Zum Hauptinhalt springen
LIVE Intel Feed
← Academy
🟢 TRACKLIVENO PRIOR KNOWLEDGE

Foundations

Zero to Defender I.

Homelab, first server, anyone who says 'I'll do security someday.'

5
missions
~31 min
total playtime
700 XP
on completion
50
languages
THE SCENARIO

You just took over a couple of servers. A homelab. A first VPS. A weekend project that accidentally became production. Nothing is on fire yet — but you can already feel that if someone looks too hard, things will break. You don't need a university course. You need to stop the five most common ways self-hosted boxes get owned.

WHY THIS TRACK

90 % of real-world self-hosted compromises exploit three things: default credentials, missing TLS hardening, and open ports nobody knew were listening. This track shuts all three down in under an hour — and teaches you to read a security scan the way an operator does, not the way a textbook does.

WHAT YOU SHIP

Concrete outcomes. No lecture notes.

  • 01A server that scores A on a real security scan, not a theoretical one
  • 02TLS with Strict-Transport-Security, CSP, and the headers Google actually checks
  • 03A UFW firewall where SSH is the only open door
  • 04An SSH config that refuses root login, refuses passwords, and accepts keys only
  • 05Your first nginx hardening patch — typed into a real simulated shell, verified by a real audit
  • 06The reflex to never `sudo anything` from a shell whose history you can't explain
IDEAL FOR
  • Indie developers shipping their first side project to a public domain
  • Homelab operators who just got burned by a bot scan
  • DevOps engineers pivoting into security without wanting to sit through 20 hours of video
  • Anyone who just read "self-hosted" in a job description and got nervous
COMPLIANCE ANGLE

Every mission in this track maps to at least one control in BSI-Grundschutz, ISO 27001 Annex A, and NIS2 Article 21. You won't graduate with a certificate you can show to an auditor — but you'll recognise the controls when the auditor names them.

I have 8 VPS boxes. I ran the Foundations track on a Sunday afternoon. By Monday morning all 8 had an A-grade SSL Labs score and a clean security audit. My old life is over.
Anon operator
Homelab, DACH region
CERTIFICATION
🏆

Defender I

Complete all 5 missions end-to-end. Final goal in each mission must be verified by the simulator (not just skipped).

  • W3C Verifiable Credential signed with `did:web:clawguru.org`
  • LinkedIn certification badge — shareable, recruiter-recognised
  • Unlocks the Stack Hardening track
  • Access to the Defender Guild Discord (invite-only, opt-in)
FAQ

Questions we already got.

Do I need Linux experience?+

No. The first two missions assume you have never opened a terminal. You type, things happen, we explain. If you already know your way around bash, you'll blow through this track in under an hour.

Is the terminal real?+

It's a fully simulated shell — xterm.js running a state machine in your browser. No real server is touched, no credentials needed, nothing reaches the network. You can also copy the commands and run them against your actual box after.

What happens if I skip a mission?+

Each mission is self-contained. Missions 1 and 2 set up context (HSTS, SSH), but you can jump straight to UFW or the Misconfig Hunt if that matches your urgency. No gates.

Does this replace a proper security audit?+

No. This is self-assessment and operator-grade hygiene. It will raise your score from 'easy target' to 'not worth the attacker's time'. For formal audits, you still want a human.

What do I get when I finish?+

A downloadable Defender I credential — a W3C Verifiable Credential signed by ClawGuru. LinkedIn-shareable. Recruiters can verify it without contacting us.

Weekly Security Report

Critical CVEs, fix guides, and hardening tips — free, every week.

DSGVO-konform·No spam, no tracking·Unsubscribe anytime
Written and validated by Schwerti · ClawGuru
Last updated: · Published:
🔒 Quantum-Resistant Mycelium Architecture
🛡️ 3M+ Runbooks – täglich von SecOps-Experten geprüft
🌐 Zero Known Breaches – Powered by Living Intelligence
🏛️ SOC2 & ISO 27001 Aligned • GDPR 100 % compliant
⚡ Real-Time Global Mycelium Network – 347 Bedrohungen in 60 Minuten
🧬 Trusted by SecOps Leaders worldwide