Skip to content

CryptoKait

  • CryptoKait
    • Home
    • About CryptoKait
    • Workshops and Public Appearances
    • Blog Posts by CryptoKait
    • Contact CryptoKait
  • Blog
  • Initiatives
    • Meet the NCL Player Ambassadors & Apply
    • CryptoKait’s Feature Friday
    • Apply to Be Featured on the CryptoKait.com Blog
    • Player Ambassador Diversity & Inclusion Advisory Board
  • National Cyber League
    • START HERE: NCL Coaching Guide for Everyone
    • Meet the NCL Player Ambassadors
    • NCL Blog
    • NCL Practice
    • Webinars and Live Shows
  • Personal Development
    • Adulting
    • Career Advice & Human Skills
    • Self Care
  • Cybersec Clubs
    • Cybersecurity Club Survival Guide
    • Blog Category: Cybersecurity Clubs
    • Collaboration Tips
  • Cybersec Bootcamps
    • Beginner Python with wolfshirtz
    • Command-line Log Analysis with Taisa

Category: Feature Friday

Breaking Boards: Hacking Hardware

July 17, 2020February 6, 2021Leave a comment

wolfshirtz
If you like cybersecurity but prefer to work with your hands, there's a way you can do both: hardware hacking! This beginner-level introduction from wolfshirtz will show you how to get started.

Fresh Kali…I mean Coffee

July 10, 2020September 4, 2020Leave a comment

Aaron James
Two oft-neglected but critical components of a cybersecurity toolkit are coffee and pictures of cats. This article by Aaron James features both. Put Kali aside for a moment to learn his secrets for a cup of brew unlike anything you've ever tried!* (*Depending on what you've tried.)

Virtual Collaboration Methods and Tools

July 3, 2020September 13, 20202 Comments

Hush1e
Explore the free tools recommended by Hush1e for virtually collaborating with your cohort—from remote chatting, to video conferencing, to screen sharing, to document sharing. Hush1e Pro Tip: Have a backup in case one goes down!

A Day in the Life of a Cyber Engineer

June 26, 2020February 6, 2021Leave a comment

Jacob "gond0r" Corley
Jacob Corley works both sides of cybersecurity—offense and defense. Once he breaks a web application, he's then tasked with fixing it. Jacob chronicles one day on the job in which he goes from discovering a vulnerability to finalizing a patch for it.

The Unexpected Ups and Downs of a First Year Consultant

May 29, 2020September 4, 20201 Comment

JeanaByte
JeanaByte's first year out of college and into the cybersecurity workforce has been a wild ride. When it feels like the downs won't end, this is her advice for pulling yourself back up.

Let’s Have A Serious Talk About Overworking Yourself

May 22, 2020September 4, 20201 Comment

WebWitch
Are you honoring your limits? Do you know when to say no? What's a good rule of thumb for how to treat yourself? WebWitch casts an introspection spell to help you meditate on your own habits.

The Joy of Smart Home Automation

May 15, 2020February 6, 20211 Comment

MistressVenom
The Internet of Things is often criticized for its security risks. MistressVenom is a fan of network security, but she also became a fan of smart homes after chronic illness threatened her independence. How did she reconcile the two?

What I Learned from Teaching Cyber at an All Girls High School

May 8, 2020September 4, 2020Leave a comment

Fred Stinchcombe
Fred has been teaching cybersecurity for about 15 years. No matter where he's taught, girls have been rare in mixed-gender classes. Fred discusses gender bias and answers the question, "How do you get girls into your classroom?" The answer may surprise you! It turns out that students who won't join a class (yet) will still join a CTF!

Follow Your Favorite NCL PA

  • Twitter
  • Twitter
  • Twitter
  • Twitter
  • Twitter
  • Twitter

Enter your email address to follow this blog and receive notifications of new posts by email.

Join 1,714 other subscribers

Your Favorite Authors

  • 0x600DF00D
    • How to Support Student Organizations
    • Helping Students During the Games
    • How to Use Your Coach’s Link
    • Thou Shall Pass! I Am a Coach. How Do I Help My Students Succeed?
  • Aaron James
    • Reverse Engineering: Fake It Until You Make It!
    • Taking Password Cracking to the Next Level
    • NCL and WSL: Leaving the Kali VM Behind
    • Fresh Kali…I mean Coffee
  • John McGill
    • CompTIA Security+ – One Certification to Rule Them All
    • Organizing Your Workspace
    • Cybersecurity Club Survival Guide: Lessons Learned from the First Year of a New Cybersecurity Club
    • Hiding in Plain Sight: Steganography Tricks and Tips
  • CryptoKait
    • Everything You Need to Know About Brackets
    • How Do I Register and Pay for Students?
    • Everything You Need to Know About the NCL Team Game
    • CryptoKait Blog Reaches 100k Views
  • ZeroTrail
    • How to Keep Your Confidence Up When You Are Stuck
    • Transferring Your Non-Tech Skills to a Cyber Security Job
    • How Setting Up a Virtual Machine and Navigating Through It Can Help You with NCL
    • How Playing War Games Can Help You Learn Command Line
  • drzeichick
    • Navigating the Coach Dashboard
    • Everything You Need to Know About the NCL Gym – Zombie Survival Guide Version
    • What Should I Consider When Selecting a Program for Cybersecurity?
  • PressSpace2Hack
    • How to Get the Most Out of the NCL Slack Channel
    • Forensics: First Impression
    • How to Keep Your Accuracy and Score All the Points
    • Everything You Need to Know About the NCL From Someone Who Has Been Around as Long as Kait
  • Taisa
    • Everything You Need to Know About the National Cyber League Preseason Game
    • Command-line Log Analysis FOR THE WIN (3/3): Untangling a Web Access Log
    • Command-line Log Analysis FOR THE WIN (2/3): Walking through “Leaping”
    • Command-line Log Analysis FOR THE WIN (1/3): How to Approach a Wild Log
  • Fred Stinchcombe
    • Leveraging Your LMS – Tips for Coaches Thinking Long Term
    • Need Some Buy In – Tips on Selling NCL to Your School Admins
    • Everything You Need to Know About the NCL Gym (but Were Too Afraid to Ask Someone)
    • What I Learned from Teaching Cyber at an All Girls High School
  • ghostinth3machine
    • How to RE with Radare When You Know Nothing
    • How to Regex When You Know Nothing
    • How to Go From Hashed to Cracked With Hashcat
    • How to Command Line When You Know Nothing
  • Jacob Corley
    • A Day in the Life of a Cyber Engineer
    • How Creating CTFs Challenges Helps You Succeed in CTFs
    • How to Include the National Cyber League Games on Your Résumé
    • Finding a Team When You’re Playing Solo
  • Hush1e
    • Everything You Need To Know About Rankings
    • How to Run Recaps
    • What Happens When the Season Is On and I Can’t Reach Out for Help?
    • Digging into Autopsy (Forensics)
  • Jeana Byte
    • Everything You Need to Know About the Team Game
    • NCL Mistakes That Make Me a Better Player
    • How to Run Your Team as a Student Coach
    • I Need Help Solving an NCL Challenge. What Do I Do?
  • mistressven0m
    • I’m Just a Lone Student. How Can I Bring NCL To My School?
    • Everything You Need to Know About Our CompTIA Partnership
    • How to Use NCL to Influence and Improve Your Résumé and Professional Appearance
    • Four Ways to Analyze Logs Like a Pro!
  • WebWitch
    • Landing a Job and Getting Paid Well For It [Part 3]
    • My Young Padawan — How to be an Effective, Supportive Mentor
    • Landing a Job and Getting Paid Well For It [Part 2/5]
    • Landing a Job and Getting Paid Well For It [Part 1/5]
  • wolfshirtz
    • Everything You Need to Know About the NCL Individual Game
    • Why Steganography is Cryptography
    • Ghidra: The NSA Reverse Engineering Tool That Will Help You Crush Enumeration and Exploitation
    • Collaborative Python Scripting for the Team Games
Website Powered by WordPress.com.
  • Follow Following
    • CryptoKait
    • Join 251 other followers
    • Already have a WordPress.com account? Log in now.
    • CryptoKait
    • Customize
    • Follow Following
    • Sign up
    • Log in
    • Report this content
    • View site in Reader
    • Manage subscriptions
    • Collapse this bar