Cal Poly California Cybersecurity Institute
Teaching Californians to Protect California
- Report this post
🚀 Check out the latest article in CP Mustang News about the #SpaceGrandChallenge hosted by the Cal Poly California Cybersecurity Institute! This event brought together middle and high school students from across the country to develop their #STEM, space and #cybersecurity skills through an innovative virtual competition.Read the full story about the impact and success of this year's challenge here: https://lnkd.in/gKv_VjJu
2
To view or add a comment, sign in
More Relevant Posts
-
Xeno Kovah
Low Level Security Dude
- Report this post
Great post walking through how to identify memory values that affect character values (like money, equipment, etc) in games. If you ever wondered how things like GameGenie worked, this is how.I love seeing blog posts showing how #OpenSecurityTraining2 helps people understand how systems work :). Because once we understand things, then we can hack things!
18
1 Comment
Like CommentTo view or add a comment, sign in
-
Wolf Engelberg-Schneiderman
I am a creative problem solver, a motivated self-learner, and I love to code. Check out my projects at: github.com/0x00wolf
- Report this post
A new post is out for my Red Team Cookbook blog: Hacking SNES Games For Fun And (in-game) Profit.In the post you will:- Receive a present that a 9 year old kid in 1994 would have killed for.- Get a gentle overview of how memory, processes, and differential analysis work.- Learn a super easy way to hack any of your new extensive SNES game collection.- I will geek out a bit about my interest in reverse-engineering.I posted about this hack a few days ago, and gave a shout out to a cybersecurity researcher, Xeno Kovah. It was from my experience taking courses through his learning platform, OpenSecurityTraining2, (https://p.ost2.fyi), that allowed me to understand game hacking in the first place. Xeno commented on my post, suggesting it would be interesting to read a blog post on my method, which is what I’m sharing with you today. A year or so before my first commit on Github, I remember watching videos on Youtube of Xeno presenting his research at past Blackhat conferences - inspiring me to pursue a career in cybersecurity. So it was a particularly cool moment for me to have him be interested in one of the rabbit holes I find myself in.At the opposite end of the spectrum, I was rear ended Friday by a distracted driver while I was at a full stop. I suffered a minor concussion and a TBA series of sprains in the suspected areas. It was tough trying to juggle, feeling inspired to work on the blog post, and the constant headaches from having a brain injury. I will need physio and I am not a fan of overhead lights, but I’m still walking and writing coherent sentences at least (I think). Unfortunately, my oratory skills are pretty depleted.Keep hacking, but also don’t text and drive.https://lnkd.in/e_QSSN3Q
12
See AlsoJean-Pierre Palmen RRM RMiA op LinkedIn: Cyberweerbaarheid voor mkb-bedrijvenChallenge 03 Systems & Devices (concept) – Loop mee met ICT (Vista College)1 Comment
Like CommentTo view or add a comment, sign in
-
Joe Wells
Aspiring Cyber Consultant | Advocate for User Education in Cyber Security | Passionate about Solving Complex Security Challenges
- Report this post
The first stage of my THM tool project is out!🔥 Excited to Introduce "THM-Generator"! 🔥Ever found yourself undecided on what to do on TryHackMe? Say no more!🚀 I've just launched the THM-Generator, a tool designed to help users effortlessly pick a THM room. Let it do the thinking for you!✅ Features:0️⃣ Random room selection based on difficulty: from Free-Info to Free-Insane.1️⃣ Sleek UI with immersive background videos and music toggle.2️⃣ Fully responsive and user-friendly.Check it out [https://lnkd.in/eBZJw9Ud] and let me know what you think! Any feedback is appreciated. Planning to add paid rooms and random subject rooms in the future!#TryHackMe #Cybersecurity #THMGenerator #Coding #WebDevelopment
32
23 Comments
Like CommentTo view or add a comment, sign in
-
Akash kumar Singh
ET @ Cognizant || THM top 7% || CEHv12 || CyberSecurity Enthusiast || Blender Artist
- Report this post
🖐 Hello connections !💥 I've just completed Day 6 of #AdventOfCyber2023 by TryHackMe.🎯 Topic: - Memory corruption🎯 Things which I Learned During this objective: -✧Specific programming languages might not handle memory safely.✧A buffer overflow happens when the amount of data coming it exceeds the storage capacity.✧Variables might overflow into nearby memory stores, which corrupts them. I definitely had my fair share of doing this when I was just a kid playing online games. Of course, at the time I didn't know what the hell I was doing, or that I shouldn't be changing values via memory.PS: - I got to play a game while learning so it was very fun for me 😉 #tryhackme #cybersecurity #learningandgrowing
2
Like CommentTo view or add a comment, sign in
-
UWaterloo Cybersecurity and Privacy Institute
1,329 followers
- Report this post
CPI’s E. George McCutcheon catches up with Cameron Hadfield and Murray Dunne, two University of Waterloo graduate students, to explore the growing field of physics-based cybersecurity measures.Learn more about their personal journeys and fascinating research by clicking below.https://lnkd.in/gUGXzqVm#cybersecurity #cybersecurityawareness
13
Like CommentTo view or add a comment, sign in
-
Eakam Veer Singh
Senior Cyber Security consultant | Hypothesis Threat Hunting | Investigation | VAPT | SIEM | RSA | SOC Engineering | Firewall | MITRE ATT&CK | NIST | CIS V8
- Report this post
🚀 Exciting Cybersecurity Learning Games! 🚀🎮 Level up your cybersecurity skills in a thrilling and interactive way! 🎮🔐 Hack The Box:Hack The Box offers a range of challenges for all skill levels, allowing you to sharpen your cybersecurity skills by conquering virtual machines.💻 OverTheWire:OverTheWire presents a variety of online challenges, covering cryptography, network security, and more. 🚀 CyberStart Game:web security, cryptography, and Linux concepts in a gamified environment. 🔍 Root Me:Root Me offers challenges and virtual environments to practice penetration testing skills🚩 CTF365:Immerse yourself in simulated cybersecurity scenarios with Capture The Flag challenges. CTF365 provides an environment for learning and practicing security skills. 🔓 Pwnable.kr:Embark on a journey of binary exploitation and reverse engineering challenges! Pwnable.kr offers hands-on technical challenges, perfect for those seeking a deeper understanding of cybersecurity concepts.🌐 Damn Vulnerable Web Application (DVWA):DVWA is intentionally vulnerable, allowing you to practice and enhance your knowledge of web security. Learn by exploiting various vulnerabilities.🐐 WebGoat:Teaching web application security in a realistic environment, WebGoat is deliberately insecure. Explore and learn through hands-on challenges maintained by OWASP.🛡️ Security Shepherd:This OWASP project provides a training platform with a variety of challenges. Test and improve your skills in a dynamic gaming environment.🌐 Google's XSS Game:Master the art of cross-site scripting (XSS) with Google's XSS Game. Engage in a series of challenges created by Google to understand and exploit XSS vulnerabilities.🎓 During my college days, I loved spending hours on HACK THE BOX and Google's XSS Game.🚨 Note: Some websites may not be safe to access using your personal computer; ensure you have a secure virtual or physical gaming environment. Have fun exploring the exciting world of cybersecurity through these engaging games! 🎉🔒 #CyberSecurity #InfoSec #GamingForLearning #CollegeMemories #CybersecurityGaming #hackthebox #Google #owasptop10 #owasp #qostechnology QOS Technology
46
2 Comments
Like CommentTo view or add a comment, sign in
-
- Report this post
As students gear up for another school year, it’s crucial to be equipped with the right tech tools. Check out valuable insights and tips for navigating the online classroom: https://lnkd.in/gWKPJstr#TechSavvyStudents,#BackToSchool, #Cybersecurity, #ITSupport, #Cyberthreats, #ITServices
2
Like CommentTo view or add a comment, sign in
-
Prakash Inuganti
Cyber-security, Backup & Disaster Recovery, Cloud services, 24x7 Help Desk, Networking, Firewalls, MSP 919-443-0086
- Report this post
As students gear up for another school year, it’s crucial to be equipped with the right tech tools. Check out valuable insights and tips for navigating the online classroom: https://lnkd.in/exBEh7pi#TechSavvyStudents,#BackToSchool,#LearningFromHome,#DigitalLearning,#StudentTech,#ProtectYourBusiness, #TechSolutions, #Cybersecurity, #ITSupport, #Cyberthreats, #ITServices, #ITFranchise
Like CommentTo view or add a comment, sign in
-
Isabelle Madill
CS Major at Norwich University | Black Girls CODE Alumna | 2023 National Cyber Scholar
- Report this post
Earlier this month, I received an email with some awful news. The email said, "Due to circ*mstances beyond our control, the CyberStart platform will be fully closed down in early 2024". Apparently I have until January 11 to play until it disappears for good. No. No, no, no! This is unacceptable. A precious resource like this shutting down without warning?CyberStart has quite literally been the gift that keeps on giving for me and my family. It has benefitted everyone in numerous ways, even those who are not interested in cybersecurity. In high school CyberStart showed me that my affinity for computer programming could be so much more than a useful hobby: it could be the key to a career where I could do fantastic things that I had only read about in books and enjoy my job. It was CyberStart that enabled me to earn my GIAC certification in Basic Cybersecurity Technologies earlier this year for free and sparked an interest in digital forensics in the process. I would not be where I am today—studying computer science, my college education fully paid for, with an industry certification to boot—without CyberStart. It showed me, a Black woman, that I could have a career in STEM, and most importantly, that I belong there. These are just the ways in which it has benefitted myself: one family member became interested in CyberStart after watching me play and became passionately interested in cybersecurity, winning multiple scholarships and earning the same GIAC certification in freshman year of high school. Now they are planning to study cybersecurity in college and become a bounty hunter when they graduate. Even relatives who have no interest in cybersecurity have learned a lot about problem-solving, online safety, and thinking outside the box, and have applied it to their various interests. I am extremely grateful for all of the wonderful experiences and opportunities CyberStart has given me and my family, and we all owe a huge debt to them. To everyone at CyberStart: thank you very, very much. You have done more for me than you will ever know and given me far more than a book or traditional methods of learning a subject could.I also feel a sharp pang of angry regret that I did not play as often as I could have; earlier iterations of the game highlighted the competitive aspects, which I found overwhelming and thus turned up my nose at it. We learn from our mistakes, but I cannot help but feel a little like I shot myself in the foot here.
14
Like CommentTo view or add a comment, sign in
-
Kerry Wheeles
Owner / President CMIT Solutions of Birmingham South
- Report this post
As students gear up for another school year, it’s crucial to be equipped with the right tech tools. Check out valuable insights and tips for navigating the online classroom:https://lnkd.in/eRKcvpKi#TechSavvyStudents,#BackToSchool,#LearningFromHome,#DigitalLearning,#StudentTech,#ProtectYourBusiness, #TechSolutions, #Cybersecurity, #ITSupport, #Cyberthreats, #ITServices, #ITFranchise
3
1 Comment
Like CommentTo view or add a comment, sign in
- 711 Posts
- 2 Articles
View Profile
FollowMore from this author
- NICE Framework and the Nexus of Space and Cybersecurity Cal Poly California Cybersecurity Institute 3y
- The Sophistication of Cyber Criminals is on the Rise – Our Law Enforcement Needs to be Two Steps Ahead Cal Poly California Cybersecurity Institute 4y
Explore topics
- Sales
- Marketing
- Business Administration
- HR Management
- Content Management
- Engineering
- Soft Skills
- See All