Activity
Mon
Wed
Fri
Sun
Apr
May
Jun
Jul
Aug
Sep
Oct
Nov
Dec
Jan
Feb
Mar
What is this?
Less
More

Owned by Aussie

Cybersecurity BootCamp

46 members • Free

Aussie cyber pro with hands-on home lab builder sharing SOC ops, pentesting labs, playbooks & cert prep. Level up your blue-team game Down Under!

Memberships

Skoolaroos

154 members • Free

AI Cyber Value Creators

8.3k members • Free

Cyber Hub | Empirical Training

13.1k members • Free

AI Academy (Free)

2.7k members • Free

AI Automation Society

274.3k members • Free

CyberCircle

84.6k members • Free

Skoolers

190.2k members • Free

13 contributions to Cybersecurity BootCamp
Welcome to the Bootcamp, Legends! 🎖️
G'day and welcome aboard. I'm Aussie Mr Cyber – your instructor, lab architect, and fellow cyber nerd. I've been in the trenches doing SOC work, building home labs, training students in VET, and now I'm here to fast-track your journey into cybersecurity with hands-on, no-BS training. This bootcamp isn't your typical "watch videos and hope for the best" course. We're building real labs, running real attacks and defences, and getting you job-ready with skills employers actually want to see. Your turn – introduce yourself:Drop a comment below with: - Your name (first name or alias is fine) - Where you're based - Your current background (IT, complete beginner, career changer?) - What you want to achieve by the end of this bootcamp (land a SOC role, level up skills, smash a cert?) This is your cohort – get to know each other. You'll be learning, troubleshooting, and celebrating wins together. Let's make this count 💪 — Aussie Mr Cyber
0 likes • 18d
So have you built a home lab yet
Welcome to Labs & Walkthroughs 🔬
This is where theory meets practice, mate. Labs & Walkthroughs is your go-to spot for hands-on, step-by-step guides that actually teach you how to DO the work – not just read about it. What you'll find here: - Full lab build guides (home SOC setups, attack ranges, SIEM deployments) - Tool walkthroughs and configurations (Splunk, Wazuh, Suricata, Metasploit, etc.) - CTF writeups and TryHackMe / HackTheBox solutions - Real-world scenario labs (incident response, threat hunting, exploitation) - Troubleshooting tips when things inevitably break The goal? Get your hands dirty. Break stuff. Fix it. Learn from it. Whether you're setting up your first VM or building a full enterprise-style lab, this is where we document the journey and help each other get unstuck. Drop a comment below: - What's the first lab or walkthrough you want to see? - What are you currently stuck on or trying to build? - Any tools or scenarios you're keen to dive into? Let's build, break, and learn together 🛠️ — Aussie Mr Cyber
0
0
Welcome to Pentesting & Adversary Emulation ⚔️
Alright red teamers, pentesters, and aspiring hackers (the ethical kind) – this is where we sharpen the sword. This section is all about thinking like an attacker so defenders can get better at stopping us. We'll cover: - Pentesting methodologies and kill chains (MITRE ATT&CK, Cyber Kill Chain) - Tools of the trade: Metasploit, Burp Suite, BloodHound, Cobalt Strike, etc. - Adversary emulation and red team tactics - Exploit development, privilege escalation, and lateral movement - Building attack labs that let you safely break things and learn Here's the deal: This isn't about being a script kiddie or causing chaos. It's about understanding how real threats operate so you can test defences properly, find gaps before the bad guys do, and become a better security professional overall. Drop a comment and let us know: - What's your current level? (Curious beginner, CEH student, seasoned pentester?) - What attack techniques or tools do you want to master? - Any specific scenarios you want to practice or discuss? Let's get offensive (responsibly) 🎯 — Aussie Mr Cyber
Welcome to SOC Ops & Blue Teams 🛡️
G'day team, This is your hub for everything Security Operations Centre (SOC) and Blue Team defence. Whether you're aiming for your first SOC analyst role, already in the trenches, or just keen to learn how defenders actually operate – you're in the right place. What we'll cover here: - Real-world SOC workflows and tools (SIEM, EDR, IDS/IPS) - Threat hunting, incident response, and log analysis - Building home labs that mirror actual SOC environments - Detection engineering and writing solid security rules - Career tips: certs, interviews, and landing that first role This isn't theory-only fluff. We're here to get hands-on, share lab builds, break down real alerts, and help each other think like defenders who actually stop attacks—not just tick compliance boxes. Drop a comment below and tell us: - Where you're at in your blue team journey (just starting, studying, already working?) - What you're most keen to learn or improve - Any tools or topics you want us to dive into first Let's build some proper defensive skills together 💪 — Aussie Mr Cyber
0
0
Home Lab Blueprint – What’s Your Budget & Goal? Part II 💰🎯
In Part I I shared my blueprint, now I want to hear about yours. Drop in the comments: - Your rough budget (shoestring, mid-range, or “send help, I’m on eBay again”) - Your main goal (SOC analyst, pentester, DFIR, “I just want to break stuff and learn”) - What gear or software you’re thinking of starting with I’ll reply with suggestions to help you shape a realistic lab plan around your budget and goal so you’re not wasting cash on the wrong kit.
0
0
1-10 of 13
Aussie Mr Cyber
1
1point to level up
@pat-hawkins-2854
Aussie cyber pro hands-on home lab builder sharing SOC ops, pentesting labs, forensics playbooks & cert prep. Level up your blue-team game Down Under!

Active 16h ago
Joined Jan 1, 2026
Sydney Australia
Powered by