Room progress ( NaN% )
Task 1Introduction
Task 2Definition of System
Task 3Attacks on Systems
Task 4Vulnerabilities
Task 5Misconfigurations
Task 6Practice
Task includes website
Task 7Conclusion
Created by
Room Type
Only subscribers can deploy virtual machines in this room! Go to your profile page to subscribe (if you have not already).
Users in Room
32
Created
today
Ready to learn Cyber Security? Create your free account today!
The Systems as Attack Vectors room is only available for premium users. Signup now to access more than 500 free rooms and learn cyber security through a fun, interactive learning environment.
Already have an account? Log in