Skip to content
  • Follow us on..

Howard University CyberSecurity Center (internal student wiki)

  • Home
    • Cybersecurity Concentration
    • Cybersecurity Positions and Related Certifications
    • MeetUp / Rountable Topics
    • Recommended Reading (alphabetical order)
  • Research
    • Cybersecurity Center Research Process
    • Federal Research Resources
    • NSA Cybersecurity Training Effectiveness Grant (Sep 2020)
  • Skills Domains and Roadmap
    • NCL Practice Gym Hints
    • Online Cyber Training and Challenge Resources
  • Skills
    • Skill #1 – General Computer Skills
      • Skill #1.1 – Numbering systems and Character Encoding
      • Skill #1.2 – Basic Network Concepts
      • Skill# 1.3 -Linux Distributions
      • Skill #1.4 – Basic Linux Commands
      • Skill#1.5 – Create a Personal Kali Linux Lab
      • 1.6 Basic Programming/Scripting Concepts
    • Skill #2 – Open Source Intelligence (OSINT)
    • Skill #3 -Cryptography
      • 3.1 Steganography Skills
      • 3.2 Modern Cryptography
    • Skill #4 – Log Analysis
    • Skill#5: Scanning Skills
    • Skill #6: Password Cracking
      • Password Attack Techniques
    • Skill#7: Web Exploitation
    • Skill #8 – Network Traffic Analysis
    • Skill#9 – Vulnerability Analysis (Enumeration)
    • Skill#10: Wireless Exploitation
    • Skill#11 – Forensics
  • Fundamental IT Skills
  • Students
    • Cybersecurity Practice Challenges
      • Preparing for Cybersecurity Capture-the-Flag Competitions
      • Basic CTF Web Exploitation Tactics
  • Home
    • - Cybersecurity Concentration
    • - Cybersecurity Positions and Related Certifications
    • - MeetUp / Rountable Topics
    • - Recommended Reading (alphabetical order)
  • Research
    • - Cybersecurity Center Research Process
    • - Federal Research Resources
    • - NSA Cybersecurity Training Effectiveness Grant (Sep 2020)
  • Skills Domains and Roadmap
    • - NCL Practice Gym Hints
    • - Online Cyber Training and Challenge Resources
  • Skills
    • - Skill #1 – General Computer Skills
      • - - Skill #1.1 – Numbering systems and Character Encoding
      • - - Skill #1.2 – Basic Network Concepts
      • - - Skill# 1.3 -Linux Distributions
      • - - Skill #1.4 – Basic Linux Commands
      • - - Skill#1.5 – Create a Personal Kali Linux Lab
      • - - 1.6 Basic Programming/Scripting Concepts
    • - Skill #2 – Open Source Intelligence (OSINT)
    • - Skill #3 -Cryptography
      • - - 3.1 Steganography Skills
      • - - 3.2 Modern Cryptography
    • - Skill #4 – Log Analysis
    • - Skill#5: Scanning Skills
    • - Skill #6: Password Cracking
      • - - Password Attack Techniques
    • - Skill#7: Web Exploitation
    • - Skill #8 – Network Traffic Analysis
    • - Skill#9 – Vulnerability Analysis (Enumeration)
    • - Skill#10: Wireless Exploitation
    • - Skill#11 – Forensics
  • Fundamental IT Skills
  • Students
    • - Cybersecurity Practice Challenges
      • - - Preparing for Cybersecurity Capture-the-Flag Competitions
      • - - Basic CTF Web Exploitation Tactics

Howard University CyberSecurity Center (internal student wiki)

  • Home
    • Cybersecurity Concentration
    • Cybersecurity Positions and Related Certifications
    • MeetUp / Rountable Topics
    • Recommended Reading (alphabetical order)
  • Research
    • Cybersecurity Center Research Process
    • Federal Research Resources
    • NSA Cybersecurity Training Effectiveness Grant (Sep 2020)
  • Skills Domains and Roadmap
    • NCL Practice Gym Hints
    • Online Cyber Training and Challenge Resources
  • Skills
    • Skill #1 – General Computer Skills
      • Skill #1.1 – Numbering systems and Character Encoding
      • Skill #1.2 – Basic Network Concepts
      • Skill# 1.3 -Linux Distributions
      • Skill #1.4 – Basic Linux Commands
      • Skill#1.5 – Create a Personal Kali Linux Lab
      • 1.6 Basic Programming/Scripting Concepts
    • Skill #2 – Open Source Intelligence (OSINT)
    • Skill #3 -Cryptography
      • 3.1 Steganography Skills
      • 3.2 Modern Cryptography
    • Skill #4 – Log Analysis
    • Skill#5: Scanning Skills
    • Skill #6: Password Cracking
      • Password Attack Techniques
    • Skill#7: Web Exploitation
    • Skill #8 – Network Traffic Analysis
    • Skill#9 – Vulnerability Analysis (Enumeration)
    • Skill#10: Wireless Exploitation
    • Skill#11 – Forensics
  • Fundamental IT Skills
  • Students
    • Cybersecurity Practice Challenges
      • Preparing for Cybersecurity Capture-the-Flag Competitions
      • Basic CTF Web Exploitation Tactics

Category: Cyber Security

Home/Category: Cyber Security

Spring 2021 Chevron Cybersecurity Scholarships

A limited number of $1,000 Chevron Cybersecurity scholarships will be awarded to students enrolled in the Cybersecurity concentration or certificate programs and who have actively participated in the activities.  Use this form to apply by Mar 15 2021  (link).  

August 29, 2021BurkeCyber Security, Uncategorized

Tip#2 – Create a Personal Cyber Lab with Kali Linux

The best way to learn cybersecurity is ‘hands-on’. To participate in labs and competitions, create a personal cyber lab running virtual machines and the Kali Linux suite of cybersecurity pentesting tools. Use these instructions to start installing the free open source Virtualbox and Kali Linux software.

January 29, 2020BurkeCyber Security

Top Ten Cyber Threats

Checkout the Top Ten Cyber Threats Revealed (according to CommsBusiness). Most of these require the bad actor to gain the trust of an unsuspecting user. Stay vigiliance, do not trust any suspicious digital requests, and report all incidences. 

December 17, 2018BurkeCyber Security, Cyber Security Articles

Securing IOT Device

Along with information assurance, computer network security, digital forensics, cryptography, risk assessment/mitigation, disaster recovery, security regulations/compliance, and information security management, IoT is one the key focus areas of the CERC. https://lnkd.in/dgUpb-uhashtag#iothashtag#cyber

December 11, 2018BurkeCyber Security, Cyber Security Articles

HANDS-ON SKILL RESOURCES

  • General IT Skills
  • Open Source Intelligence
  • Cryptography
  • Log Analysis  
  • Scanning     
  • Web Exploitation   
  • Password Cracking
  • Network Traffic Analysis 
  • Enumeration & Exploitation
  • Wireless Security
  • Forensics (new)

Online Challenges

  1. TryHackMe 
  2. OvertheWire/Bandit 
  3. PicoCTF 
  4. National Cyber League 
  5. Root Me 
  6. HackthisSite 
Developed by Think Up Themes Ltd. Powered by WordPress.
  • Home
  • Research
  • Skills Domains and Roadmap
  • Skills
  • Fundamental IT Skills
  • Students