WELCOME TO,

NetEducation

LEARNING PLATFORM

START

lIST OF COURSES

STEGANOGRAPHY

Steganography, the practice of hiding information, has been around for centuries. More recently, it has been associated with some forms of cyber attacks. Read on to learn more about steganography examples, types of steganography, and steganography in cyber security.

JOIN
img

OSINT

Open Source Intelligence (OSINT) involves gathering and analyzing publicly available information from various sources, such as social media, websites, news, and public records. It is widely used in cybersecurity, law enforcement, and competitive intelligence. OSINT leverages tools and techniques to collect and process data efficiently. The goal is to derive actionable insights while ensuring ethical and legal compliance.

JOIN
img

Digital Forensic

Digital forensics involves the identification, preservation, analysis, and presentation of electronic evidence from digital devices like computers, smartphones, and networks. It is crucial in investigating cybercrimes, data breaches, and other illegal activities. Specialists use various tools and techniques to recover data, even if it has been deleted or encrypted. The process ensures that the evidence is admissible in court by maintaining a strict chain of custody and following legal protocols.

JOIN
img

Crytography

Cryptography is the practice of securing information through encoding techniques to prevent unauthorized access. It involves algorithms and protocols to transform readable data (plaintext) into an unreadable format (ciphertext) and vice versa. Cryptography ensures confidentiality, integrity, authenticity, and non-repudiation of data. It is fundamental in securing communications, protecting sensitive information, and enabling secure transactions in digital environments.

JOIN
img

Quiz

Time Crisis: Save the Day

You as a time traveler from the future on a mission to prevent a catastrophic alteration of Malaysian history. Someone has stolen a vital artifact, threatening to disrupt a pivotal moment in Malaysia's past. Your task is to locate and retrieve the missing item before it's too late. Can you save the important day in Malaysian history and restore the timeline to its rightful course? (OSINT,Stega,Encryption)

START

Mystery Box Cipher

Players find a locked box with a combination lock. Hidden around the room are various objects with numbers and symbols. Each object has a clue that points to a corresponding number or symbol needed to unlock the box. For example, a book might have a highlighted number on a specific page, or a painting might contain hidden numbers when viewed under a UV light. The final combination unlocks the box, revealing the next clue or a key.

START

Hidden Message Puzzle

A series of letters or symbols are scattered around the room, each piece of paper or object holding a part of the message. Players need to find and assemble all pieces in the correct order to reveal a hidden phrase or code. For instance, pieces could be hidden inside books, taped under tables, or embedded in a jigsaw puzzle. The completed message could direct players to a specific location in the room.

START

Chemical Reaction

Players are presented with a locked cabinet and several vials of chemicals, each labeled with different colors and symbols. A nearby note hints at a safe combination that can only be revealed by performing the correct chemical reaction. For example, mixing the right chemicals might create a reaction that produces a specific color or reveals a hidden message on a piece of paper. The result of the reaction provided.

START

Course Management System

Join Course

Forum