Cybersecurity Awareness
Understand digital threats with interactive modules, real-time analysis tools and learning paths tailored to your level.
24
Modules
6
Categories
2
Languages
100%
Free & Open
What is mlab Academy?
mlab Academy is a free platform designed to help everyone understand digital threats. Each module combines clear explanations, interactive tools connected to the mlab.sh API, and hands-on exercises to learn how to identify and analyze cyber threats.
Threat Analysis
Hashes, IPs, domains, IOCs, malware -- cybersecurity fundamentals explained simply.
Practical Tools
Hash lookup, IP reputation, domain scan, IOC classifier, phishing scorer -- powered by mlab.sh.
Learning Paths
3 paths tailored to your level, interactive quizzes and a comprehensive glossary.
Who is it for?
SOC Analysts
Strengthen your threat analysis and alert triage skills.
Corporate Employees
Learn to recognize phishing and everyday digital scams.
Cyber Students
Structured paths and hands-on exercises to build your foundations.
General Public
No technical prerequisites. Understand cybersecurity in plain language.
Fundamentals
What is a file hash?
Understanding digital fingerprints: how a hash uniquely identifies a file.
ExploreWhat is an IP address?
The postal address of the Internet: how every device is identified on the network.
ExploreWhat is a domain?
Human-readable names: how domains translate IP addresses into easy-to-remember names.
ExploreWhat is an IOC?
Clues of a cyberattack: learning to recognize indicators of compromise.
ExploreWhat is malware?
Viruses, ransomware, trojans: understanding the different families of malicious software.
ExploreFile Analysis
Understanding MD5, SHA1, SHA256
Deep dive into hashing algorithms: strengths, weaknesses, and use cases.
ExploreReading a file analysis report
Deciphering sandbox and antivirus reports: understanding verdicts and key indicators.
ExploreRecognizing a malicious file
Warning signs to look for before opening a suspicious file.
ExploreNetwork Analysis
Reading an IP reputation
Assessing the danger of an IP address using reputation databases and threat intelligence.
ExploreUnderstanding ASN and geolocation
Identifying who hosts an IP and where it comes from using autonomous system numbers.
ExploreAnalyzing a suspicious domain
Techniques for evaluating whether a domain is legitimate or potentially malicious.
ExploreWhat is DNS?
The Internet's phone book: how DNS translates domain names into IP addresses.
ExplorePhishing & Social Engineering
Recognizing a phishing link
Techniques for detecting fraudulent URLs that mimic legitimate websites.
ExploreAnalyzing a suspicious email
Dissecting email headers to identify phishing and spoofing attempts.
ExploreSpoofing techniques
Digital identity theft: email spoofing, caller ID spoofing, and domain spoofing.
ExploreWhat is social engineering?
Social engineering attacks: how scammers hack humans instead of systems, and what to watch for.
ExploreSmishing and vishing explained
SMS phishing (smishing) and voice phishing (vishing): the phone-based scams that bypass your spam filter.
ExploreThreat Intelligence
What is a threat intel feed?
Threat intelligence feeds: how they work and why they are essential.
ExploreHow to read a CTI report
Deciphering a Cyber Threat Intelligence report: structure, indicators, and recommendations.
ExploreMajor threat families
APTs, hacktivists, cybercriminals, insiders: mapping cyber threat actors.
Explore