Market Overview

National Cyber League Hones in on Specific Skills Needed for Cybersecurity Careers

Share:

As the shortage of qualified employees in the cybersecurity industry continues, the National Cyber League (NCL) is helping get those folks into careers faster by showcasing their abilities and talent. Anyone interested in developing or enhancing their cybersecurity skills should sign up for the NCL Fall Season; registration is now open.

CHEVY CHASE, Md. (PRWEB) September 05, 2018

As the shortage of qualified employees in the cybersecurity industry continues, the National Cyber League (NCL) is helping get those folks into careers faster by showcasing their abilities and talent. Anyone interested in developing or enhancing their cybersecurity skills should sign up for the NCL Fall Season; registration is now open.

Most recently, the NCL's Spring Season boasted nearly 3,500 participants, including the addition of high school students. Through the NCL Gymnasium, the virtual practice arena, as well as the season competitions, the challenges keep everyone guessing and sometimes stumps them all.

NCL is unique in that it requires participants to apply knowledge and skills to solve real world problems, which especially help in certification exams. Players are put into the role of a cyber analyst and are responsible for codebreaking, identifying vulnerabilities and investigating forensic evidence for compromises. They could be asked to break the encryption scheme developed by an adversary. Or they may need to analyze network traffic and identify an IoT device on a corporate network that is leaking sensitive information.

The challenge categories, which all pertain to the real world, include Network Traffic Analysis, Open Source Intelligence, Scanning, Enumeration and Exploitation, Password Cracking, Traffic Analysis, Log Analysis, Wireless Security, Cryptography, and Web Application Security.

Open Source Intelligence is the ability to use online resources and specialized search terms, which is a useful skill for people interested in defending a corporate network, for example.

Scanning involves techniques used to figure out what is actually on a network and what targets are in scope without being too active. Tools used include EdMap and DirBuster, but regardless, this is a key skill for pen testing.

Enumeration and exploitation is an important skill for secure code audits or to help a bank secure its online resources, for example.

NCL has good content in the gym for Log Analysis and Traffic Analysis. Log Analysis looks at files that services and programs run on a device that they are going to output. Traffic Analysis looks at raw data going across the network. Wireshark will help participants, who also need a familiarity with bit codes.

Wireless Security involves pen testing and decrypting. Participants could go into a client site and demonstrate that they can hack into open Wi-Fi network and get access to the admin panel and intercept traffic.

Working through the Cryptography challenge is like working with puzzles. The Gymnasium has tools to help, in addition to rumkin.com, but understanding RSA, number schemes and encoding is beneficial. One of the harder topics is Web Application Security. Participants try to break into a website as they find different vulnerabilities.

In addition to viewing tutorials on YouTube, practicing in the NCL gymnasium is valuable. Registration for the Fall Season began Aug. 27. For more information, visit http://www.nationalcyberleague.org.

For the original version on PRWeb visit: https://www.prweb.com/releases/national_cyber_league_hones_in_on_specific_skills_needed_for_cybersecurity_careers/prweb15736844.htm

View Comments and Join the Discussion!