Skip to content
  • Follow us on..

Howard University CyberSecurity Center (internal student wiki)

  • Home
    • Cybersecurity Concentration
    • Cybersecurity Positions and Related Certifications
    • MeetUp / Rountable Topics
    • Recommended Reading (alphabetical order)
  • Research
    • Cybersecurity Center Research Process
    • Federal Research Resources
    • NSA Cybersecurity Training Effectiveness Grant (Sep 2020)
  • Skills Domains and Roadmap
    • NCL Practice Gym Hints
    • Online Cyber Training and Challenge Resources
  • Skills
    • Skill #1 – General Computer Skills
      • Skill #1.1 – Numbering systems and Character Encoding
      • Skill #1.2 – Basic Network Concepts
      • Skill# 1.3 -Linux Distributions
      • Skill #1.4 – Basic Linux Commands
      • Skill#1.5 – Create a Personal Kali Linux Lab
      • 1.6 Basic Programming/Scripting Concepts
    • Skill #2 – Open Source Intelligence (OSINT)
    • Skill #3 -Cryptography
      • 3.1 Steganography Skills
      • 3.2 Modern Cryptography
    • Skill #4 – Log Analysis
    • Skill#5: Scanning Skills
    • Skill #6: Password Cracking
      • Password Attack Techniques
    • Skill#7: Web Exploitation
    • Skill #8 – Network Traffic Analysis
    • Skill#9 – Vulnerability Analysis (Enumeration)
    • Skill#10: Wireless Exploitation
    • Skill#11 – Forensics
  • Fundamental IT Skills
  • Students
    • Cybersecurity Practice Challenges
      • Preparing for Cybersecurity Capture-the-Flag Competitions
      • Basic CTF Web Exploitation Tactics
  • Home
    • - Cybersecurity Concentration
    • - Cybersecurity Positions and Related Certifications
    • - MeetUp / Rountable Topics
    • - Recommended Reading (alphabetical order)
  • Research
    • - Cybersecurity Center Research Process
    • - Federal Research Resources
    • - NSA Cybersecurity Training Effectiveness Grant (Sep 2020)
  • Skills Domains and Roadmap
    • - NCL Practice Gym Hints
    • - Online Cyber Training and Challenge Resources
  • Skills
    • - Skill #1 – General Computer Skills
      • - - Skill #1.1 – Numbering systems and Character Encoding
      • - - Skill #1.2 – Basic Network Concepts
      • - - Skill# 1.3 -Linux Distributions
      • - - Skill #1.4 – Basic Linux Commands
      • - - Skill#1.5 – Create a Personal Kali Linux Lab
      • - - 1.6 Basic Programming/Scripting Concepts
    • - Skill #2 – Open Source Intelligence (OSINT)
    • - Skill #3 -Cryptography
      • - - 3.1 Steganography Skills
      • - - 3.2 Modern Cryptography
    • - Skill #4 – Log Analysis
    • - Skill#5: Scanning Skills
    • - Skill #6: Password Cracking
      • - - Password Attack Techniques
    • - Skill#7: Web Exploitation
    • - Skill #8 – Network Traffic Analysis
    • - Skill#9 – Vulnerability Analysis (Enumeration)
    • - Skill#10: Wireless Exploitation
    • - Skill#11 – Forensics
  • Fundamental IT Skills
  • Students
    • - Cybersecurity Practice Challenges
      • - - Preparing for Cybersecurity Capture-the-Flag Competitions
      • - - Basic CTF Web Exploitation Tactics

Howard University CyberSecurity Center (internal student wiki)

  • Home
    • Cybersecurity Concentration
    • Cybersecurity Positions and Related Certifications
    • MeetUp / Rountable Topics
    • Recommended Reading (alphabetical order)
  • Research
    • Cybersecurity Center Research Process
    • Federal Research Resources
    • NSA Cybersecurity Training Effectiveness Grant (Sep 2020)
  • Skills Domains and Roadmap
    • NCL Practice Gym Hints
    • Online Cyber Training and Challenge Resources
  • Skills
    • Skill #1 – General Computer Skills
      • Skill #1.1 – Numbering systems and Character Encoding
      • Skill #1.2 – Basic Network Concepts
      • Skill# 1.3 -Linux Distributions
      • Skill #1.4 – Basic Linux Commands
      • Skill#1.5 – Create a Personal Kali Linux Lab
      • 1.6 Basic Programming/Scripting Concepts
    • Skill #2 – Open Source Intelligence (OSINT)
    • Skill #3 -Cryptography
      • 3.1 Steganography Skills
      • 3.2 Modern Cryptography
    • Skill #4 – Log Analysis
    • Skill#5: Scanning Skills
    • Skill #6: Password Cracking
      • Password Attack Techniques
    • Skill#7: Web Exploitation
    • Skill #8 – Network Traffic Analysis
    • Skill#9 – Vulnerability Analysis (Enumeration)
    • Skill#10: Wireless Exploitation
    • Skill#11 – Forensics
  • Fundamental IT Skills
  • Students
    • Cybersecurity Practice Challenges
      • Preparing for Cybersecurity Capture-the-Flag Competitions
      • Basic CTF Web Exploitation Tactics

Tag: #cyberSecurity #cyberday

Home/Tag: #cyberSecurity #cyberday

HU Cyber Security Day 2018

May 8, 2018BurkeCyber Security Articles, Seminars / MeetUps#cyberSecurity #cyberday

HANDS-ON SKILL RESOURCES

  • General IT Skills
  • Open Source Intelligence
  • Cryptography
  • Log Analysis  
  • Scanning     
  • Web Exploitation   
  • Password Cracking
  • Network Traffic Analysis 
  • Enumeration & Exploitation
  • Wireless Security
  • Forensics (new)

Online Challenges

  1. TryHackMe 
  2. OvertheWire/Bandit 
  3. PicoCTF 
  4. National Cyber League 
  5. Root Me 
  6. HackthisSite 
Developed by Think Up Themes Ltd. Powered by WordPress.
  • Home
  • Research
  • Skills Domains and Roadmap
  • Skills
  • Fundamental IT Skills
  • Students