Skip to content
Follow us on..
Howard University CyberSecurity Center (internal student wiki)
Home
Cybersecurity Concentration
Cybersecurity Positions and Related Certifications
MeetUp / Rountable Topics
Recommended Reading (alphabetical order)
Research
Cybersecurity Center Research Process
Federal Research Resources
NSA Cybersecurity Training Effectiveness Grant (Sep 2020)
Skills Domains and Roadmap
NCL Practice Gym Hints
Online Cyber Training and Challenge Resources
Skills
Skill #1 – General Computer Skills
Skill #1.1 – Numbering systems and Character Encoding
Skill #1.2 – Basic Network Concepts
Skill# 1.3 -Linux Distributions
Skill #1.4 – Basic Linux Commands
Skill#1.5 – Create a Personal Kali Linux Lab
1.6 Basic Programming/Scripting Concepts
Skill #2 – Open Source Intelligence (OSINT)
Skill #3 -Cryptography
3.1 Steganography Skills
3.2 Modern Cryptography
Skill #4 – Log Analysis
Skill#5: Scanning Skills
Skill #6: Password Cracking
Password Attack Techniques
Skill#7: Web Exploitation
Skill #8 – Network Traffic Analysis
Skill#9 – Vulnerability Analysis (Enumeration)
Skill#10: Wireless Exploitation
Skill#11 – Forensics
Fundamental IT Skills
Students
Cybersecurity Practice Challenges
Preparing for Cybersecurity Capture-the-Flag Competitions
Basic CTF Web Exploitation Tactics
Home
- Cybersecurity Concentration
- Cybersecurity Positions and Related Certifications
- MeetUp / Rountable Topics
- Recommended Reading (alphabetical order)
Research
- Cybersecurity Center Research Process
- Federal Research Resources
- NSA Cybersecurity Training Effectiveness Grant (Sep 2020)
Skills Domains and Roadmap
- NCL Practice Gym Hints
- Online Cyber Training and Challenge Resources
Skills
- Skill #1 – General Computer Skills
- - Skill #1.1 – Numbering systems and Character Encoding
- - Skill #1.2 – Basic Network Concepts
- - Skill# 1.3 -Linux Distributions
- - Skill #1.4 – Basic Linux Commands
- - Skill#1.5 – Create a Personal Kali Linux Lab
- - 1.6 Basic Programming/Scripting Concepts
- Skill #2 – Open Source Intelligence (OSINT)
- Skill #3 -Cryptography
- - 3.1 Steganography Skills
- - 3.2 Modern Cryptography
- Skill #4 – Log Analysis
- Skill#5: Scanning Skills
- Skill #6: Password Cracking
- - Password Attack Techniques
- Skill#7: Web Exploitation
- Skill #8 – Network Traffic Analysis
- Skill#9 – Vulnerability Analysis (Enumeration)
- Skill#10: Wireless Exploitation
- Skill#11 – Forensics
Fundamental IT Skills
Students
- Cybersecurity Practice Challenges
- - Preparing for Cybersecurity Capture-the-Flag Competitions
- - Basic CTF Web Exploitation Tactics
Howard University CyberSecurity Center (internal student wiki)
Home
Cybersecurity Concentration
Cybersecurity Positions and Related Certifications
MeetUp / Rountable Topics
Recommended Reading (alphabetical order)
Research
Cybersecurity Center Research Process
Federal Research Resources
NSA Cybersecurity Training Effectiveness Grant (Sep 2020)
Skills Domains and Roadmap
NCL Practice Gym Hints
Online Cyber Training and Challenge Resources
Skills
Skill #1 – General Computer Skills
Skill #1.1 – Numbering systems and Character Encoding
Skill #1.2 – Basic Network Concepts
Skill# 1.3 -Linux Distributions
Skill #1.4 – Basic Linux Commands
Skill#1.5 – Create a Personal Kali Linux Lab
1.6 Basic Programming/Scripting Concepts
Skill #2 – Open Source Intelligence (OSINT)
Skill #3 -Cryptography
3.1 Steganography Skills
3.2 Modern Cryptography
Skill #4 – Log Analysis
Skill#5: Scanning Skills
Skill #6: Password Cracking
Password Attack Techniques
Skill#7: Web Exploitation
Skill #8 – Network Traffic Analysis
Skill#9 – Vulnerability Analysis (Enumeration)
Skill#10: Wireless Exploitation
Skill#11 – Forensics
Fundamental IT Skills
Students
Cybersecurity Practice Challenges
Preparing for Cybersecurity Capture-the-Flag Competitions
Basic CTF Web Exploitation Tactics
Blank
Home
/
Blank
(Intentional left Blank)
This website is in the process of being shutdown.