{"id":397,"date":"2021-03-20T16:36:50","date_gmt":"2021-03-20T16:36:50","guid":{"rendered":"https:\/\/studentorgs.syr.edu\/isc\/?page_id=397"},"modified":"2025-11-06T22:54:20","modified_gmt":"2025-11-07T03:54:20","slug":"resources","status":"publish","type":"page","link":"https:\/\/studentorgs.syr.edu\/isc\/resources\/","title":{"rendered":"Resources"},"content":{"rendered":"<h3 id=\"s:were-glad-to-see-you8217\">We&#8217;re glad to see you&#8217;re interested in learning cybersecurity! Here we will provide you with online resources to give you some practical experience with your technical skills.<span class=\"anchor\" aria-hidden=\"true\"><a href=\"#s:were-glad-to-see-you8217\" aria-label=\"Link to section 'We&#8217;re glad to see you&#8217;re interested in learning cybersecurity! Here we will provide you with online resources to give you some practical experience with your technical skills.'\" tabindex=\"-1\"> Link<\/a><\/span><\/h3>\n<p><a href=\"#command-line\">1. Command Line<\/a><br \/>\n<a href=\"#capture-the-flag\">2. Capture the Flag<\/a><br \/>\n<a href=\"#web-security\">3. Web Security<\/a><br \/>\n<a href=\"#network-security\">4. Network Security<\/a><br \/>\n<a href=\"#paid-resources\">5. Paid Resources<\/a><br \/>\n<a href=\"#competition-resources\">5. Competition Resources<\/a><br \/>\n<a href=\"#presentations\">6. Presentations<\/a><\/p>\n<hr \/>\n<h3 id=\"s:command-line\"><strong><a id=\"command-line\"><\/a>Command Line<\/strong><span class=\"anchor\" aria-hidden=\"true\"><a href=\"#s:command-line\" aria-label=\"Link to section 'Command Line'\" tabindex=\"-1\"> Link<\/a><\/span><\/h3>\n<ul>\n<li>Network Mapper (<a href=\"https:\/\/www.freecodecamp.org\/news\/what-is-nmap-and-how-to-use-it-a-tutorial-for-the-greatest-scanning-tool-of-all-time\/\">nmap<\/a>) guide<\/li>\n<li><a href=\"https:\/\/www.linkedin.com\/learning\/learning-linux-command-line-2018\">Linkedin Learning Linux Command Line Course<\/a><\/li>\n<li><a href=\"https:\/\/ubuntu.com\/tutorials\/command-line-for-beginners\">Command Line Tutorial<\/a> by Ubuntu<\/li>\n<li><a href=\"https:\/\/ubuntu.com\/tutorials\/viewing-and-monitoring-log-files#1-overview\">Important Logs<\/a> by Ubuntu<\/li>\n<li><a href=\"https:\/\/cheatography.com\/davechild\/cheat-sheets\/linux-command-line\/\">Command Line Cheat Sheet<\/a>, <a href=\"https:\/\/www.tutorialspoint.com\/unix_commands\/awk.htm\">Awk Command<\/a><\/li>\n<li><a href=\"https:\/\/vim-adventures.com\/\">Vim Tutorial<\/a><\/li>\n<\/ul>\n<h3 id=\"s:capture-the-flag\"><strong><a id=\"capture-the-flag\"><\/a>Capture the Flag<\/strong><span class=\"anchor\" aria-hidden=\"true\"><a href=\"#s:capture-the-flag\" aria-label=\"Link to section 'Capture the Flag'\" tabindex=\"-1\"> Link<\/a><\/span><\/h3>\n<ul>\n<li>Bandit made by <a href=\"https:\/\/overthewire.org\">Over The Wire<\/a> (Linux)<\/li>\n<li><a href=\"https:\/\/www.hackthebox.eu\/\">Hack the Box<\/a><\/li>\n<li><a href=\"https:\/\/cyberskyline.com\/events\/ncl\">National Cyber League<\/a><\/li>\n<li><a href=\"https:\/\/picoctf.org\/\">PicoCTF<\/a><\/li>\n<\/ul>\n<h3 id=\"s:web-security\"><strong><a id=\"web-security\"><\/a>Web Security<\/strong><span class=\"anchor\" aria-hidden=\"true\"><a href=\"#s:web-security\" aria-label=\"Link to section 'Web Security'\" tabindex=\"-1\"> Link<\/a><\/span><\/h3>\n<ul>\n<li><a href=\"https:\/\/portswigger.net\/web-security\">Information on Web Security<\/a> by Burp Suite<\/li>\n<li><a href=\"https:\/\/www.hacksplaining.com\/lessons\">Hands-on Lessons on Web Security<\/a> by Hacksplaining<\/li>\n<\/ul>\n<h3 id=\"s:network-security\"><strong><a id=\"network-security\"><\/a>Network Security<\/strong><span class=\"anchor\" aria-hidden=\"true\"><a href=\"#s:network-security\" aria-label=\"Link to section 'Network Security'\" tabindex=\"-1\"> Link<\/a><\/span><\/h3>\n<ul>\n<li><a href=\"https:\/\/github.com\/bkimminich\/it-security-lecture\/blob\/master\/slides\/01-04-network_security.md\">Network Security exercises<\/a> by <span class=\"p-name vcard-fullname d-block overflow-hidden\">Bj\u00f6rn Kimminich<\/span><a href=\"https:\/\/www.hackthebox.eu\/\"><\/a><\/li>\n<\/ul>\n<h3 id=\"s:paid-resources\"><strong><a id=\"paid-resources\"><\/a><strong>Paid Resources<\/strong><span class=\"anchor\" aria-hidden=\"true\"><a href=\"#s:paid-resources\" aria-label=\"Link to section 'Paid Resources'\" tabindex=\"-1\"> Link<\/a><\/span><\/h3>\n<ul>\n<li><a href=\"https:\/\/www.cybrary.it\/\">Library of Cyber Security books<\/a><\/li>\n<\/ul>\n<h3 id=\"s:competition-red-or-blue-resources\"><strong><a id=\"competition-resources\"><\/a>Competition (Red or Blue) Resources<\/strong><span class=\"anchor\" aria-hidden=\"true\"><a href=\"#s:competition-red-or-blue-resources\" aria-label=\"Link to section 'Competition (Red or Blue) Resources'\" tabindex=\"-1\"> Link<\/a><\/span><\/h3>\n<ul>\n<li><a href=\"https:\/\/www.mvcc.edu\/cyberlab\/\">CyberLab Resources<\/a> &amp;\u00a0<a href=\"https:\/\/www.youtube.com\/playlist?list=PL5M8MNsdIsFNq10A-aYenpUp9apuo0ftR\">CyberLab Playlist<\/a> by Mohawk Valley Community College<\/li>\n<li><a href=\"https:\/\/drive.google.com\/file\/d\/1z7WqkLa4nMRfOtfXzMfZFLCIrVEg8J9T\/view?usp=sharing\">University at Buffalo&#8217;s Network Defense Playbook<\/a> &#8211; This playbook can be very useful when preparing for network defense (red team vs blue team) competitions. It contains information on general policies during competitions, as well as basic hardening for both Windows and Linux. Most importantly, it has guides on common services such as Active Directory, HTTP (Web),\u00a0 and DNS. Using this document to practice how to configure and harden these services will reduce the amount of obstacles you&#8217;ll face in competitions.<\/li>\n<li><a href=\"http:\/\/c2games.org\/\">Cyber Security Games<\/a> by NCAE<\/li>\n<li><a href=\"https:\/\/sourque.com\/ctf\/hivestorm\">Hivestorm Documentation<\/a> by previous participants, <a href=\"https:\/\/sourque.com\/ctf\/hivestorm\/hs21\/image_hints.pdf\">Hivestorm Image Hints (PDF)<\/a>, and a sample <a href=\"\/\/github.com\/asoberan\/aeacus\">Hivestorm Scoring Engine<\/a>.<\/li>\n<li><a href=\"https:\/\/studentorgs.syr.edu\/isc\/wp-content\/uploads\/sites\/49\/2022\/10\/Lockdown_v12_Blue_Team_Packet.pdf\">Lockdown v12 Blue Team Packet<\/a>, which includes the competition topology, schedule,\u00a0 rules, and guidelines for Lockdown.<\/li>\n<li><a href=\"https:\/\/mikehacksthings.com\/2018\/11\/19\/cny-hackathon-ctf-walkthrough-fall-2018-edition\/\">CNY Hackathon Fall 2018 Walkthrough<\/a>, which has multiple challenges across five categories: Trivia, Exploitation, Cryptography, Steganography, and Reverse Engineering.<\/li>\n<li><a href=\"https:\/\/cryptokait.com\/workshops\/national-cyber-league-coaching-guide-v-2-1\/ncl-coaching-guide-resources-by-category\/\">NCL Coaching and Practice Guides<\/a> by CryptoKaith. Learn, practice, and read interesting netsec blogs, all in one site.<\/li>\n<\/ul>\n<h3 id=\"s:presentations\"><strong><a id=\"presentations\"><\/a>Presentations<\/strong><span class=\"anchor\" aria-hidden=\"true\"><a href=\"#s:presentations\" aria-label=\"Link to section 'Presentations'\" tabindex=\"-1\"> Link<\/a><\/span><\/h3>\n<ul>\n<li><a href=\"https:\/\/sumailsyr.sharepoint.com\/:p:\/s\/InformationSecurityClubE-Board\/EaE90KPgShFDm2a86TIpeeQBTpHQUgwMYKjs8xabi3y3Ow?e=KpsXnV\">Tim Van Waes&#8217;s LastPass Data Breach presentation<\/a><\/li>\n<\/ul>\n<p>If you have any recommendations for more resources, please let us know!<\/p>","protected":false},"excerpt":{"rendered":"<p>We&#8217;re glad to see you&#8217;re interested in learning cybersecurity! Here we will provide you with online resources to give you some practical experience with your technical skills. Link 1. Command Line 2. Capture the Flag 3. Web Security 4. Network Security 5. Paid Resources 5. Competition Resources 6. Presentations Command Line Link Network Mapper (nmap)&hellip;<\/p>\n","protected":false},"author":203,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-397","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/studentorgs.syr.edu\/isc\/wp-json\/wp\/v2\/pages\/397","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/studentorgs.syr.edu\/isc\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/studentorgs.syr.edu\/isc\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/studentorgs.syr.edu\/isc\/wp-json\/wp\/v2\/users\/203"}],"replies":[{"embeddable":true,"href":"https:\/\/studentorgs.syr.edu\/isc\/wp-json\/wp\/v2\/comments?post=397"}],"version-history":[{"count":38,"href":"https:\/\/studentorgs.syr.edu\/isc\/wp-json\/wp\/v2\/pages\/397\/revisions"}],"predecessor-version":[{"id":1406,"href":"https:\/\/studentorgs.syr.edu\/isc\/wp-json\/wp\/v2\/pages\/397\/revisions\/1406"}],"wp:attachment":[{"href":"https:\/\/studentorgs.syr.edu\/isc\/wp-json\/wp\/v2\/media?parent=397"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}