Introduction & Setup
Orient the course, establish the lab baseline, and make the first environment decisions before deeper detection and evasion work begins.
View pathCurriculum
Each learning path maps one-to-one with a curriculum section in Mastering Bot Defense & Evasion. The public site exposes the sequence, outcomes, prerequisites, and every visible assessment item without bundling account or enrollment logic into this repository.
9 Paths 63 Total Hours 50 Lectures 8 Assessments
Follow the track in order or jump directly to the phase you need.
Orient the course, establish the lab baseline, and make the first environment decisions before deeper detection and evasion work begins.
View pathEstablish the vocabulary and history behind web automation so later defensive decisions are tied to operator incentives and capabilities.
View pathMove from conceptual bot classes into the browser and network signals that make devices and sessions look coherent or suspicious.
View pathStudy how automation stacks leak themselves and how challenge systems force headless browsers to prove they are coherent.
View pathExpand from browser-level signals into reputation, routing, infrastructure attribution, and the operational value of network telemetry.
View pathWork from raw interaction traces into behavioral models while keeping explainability and adversarial adaptation in view.
View pathConnect browser trust and bot pressure to API abuse, credential attacks, token replay, and challenge systems.
View pathTake detection logic out of prototypes and place it into CDN, WAF, cache, session, and SOC-adjacent production systems.
View pathEnd the quarter with a capstone and a publishable artifact set that reflects both engineering rigor and responsible communication.
View path