Cybersecurity Club Survival Guide: How to Organize Events and Meetings, Invite Speakers, and Attract Sponsors

Have you ever attended a career fair? Have you ever wondered how much it cost, or how many people were involved in setting it up? How many phone calls, meetings, and approvals had to take place? When you see free stickers, t-shirts, bags of goodies and pens, did you wonder where all that came from … Continue reading Cybersecurity Club Survival Guide: How to Organize Events and Meetings, Invite Speakers, and Attract Sponsors

Cybersecurity Club Survival Guide: Leadership Methodologies for Running an Effective Cybersecurity Club

Our application was rejected, again. They said we must have a faculty sponsor. Why do we need faculty involved in a student club? Where are we going to find a sponsor? Students come and go. Some drop out, some wander off, some just get too busy or behind in their studies. New students arrive with … Continue reading Cybersecurity Club Survival Guide: Leadership Methodologies for Running an Effective Cybersecurity Club

Secret Information in Network Traffic Logs: NTA for NCL

Network traffic analysis can be overwhelming. Even with a solid foundation, it's not unusual for a packet capture to contain so much data that it's difficult to get a sense for what's going on. Improving your analysis techniques can mean the difference between wasting hours on a challenge and solving it in five minutes. Prerequisites … Continue reading Secret Information in Network Traffic Logs: NTA for NCL