Skip to content
  • Follow us on..

Howard University CyberSecurity Center (internal student wiki)

  • Home
    • Cybersecurity Concentration
    • Cybersecurity Positions and Related Certifications
    • MeetUp / Rountable Topics
    • Recommended Reading (alphabetical order)
  • Research
    • Cybersecurity Center Research Process
    • Federal Research Resources
    • NSA Cybersecurity Training Effectiveness Grant (Sep 2020)
  • Skills Domains and Roadmap
    • NCL Practice Gym Hints
    • Online Cyber Training and Challenge Resources
  • Skills
    • Skill #1 – General Computer Skills
      • Skill #1.1 – Numbering systems and Character Encoding
      • Skill #1.2 – Basic Network Concepts
      • Skill# 1.3 -Linux Distributions
      • Skill #1.4 – Basic Linux Commands
      • Skill#1.5 – Create a Personal Kali Linux Lab
      • 1.6 Basic Programming/Scripting Concepts
    • Skill #2 – Open Source Intelligence (OSINT)
    • Skill #3 -Cryptography
      • 3.1 Steganography Skills
      • 3.2 Modern Cryptography
    • Skill #4 – Log Analysis
    • Skill#5: Scanning Skills
    • Skill #6: Password Cracking
      • Password Attack Techniques
    • Skill#7: Web Exploitation
    • Skill #8 – Network Traffic Analysis
    • Skill#9 – Vulnerability Analysis (Enumeration)
    • Skill#10: Wireless Exploitation
    • Skill#11 – Forensics
  • Fundamental IT Skills
  • Students
    • Cybersecurity Practice Challenges
      • Preparing for Cybersecurity Capture-the-Flag Competitions
      • Basic CTF Web Exploitation Tactics
  • Home
    • - Cybersecurity Concentration
    • - Cybersecurity Positions and Related Certifications
    • - MeetUp / Rountable Topics
    • - Recommended Reading (alphabetical order)
  • Research
    • - Cybersecurity Center Research Process
    • - Federal Research Resources
    • - NSA Cybersecurity Training Effectiveness Grant (Sep 2020)
  • Skills Domains and Roadmap
    • - NCL Practice Gym Hints
    • - Online Cyber Training and Challenge Resources
  • Skills
    • - Skill #1 – General Computer Skills
      • - - Skill #1.1 – Numbering systems and Character Encoding
      • - - Skill #1.2 – Basic Network Concepts
      • - - Skill# 1.3 -Linux Distributions
      • - - Skill #1.4 – Basic Linux Commands
      • - - Skill#1.5 – Create a Personal Kali Linux Lab
      • - - 1.6 Basic Programming/Scripting Concepts
    • - Skill #2 – Open Source Intelligence (OSINT)
    • - Skill #3 -Cryptography
      • - - 3.1 Steganography Skills
      • - - 3.2 Modern Cryptography
    • - Skill #4 – Log Analysis
    • - Skill#5: Scanning Skills
    • - Skill #6: Password Cracking
      • - - Password Attack Techniques
    • - Skill#7: Web Exploitation
    • - Skill #8 – Network Traffic Analysis
    • - Skill#9 – Vulnerability Analysis (Enumeration)
    • - Skill#10: Wireless Exploitation
    • - Skill#11 – Forensics
  • Fundamental IT Skills
  • Students
    • - Cybersecurity Practice Challenges
      • - - Preparing for Cybersecurity Capture-the-Flag Competitions
      • - - Basic CTF Web Exploitation Tactics

Howard University CyberSecurity Center (internal student wiki)

  • Home
    • Cybersecurity Concentration
    • Cybersecurity Positions and Related Certifications
    • MeetUp / Rountable Topics
    • Recommended Reading (alphabetical order)
  • Research
    • Cybersecurity Center Research Process
    • Federal Research Resources
    • NSA Cybersecurity Training Effectiveness Grant (Sep 2020)
  • Skills Domains and Roadmap
    • NCL Practice Gym Hints
    • Online Cyber Training and Challenge Resources
  • Skills
    • Skill #1 – General Computer Skills
      • Skill #1.1 – Numbering systems and Character Encoding
      • Skill #1.2 – Basic Network Concepts
      • Skill# 1.3 -Linux Distributions
      • Skill #1.4 – Basic Linux Commands
      • Skill#1.5 – Create a Personal Kali Linux Lab
      • 1.6 Basic Programming/Scripting Concepts
    • Skill #2 – Open Source Intelligence (OSINT)
    • Skill #3 -Cryptography
      • 3.1 Steganography Skills
      • 3.2 Modern Cryptography
    • Skill #4 – Log Analysis
    • Skill#5: Scanning Skills
    • Skill #6: Password Cracking
      • Password Attack Techniques
    • Skill#7: Web Exploitation
    • Skill #8 – Network Traffic Analysis
    • Skill#9 – Vulnerability Analysis (Enumeration)
    • Skill#10: Wireless Exploitation
    • Skill#11 – Forensics
  • Fundamental IT Skills
  • Students
    • Cybersecurity Practice Challenges
      • Preparing for Cybersecurity Capture-the-Flag Competitions
      • Basic CTF Web Exploitation Tactics

Category: CERC Laboratory

Home/Category: CERC Laboratory

HU Cyber Lab topology – June 5, 2019

This image has an empty alt attribute; its file name is Cyber-Lab-Topology-1024x503.jpg

The new Howard University Cyber Center Lab network topology has been established to support student machine hosted labs and cloud hosted cyber labs. The topology is portable and can be accessed by students remotely.

June 5, 2019BurkeCERC Laboratory, Uncategorized

HANDS-ON SKILL RESOURCES

  • General IT Skills
  • Open Source Intelligence
  • Cryptography
  • Log Analysis  
  • Scanning     
  • Web Exploitation   
  • Password Cracking
  • Network Traffic Analysis 
  • Enumeration & Exploitation
  • Wireless Security
  • Forensics (new)

Online Challenges

  1. TryHackMe 
  2. OvertheWire/Bandit 
  3. PicoCTF 
  4. National Cyber League 
  5. Root Me 
  6. HackthisSite 
Developed by Think Up Themes Ltd. Powered by WordPress.
  • Home
  • Research
  • Skills Domains and Roadmap
  • Skills
  • Fundamental IT Skills
  • Students