Augusta University

GenCyber Summer Camp Resources

  • Free on-line cybersecurity course designed for high school students. Students learn about different operating systems (including the Linux command-line), Powershell, basic networking topics, and system administration. Includes lectures, labs and quizzes.

  • Check into this program. If your high school is not yet involved, then try and get your school involved in this cyber defense competition.

  • A sampling of some possible jobs in the field of Cybersecurity.
  • A collection of introductory programming exercises for K-12 students (be sure to look through the catalog for the age-appropriate exercises as the elementary school exercises pop up first).

  • A collection of programming tutorials–an easy way to learn to code in many languages for free!

  • A fun way to up your coding game by fighting as a robot against both human and AI opponents.

  • Collection of Python tutorials to get a jumpstart on this commonly-used scripting language.

  • Another collection of Python tutorials to continue learning this commonly-used scripting language.

  • Let’s Learn Python–one Youtube playlist will help you work through the basics of the language.

  • This tutorial has been prepared for the beginners to help them understand basic C# programming.

  • PHP is a server scripting language, and a powerful tool for making dynamic and interactive Web pages.

  • Create and run three common types of programs written for the Java platform; applications, applets, and servlets.

  • Windows PowerShell is a popular scripting language for Microsoft Windows. Cybersecurity professionals are increasingly finding this language useful for forensics and automation.
  • This book provides an excellent start to understanding how our computers are attacked. It sets the stage by teaching you needed networking, Linux (UNIX), and Windows basics before diving into attack techniques for each of the 5 phases. The book also describes how to set up a safe lab for experimentation. You must ensure you are experimenting in a safe environment and have permission to use attack tools!

  • Another useful book to learn more about Wireshark and packet analysis is “Practical Packet Analysis – Using Wireshark to Solve Real-world Network Problems”, by Chris Sanders, No Starch Press, 2nd Edition. The publisher, No Starch Press books, also has a number of other inexpensive, well-done technicals books.
  • Kali Linux is a distribution of Linux pre-loaded with lots of commonly used security tools. It can be installed locally or run as a LiveCD (where it boots only into memory and won’t affect any existing installed operating systems). This USB drive includes a version of Kali Live (v1.1.0a for x86). Simply reboot your computer, activate your computer’s boot menu (usually by pressing F12 when the manufacturer’s logo shows), then choose to boot to the USB drive.

  • Wireshark is a free, open-source, popular network analysis tool. It can collect packets live and review previously captured packets. Its packet/protocol dissection capabilities are extensive, and are useful for troubleshooting network issues, understanding network traffic, and studying malicious cyber actors and vulnerabilities.

  • This is the wiki site for the Wireshark network protocol analyzer.

  • Virtualization is an essential tool for creating test systems to experiment with defense and offense techniques. VMware is one popular application for this. VMware Player is VMware’s free virtualization option. VMware Workstation adds a number of features (like snapshots) and is available for purchase. Note that the latest version of VMware Workstation (v12) require 64-bit operating systems. Earlier versions are still available that will work on 32-bit operating systems.

Places to (Legally and Ethically) Hack

  • A collection of virtual machines (usable with VMware tools) and LiveCDs for download to practice exploiting vulnerabilities. The exercises are structured in increasingly challenging levels, as your skills increase.

  • A collection of community-contributed virtual machines for download to use while practicing exploiting vulnerabilities.

  • The Department of Homeland Security’s National Initiative for Cybersecurity Careers and Studies (NICCS) maintains a list of cybersecurity competitions. All skill and academic levels are covered.

Do you enjoy breaking codes? Try these sites for some more codes to crack!

  • NSA publishes some challenges on their website. The Yardleygrams are taken from a book by Herbert Yardley which teaches cryptanalysis through stories.

  • A short document detailing easy steps to keep yourself secure at home.

  • NIST authored a comprehensive set of security controls in SP 800-53. While cybersecurity experts agreed with this list, they decided to priortize the controls and create a marketing campaign to focus on the most important 20 controls.

It’s critical to stay up-to-date on the latest threats and vulnerabilities. Finding good sources of current cybersecurity events and threat information is essential.

  • Twice a week summaries of current events. Cybersecurity experts weigh in with commentary to point out what’s important and what’s not.

  • Daily summaries of threat activity, current events, and vulnerability discoveries. About 5-10 minutes per episode.

  • The U.S. CERT runs several informative mailing lists alerting you to critical vulnerabilities. These alerts or weekly digests provide current information on issues that cybersecurity professionals must address.

  • On February 18th, 2013, Mandiant released a report detailing the activities of a Chinese government-sponsored cyber hacking group. While dated (this particular actor had to find new tools and techniques after the release of this report!), the report still represents a fascinating and very detailed insight into a nation-state cyber threat.

Cybersecurity & hacking are becoming a more regular part of our culture! Here’s a sampling of movies and TV shows which feature aspects of cybersecurity and social engineering.
We don’t endorse any particular movies and we suggest you consider the ratings and reviews for content before enjoying!