By FiFi aka "ZeroTrail"
A survey of IT decisionmakers revealed that soft skills are in high demand(*). Every job you've had in the past is therefore precious, because you gained soft skills from it that you can transfer to a position in cybersecurity. ZeroTrail made the switch and shows you how to boost your résumé and get hired by recognizing the value of your non-tech skills.
Category: Adulting
Everything You Need to Know About Our CompTIA Partnership
MistressVenom
Last year, the National Cyber League and CompTIA announced that they were teaming up. MistressVen0m answers the most common questions we've received about this partnership: Who is CompTIA? How does this affect players and coaches? What's this we hear about a CompTIA student membership? And last, but not least, will there be prizes??? (YES!)
Volunteer Work and How Not to Take on Too Much
Hush1e
Sometimes, you have to step back and breathe so that you can re-evaluate how much you can personally handle. Taking on too many projects is not healthy, and you should know your limits. Hush1e used to be a corporate trainer, and she shares her mindfulness and decompression tips in time for the NCL Season to ramp up.
What Should I Consider When Selecting a Program for Cybersecurity?
By David Zeichick
Ever wonder what path you should take to get a job in Cyber Security? Two-year or four-year degree? Certificate? What to major in? David endeavors to give you enough information to choose the path which is best for you. We're also interested in your experiences—please tell us what your journey has been like in the comments!
Low-tech Tooling: Competing From a Device You Can’t Install Tools On
By Taisa
Taisa played her first season of NCL entirely from a browser-only device and shares her top resources and tricks for competing in less-than-ideal circumstances. Even if you've got Kali running as a VM, low-tech and browser-based tools can be a great way to check your work, troubleshoot your process, or collaborate with teammates in the cloud.
What is HTTP Request Smuggling and Why Do I Care?
WebWitch
WebWitch examines the reemergence of HTTP Request Smuggling as an allegory for the dangers of making assumptions about older programs and protocols when the cybersecurity landscape is constantly shifting. Their perspective on research topics in cybersecurity (and the Oxford comma) will help you start thinking like a seasoned professional.
How to Use NCL to Influence and Improve Your Résumé and Professional Appearance
MistressVenom
The NCL Games are over—now what? MistressVenom works in cybersecurity and has reviewed thousands of résumés. She explains how to effectively put your NCL experience and Scouting Report to work for you in your quest for employment. Learn what recruiters like, what NCL allows, and what qualifies as a spoken language!
The Easy Way to Deal with Difficult NCL Teammates
wolfshirtz
Don't simply ignore that difficult teammate! Use your NCL team experience to learn and practice valuable communication skills. Wolfshirtz, WebWitch, and Bill & Ted will show you how!
Fresh Kali…I mean Coffee
Aaron James
Two oft-neglected but critical components of a cybersecurity toolkit are coffee and pictures of cats. This article by Aaron James features both. Put Kali aside for a moment to learn his secrets for a cup of brew unlike anything you've ever tried!* (*Depending on what you've tried.)
A Day in the Life of a Cyber Engineer
Jacob "gond0r" Corley
Jacob Corley works both sides of cybersecurity—offense and defense. Once he breaks a web application, he's then tasked with fixing it. Jacob chronicles one day on the job in which he goes from discovering a vulnerability to finalizing a patch for it.