IMPORTANT
WiCyS NCL Training
Deadline 9/28/2020
Monday, September 28, 2020 · All Day
Online
Hey all,
This seems like a great opportunity for all WiCyS National student members. The deadline to apply is 9/28/2020.
Virtual Cybersecurity Competition/Game made possible by Target
Build your portfolio, pump up your resume, add credibility to your LinkedIn profile, gain simulated real-world experience, and speak to the world of cybersecurity based on your National Cyber League (NCL) virtual competition/game experience!
WiCyS is pleased to announce a partnership with Target and International Consortium of Minority Cybersecurity Professionals (ICMCP) to bring this cybersecurity competition/game training program to the WiCyS community and beyond!
This competition/game allows WiCyS and ICMCP players to showcase and build their skills through simulated real-world scenarios. After the game, players will receive an NCL scouting report that identifies player’s strengths/weaknesses. WiCyS and ICMCP members can then share scores on resumes and LinkedIn to showcase growth, progress, determination, grit, and glory!
The NCL model of learn to play; play to learn makes it easy for newbies and advanced players to gain the most out of their experience. The modules include:
Open Source Intelligence: Utilize publicly available information such as search engines, public repositories, social media, and more to gain in-depth knowledge on a topic or target
Cryptography: Identify techniques used to encrypt or obfuscate messages and leverage tools to extract the plain text
Scanning and Reconnaissance: Identify and use the proper tools to gain intelligence about a target including its services and potential vulnerabilities
Log Analysis: Utilize the proper tools and techniques to establish a baseline for normal operation and identify malicious activities using logs from various services
Network Traffic Analysis: Identify malicious and benign network traffic to demonstrate an understanding of potential security breaches
Password Cracking: Identify types of password hashes and apply various techniques to efficiently determine plain text passwords
Wireless Access Exploitation: Identify the security posture of wireless networks from network captures
Web Application Exploitation: Identify actionable exploits and vulnerabilities and use them to bypass the security measures in online services
Enumeration and Exploitation: Identify actionable exploits and vulnerabilities and use them to bypass the security measures in code and compiled binaries
To learn more about NCL, go here:
nationalcyberleague.org