Please enable JavaScript to use CodeHS

Cyber Range

Add-On

An interactive lab environment where students develop real cybersecurity skills through hands-on CTF-style challenges. Run real Linux commands, solve security puzzles, and master cybersecurity concepts with labs mapped to AP Cybersecurity standards.

cyber-range@codehs:~$

$ whoami

cyber_student

$ cat flag.txt

FLAG{welcome_to_cyber_range}

Labs Mapped to AP Cybersecurity

Cyber Range challenges are carefully aligned with AP Cybersecurity curriculum standards, giving students practical experience with concepts they'll need for the AP exam and beyond.

Available as an Add-On to CodeHS Pro

Cyber Range is a separate add-on feature that enhances your CodeHS Pro subscription. Contact our team to add Cyber Range to your school or district.

Linux Challenge

$ ls -la /home/secret

drwx------ 2 root root 4096 Jan 15 10:30 .

-rw------- 1 root root 42 Jan 15 10:30 .hidden_flag

$ sudo cat /home/secret/.hidden_flag

FLAG{linux_master_unlocked}

Run Real Linux Commands

Students work in authentic Linux environments where they can run real commands, navigate file systems, manage permissions, and solve challenges using actual command-line skills that translate directly to real-world cybersecurity work.

Get More Info

CTF-Style Challenges

Engage students with gamified Capture The Flag (CTF) style problems. Each challenge presents a realistic security scenario where students must apply their knowledge to find hidden flags, earning points and building confidence as they progress through increasingly complex puzzles.

🔐 Cryptography

Caesar's Secret Message

Beginner
🌐 Web Security

SQL Injection 101

Advanced

Challenge Topics

Explore a comprehensive range of cybersecurity topics through hands-on challenges

🐧

Linux Basics

Master command line fundamentals, file permissions, process management, and shell scripting.

Who Am I? Permission Puzzle Grep Detective
🔐

Cryptography

Learn encryption, decryption, hashing, and cryptographic protocols through practical challenges.

Caesar Cipher Base64 Basics RSA Key Lab
🌐

Web Security

Discover web vulnerabilities, XSS, SQL injection, and security best practices for web applications.

View Source Cookie Monster XSS Playground
📡

Network Security

Analyze network traffic, understand protocols, and learn to identify network-based attacks.

Packet Detective Port Scanner DNS Detective
🔍

Forensics

Investigate digital evidence, recover hidden data, and analyze system artifacts like a cyber detective.

File Recovery Memory Analysis Log Detective
💣

Binaries

Understand binary analysis, reverse engineering fundamentals, and executable file structures.

Binary Basics String Search Reverse Challenge

Sample Challenges

Engaging challenges across topics in cybersecurity

Linux Basics Beginner

Navigate the Maze

Use cd, ls, and pwd commands to navigate through a complex directory structure and find the hidden flag.

Cryptography Intermediate

XOR Decryption

Apply XOR operations to decrypt an encoded message and reveal the secret flag.

Network Security Advanced

The Eavesdropper

Analyze captured network traffic to intercept and decode sensitive communications.

Web Security Beginner

Cookie Monster

Inspect and manipulate browser cookies to bypass authentication and access restricted content.