Find answers, ask questions, and connect with our
welcoming community.

Home Page Forums Welcome & Introductions Introduce Yourself & Tell Us How We Can Help You Succeed in Cybersecurity!

  • Introduce Yourself & Tell Us How We Can Help You Succeed in Cybersecurity!

     Yourstudent updated 2 months ago 6 Members · 10 Posts
  • Shawna

    Administrator
    May 26, 2020 at 3:38 am

    Hello Cyber Seekers! This online Community of Practice [and learning] exists to serve your cybersecurity support needs! Our focus is on enabling your success in cybersecurity and partnering with you to identify and provide what each of you need to succeed! Tell us about the support, information, knowledge, skill, training and experience gaps you’re facing, and we will do our best to help you out!

    This community is being built “by you” and “for you” with help from “others like you” to serve the needs of anyone seeking support, information, advice, encouragement or experience related to building cyber skills, starting your cybersecurity career or preparing for cybersecurity certifications. We want this platform to become the place you go “get” and “give” the support needed to “Help Each Other Succeed in Cybersecurity”!

    To help us provide greater value to you, please share what you are looking to get [or give] during your time in this community.

    • Where are you on your cybersecurity journey? What is your Current Role? [i.e. student, IT Professional, IT Educator, IT Recruiter, etc.]
    • What is your current Cybersecurity Goal? [i.e.skill-building, Security+ certification or prep for specific job role, etc.]
    • What do you NEED the most “from us” to help you succeed? [i.e. content, resources, courses or support]?
    • What would you like to do to help others succeed in cybersec? [i.e. blog post, create How-To guides, create challenges, etc.?

    Thank you for sharing with us!
    Cybr Team

    • This discussion was modified 5 months ago by  Shawna.
    • This discussion was modified 5 months ago by  Shawna.
    • This discussion was modified 4 months, 4 weeks ago by  Shawna.
    • This discussion was modified 4 months, 2 weeks ago by  Shawna.
    • This discussion was modified 4 months, 2 weeks ago by  Shawna.
    • This discussion was modified 4 months, 2 weeks ago by  Shawna.
    • This discussion was modified 4 months, 2 weeks ago by  Shawna.
    • This discussion was modified 4 months, 2 weeks ago by  Shawna.
    • This discussion was modified 4 months, 2 weeks ago by  Shawna.
    • This discussion was modified 4 months, 2 weeks ago by  Shawna.
    • This discussion was modified 4 months, 2 weeks ago by  Shawna.
  • Sagar

    Member
    June 19, 2020 at 9:16 am

    Thanks

    • This reply was modified 4 months, 1 week ago by  Sagar.
    • Christophe

      Administrator
      June 20, 2020 at 4:49 pm

      Welcome to the community, @MrSagarBedi ! We’d love to learn more about your learning goals — are you looking to get certified? Learn specific skills?

  • Eric

    Member
    June 22, 2020 at 8:24 pm

    Hello my name is Eric and I just signed up after watching one of your awesome videos on sql injection. I am a full time student but first a husband and father. This is my second career as I was injured and couldn’t continue with my first which was in law enforcement. I am almost finished with about 3 years of school but is not the same as you would think as my community college has a special program with a local university which allows me to complete my third year at the community college level then go on to the university level and finish up 1 year and get my bachelors in cybersecurity. I love ethical hacking specifically webapp and malware analysis. My biggest expectation is to find some direction and help as I move forward. It’s overwhelming the amount of information and resources to sift through and I often find myself on rabbit trails. I would then love to give back to this community by sharing some of the projects I had difficulty with in school. I’ve written a few tutorials but still have a long way to go. I’m trying to focus on programming, networking, and webapp pentesting. Please let me know if you have any questions.

    • Christophe

      Administrator
      June 22, 2020 at 9:22 pm

      Welcome, @sechvn ! We’re glad to have you here and we look forward to helping you find your path! It can definitely be an overwhelming field because there’s so much going on, so much to learn, and so many possible directions. Let’s keep the dialog open and take it one step at a time, and you’ll find your footing in no time 🙂

      I’d personally love to hear about some of the projects you had difficulty with in school, and I have no doubt others would benefit from it too.

      You mentioned having written a few tutorials — have you posted them publicly? If so, I would love to take a look. Otherwise, we’d love to have you consider posting them on our blog, since they could help others in similar shoes!

  • Eric

    Member
    June 23, 2020 at 3:03 pm

    Thank you so much for the insight and I think it would be awesome to connect with you especially for my brother. He is currently developing a keylogger and has already created a website utilizing python flask. He is also a wiz with networking. But he is very discouraged and has had several interviews with no results. The labs that I had the most trouble with was actually configuring Burp. I ended up figuring everything out and wrote two tutorials on Burp and Ettercap. Haven’t shared them publicly but have no problem sharing them with you. I used Microsoft word to create both please let me know how I can get them to you.

  • Eric

    Member
    June 23, 2020 at 3:17 pm

    The other task that I had an extremely difficult time with was setting up a pentesting lab utilizing vmware workstation. I have since set up multiple virtual pentesting labs. One of the main issues were trying to understand the virtual networking aspect. The most current lab I have set up uses pfsense to distribute IP’s within lan segments to my VM’s. I have a DC with another server instance and two windows machines and a kali machine. One of the issues was understanding that in order for vmware workstation to use the bridge setting on a laptop wirelessly is you have to go into network editor and set the bridge adapter to your wireless adapter and not automatic. But I would say that setting up these labs were probably the most challenging in that a lot of tutorials don’t cover virtual networking. Vmware has extensive documentation but when your using wireless via a laptop it gets tricky. I think the community for students could really use an in depth series on setting up realistic pentesting labs and utilizing pfsense. Another crucial area that I have not seen covered really well is the area of setting up honeypots and using for example the onion security VM that has tools to analyze the traffic coming into the honeypot like snort. There are some but I know for myself it really isn’t covered well enough to feel comfortable running a honeypot. Sorry to ramble on I just think the way you explain things is amazing and so many students would benefit from your instruction in some of these areas.

  • kripar

    Member
    July 23, 2020 at 10:32 pm

    Hi community!! I’m here out of sheer curiosity about the SQL injection attacks….The course is very useful and love the detailed presentations. Thank you!

    • Christophe

      Administrator
      July 26, 2020 at 3:58 pm

      Welcome @kripar and thank you! We’re glad to have you here.

      Let us know if you have any questions about the SQL injections course. By the way, we’ve just recently added an OS Command injections section to that course, so check that out!

  • Yourstudent

    Member
    August 22, 2020 at 11:34 am

    We learn from you and your team thanks for this keep teaching

    👍👍👍👍👍👍

    • This reply was modified 2 months ago by  Yourstudent.

Log in to reply.

Original Post
0 of 0 posts June 2018
Now