Track 01: Core Python & Defense
Foundational scripting and basic cryptography.
Lab 00: Python 101 Bootcamp
Start HereAbsolute Beginner?
If you have never written a line of code in your life, start here. This interactive, split-screen bootcamp will teach you Variables, Logic, and Loops in 10 minutes directly in your browser.
Lab 01: Secure Password Generator
BeginnerThe Mission
The first line of defense is a cryptographic key. In this lab, you will write a Python script that automatically generates a highly secure, 16-character password using true randomness.
import random
import string
chars = string.ascii_letters + string.digits + "!@#$%^&*"
password = "".join(random.choice(chars) for _ in range(16))
print("SecureT Key:", password)
Track 02: Cyber Operations
Ethical hacking, network mapping, and data encryption.
Lab 02: Cryptographic Data Vault
Cyber OpsThe Mission
Learn how ransomware locks files, and how SecureT protects them. You will use the cryptography library to generate an AES encryption key, encrypt a secret message, and then decrypt it.
- Install requirement:
pip install cryptography - Learn symmetric encryption (Fernet).
from cryptography.fernet import Fernet
# 1. Generate the Master Key
key = Fernet.generate_key()
cipher = Fernet(key)
# 2. Encrypt the target data
secret_data = b"SecureT_Classified_Intel"
encrypted_data = cipher.encrypt(secret_data)
print(f"LOCKED: {encrypted_data}")
# 3. Decrypt with the Key
decrypted_data = cipher.decrypt(encrypted_data)
print(f"UNLOCKED: {decrypted_data.decode()}")
Lab 03: Stealth Port Scanner
Network SecThe Mission
Before defending a network, you must learn how hackers map it out. Use Python's built-in socket library to scan a local server and find open vulnerabilities (ports).
- Understand TCP/IP protocols.
- Write network connection loops.
import socket
target_ip = "127.0.0.1" # Localhost only for safety
print(f"[*] Commencing scan on {target_ip}")
for port in [21, 22, 80, 443, 3306]:
sock = socket.socket(socket.AF_INET, socket.SOCK_STREAM)
sock.settimeout(1)
# Returns 0 if connection succeeds
result = sock.connect_ex((target_ip, port))
if result == 0:
print(f"[!] Alert: Port {port} is OPEN")
sock.close()
Interactive: Enterprise Threat Modeler
Architecture SandboxThe Mission
Learn the STRIDE threat modeling methodology. Click on different parts of a simulated enterprise network to instantly generate threat profiles and Python mitigation strategies.
# The STRIDE Framework:
S - Spoofing
T - Tampering
R - Repudiation
I - Information Disclosure
D - Denial of Service
E - Elevation of Privilege
Track 03: Artificial Intelligence
Machine learning basics to advanced API integrations.
Lab 04: AI Sentiment Analysis
Intermediate AIThe Mission
Teach your code to read emotions. Using the TextBlob library, write a script that analyzes text (like social media posts) and determines if the tone is positive or negative.
from textblob import TextBlob
feedback = "SecureT's new firewall system is incredibly fast!"
analysis = TextBlob(feedback)
if analysis.sentiment.polarity > 0:
print("[RESULT] Positive Sentiment 🟢")
else:
print("[RESULT] Negative/Neutral 🔴")
Lab 05: Automated Threat Scraper
Advanced AIThe Mission
Use Python to scrape hacker news feeds and integrate the OpenAI API to automatically summarize incoming threats.
Launch Full AI Lab -># Preview: Sending scraped data to AI
import openai
response = openai.ChatCompletion.create(
model="gpt-3.5-turbo",
messages=[
{"role": "system", "content": "Summarize this cyber threat."}
]
)
Track 04: Enterprise Cloud
Zero-trust architecture and secure deployments.
Lab 06: Enterprise Cloud Architecture
Researchers / ProThe Mission
Writing a Python script is only step one. Architect secure, highly available Python backends using enterprise cloud infrastructure.
# Enterprise Checklist:
[ ] Containerize Python app (Docker)
[ ] Push to secure Container Registry
[ ] Configure VPC networks
[ ] Assign least-privilege IAM roles