CTF4Noobz: CTF Workshop + CompetitionInterested in cybersecurity competitions but don’t know where to start? Or have you tried one or two or 10 and want more practice? The Women’s Society in Cyberjutsu (WSC) invites those of all experience levels to join in on this training and competition. In this hands-on keys workshop, we will explore different types of competitions from Capture the Flag to offense/defense and everything in between. In addition, we will review various tools of the cyber trade. These will become part of your toolkit to solve cybersecurity competition challenges! We will explore techniques associated with reconnaissance, scanning and enumeration, and exploitation. Also featured will be forensic challenges, hash-cracking, binary analysis, crypto decoding, etc. The challenges are related to topics covered in the EC Council Certified Ethical Hacker (C|EH) certification.
Learning Objectives:1: Grow information security skills.
2: Understand current abilities and areas of improvement.
Prerequisites:
Introductory to intermediate knowledge of information security concepts, tools and techniques. The challenges incorporate a broad spectrum of cyber-defense, digital forensics, and penetration testing comprehension and are designed for novice to advanced participants.
Participant Requirements:- A computer with at least 4 GB RAM (preferably 8 GB) and wireless network card.
- Install VirtualBox for your OS. Note: if you are using a different virtual machine player we will not be able to troubleshoot issues for you.
- Download the Kali Linux VirtualBox image. If you already have Kali you can skip this step. Import to VirtualBox.
Alternative Preparation:Skip installing VirtualBox and Kali Linux and instead install stand-alone tools such as nmap, Wireshark, and FTK Imager. The nice thing about Kali is it already has most tools we will use built in.
Questions? Contact
info@womenscyberjutsu.org.