David Zeichick
Ever wonder what path you should take to get a job in Cyber Security? Two-year or four-year degree? Certificate? What to major in? David endeavors to give you enough information to choose the path which is best for you. We're also interested in your experiences—please tell us what your journey has been like in the comments!
Category: National Cyber League
Everything You Need to Know About the NCL Season
ghostinth3machine
New to NCL and not sure how the season works? Got some jitters to shake? Ghostinth3machine offers a high-level overview of the NCL season along with tips and links to help you start getting acclimated!
Command-line Log Analysis FOR THE WIN (1/3): How to Approach a Wild Log
Taisa
(First in a three-part series.)
In 2017, Taisa was traumatized by logs. In 2018, she was analyzing logs by hand on a browser-only Chromebook. In 2020, she was #1 on the leaderboard in Log Analysis at the end of the Spring Preseason. Follow her Command-line Log Analysis blog series to find out which tools she used and how she did it—and how you can, too!
Need Some Buy In – Tips on Selling NCL to Your School Admins
Fred Stinchcombe
Fred is an educator who teaches cybersecurity at the high school level. When he inherited his school's cyber team, administration paid no attention. Seven years later, his entire school benefits from great press, visionary leadership, and students who are learning hands-on, competing, and excelling. Read to find out how you can gain support for NCL at your school!
Why Steganography is Cryptography
wolfshirtz
The NCL Player Ambassadors have been asked this question many times over the years. Wolfshirtz offers a definitive answer, but first poses this insightful counter-question: "Why mathematically garble your data to hide it when you can make it look like a dinosaur with a cool top hat?"
Who Should Play the NCL CTF and Why?
Hush1e
Do other cybersecurity competitions make you feel like you just stumbled into a crowded room with toilet paper hanging off your shoes? That won't happen here. Hush1e talks about the diverse community of NCL players, where we all go to find support, and what all of us (including you!) gain from playing together, regardless of skill level.
Google-Fu: A Tour of Google Dorking
JeanaByte
You may have heard someone brag about their "Google-Fu" skills before and assumed they were just being funny, but, as JeanaByte demonstrates, a powerful art known as "Google dorking" does indeed exist, and it can be used for good or for bad—and for the Open Source Intelligence domain of the NCL Games. Please query responsibly!
Thou Shall Pass! I Am a Coach. How Do I Help My Students Succeed?
0x600DF00D
New NCL Coaches: Read for a gentle introduction.
Seasoned Coaches: Read for a new take on how to help your students succeed.
0x600DF00D breaks down how to coach, what to coach, and ways to incorporate NCL into the classroom, all while honoring the Rules of Conduct.
Low-tech Tooling: Competing From a Device You Can’t Install Tools On
Taisa
Taisa played her first season of NCL entirely from a browser-only device and shares her top resources and tricks for competing in less-than-ideal circumstances. Even if you've got Kali running as a VM, low-tech and browser-based tools can be a great way to check your work, troubleshoot your process, or collaborate with teammates in the cloud.
What is HTTP Request Smuggling and Why Do I Care?
WebWitch
WebWitch examines the reemergence of HTTP Request Smuggling as an allegory for the dangers of making assumptions about older programs and protocols when the cybersecurity landscape is constantly shifting. Their perspective on research topics in cybersecurity (and the Oxford comma) will help you start thinking like a seasoned professional.
You must be logged in to post a comment.