# Home Base

### Onboarding

*Creating accounts and getting set up for your missions...*

{% content-ref url="onboarding" %}
[onboarding](https://cybersleuth.gitbook.io/cybersleuth/onboarding)
{% endcontent-ref %}

### Day 1

*Introduction to Programming in Cybersecurity*

{% content-ref url="day-1/briefing" %}
[briefing](https://cybersleuth.gitbook.io/cybersleuth/day-1/briefing)
{% endcontent-ref %}

{% content-ref url="day-1/case-1-locked-zip-files" %}
[case-1-locked-zip-files](https://cybersleuth.gitbook.io/cybersleuth/day-1/case-1-locked-zip-files)
{% endcontent-ref %}

{% content-ref url="day-1/case-2-scraping-websites" %}
[case-2-scraping-websites](https://cybersleuth.gitbook.io/cybersleuth/day-1/case-2-scraping-websites)
{% endcontent-ref %}

### Day 2

*Foundations of Cryptography*

{% content-ref url="day-2/briefing" %}
[briefing](https://cybersleuth.gitbook.io/cybersleuth/day-2/briefing)
{% endcontent-ref %}

{% content-ref url="day-2/case-1-starting-from-the-basics" %}
[case-1-starting-from-the-basics](https://cybersleuth.gitbook.io/cybersleuth/day-2/case-1-starting-from-the-basics)
{% endcontent-ref %}

{% content-ref url="day-2/case-2-caesar-cipher-not-the-salad" %}
[case-2-caesar-cipher-not-the-salad](https://cybersleuth.gitbook.io/cybersleuth/day-2/case-2-caesar-cipher-not-the-salad)
{% endcontent-ref %}

{% content-ref url="day-2/case-3-reading-about-the-book-cipher" %}
[case-3-reading-about-the-book-cipher](https://cybersleuth.gitbook.io/cybersleuth/day-2/case-3-reading-about-the-book-cipher)
{% endcontent-ref %}

### Day 3

*Forensics and Steganography*

{% content-ref url="day-3/briefing" %}
[briefing](https://cybersleuth.gitbook.io/cybersleuth/day-3/briefing)
{% endcontent-ref %}

{% content-ref url="day-3/case-1-whats-in-an-image" %}
[case-1-whats-in-an-image](https://cybersleuth.gitbook.io/cybersleuth/day-3/case-1-whats-in-an-image)
{% endcontent-ref %}

{% content-ref url="day-3/case-2-secret-secret-on-the-wall" %}
[case-2-secret-secret-on-the-wall](https://cybersleuth.gitbook.io/cybersleuth/day-3/case-2-secret-secret-on-the-wall)
{% endcontent-ref %}

{% content-ref url="day-3/case-3-files-in-files" %}
[case-3-files-in-files](https://cybersleuth.gitbook.io/cybersleuth/day-3/case-3-files-in-files)
{% endcontent-ref %}

### Day 4

*Weak Websites*

{% content-ref url="day-4/briefing" %}
[briefing](https://cybersleuth.gitbook.io/cybersleuth/day-4/briefing)
{% endcontent-ref %}

{% content-ref url="day-4/case-1-pandamonium" %}
[case-1-pandamonium](https://cybersleuth.gitbook.io/cybersleuth/day-4/case-1-pandamonium)
{% endcontent-ref %}

{% content-ref url="day-4/case-2-admins-only" %}
[case-2-admins-only](https://cybersleuth.gitbook.io/cybersleuth/day-4/case-2-admins-only)
{% endcontent-ref %}

{% content-ref url="day-4/case-3-imminent-disaster" %}
[case-3-imminent-disaster](https://cybersleuth.gitbook.io/cybersleuth/day-4/case-3-imminent-disaster)
{% endcontent-ref %}

{% content-ref url="day-4/case-4-deception" %}
[case-4-deception](https://cybersleuth.gitbook.io/cybersleuth/day-4/case-4-deception)
{% endcontent-ref %}

### Day 5

*Linux & OSINT*

{% content-ref url="day-5/briefing" %}
[briefing](https://cybersleuth.gitbook.io/cybersleuth/day-5/briefing)
{% endcontent-ref %}

{% content-ref url="day-5/case-1-exposed-files" %}
[case-1-exposed-files](https://cybersleuth.gitbook.io/cybersleuth/day-5/case-1-exposed-files)
{% endcontent-ref %}

{% content-ref url="day-5/case-2-vulnerable-people" %}
[case-2-vulnerable-people](https://cybersleuth.gitbook.io/cybersleuth/day-5/case-2-vulnerable-people)
{% endcontent-ref %}
