Dept of Energy Summer Internships
Summer 2020 internships in Engineering, Sciences, Social Sciences, and Business. The Application deadline is March 31. Go to https://doemeispp.org/ for more info.

Summer 2020 internships in Engineering, Sciences, Social Sciences, and Business. The Application deadline is March 31. Go to https://doemeispp.org/ for more info.
Checkout the Black History CTF Meetup on Mar 5th sponsored by Cover6. See the DC Cyber Professionals Meetup site for more information.
Congratulations to all the students that participated in the PwC CTF on Feb 22nd. It was very challenging, lots of fun and there were *great* prizes. Thank you again to the PwC team or sponsoring this event.
The new HU Cyber Center ‘Wall of Acheivement’ will recognize student participation in cyber challenges and events with awards and prizes. The season ends on April, 24th, so submit an update and get started today.
Join the Howard University Slack Channel to collaborate on labs, projects and competitions.
Open Source Intelligence Techniques (OSINT) are used to gather publicly available data in preparation for a penetration tests. This info is used direct the scanning, vulnerability assessments and exploitation (attacks). More is available at this link.
Understanding the Linux terminal and basic Linux commands are *very* important in a cyber competition. Learn and practice basic commands using the free labs in ‘Linux for Noobs ’ and the additional references available at the following link.
For cyber competitions, student must be able to convert a computer number format or text (ASCII) encoding format to the other equivelent numeric or text formats. Use the following link for more information.
The fundamental IT skills needed to learn cybersecurity include; (1) operating systems, (2) software, (3) programming, (4) networks and (5) hardware. The following specific cybersecurity skills are derived from these fundemental skills and used cyber competition:
The best way to learn cybersecurity is ‘hands-on’. To participate in labs and competitions, create a personal cyber lab running virtual machines and the Kali Linux suite of cybersecurity pentesting tools. Use these instructions to start installing the free open source Virtualbox and Kali Linux software.