The Cyber-Dojo Labs

Practical, industry-grade Python training modules. From foundational network scripting to enterprise cloud architecture.

Track 01: Core Python & Defense

Foundational scripting and basic cryptography.

Lab 00: Python 101 Bootcamp

Start Here

Absolute Beginner?

If you have never written a line of code in your life, start here. This interactive, split-screen bootcamp will teach you Variables, Logic, and Loops in 10 minutes directly in your browser.

Lab 01: Secure Password Generator

Beginner

The Mission

The first line of defense is a cryptographic key. In this lab, you will write a Python script that automatically generates a highly secure, 16-character password using true randomness.

Launch Interactive Lab ->
import random
import string

chars = string.ascii_letters + string.digits + "!@#$%^&*"
password = "".join(random.choice(chars) for _ in range(16))
print("SecureT Key:", password)

Track 02: Cyber Operations

Ethical hacking, network mapping, and data encryption.

Lab 02: Cryptographic Data Vault

Cyber Ops

The Mission

Learn how ransomware locks files, and how SecureT protects them. You will use the cryptography library to generate an AES encryption key, encrypt a secret message, and then decrypt it.

  • Install requirement: pip install cryptography
  • Learn symmetric encryption (Fernet).
from cryptography.fernet import Fernet

# 1. Generate the Master Key
key = Fernet.generate_key()
cipher = Fernet(key)

# 2. Encrypt the target data
secret_data = b"SecureT_Classified_Intel"
encrypted_data = cipher.encrypt(secret_data)
print(f"LOCKED: {encrypted_data}")

# 3. Decrypt with the Key
decrypted_data = cipher.decrypt(encrypted_data)
print(f"UNLOCKED: {decrypted_data.decode()}")

Lab 03: Stealth Port Scanner

Network Sec

The Mission

Before defending a network, you must learn how hackers map it out. Use Python's built-in socket library to scan a local server and find open vulnerabilities (ports).

  • Understand TCP/IP protocols.
  • Write network connection loops.
import socket

target_ip = "127.0.0.1" # Localhost only for safety
print(f"[*] Commencing scan on {target_ip}")

for port in [21, 22, 80, 443, 3306]:
    sock = socket.socket(socket.AF_INET, socket.SOCK_STREAM)
    sock.settimeout(1)
    
    # Returns 0 if connection succeeds
    result = sock.connect_ex((target_ip, port))
    if result == 0:
        print(f"[!] Alert: Port {port} is OPEN")
    sock.close()

Interactive: Enterprise Threat Modeler

Architecture Sandbox

The Mission

Learn the STRIDE threat modeling methodology. Click on different parts of a simulated enterprise network to instantly generate threat profiles and Python mitigation strategies.

# The STRIDE Framework:

S - Spoofing

T - Tampering

R - Repudiation

I - Information Disclosure

D - Denial of Service

E - Elevation of Privilege

Track 03: Artificial Intelligence

Machine learning basics to advanced API integrations.

Lab 04: AI Sentiment Analysis

Intermediate AI

The Mission

Teach your code to read emotions. Using the TextBlob library, write a script that analyzes text (like social media posts) and determines if the tone is positive or negative.

from textblob import TextBlob

feedback = "SecureT's new firewall system is incredibly fast!"
analysis = TextBlob(feedback)

if analysis.sentiment.polarity > 0:
    print("[RESULT] Positive Sentiment 🟢")
else:
    print("[RESULT] Negative/Neutral 🔴")

Lab 05: Automated Threat Scraper

Advanced AI

The Mission

Use Python to scrape hacker news feeds and integrate the OpenAI API to automatically summarize incoming threats.

Launch Full AI Lab ->
# Preview: Sending scraped data to AI
import openai

response = openai.ChatCompletion.create(
    model="gpt-3.5-turbo",
    messages=[
        {"role": "system", "content": "Summarize this cyber threat."}
    ]
)

Track 04: Enterprise Cloud

Zero-trust architecture and secure deployments.

Lab 06: Enterprise Cloud Architecture

Researchers / Pro

The Mission

Writing a Python script is only step one. Architect secure, highly available Python backends using enterprise cloud infrastructure.

# Enterprise Checklist:

[ ] Containerize Python app (Docker)

[ ] Push to secure Container Registry

[ ] Configure VPC networks

[ ] Assign least-privilege IAM roles