VirginiaCyberRange
VirginiaCyberRange
  • 142
  • 188 512
CyberPatriot: Using Using CyberRange VMs + CloudCTF for CyberPatriot Practice
Are you looking for a little more advanced VM based challenges for your high school students? CyberPatriot is a great, state and national competition that challenges students to learn how to secure and harden both Windows and Linux hosts, and then brings them together for annual state and national competitions!
The CyberPatriot is a great program, but it requires pretty beefy PCs, capable computer lab, or laptops to run VMWare based images to operate on. This puts low income/resourced schools at a disadvantage, and as more schools are moving to google chromebooks, also makes it impossible for many schools to even compete without a dedicated computer lab that can offer these types of computer resources.
This is why we created this video, and these Cyber Range based resources for teachers wanting to take their students to the next level with Cyber Patriot. This 1hr+ video shows you a Windows+Linux VM environment we created on the web-based Cyber Range, along with a competitive Capture the Flag game preloaded with CP-like challenge library, along with VM artifacts and activities to step students through the types of host discovery and hardening challenges that you will encounter in the real Cyber Patriot competition. All without messing with VMWare downloads and beefy hardware needed for the real Cyber Patriot event.
T.Weeks steps you through getting set up with this unpublished environment that's becoming more and more popular with HS teachers wanting to get their kids into CyberPatriot.. and then talks about how to make your OWN custom images with artifacts and challenges.
Переглядів: 353

Відео

Cybersecurity Career Week CTF Workshop
Переглядів 653Рік тому
We introduce different types of CTF competitions, focusing on Jeopardy-style CTFs. This CTF will include challenges aligned with the categories from the NICE Workforce Framework for Cybersecurity. Challenges are appropriate for a range of participants, including introductory challenges.
Networking Interfaces
Переглядів 574Рік тому
This video lesson will demonstrate how to use Linux commands to view the network interface information.
Parsing Text Files
Переглядів 184Рік тому
In this video, learn how to use Linux commands to view a file from the command line interface.
Processing Text Files
Переглядів 63Рік тому
The purpose of this video is to introduce the basics of viewing and parsing text files on a Linux system.
Using Vi part 3
Переглядів 56Рік тому
In this lesson, learn how to use the Vi text editor on a Linux system and understand the use of vi to edit text files.
Using Vi part 2
Переглядів 41Рік тому
In this lesson, learn how to use the Vi text editor on a Linux system. We will go over the basics of moving around a file in vi.
Intro to vi text editor (continued)
Переглядів 122Рік тому
Continue to understand the basic use of the Vi text editor.
Intro to vi text editor
Переглядів 193Рік тому
In this workshop we'll show you how to use the Vi text editor on a Linux system.
Intro to Command Line Interface using Nano
Переглядів 94Рік тому
In this lesson, learn how to use the Nano text editor on a Linux system.
Network and Host Scanning using nmap on Kali Linux
Переглядів 2,6 тис.Рік тому
This week we discuss how to do Network/Host Scanning using nmap. We'll go over port scanning ethics 101; How to scoping a network size (CIDR notation); Ping scans vs port scans; Useful command line options; Integration with scripts & other tools.
Linux Command Line tricks & tips using regular expressions & POSIX tools
Переглядів 278Рік тому
Linux Command Line tricks & tips using regular expressions & POSIX tools
Introduction to Regular Expressions
Переглядів 117Рік тому
Introduction to Regular Expressions
Introduction to reverse engineering CTF challenges
Переглядів 14 тис.Рік тому
Introduction to reverse engineering CTF challenges
Introduction to Reconnaissance Challenges
Переглядів 1 тис.Рік тому
Introduction to Reconnaissance Challenges
Introduction to Web Challenges
Переглядів 690Рік тому
Introduction to Web Challenges
Networking Challenges Part 2
Переглядів 413Рік тому
Networking Challenges Part 2
Introduction to Networking Challenges
Переглядів 573Рік тому
Introduction to Networking Challenges
Introduction to Cryptography Challenges
Переглядів 1,1 тис.Рік тому
Introduction to Cryptography Challenges
Basic tips for solving CTF challenges
Переглядів 3,4 тис.Рік тому
Basic tips for solving CTF challenges
Hosting capture-the-flag events with CloudCTF
Переглядів 323Рік тому
Hosting capture-the-flag events with CloudCTF
Introduction to capture-the-flag and the CloudCTF platform
Переглядів 307Рік тому
Introduction to capture-the-flag and the CloudCTF platform
Weekly workshops announcement
Переглядів 52Рік тому
Weekly workshops announcement
Cybersecurity is for everyone
Переглядів 992 роки тому
Cybersecurity is for everyone
Careers in Cybersecurity
Переглядів 1172 роки тому
Careers in Cybersecurity
2022 Virginia Cyber Signing Day Highlights
Переглядів 722 роки тому
2022 Virginia Cyber Signing Day Highlights
Is Cybersecurity for you? Yes!
Переглядів 2722 роки тому
Is Cybersecurity for you? Yes!
Tell Your Story Series #4: Michael Onda
Переглядів 912 роки тому
Tell Your Story Series #4: Michael Onda
Tell Your Story Series #3: Gerald "Gerry" Martin
Переглядів 1242 роки тому
Tell Your Story Series #3: Gerald "Gerry" Martin
Tell Your Story Series #2: Dana Painter
Переглядів 893 роки тому
Tell Your Story Series #2: Dana Painter

КОМЕНТАРІ

  • @andrew.igumenoff
    @andrew.igumenoff 16 днів тому

    Come on, such an off-topic tutorial!

  • @fauzirahmat8160
    @fauzirahmat8160 2 місяці тому

    Tolong di artikan dalam bahasa indo pak supaya mudah di mengerti

  • @midjabalde2617
    @midjabalde2617 2 місяці тому

    Amazing series.

  • @faisalrabbanisitompul4524
    @faisalrabbanisitompul4524 5 місяців тому

    Very impresive video

  • @VirginiaCyberRange
    @VirginiaCyberRange 8 місяців тому

    The follow up on solving challenges related to: "Linux Command Line tricks & tips using regular expressions & POSIX tools" - ua-cam.com/video/tz9GOLFbhig/v-deo.html "Network and Host Scanning using nmap on Kali Linux" - ua-cam.com/video/69emRb7Jvm0/v-deo.html

  • @rohandas2029
    @rohandas2029 8 місяців тому

    Great talk

  • @mashtech7477
    @mashtech7477 Рік тому

    Can I please get an invitation code. Am interested in the program

    • @VirginiaCyberRange
      @VirginiaCyberRange Рік тому

      Invitation/registration codes are for specific courses (offered by specific teachers) and only last for a couple of weeks. This is just a demo video. If you live in Virginia and a part of a public school, then talk to your school/instructor about getting your class a free account on the Cyber Range. If you're outside of Virginia, then reach out to usCyberRnage.org about setting up a paid account with us.

  • @poojithareddy-z6k
    @poojithareddy-z6k Рік тому

    Code isn't working mam

  • @blablabla050484
    @blablabla050484 Рік тому

    how to register sir ? i need a code from trainer/facilitators to fill registration form. please let me know, thank you

    • @VirginiaCyberRange
      @VirginiaCyberRange Рік тому

      If you do not live in Virginia.. then contact the USCyberRange.org on purchasing services.

  • @m.chinzorig4367
    @m.chinzorig4367 Рік тому

    If the program is python based exe, and which function should I find first for find password checking function sir ?

  • @anntakamaki1960
    @anntakamaki1960 Рік тому

    Much of the computer architectures knowledge can be obtained by specific UA-cam videos. However there was no playlist so it took a while to learn. Also, it’s recommended to do an assembly course.

    • @rafirafi3094
      @rafirafi3094 26 днів тому

      do you have any recomendation about some asm course for free? thanks

    • @anntakamaki1960
      @anntakamaki1960 26 днів тому

      @ I learnt from UA-cam videos and reading textbooks. Practical Malware Analysis textbook, and Ghidra book textbook. But I think I would recommend to find some course on Udemy too. Also, before starting this make sure you know C programming.

    • @rafirafi3094
      @rafirafi3094 26 днів тому

      @@anntakamaki1960 yes right now i'm still learing cpp from yt channel Bro Code, next ill read those text book, thanks man appreciate it😁

  • @benarcher372
    @benarcher372 Рік тому

    But this is not 'vi', it's 'vim', right?

    • @VirginiaCyberRange
      @VirginiaCyberRange Рік тому

      vi IS vim... $ which vi /usr/bin/vi $ ls -la /usr/bin/vi lrwxrwxrwx 1 root root 20 Sep 15 2022 /usr/bin/vi -> /etc/alternatives/vi $ ls -la /etc/alternatives/vi lrwxrwxrwx 1 root root 17 Sep 15 2022 /etc/alternatives/vi -> /usr/bin/vim.tiny

    • @benarcher372
      @benarcher372 Рік тому

      OK, got it@@VirginiaCyberRange 🙂 I always thought that 'vi' meant the original 'ex' editor in visual mode. But fully understand your point. It's more that all trainings nowadays seems to use the name 'vim' and not 'vi'. Thanks for answering me and best of luck. /ben

    • @VirginiaCyberRange
      @VirginiaCyberRange Рік тому

      @@benarcher372 Yeah.. vi is still a real (separate) project on other UN*Xes.. but on all modern UN*X clones.. vim/vi/nvim is the standard. There's a deep and confusion hisotry of vim/nvim, vi and ex though.. see here: vi.stackexchange.com/questions/341/what-is-the-relation-between-vi-nvi-and-vim Short of it.. if you're an IT professional who works on Linux/UN*X systems, you need to know basic vi syntax. If you paid to ressurect dead system or fix off line systems with failed RAID arrays or the like.. or even cloud VMs in console single user mode.. and all you have the default system editor (vi/vim).. then you better be ableto do your job and not have to have some easy or convenient tool like nano, pico or <gag> EMACS.

  • @coolperzon63
    @coolperzon63 Рік тому

    yall are probably not gonna read this, but i appreciate the videos, im going through and watching the CTF series

  • @QuangPhongNguyen-op4ic
    @QuangPhongNguyen-op4ic Рік тому

    Thank you😍

  • @saifafghansport2718
    @saifafghansport2718 Рік тому

    How we know gold number for deep seeker 3d which number gold or diamond

  • @thaliadezi4352
    @thaliadezi4352 Рік тому

    😞 *Promo SM*

  • @Humachine
    @Humachine Рік тому

    am shocked with views count 💀 this video deserves over a million views & likes 🤷‍♂🤷‍♂ but I think there are very less people in digital forensics

  • @dhavalasaravani760
    @dhavalasaravani760 2 роки тому

    "Program seems to be broken and illogical and we forgot the missing number. Can you find the missing number for us".... This is the challenge in ctf. What is the flag for it??

  • @dianaayensu3217
    @dianaayensu3217 2 роки тому

    HELLO, Sir please i would like to join your course. I have sent you an emails but to no reply. thank you

    • @VirginiaCyberRange
      @VirginiaCyberRange 2 роки тому

      Hey Diana! So if you're a student in the state of VA, then speak with your instructor or faculty member who has a Cyber Range account and they can invite you to a course. The course above was just a demo course from 2019. If you're in VA, and none of your faculty have access to the Cyber Range, just apply for a free account here, and click "Sign Up": www.virginiacyberrange.org/ If you're not a VA faculty educator, then all other states and orgs need to apply through the US Cyber Range here: www.uscyberrange.org/ Either system, schools and educators apply, and send course invites out to students. Students never directly "sign up" at the Range without an educator inviting them. More information on this is here: kb.uscyberrange.org/faq/us-what-is-cyber-range.html Cheers! T.Weeks Cyber Range Engineer

  • @ayaancool3901
    @ayaancool3901 2 роки тому

    I've learnt cybersecurity from a lot of courses and obtained few certifications too. But still ain't getting job

  • @2calzini77
    @2calzini77 2 роки тому

    @15:40 IMAP is not used to send, only to check and retrieve email. The Email Sender is always using SMTP to send email to the MTA

    • @VirginiaCyberRange
      @VirginiaCyberRange 2 роки тому

      Traditionally... yes.. SMTP is for "Transferring" email.. and POP/IMAP is for accessing/reading email (though I hope no one is still using POP), though there are some IMAP-sending custom services out there (www.courier-mta.org/imap/INSTALL.html#imapsend).. But yes.. looking at email headers, you're going to be diagnosing SMTP servers, DNS, filtering, etc.

    • @VirginiaCyberRange
      @VirginiaCyberRange 2 роки тому

      Ahh.. I see the confusion. His network diagram is not the greatest. It shows the client accessing the email via webmail, and he has it listed as "IMAP/HTTP" (or webmail).. which is mainly talking IMAP (between the webclient and the mail server) and mainly HTTP to the physical client/browser. Sending email (from a web client) is using HTTP to compose and click send), and then it goes out by SMTP. I think he's also confused bc he's mixing IMAP and Outlook/Exchange, which uses MAPI over HTTP (docs.microsoft.com/en-us/Exchange/clients/mapi-over-http/mapi-over-http?view=exchserver-2019) which CAN both send and receive messages.. but still sends outside itself via SMTP (unless talking to other systems in its own Exchange site).

  • @Jasper_S
    @Jasper_S 2 роки тому

    She must be such an awesome teacher to have! The energy, enthusiasm and humor she is giving this lecture with is really engaging and captivating. It's not often that I watch a 45 min lecture on something in one go, without my mind wandering off! Some of my university teachers could learn a thing or two from her!

  • @jatin1032
    @jatin1032 2 роки тому

    bravo

  • @ratchetbear3777
    @ratchetbear3777 3 роки тому

    Video starts at 28:50

  • @lahcenboutgayout3785
    @lahcenboutgayout3785 3 роки тому

    Very simplified and helpful explanation, thank you Mr. David !

  • @learnknowandgrow2025
    @learnknowandgrow2025 3 роки тому

    Hello How are you Good Information you delivered

  • @mathavenkatasaikarthik3022
    @mathavenkatasaikarthik3022 3 роки тому

    Crack me if you can! Reverse engineering answer pls

  • @nihalk2191
    @nihalk2191 3 роки тому

    ❤️

  • @Based1776
    @Based1776 3 роки тому

    Thank you for uploading this!

    • @VirginiaCyberRange
      @VirginiaCyberRange 3 роки тому

      We have tons more content.. Let us know if there's anything you would like covered.

  • @jrpasinski
    @jrpasinski 3 роки тому

    Challenge begins at 42:58

    • @luizandre12345
      @luizandre12345 3 роки тому

      lol

    • @jrpasinski
      @jrpasinski 3 роки тому

      @@luizandre12345 the presenter is a massive time waster. If he called the UA-cam video "lecture on..." would have at least been more accurate (i.e know what to expect). So glad he is not my university lecturer, seriously would not watch any of his lectures, after seeing how he conducts the first one.

    • @GamingWithSharpShooter
      @GamingWithSharpShooter 3 роки тому

      😂😂 LOL.. Thanks bro, You saved my night...😑❤

    • @matheus-el5lt
      @matheus-el5lt 2 роки тому

      thanks man lol

  • @VirginiaCyberRange
    @VirginiaCyberRange 4 роки тому

    For more info on our new Cloud CTF offering, see here: kb.virginiacyberrange.org/cloud-ctf.html

  • @OxOv3rH4uL
    @OxOv3rH4uL 4 роки тому

    What's the link for this CTF?

    • @VirginiaCyberRange
      @VirginiaCyberRange 4 роки тому

      Each CTF is different.. and they usually have a specific start and stop date (like a hack-a-thon). After a CTF ends.. we usually keep the final scoreboard up so teachers and participants can show bragging rights. Fore more info on getting your own CTF set up.. see: kb.virginiacyberrange.org/cloud-ctf.html

  • @jrcorpuz6801
    @jrcorpuz6801 4 роки тому

    This is AWESOME!!!!

  • @ayaancool3901
    @ayaancool3901 4 роки тому

    Fist one to see and like😎

  • @arifbasri4950
    @arifbasri4950 4 роки тому

    Tq sir

  • @VirginiaCyberRange
    @VirginiaCyberRange 6 років тому

    I love your Data Encapsulation slide Dave.. that's the best, functional diagram of http flowing through the stack I've ever seen. :) Tweeks