Our four unique bases focus on different cyber security disciplines so you can experience the breadth of the profession

CyberStart Headquarters base

Headquarters (HQ) base

Stay one step ahead of cyber-criminal gangs by solving puzzles and learning techniques like code breaking, password cracking, command line basics, binary reversing, SQL Injection and XSS.

Difficulty spectrum

Easy: 30%
Medium: 40%
Hard: 30%

What you'll learn

Cryptography
Password Security
Social Engineering
Browser Dev Tools
Encoding
Web App Attacks
Linux Command Line
JavaScript Debugging
OSINT
Steganography
File Forensics
Linux Forensics Hashing
Scripting
Network Scanning
Binary Exploitation
Reverse Engineering
Assembly Debugging
C Debugging
Log Analysis
CyberStart Moon base

Moon base

How do you always stay ahead? You learn how to build your own security tools and programs! In Moon base, you’ll learn how to program using Python, executing and running code through your own browser-based code editor.

Difficulty spectrum

Easy: 37.5%
Medium: 37.5%
Hard: 25%

What you'll learn

Python
CyberStart Forensics base

Forensics base

As an agent, you are sometimes called upon when it all goes wrong. In the Forensics base, you’ll learn the essential concepts and ideas cyber agents apply when dealing with the aftermath of a cyber security attack. Step into the shoes of a police investigator and use your skills to uncover cyber criminals digital trails.

Difficulty spectrum

Easy: 37.5%
Medium: 37.5%
Hard: 25%

What you'll learn

File Forensics
Steganography
Network Forensics
Hashing
Windows Forensics
Log Analysis
Memory Forensics
File System Forensics
Password Security
CyberStart Volcano base

Volcano base

Can you unlock Agent J’s secret base? It’s only open to those who 100% HQ. But beware, this base comes with a warning: only the most determined, relentless, and skilled will ever complete it!

Please note, Volcano base is only available to those on an enterprise licence.

Difficulty spectrum

Hard: 60%
Extreme: 40%

What you'll learn

Web App Attacks
Binary Exploitation
Network Scanning
Password Security