Overview
Think like an attacker. Defend like an architect. From packet analysis to red team operations β every concept is taught hands-on, in real two-container Docker labs with verified terminal output.
πΊοΈ Choose Your Level
π± Foundations
Networking, cryptography, attack vectors, password security, social engineering. Build your mental model of how systems are broken β and protected. No prior experience needed.
βοΈ Practitioner
Full OWASP Top 10 coverage (A01βA10), web app penetration testing with Docker labs, API security, authentication bypass, session attacks, and a pentest capstone.
π€ AI-Assisted Security
AI-driven penetration testing with Shannon, automated vulnerability discovery, AI agents for recon and exploitation, Claude Code integration, and modern security orchestration. Real-world Juice Shop lab with 12 documented vulnerabilities.
π Curriculum Overview
Build your security foundation β understand before you attack
01β04
OSI Model, TCP/IP fundamentals, DNS deep dive, cryptography basics
05β08
Hashing & integrity, PKI & certificates, SSL/TLS, common attack vectors
09β12
Linux security, network recon with nmap, password security, social engineering
13β16
Malware types, firewalls & IDS, VPN & tunneling, web security basics
17β20
Wireless security, incident classification, security tools survey, CTF intro
Tools: nmap, openssl, hashcat concepts, python3, curl
Attack and defend real web applications β two-container Docker architecture
01β10
OWASP A01βA10 β every Top 10 vulnerability with live exploitation and mitigation
11
Web Recon: nmap, whatweb, gobuster directory brute-force
12
API Security: 6 attack vectors including BOLA, mass assignment, injection
13β14
Authentication Bypass, File Upload vulnerabilities
15β17
XXE Injection, Business Logic flaws, Session Management attacks
18β20
CSRF exploitation, Security Headers bypass, Pentest Capstone
Architecture: Kali attacker container β Flask victim container via Docker network
Professional-grade offensive security β all Docker-verified
01β05
Blind SQLi (time-based), SSTI Jinja2, OS Command Injection, Pickle Deserialization, YAML injection
06β10
JWT Algorithm Confusion, Race Conditions, Advanced XSS+CSP Bypass, GraphQL IDOR, OAuth 2.0
11β15
SSRF Advanced, NoSQL Injection, HTTP Parameter Pollution, Advanced Recon, Capstone
16β18
Linux Privilege Escalation, Lateral Movement & Persistence, Network Pentesting
19β20
Malware Analysis & Digital Forensics, Threat Hunting & Red Team Capstone
Images: zchencow/innozverse-advanced:latest (victim) Β· zchencow/innozverse-kali:latest (attacker)
Design and govern enterprise security at scale
Labs
Topics
------
--------
01β05
SOC architecture, Elastic SIEM design, Threat Intelligence Platform (STIX/TAXII), Zero Trust (NIST SP 800-207), Cloud Security (CSPM/CWPP/CASB)
06β10
IAM architecture (SAML/OIDC/JWT/RBAC/PAM), PKI & CA design (3-tier, OCSP, SPIFFE), SOAR automation, Container & Kubernetes security, DevSecOps pipeline
11β15
Incident Response (NIST SP 800-61), Threat Hunting (PEAK/ATT&CK), Red Team Operations, BCP & Disaster Recovery, Compliance Frameworks (ISO 27001/SOC 2/PCI DSS)
16β20
Vulnerability Management (CVSS/EPSS), DLP Architecture, Network Security Review, Security Metrics & FAIR Risk Quantification, Capstone Enterprise Architecture
20 Labs Β· Docker-verified β Start here β
π³ Quick Start
All practitioner and advanced labs use a two-container architecture. Pull both images first:
Then follow the lab instructions β all commands run inside the attacker container.
Foundations labs run directly on Ubuntu/macOS/WSL:
Verify your setup works with this one-liner:
Expected output: Nmap 7.xx ... Python 3.x.x ... β
Ready
β‘ Lab Format
Every lab follows a consistent, professional format:
Each lab includes:
π― Objective β what you'll achieve and why it matters in real engagements
π Background β the theory behind the attack or defence
π¬ 8 step-by-step instructions β real commands with real tools
πΈ Verified output β actual terminal output captured from live Docker runs
π‘οΈ Mitigations β how to fix or defend against each vulnerability
π‘ Tip callouts β explains why not just how
π Certifications Aligned
CompTIA Security+
Foundations + Practitioner
CEH β Certified Ethical Hacker
Practitioner + Advanced
OSCP (OffSec)
Advanced
CISSP
Architect
AWS Security Specialty
Advanced β Architect
OWASP WSTG
Practitioner (full A01βA10 coverage)
β οΈ Legal & Ethical Notice
All techniques in this curriculum are for authorised use only.
Only attack systems you own or have explicit written permission to test
All Docker labs use isolated internal networks β no internet-facing targets
Never apply offensive techniques to production systems or third-party targets
Unauthorised computer access is a criminal offence in most jurisdictions (Computer Fraud and Abuse Act, Computer Misuse Act, etc.)
π Start Here
New to cybersecurity? Start with Lab 01: OSI Model Deep Dive β no prior experience required.
Know web development? Jump to Lab 04: SQL Injection (OWASP A03) β build a vulnerable Flask app and exploit it in 60 minutes.
Coming from IT/sysadmin? Start at Lab 09: Linux Security Basics β your existing knowledge will accelerate learning.
Ready for red team? Go straight to Advanced Lab 01: Blind SQL Injection β assumes practitioner-level foundations.
Last updated
