A hands-on course

See what's really on a network —
and learn why you can never see all of it.

Network security starts with one deceptively hard question: what is actually here? This course teaches discovery and asset inventory the way it's really practiced — as measurement under uncertainty, not button-pushing. Each chapter pairs concepts with a tool you can run on a simulated network and your own.

Chapters
Live
CHAPTER 01

Network Discovery & Asset Inventory

Find devices with passive and active methods. Learn existence vs. identity, the discovery gap, and why completeness and soundness must be judged together. Run it on a simulated network, then your own.

Coming soon
CHAPTER 02

Enrichment & Fingerprinting

Turn "probably a Hikvision" into a confident device identity using corroborating signals — banners, protocols, OUI, and behavior.

Coming soon
CHAPTER 03

Vulnerability & Credential Risk

Map identified devices to CVEs, default credentials, and firmware age. Detective analytics built on a sound inventory.

Coming soon
CHAPTER 04

Attack-Path Reasoning

Predictive analytics: how an attacker chains exposures across the devices you found into a path through the network.

How each chapter works

Every chapter has three parts: Lessons (the concepts, drawn from real lab exercises), a Learn mode (a simulated network with known ground truth, so you can measure how much you found), and a Scan Mine mode (run real, safe discovery commands on your own network and analyze the results in your browser). Nothing you scan ever leaves your device.