// SYSTEM ONLINE — IGOR CYBER v1.0

Stop Watching. Start Fighting.

The new standard for cybersecurity training. Experience the pressure of live environments, master the art of Red, Blue, and Gray, and prove your skills in real-time competitions.

Igor Cyber IGOR CYBER
PLATFORM STATUS EARLY ACCESS
ENVIRONMENT RED // BLUE // PURPLE
PROGRESSION PATHS 03 LOADED
THREAT LEVEL LIVE

Why Current Training
Is Broken.

Most cybersecurity education is a lecture hall disguised as a platform. You watch videos, read PDFs, and then "guess" what you learned.

Real-world security isn't a multiple-choice test. It is live. It is adversarial. It is high-stakes. When a breach happens, there is no "rewind" button.

Igor Cyber is built on one premise:

You are only prepared when you are forced to react.

Red. Blue. Purple.

Three distinct tracks. Each one a full curriculum — sequential modules that build on each other, ending in live competition. Pick the path that fits your instinct.

// OFFENSIVE
Red Path
Think like the attacker
// DEFENSIVE
Blue Path
Fortify. Detect. Respond.
// INTELLIGENCE
Purple Path
Operate between the lines
Red Path
Master the attacker's mindset. Modules span the full offensive lifecycle — from your first recon run to evading detection on a live network.
Focus Offensive Ops
Style Hands-on Labs
Modules Always Growing
Enlist in Red Path
Domain
Reconnaissance
Passive & active recon Service fingerprinting Attack surface mapping More modules in this domain
Domain
Exploitation
CVE analysis & weaponization Payload staging & delivery Initial access techniques More modules in this domain
Domain
Privilege Escalation
Linux & Windows privesc paths Token impersonation SUID/SUDO misconfigurations More modules in this domain
Domain
Lateral Movement
Credential harvesting Pivoting & tunneling C2 frameworks More modules in this domain
Domain
Evasion
AV & EDR bypass Log manipulation Traffic obfuscation More modules in this domain
Domain
Persistence
Scheduled task & cron abuse Registry persistence Backdoor implantation More modules in this domain
New modules are added continuously as the platform grows — this list is just the start.
Path Culmination
The Arena — Live Red vs. Blue Competition
Coming Soon
Blue Path
Build systems that hold. Modules cover every layer of modern defense — from hardening a fresh install to containing a breach in progress.
Focus Defensive Ops
Style Hands-on Labs
Modules Always Growing
Enlist in Blue Path
Domain
System Hardening
OS baseline configuration CIS benchmark application Service minimization More modules in this domain
Domain
Access Control
Least privilege enforcement Role-based access design Permission auditing More modules in this domain
Domain
Logging & Monitoring
SIEM deployment & tuning Log aggregation pipelines Baseline deviation alerting More modules in this domain
Domain
Intrusion Detection
IDS/IPS rule authoring Network traffic analysis MITRE ATT&CK mapping More modules in this domain
Domain
Incident Response
Triage & containment Eradication procedures Evidence documentation More modules in this domain
Domain
Network Defense
Firewall architecture Segmentation & DMZ design Traffic filtering strategy More modules in this domain
New modules are added continuously as the platform grows — this list is just the start.
Path Culmination
The Arena — Live Red vs. Blue Competition
Coming Soon
Purple Path
See the whole board. Modules train you to gather, analyze, and act on intelligence that neither Red nor Blue has access to on their own.
Focus Intel & Analysis
Style Hands-on Labs
Modules Always Growing
Enlist in Purple Path
Domain
OSINT
Open-source data collection Social & digital footprinting Intelligence verification More modules in this domain
Domain
Human Intelligence
Social engineering mechanics Pretexting & vishing Recognizing & countering SE More modules in this domain
Domain
Threat Intelligence
Threat actor profiling IOC analysis & pivoting Actionable intel reporting More modules in this domain
Domain
Threat Hunting
Hypothesis-driven hunting Memory & log forensics Adversary behavior modeling More modules in this domain
Domain
Deception Operations
Honeypot deployment Canary token strategies Misdirection networks More modules in this domain
Domain
Counter-Intelligence
Attribution analysis Disinformation detection Operational security More modules in this domain
New modules are added continuously as the platform grows — this list is just the start.
Path Culmination
The Arena — Live Gray Team Event
Coming Soon

The Playground.

Every module on every path comes with its own dedicated practice environment. You don't watch someone else exploit a vulnerability — you do it yourself, against a live system built specifically for that module's objective.

Module-Specific Environments
Each module spins up its own isolated lab. The vulnerabilities, services, and configurations are intentional — built to teach the exact skill that module covers.
Supporting Services
Labs aren't just targets. They include running services, logs, and supporting infrastructure — so you're working in something realistic, not an isolated toy.
Evidence-Based Completion
You don't complete a module by clicking through a quiz. You complete it by proving what you did. Find the log, capture the flag, document the chain. The work speaks for itself.
igor-lab — red/priv-esc-01
$igor lab start --module priv-esc-01
✓ Environment provisioned [RED-LAB]
Target: 10.0.0.42 — SSH open
Objective: Escalate to root, retrieve /root/flag.txt
$ssh operator@10.0.0.42
✓ Connected as: operator [low-priv]
$sudo -l
(root) NOPASSWD: /usr/bin/find
$sudo find . -exec /bin/sh \; -quit
✓ Shell acquired — whoami: root
$igor submit --evidence /root/flag.txt
MODULE COMPLETE — priv-esc-01 ✓
$
"Preparing you for the inevitable,
one module at a time."
— IGOR CYBER PLATFORM — EARLY ACCESS LAUNCHING SOON —