-concepts-for-soc","image":"https://tryhackme-images.s3.eu-west-1.amazonaws.com/modules/malware-concepts-for-soc-1761852381555.svg","rooms":4,"tags":[],"collaborator":[]},{"_id":"6903bd05f821c74ba9fa2374","title":"Network Traffic Analysis","summary":"Learn the basics of network traffic analysis and get hands-on with Wireshark to detect various types of attacks.","moduleURL":"network-traffic-analysis","image":"https://tryhackme-images.s3.eu-west-1.amazonaws.com/modules/network-traffic-analysis-1761907038015.png","rooms":5,"tags":[],"collaborator":[]},{"_id":"6904940833c100d524e5b59e","title":"Cyber Defence Frameworks","summary":"Learn how defensive frameworks, such as Pyramid of Pain, Cyber Kill Chain, and MITRE, help you understand adversarial behaviour and harden detection, triage, and response.","moduleURL":"cyber-defence-frameworks","image":"https://tryhackme-images.s3.eu-west-1.amazonaws.com/modules/cyber-defence-frameworks-2025-1761907719768.png","rooms":6,"tags":[],"collaborator":[]},{"_id":"6904af19a1abe9c491f9a939","title":"Linux Security Monitoring","summary":"Learn how Linux logging works and how you can use it to detect common Linux attacks - all through real-world examples and challenging, hands-on threat detection labs.","moduleURL":"linux-security-monitoring","image":"https://tryhackme-images.s3.eu-west-1.amazonaws.com/modules/linux-security-monitoring-1761914648963.svg","rooms":4,"tags":[],"collaborator":[]},{"_id":"6908bfcabf69a92ed6dbb6ed","title":"Blue Team Introduction","summary":"Start your defensive security career by exploring the Blue Team and its core - the Security Operations Centre (SOC). You’ll learn why defensive security is essential and how it helps organisations stay protected against attacks.","moduleURL":"blue-team-introduction","image":"https://tryhackme-images.s3.eu-west-1.amazonaws.com/modules/blue-team-introduction-1762181065779.svg","rooms":4,"tags":[],"collaborator":[]},{"_id":"69174bde37d4925162649301","title":"OWASP Top 10 (2025)","summary":"Explore, exploit, and learn how to remediate the most critical web application security risks listed in the OWASP Top 10 (2025) list through interactive labs and practical recommendations. ","moduleURL":"owasp-top-10-2025","image":"https://tryhackme-images.s3.eu-west-1.amazonaws.com/module-icons/1773338414750-owasp.png","rooms":3,"tags":[],"collaborator":[]},{"_id":"691b1b242ee392b924fa2add","title":"Advent of Cyber 2025","summary":"A warm up room, followed by 24 walkthrough rooms taken from our Advent of Cyber 2025 event.","moduleURL":"aoc-2025-kra8blxfpajw0vn6","image":"https://tryhackme-images.s3.eu-west-1.amazonaws.com/modules/aoc-2025-kra8blxfpajw0vn6-1767897741004.svg","rooms":25,"tags":[],"collaborator":[]},{"_id":"692038722ed81fd1bb1975e8","title":"Honeynet Collapse","summary":"Dive into the story of DeceptiTech, a company that fell victim to a ransomware attack. They now desperately need your forensic skills to unwrap the incident and stop the threat from striking again.","moduleURL":"honeynet-collapse","image":"https://tryhackme-images.s3.eu-west-1.amazonaws.com/modules/honeynet-collapse-1763719281937.svg","rooms":6,"tags":[],"collaborator":[]},{"_id":"6925a74a017b02d5ae2f8d4f","title":"Bypassing WAF","summary":"Master techniques to understand, exploit, and bypass WAFs, covering signature and pattern bypasses, parsing and normalisation evasion, protocol manipulation, and exploiting weak/outdated configurations.","moduleURL":"bypassingwaf","image":"https://tryhackme-images.s3.eu-west-1.amazonaws.com/modules/bypassingwaf-1764085726602.svg","rooms":4,"tags":[],"collaborator":[]},{"_id":"6925a757dbdd09069ab76f8e","title":"Attacking LLMs","summary":"Learn to identify and exploit LLM vulnerabilities, covering prompt injection, insecure output handling, and model poisoning.","moduleURL":"attackingllm","image":"https://tryhackme-images.s3.eu-west-1.amazonaws.com/modules/attackingllm-1764085731288.svg","rooms":6,"tags":[],"collaborator":[]},{"_id":"6984fa081d75c4c567926e80","title":"Love at First Breach 2026","summary":"Beat the 10 challenges from the beginner’s track, or give a try to the 7 challenges in our advanced track.","moduleURL":"lafbctf2026","image":"https://tryhackme-images.s3.eu-west-1.amazonaws.com/modules/lafbctf2026-1770322438619.svg","rooms":10,"tags":[],"collaborator":[]},{"_id":"698f0adff8b4d1d7774ff14a","title":"Computer Fundamentals","summary":"Before you can secure technology, you need to understand how it works. Explore what's inside a computer, from hardware basics to the cloud.","moduleURL":"computer-fundamentals","image":"https://tryhackme-images.s3.eu-west-1.amazonaws.com/module-icons/1773400050998-Module_Image.png","rooms":5,"tags":[],"collaborator":[]},{"_id":"699379bbd49c68a3b3a78804","title":"Operating Systems Basics","summary":"Learn the fundamentals of operating systems and how users interact with Windows and Linux through graphical and command line interfaces.","moduleURL":"operating-systems-basics","image":"https://tryhackme-images.s3.eu-west-1.amazonaws.com/module-icons/1773400058187-Module_Image-1.png","rooms":5,"tags":[],"collaborator":[]},{"_id":"69937ac784754e5af02052c1","title":"Software Basics","summary":"Explore how computers handle data behind the scenes, and try your first steps in Python, JavaScript, and SQL.","moduleURL":"software-basics","image":"https://tryhackme-images.s3.eu-west-1.amazonaws.com/module-icons/1773400063710-Module_Image-2.png","rooms":5,"tags":[],"collaborator":[]},{"_id":"69937bbc0c01f8c3d629a689","title":"Attacks and Defenses","summary":"Learn how attackers and defenders think, how data is protected, and how real world systems are attacked and defended in practice.","moduleURL":"attacks-and-defenses","image":"https://tryhackme-images.s3.eu-west-1.amazonaws.com/module-icons/1773400066952-Module_Image-3.png","rooms":4,"tags":[],"collaborator":[]},{"_id":"69af413030b4d422aea75dd7","title":"Cloud Security for SOC","summary":"Learn how SOC teams monitor and defend cloud environments using SIEM throughout a series of hands-on labs. While focused on AWS, the concepts in this module apply to any cloud infrastructure.","moduleURL":"cloud-security-soc","image":"https://tryhackme-images.s3.eu-west-1.amazonaws.com/modules/cloud-security-soc-1773093168400.png","rooms":4,"tags":[],"collaborator":[]},{"_id":"69c1639abc23739c53d98183","title":"Active Directory for SOC","summary":"Learn how attackers target Active Directory environments and how to detect their techniques across the kill chain using Splunk.","moduleURL":"active-directory-soc","image":"https://tryhackme-images.s3.eu-west-1.amazonaws.com/modules/active-directory-soc-1774281625875.png","rooms":5,"tags":[],"collaborator":[]},{"_id":"69c2e6a9d1b9dc9b9ab7ee07","title":"Microsoft 365 for SOC","summary":"Explore core concepts of Entra ID and M365, the threats targeting them, and how to monitor their logs and activity as a SOC analyst.","moduleURL":"m365-monitoring-soc","image":"https://tryhackme-images.s3.eu-west-1.amazonaws.com/modules/m365-monitoring-soc-1774380713256.png","rooms":5,"tags":[],"collaborator":[]},{"_id":"69d11c22a4b37712cfb0c87f","title":"AI Fundamentals","summary":"Learn the core concepts of AI and ML, and how they apply to the cybersecurity landscape.","moduleURL":"ai-fundamentals","image":"https://tryhackme-images.s3.eu-west-1.amazonaws.com/modules/ai-fundamentals-1775725770048.svg","rooms":6,"tags":[],"collaborator":[]},{"_id":"69d11d5891db602600d5e2f9","title":"Secure AI Systems","summary":"Understand how AI systems are architected and how to assess their security posture.","moduleURL":"secure-ai-systems","image":"https://tryhackme-images.s3.eu-west-1.amazonaws.com/modules/secure-ai-systems-1775725816935.svg","rooms":5,"tags":[],"collaborator":[]},{"_id":"69d11ec567c6208e3b80c988","title":"Prompt Security","summary":"Learn how attackers manipulate AI models through malicious inputs, and how to stop them.","moduleURL":"prompt-security","image":"https://tryhackme-images.s3.eu-west-1.amazonaws.com/modules/prompt-security-1775725558255.svg","rooms":5,"tags":[],"collaborator":[]},{"_id":"69d11fb2f94c2cd76cc9b60b","title":"AI Supply Chain Security","summary":"Explore how AI model artefacts and supply chains can be compromised and how to defend them.","moduleURL":"ai-supply-chain-security","image":"https://tryhackme-images.s3.eu-west-1.amazonaws.com/modules/ai-supply-chain-security-1775726017856.svg","rooms":5,"tags":[],"collaborator":[]},{"_id":"69d120d491db602600d5e4ad","title":"Data Poisoning","summary":"Discover how attackers corrupt the data AI systems rely on, from RAG pipelines to training sets.","moduleURL":"data-poisoning","image":"https://tryhackme-images.s3.eu-west-1.amazonaws.com/modules/data-poisoning-1775725610571.svg","rooms":5,"tags":[],"collaborator":[]}],"network":[{"_id":"5fa34d36f0506c48b1fb1337","imageURL":"https://tryhackme-images.s3.amazonaws.com/room-icons/79023e1ed4c207bc52b7dfee208c80a5.png","description":"Holo is an Active Directory (AD) and Web-App attack lab that aims to teach core web attack vectors and more advanced AD attack techniques. This network simulates an external penetration test on a corporate network.","title":"Holo","code":"hololive","paidAccess":{"streak":{"enabled":true,"accessTime":10,"number":{"freeUser":7,"subUser":-1}}},"difficulty":"hard","freeToUse":false,"completedByUser":false},{"_id":"5ff07cef0ba6cf6bedd84acc","imageURL":"https://tryhackme-images.s3.amazonaws.com/room-icons/ffa81460a5c1487dd7bb43d0ca0735a1.png","description":"Learn how to pivot through a network by compromising a public facing web machine and tunnelling your traffic to access other machines in Wreath's network. ","title":"Wreath","code":"wreath","paidAccess":{"streak":{"enabled":true,"number":{"freeUser":7,"subUser":-1},"accessTime":10}},"difficulty":"easy","freeToUse":false,"completedByUser":false},{"_id":"620aabba3aba4e004986f223","paidAccess":{"streak":{"enabled":true,"accessTime":4,"number":{"freeUser":7,"subUser":-1}}},"freeToUse":false,"difficulty":"medium","code":"breachingad","title":"Breaching Active Directory","description":"This network covers techniques and tools that can be used to acquire that first set of AD credentials that can then be used to enumerate AD.","imageURL":"https://tryhackme-images.s3.amazonaws.com/room-icons/a936e45c948fb10f2eec7768c7a32e66.png","completedByUser":false},{"_id":"620aabe3b17d0b0042a14d45","paidAccess":{"streak":{"enabled":true,"accessTime":10,"number":{"freeUser":7,"subUser":-1}}},"freeToUse":false,"difficulty":"medium","code":"adenumeration","title":"Enumerating Active Directory","description":"This room covers various Active Directory enumeration techniques, their use cases as well as drawbacks.","imageURL":"https://tryhackme-images.s3.amazonaws.com/room-icons/aab8209b616e6e146df6ceaf7bda48d5.png","completedByUser":false},{"_id":"6245dd826a6c2400483a47d0","paidAccess":{"streak":{"enabled":true,"accessTime":3,"number":{"freeUser":7,"subUser":-1}}},"freeToUse":false,"difficulty":"easy","code":"lateralmovementandpivoting","title":"Lateral Movement and Pivoting","description":"Learn about common techniques used to move laterally across a Windows network.","imageURL":"https://tryhackme-images.s3.amazonaws.com/room-icons/2c164794fa55d4805f01fbc5eef79017.png","completedByUser":false},{"_id":"624c96a2413b2c00502ad21f","paidAccess":{"streak":{"enabled":true,"accessTime":3,"number":{"freeUser":7,"subUser":-1}}},"freeToUse":false,"difficulty":"medium","code":"exploitingad","title":"Exploiting Active Directory","description":"Learn common AD exploitation techniques that can allow you to reach your goal in an AD environment.","imageURL":"https://tryhackme-images.s3.amazonaws.com/room-icons/9975bcee38db4eff87972247f8895e40.png","completedByUser":false},{"_id":"62530b5d4283500052d57f81","paidAccess":{"streak":{"enabled":true,"accessTime":4,"number":{"freeUser":7,"subUser":-1}}},"freeToUse":false,"difficulty":"medium","code":"persistingad","title":"Persisting Active Directory","description":"Learn about common Active Directory persistence techniques that can be used post-compromise to ensure the blue team will not be able to kick you out during a red team exercise.","imageURL":"https://tryhackme-images.s3.amazonaws.com/room-icons/df8f584cce98cbf00bbd8a4da5cc4a09.png","completedByUser":false},{"_id":"63dc6b90b9ce90032c6fd410","paidAccess":{"streak":{"enabled":true,"accessTime":7,"number":{"freeUser":7,"subUser":-1}}},"freeToUse":false,"difficulty":"hard","code":"redteamcapstonechallenge","title":"Red Team Capstone Challenge","description":"This room is the capstone challenge for the red team learning pathway.","imageURL":"https://tryhackme-images.s3.amazonaws.com/room-icons/19300c6a4e14181b945aac5104d08c9d.png","completedByUser":false},{"_id":"6410682309fe66004ad249e6","paidAccess":{"streak":{"enabled":true,"accessTime":4,"number":{"freeUser":5,"subUser":-1}}},"freeToUse":false,"difficulty":"hard","code":"bandit","title":"Bandit","description":"You’ve been asked to exploit all the vulnerabilities on multiple systems.","imageURL":"https://tryhackme-images.s3.amazonaws.com/room-icons/602513b69ffd0bb6e7d2dd7899816661.png","completedByUser":false},{"_id":"64b6c3f59f142c0062d73b2b","paidAccess":{"streak":{"enabled":true,"number":{"freeUser":7,"subUser":-1},"accessTime":3}},"freeToUse":false,"difficulty":"medium","code":"cicdandbuildsecurity","title":"CI/CD and Build Security","description":"Learn about CI/CD and build principles to safeguard your pipelines.","imageURL":"https://tryhackme-images.s3.amazonaws.com/room-icons/49688427a6da353a664c0059639ea881.png","completedByUser":false},{"_id":"6907c6e158c904e55e21fe10","paidAccess":{"streak":{"enabled":false}},"freeToUse":false,"difficulty":"insane","code":"ho-aoc2025-yboMoPbnEX","title":"Hoppers Origins","description":"From HopSec Island, Eggsploits whisper through TBFC - Origins of how SOC-mas became EAST-mas.","imageURL":"https://tryhackme-images.s3.amazonaws.com/room-icons/6093e17fa004d20049b6933e-1764757483296","completedByUser":false}]}}