As part of our organization we will provide examples and labs dedicated to teaching concepts and information relating to Cyber Security. We encourage members to learn and practice outside on their own time. As such we also provide resources where interested cadets can learn more and follow along on their own time. If you would like to learn more about some of the specific ideas we introduce and would like to make suggestions please contact us at cadetcyberorganization@gmail.com and we will work to provide more information on the topic.
Many of the tools we will use require the use of Linux and as such you will need to either setup a Linux subsytem on Windows or create a Kali Virtual Machine. We go into more detail on making a Kali Linux Virtual Box in another page but directions on installling a Linux Subsytem can be found here.
https://docs.microsoft.com/en-us/windows/wsl/install-win10
Coding is not required for learning about Cyber Security however, you should learn how to use a terminal. Here we have provided a good supplementary video about using a terminal.
There are many ways to practice skills you might acquire from Computer Security. Two of our recommended websites are Bandit Over the Wire and PicoCTF.
Bandit over the wire can be found here. It is great for beginners and features 33 levels for you to go through that will teach and help you practice many different skills.
PicoCTF is similar to Bandit Over the Wire but offers competitions every year where entrants compete to earn the most points in the given amount of time. We recommend going over past years challenges which are freely available to anyone.
There are many different tools that are used in cybers security. Below we will recommend some that you should familiarize yourself with and provide resources to do so. These are all installed by default in Kali Linux so practicing with them should be easy. The website we are recommending is called TryHackMe and is a great resource for practice as it often will guide you through how to use these tools for an introduction. You will need to make an account and connect yourself to the network to practice with some of these challenges but this is all free to use.
A password cracking software useful. Used after obtaining hashed passwords for later exploitation.
Network scanning software. Used for scanning ports and devices for exploitation.
Penetration testing software. Used in loading payloads to send out to targets.