Skip to content
  • Follow us on..

Howard University CyberSecurity Center (internal student wiki)

  • Home
    • Cybersecurity Concentration
    • Cybersecurity Positions and Related Certifications
    • MeetUp / Rountable Topics
    • Recommended Reading (alphabetical order)
  • Research
    • Cybersecurity Center Research Process
    • Federal Research Resources
    • NSA Cybersecurity Training Effectiveness Grant (Sep 2020)
  • Skills Domains and Roadmap
    • NCL Practice Gym Hints
    • Online Cyber Training and Challenge Resources
  • Skills
    • Skill #1 – General Computer Skills
      • Skill #1.1 – Numbering systems and Character Encoding
      • Skill #1.2 – Basic Network Concepts
      • Skill# 1.3 -Linux Distributions
      • Skill #1.4 – Basic Linux Commands
      • Skill#1.5 – Create a Personal Kali Linux Lab
      • 1.6 Basic Programming/Scripting Concepts
    • Skill #2 – Open Source Intelligence (OSINT)
    • Skill #3 -Cryptography
      • 3.1 Steganography Skills
      • 3.2 Modern Cryptography
    • Skill #4 – Log Analysis
    • Skill#5: Scanning Skills
    • Skill #6: Password Cracking
      • Password Attack Techniques
    • Skill#7: Web Exploitation
    • Skill #8 – Network Traffic Analysis
    • Skill#9 – Vulnerability Analysis (Enumeration)
    • Skill#10: Wireless Exploitation
    • Skill#11 – Forensics
  • Fundamental IT Skills
  • Students
    • Cybersecurity Practice Challenges
      • Preparing for Cybersecurity Capture-the-Flag Competitions
      • Basic CTF Web Exploitation Tactics
  • Home
    • - Cybersecurity Concentration
    • - Cybersecurity Positions and Related Certifications
    • - MeetUp / Rountable Topics
    • - Recommended Reading (alphabetical order)
  • Research
    • - Cybersecurity Center Research Process
    • - Federal Research Resources
    • - NSA Cybersecurity Training Effectiveness Grant (Sep 2020)
  • Skills Domains and Roadmap
    • - NCL Practice Gym Hints
    • - Online Cyber Training and Challenge Resources
  • Skills
    • - Skill #1 – General Computer Skills
      • - - Skill #1.1 – Numbering systems and Character Encoding
      • - - Skill #1.2 – Basic Network Concepts
      • - - Skill# 1.3 -Linux Distributions
      • - - Skill #1.4 – Basic Linux Commands
      • - - Skill#1.5 – Create a Personal Kali Linux Lab
      • - - 1.6 Basic Programming/Scripting Concepts
    • - Skill #2 – Open Source Intelligence (OSINT)
    • - Skill #3 -Cryptography
      • - - 3.1 Steganography Skills
      • - - 3.2 Modern Cryptography
    • - Skill #4 – Log Analysis
    • - Skill#5: Scanning Skills
    • - Skill #6: Password Cracking
      • - - Password Attack Techniques
    • - Skill#7: Web Exploitation
    • - Skill #8 – Network Traffic Analysis
    • - Skill#9 – Vulnerability Analysis (Enumeration)
    • - Skill#10: Wireless Exploitation
    • - Skill#11 – Forensics
  • Fundamental IT Skills
  • Students
    • - Cybersecurity Practice Challenges
      • - - Preparing for Cybersecurity Capture-the-Flag Competitions
      • - - Basic CTF Web Exploitation Tactics

Howard University CyberSecurity Center (internal student wiki)

  • Home
    • Cybersecurity Concentration
    • Cybersecurity Positions and Related Certifications
    • MeetUp / Rountable Topics
    • Recommended Reading (alphabetical order)
  • Research
    • Cybersecurity Center Research Process
    • Federal Research Resources
    • NSA Cybersecurity Training Effectiveness Grant (Sep 2020)
  • Skills Domains and Roadmap
    • NCL Practice Gym Hints
    • Online Cyber Training and Challenge Resources
  • Skills
    • Skill #1 – General Computer Skills
      • Skill #1.1 – Numbering systems and Character Encoding
      • Skill #1.2 – Basic Network Concepts
      • Skill# 1.3 -Linux Distributions
      • Skill #1.4 – Basic Linux Commands
      • Skill#1.5 – Create a Personal Kali Linux Lab
      • 1.6 Basic Programming/Scripting Concepts
    • Skill #2 – Open Source Intelligence (OSINT)
    • Skill #3 -Cryptography
      • 3.1 Steganography Skills
      • 3.2 Modern Cryptography
    • Skill #4 – Log Analysis
    • Skill#5: Scanning Skills
    • Skill #6: Password Cracking
      • Password Attack Techniques
    • Skill#7: Web Exploitation
    • Skill #8 – Network Traffic Analysis
    • Skill#9 – Vulnerability Analysis (Enumeration)
    • Skill#10: Wireless Exploitation
    • Skill#11 – Forensics
  • Fundamental IT Skills
  • Students
    • Cybersecurity Practice Challenges
      • Preparing for Cybersecurity Capture-the-Flag Competitions
      • Basic CTF Web Exploitation Tactics

Author: Burke

Home/Author: Burke

Checkout the recommended cyber training/challenge portals

Use this prioritized list of portals to build your skills outside the classroom.

  1. TryHackMe 
  2. National Cyber League 
  3. OvertheWire/Bandit 
  4. PicoCTF 
  5. Other (e.g. Root Me, HackthisSite, etc.) 
February 24, 2022BurkeUncategorized

What Hands-on Cyber Skills should you develop?

Here is the list of recommended skills with links to webpages with additional resources:

  • General IT Skills 
  • Open Source Intelligence
  • Cryptography
  • Log Analysis  
  • Scanning     
  • Web Exploitation   
  • Password Cracking
  • Network Traffic Analysis 
  • Enumeration & Exploitation
  • Wireless Security
  • Forensics (new)
February 18, 2022BurkeUncategorized

Cover6 Intro2Cyber Workshop (Virtual)- Jan 4th & 6th, 2022

Do you want to learn hands-on cyber security ?    Register for the free Intro2Cyber Skills Workshop (Virtual) – January 4th & 6th, (6-8pm) 2022 today! 
December 11, 2021BurkeUncategorized

Cyber Skyline: Code Basics – Nov 18@ 5pm

Learn basic programming concepts that may be needed in entry level cyber competitions (see replay link)

November 8, 2021BurkeUncategorized

Cyber Skyline Live – Exploiting vsftpd – Nov 4th

vsFTP is an IP service used to transfer files. See the vsFTP session replay for exploitation techniques.

November 4, 2021BurkeUncategorized

Cyber Skyline Live – DNS – Oct 28 2021

Understand DNS (Domain Name System) and how its used in internet attacks. Replay link available.

October 23, 2021BurkeUncategorized

Cyber Skyline Live – ICMP – Oct 19 2021

ICMP is part of the Internet protocol suite and is typically used for diagnostic or control messages (e.g., ping ). See the the replay link.

October 19, 2021BurkeUncategorized

Cyber Career Awareness – Hands-on Skill Labs (Oct18th & 20th)

Open hands-on skill labs in HUSB rm 426. Contact CERC@howard.edu for more info.

October 13, 2021BurkeUncategorized

Cyber Careers at PWC on Oct 13th

Howard Alumni and PWC Partner Kevin Simmonds will present Cyber Careers options to students on Oct13th at 12:40pm in room 200. Contact Robert Burke (cerc@howard.edu) for more info.

October 13, 2021BurkeUncategorized

Cyber Skyline Live – SQL Basics – Oct 7 2021

SQL (Structured Query Language) is used to manage relational databases but can be used to make unauthorized changes. Replay link available.

October 2, 2021BurkeUncategorized

Posts navigation

1 2 3 … 9

HANDS-ON SKILL RESOURCES

  • General IT Skills
  • Open Source Intelligence
  • Cryptography
  • Log Analysis  
  • Scanning     
  • Web Exploitation   
  • Password Cracking
  • Network Traffic Analysis 
  • Enumeration & Exploitation
  • Wireless Security
  • Forensics (new)

Online Challenges

  1. TryHackMe 
  2. OvertheWire/Bandit 
  3. PicoCTF 
  4. National Cyber League 
  5. Root Me 
  6. HackthisSite 
Developed by Think Up Themes Ltd. Powered by WordPress.
  • Home
  • Research
  • Skills Domains and Roadmap
  • Skills
  • Fundamental IT Skills
  • Students