Gwinnett Technical College Institute of Cyber Defense Education Resources Page

Hacking & Competition Websites
Disclaimer: All competition websites should be used at your own risk. It is recommended that you use a VM in NAT mode.
# | Hacking Competitions and URLs |
---|---|
1. | Honeynet Project Challenges |
2. | CyberCompex |
3. | flAWS challenge |
4. | CTF Time : All About Capture The Flag |
5. | InfoSec Institute CTF |
6. | We Challenge |
7. | Over The Wire Wargames |
8. | Hack This Site |
9. | Smash The Stack Wargaming Network |
10. | Some CTFs from GitHub |
11. | Exploit Exercises |
12. | Hacker Challenges |
13. | Cyber Security Challenge UK |
14. | iCTF (International Capture The Flag) |
Websites For Threat Intelligence Information
# | Name and URLs |
---|---|
1. | Internet Storm Center |
2. | SANS Reading Room |
3. | CYWARE |
4. | Shadow Server for Dark Side Intelligence |
5. | Security Intelligence from IBM |
INSTITUTIONAL SECURITY
# | Gwinnett Tech Policies and Contact Information |
---|---|
1. | 3.3.4p. TCSG Procedure: Acceptable Computer & Internet Use |
2. | 7.2.4 GT Internet Access Filtering and Email Filtering Guidelines |
3. | 7.2.7 GT User ID and Password Guidelines |
4. | Gwinnett Tech Help Desk |
Some Recorded Webinars for Training
Case Study: 6 Lessons Learned Hunting Advanced Cyber Criminals Started with a spike on a system normally dormant, and was related to Powershell.
Register for Free ➤
Some YouTube videos for Training
US Cyber 9/12 : Discussion about Cyber Attacks
Hacking Websites with SQL Injection
Security Onion at Atlanta DC404 meeting April 2014 Robert Harris