Skip to content
  • Follow us on..

Howard University CyberSecurity Center (internal student wiki)

  • Home
    • Cybersecurity Concentration
    • Cybersecurity Positions and Related Certifications
    • MeetUp / Rountable Topics
    • Recommended Reading (alphabetical order)
  • Research
    • Cybersecurity Center Research Process
    • Federal Research Resources
    • NSA Cybersecurity Training Effectiveness Grant (Sep 2020)
  • Skills Domains and Roadmap
    • NCL Practice Gym Hints
    • Online Cyber Training and Challenge Resources
  • Skills
    • Skill #1 – General Computer Skills
      • Skill #1.1 – Numbering systems and Character Encoding
      • Skill #1.2 – Basic Network Concepts
      • Skill# 1.3 -Linux Distributions
      • Skill #1.4 – Basic Linux Commands
      • Skill#1.5 – Create a Personal Kali Linux Lab
      • 1.6 Basic Programming/Scripting Concepts
    • Skill #2 – Open Source Intelligence (OSINT)
    • Skill #3 -Cryptography
      • 3.1 Steganography Skills
      • 3.2 Modern Cryptography
    • Skill #4 – Log Analysis
    • Skill#5: Scanning Skills
    • Skill #6: Password Cracking
      • Password Attack Techniques
    • Skill#7: Web Exploitation
    • Skill #8 – Network Traffic Analysis
    • Skill#9 – Vulnerability Analysis (Enumeration)
    • Skill#10: Wireless Exploitation
    • Skill#11 – Forensics
  • Fundamental IT Skills
  • Students
    • Cybersecurity Practice Challenges
      • Preparing for Cybersecurity Capture-the-Flag Competitions
      • Basic CTF Web Exploitation Tactics
  • Home
    • - Cybersecurity Concentration
    • - Cybersecurity Positions and Related Certifications
    • - MeetUp / Rountable Topics
    • - Recommended Reading (alphabetical order)
  • Research
    • - Cybersecurity Center Research Process
    • - Federal Research Resources
    • - NSA Cybersecurity Training Effectiveness Grant (Sep 2020)
  • Skills Domains and Roadmap
    • - NCL Practice Gym Hints
    • - Online Cyber Training and Challenge Resources
  • Skills
    • - Skill #1 – General Computer Skills
      • - - Skill #1.1 – Numbering systems and Character Encoding
      • - - Skill #1.2 – Basic Network Concepts
      • - - Skill# 1.3 -Linux Distributions
      • - - Skill #1.4 – Basic Linux Commands
      • - - Skill#1.5 – Create a Personal Kali Linux Lab
      • - - 1.6 Basic Programming/Scripting Concepts
    • - Skill #2 – Open Source Intelligence (OSINT)
    • - Skill #3 -Cryptography
      • - - 3.1 Steganography Skills
      • - - 3.2 Modern Cryptography
    • - Skill #4 – Log Analysis
    • - Skill#5: Scanning Skills
    • - Skill #6: Password Cracking
      • - - Password Attack Techniques
    • - Skill#7: Web Exploitation
    • - Skill #8 – Network Traffic Analysis
    • - Skill#9 – Vulnerability Analysis (Enumeration)
    • - Skill#10: Wireless Exploitation
    • - Skill#11 – Forensics
  • Fundamental IT Skills
  • Students
    • - Cybersecurity Practice Challenges
      • - - Preparing for Cybersecurity Capture-the-Flag Competitions
      • - - Basic CTF Web Exploitation Tactics

Howard University CyberSecurity Center (internal student wiki)

  • Home
    • Cybersecurity Concentration
    • Cybersecurity Positions and Related Certifications
    • MeetUp / Rountable Topics
    • Recommended Reading (alphabetical order)
  • Research
    • Cybersecurity Center Research Process
    • Federal Research Resources
    • NSA Cybersecurity Training Effectiveness Grant (Sep 2020)
  • Skills Domains and Roadmap
    • NCL Practice Gym Hints
    • Online Cyber Training and Challenge Resources
  • Skills
    • Skill #1 – General Computer Skills
      • Skill #1.1 – Numbering systems and Character Encoding
      • Skill #1.2 – Basic Network Concepts
      • Skill# 1.3 -Linux Distributions
      • Skill #1.4 – Basic Linux Commands
      • Skill#1.5 – Create a Personal Kali Linux Lab
      • 1.6 Basic Programming/Scripting Concepts
    • Skill #2 – Open Source Intelligence (OSINT)
    • Skill #3 -Cryptography
      • 3.1 Steganography Skills
      • 3.2 Modern Cryptography
    • Skill #4 – Log Analysis
    • Skill#5: Scanning Skills
    • Skill #6: Password Cracking
      • Password Attack Techniques
    • Skill#7: Web Exploitation
    • Skill #8 – Network Traffic Analysis
    • Skill#9 – Vulnerability Analysis (Enumeration)
    • Skill#10: Wireless Exploitation
    • Skill#11 – Forensics
  • Fundamental IT Skills
  • Students
    • Cybersecurity Practice Challenges
      • Preparing for Cybersecurity Capture-the-Flag Competitions
      • Basic CTF Web Exploitation Tactics

Author: Burke

Home/Author: Burke

Apply for the CrowdStrike HBCU Mentor/Scholarships by Sep 29th

Apply for the HBCU Crowdstrike Mentorship/Scholarship to receive the following:

  • $500 scholarship
  • Mentorship sessions with CrowdStrike employee
  • Opportunity to apply for CrowdStrike internships
  • Resume-worthy listing as a CrowdStrike mentee
September 19, 2021BurkeUncategorized

Fall 2021 Chevron Cybersecurity Scholarships – Apply by Oct 4th

APPLY FOR THE SCHOLARSHIP BY SUBMITTING this form by Oct 4th (link).  

September 4, 2021BurkeUncategorized

Top 15 Linux Vulnerabilities published (Aug 2021)

Timely update in the Linux Threat Report 2021 1H from Trend Micro.

September 1, 2021BurkeUncategorized

How to submit a Cybersecurity Interest form (Fall 2021)

To apply for the HUSB concentration, certificate, or to just participate in upcoming cybersecurity extracurricular activities,  please use: HU Cybersecurity Interest Form . Everyone is welcome!

August 29, 2021BurkeUncategorized

Spring 2021 Chevron Cybersecurity Scholarships

A limited number of $1,000 Chevron Cybersecurity scholarships will be awarded to students enrolled in the Cybersecurity concentration or certificate programs and who have actively participated in the activities.  Use this form to apply by Mar 15 2021  (link).  

August 29, 2021BurkeCyber Security, Uncategorized

AWS Cloud Boot Camp – Jan 11, 2021

Howard Cybersecurity Center is sponsoring an AWS Cloud Boot camp for students to prepare for the AWS Practitioner Certification. Please use the following AWS Bootcamp Enrollment Form to apply by Dec 21st.   

August 28, 2021BurkeUncategorized

NCL Summer Live – WiFi Cracking Demo – Aug 26 2021

See the NCL Youtube for the replay link.

August 18, 2021BurkeUncategorized

NCL Summer Live – Forensics w/ Binwalk -July 29 2021

Binwalk is a tool for searching a given binary image for embedded files and executable code.

See the NCL Youtube channel for the replay link.

July 26, 2021BurkeUncategorized

Cyber Security+ Bootcamp May 11th-22nd (Virtual)

A free online Cybersecurity Bootcamp will be held for Howard Seniors and recent graduates from May 11th-22nd 2020 (offered by the Montgomery College Training Center). Submit this interest form by Mar 15th to receive more information on how to apply.

March 6, 2020BurkeUncategorized

Free Vouchers Available for National Cyber League (NCL) Spring CTF

Use the following link to request a free voucher for the National Cyber League (NCL) Spring 2020 competition starting on Mar 23rd (NCL voucher). This all virtual event is a great way to learn, practice and demonstrate hands-on cyber security skills (see Preparing for Cyber CTF Competitions and the NCL portal for more info).

March 6, 2020BurkeUncategorized

Posts navigation

1 2 3 4 … 9

HANDS-ON SKILL RESOURCES

  • General IT Skills
  • Open Source Intelligence
  • Cryptography
  • Log Analysis  
  • Scanning     
  • Web Exploitation   
  • Password Cracking
  • Network Traffic Analysis 
  • Enumeration & Exploitation
  • Wireless Security
  • Forensics (new)

Online Challenges

  1. TryHackMe 
  2. OvertheWire/Bandit 
  3. PicoCTF 
  4. National Cyber League 
  5. Root Me 
  6. HackthisSite 
Developed by Think Up Themes Ltd. Powered by WordPress.
  • Home
  • Research
  • Skills Domains and Roadmap
  • Skills
  • Fundamental IT Skills
  • Students