Modules Library

Access 44 specialized operational modules.

Web Application Hacking
Offensive
Beginner8 hours

Web Application Hacking

Master the art of web application security testing. Learn to find and exploit vulnerabilities in modern web apps.

Start Module
Network Penetration Testing
Offensive
Intermediate12 hours

Network Penetration Testing

Learn to identify and exploit network vulnerabilities. Master scanning, enumeration, and network attacks.

Start Module
Active Directory Attacks
Offensive
Advanced10 hours

Active Directory Attacks

Master attacking Windows Active Directory environments. From initial foothold to domain admin.

Start Module
Privilege Escalation
Offensive
Intermediate6 hours

Privilege Escalation

Learn to escalate privileges on both Linux and Windows systems. From low-priv user to root/admin.

Start Module
Password Attacks
Offensive
Beginner4 hours

Password Attacks

Master password cracking, brute forcing, and credential attacks. From hashes to plaintext.

Start Module
Social Engineering
Offensive
Beginner5 hours

Social Engineering

Learn the art of human hacking. Phishing, pretexting, and psychological manipulation techniques.

Start Module
Wireless Attacks
Offensive
Intermediate5 hours

Wireless Attacks

Master WiFi security testing. WPA/WPA2 cracking, evil twin attacks, and wireless exploitation.

Start Module
Post-Exploitation
Offensive
Intermediate8 hours

Post-Exploitation

Learn what to do after gaining access. Data exfiltration, persistence, and covering tracks.

Start Module
Introduction to Vibe Hacking with Predator
Offensive
Intermediate4 hours

Introduction to Vibe Hacking with Predator

Learn the fundamentals of Vibe Hacking using the Predator AI agent.

Start Module
Advanced Vibe Hacking with Predator
Offensive
Advanced6 hours

Advanced Vibe Hacking with Predator

Master advanced Vibe Hacking techniques and strategies with Predator.

Start Module
Security Operations Fundamentals
Defensive
Beginner6 hours

Security Operations Fundamentals

Master the foundations of security operations. Learn SOC workflows, security monitoring, and incident response basics.

Start Module
SIEM & Log Analysis
Defensive
Intermediate10 hours

SIEM & Log Analysis

Master SIEM platforms and log analysis techniques. Learn Splunk, ELK, and advanced query languages.

Start Module
Threat Detection & Hunting
Defensive
Intermediate12 hours

Threat Detection & Hunting

Learn proactive threat hunting and detection engineering. Master Sigma rules, YARA, and hunting methodologies.

Start Module
Incident Response & Forensics
Defensive
Advanced14 hours

Incident Response & Forensics

Master incident response procedures and digital forensics. Learn memory, disk, and network forensics.

Start Module
Network Defense
Defensive
Intermediate10 hours

Network Defense

Learn to defend networks with firewalls, IDS/IPS, and secure architecture. Master Snort, Suricata, and network hardening.

Start Module
Endpoint Security
Defensive
Intermediate9 hours

Endpoint Security

Master endpoint defense with EDR, hardening, and security configurations for Windows, Linux, and containers.

Start Module
Cloud Security & Monitoring
Defensive
Advanced11 hours

Cloud Security & Monitoring

Defend cloud environments. Master AWS, Azure, and GCP security monitoring, configuration, and incident response.

Start Module
Security Automation & SOAR
Defensive
Expert8 hours

Security Automation & SOAR

Automate security operations with SOAR platforms, playbooks, and Python scripting for security.

Start Module
Security Risk Assessment
Consulting
Intermediate8 hours

Security Risk Assessment

Learn to identify, analyze, and prioritize security risks using industry-standard frameworks and methodologies.

Start Module
Compliance Frameworks
Consulting
Intermediate10 hours

Compliance Frameworks

Master major compliance frameworks including SOC 2, ISO 27001, GDPR, HIPAA, and PCI-DSS.

Start Module
Security Program Development
Consulting
Advanced6 hours

Security Program Development

Build and mature security programs from the ground up. Develop policies, procedures, and governance structures.

Start Module
Third-Party Risk Management
Consulting
Intermediate6 hours

Third-Party Risk Management

Assess and manage vendor security risks. Learn to evaluate third-party security posture and manage supply chain risks.

Start Module
Security Auditing
Consulting
Advanced8 hours

Security Auditing

Conduct comprehensive security audits. Learn audit planning, execution, and reporting for various frameworks.

Start Module
Client Communication
Consulting
Beginner4 hours

Client Communication

Master the art of security consulting communication. Learn to present findings, manage stakeholders, and build trust.

Start Module
Executive Reporting
Consulting
Intermediate4 hours

Executive Reporting

Create compelling security reports for executives and board members. Turn technical findings into business insights.

Start Module
Security Strategy & Roadmaps
Consulting
Advanced6 hours

Security Strategy & Roadmaps

Develop multi-year security strategies and transformation roadmaps. Align security with business objectives.

Start Module
Vendor Assessment
Consulting
Intermediate4 hours

Vendor Assessment

Evaluate security tools and solutions. Help clients select the right security technologies for their needs.

Start Module
ISO 27001 Implementation
Consulting
Advanced14 hours

ISO 27001 Implementation

Complete ISO 27001 ISMS implementation methodology. All Durchführung steps from project initiation to certification audit.

Start Module
COBIT Framework
Consulting
Advanced10 hours

COBIT Framework

Master COBIT 2019 for IT governance and management. Understand all domains and implement effective IT governance.

Start Module
IT Governance Frameworks
Consulting
Expert8 hours

IT Governance Frameworks

Integrate multiple governance frameworks. Map controls across ISO 27001, COBIT, NIST, and ITIL for comprehensive governance.

Start Module
German Compliance
Consulting
Advanced12 hours

German Compliance

Master German-specific security requirements: BSI Grundschutz, TISAX for automotive, BDSG, and KRITIS regulations.

Start Module
US Compliance
Consulting
Advanced10 hours

US Compliance

Navigate US federal and state regulations: CCPA/CPRA, HIPAA, SOX, GLBA, FedRAMP, and state privacy laws.

Start Module
UK Compliance
Consulting
Intermediate8 hours

UK Compliance

Master UK-specific requirements: UK GDPR, NIS Regulations, Cyber Essentials, and FCA requirements.

Start Module
Swiss Compliance
Consulting
Intermediate6 hours

Swiss Compliance

Swiss data protection and security requirements: revDSG/FADP, FINMA regulations, and Swiss-specific standards.

Start Module
EU Regulations
Consulting
Advanced12 hours

EU Regulations

Master new EU cybersecurity regulations: NIS2 Directive, DORA for financial sector, AI Act, and Cyber Resilience Act.

Start Module
Cloud Security & Compliance
Consulting
Advanced12 hours

Cloud Security & Compliance

Secure cloud environments across AWS, Azure, and GCP. Implement cloud-native security controls and achieve cloud compliance.

Start Module
Incident Response Management
Consulting
Advanced10 hours

Incident Response Management

Build and manage incident response capabilities. Develop IR plans, run tabletop exercises, and handle security incidents professionally.

Start Module
vCISO Services
Consulting
Expert10 hours

vCISO Services

Deliver Virtual CISO services to clients. Learn to assess, advise, and lead security programs as an external security executive.

Start Module
Business Continuity & DR
Consulting
Advanced10 hours

Business Continuity & DR

Develop comprehensive BCP/DR programs. Conduct business impact analysis, design recovery strategies, and test continuity plans.

Start Module
M&A Security Due Diligence
Consulting
Expert8 hours

M&A Security Due Diligence

Conduct security assessments for mergers and acquisitions. Identify risks, assess security posture, and support integration planning.

Start Module
Security Awareness Programs
Consulting
Intermediate8 hours

Security Awareness Programs

Design and implement effective security awareness programs. Create engaging training, run phishing simulations, and measure culture change.

Start Module
Privacy Engineering
Consulting
Advanced10 hours

Privacy Engineering

Implement privacy by design. Build privacy-respecting systems, conduct DPIAs, and operationalize privacy requirements.

Start Module
Supply Chain Security
Consulting
Advanced10 hours

Supply Chain Security

Master the "massive" field of Software Supply Chain Security. Deep dive into SCA, SBOM (CycloneDX/SPDX), VEX, and secure CI/CD pipelines.

Start Module
Consulting Methodology
Consulting
Beginner6 hours

Consulting Methodology

Master professional consulting practices. Project management, engagement models, and delivery excellence.

Start Module
Premium Feature

Design Your Own Labs

Unlock the Lab Designer to create custom scenarios, challenges, and attack paths, and experience the Predator in a deeper level. Share them with your team or the community.

  • Custom Network Topologies
  • Upload Vulnerable VMs
  • Scripted Flag Generation
  • Private Team Leaderboard