Files
CyberSecurityClub/README.md
atkison 3785e67f59 Update README.md
Grammatical changes
2021-03-12 09:39:14 -06:00

4.5 KiB

The University of Alabama's Cyber Security Club

Welcome to the Crimson Defense GitHub for Crimson Defense Cyber Security Club members and individuals interested in learning more about Cyber Security! Here you will find everything you need when it comes to learning more about Cyber Security. There is information and resources for beginners up to advanced individuals who are looking to learn more and advance their skills in Cyber Security! Please make sure you carefully read all READMEs in every repository as they all contain important information that could help with finding certain resources and getting things set up properly!

Crimson Defense was established with three main goals in mind:

  • Teach real Cyber Security that's applicable in the field (penetration testing, malware analysis, etc.)
  • Bring together a group that advocates and promote the Cyber Security degree, major, and specialization within the Computer Science Department at The University of Alabama
  • Compete in Cyber Security competitions at the local, state, and national level

DISCLAIMER: Using security techniques with malicious intent will result in your removal from Crimson Defense. If applicable, you will be reported to the appropriate authorities. Do not abuse your power, WE ARE NOT A HACKTIVIST GROUP.

Logo


Email: crimsonCyberDefense@gmail.com
Slack: https://bit.ly/2yGRfV5
Website: uacrimsondefense.github.io

UACTF

If you are competing in UACTF, Crimson Defense welcomes you to the world of cyber security and wishes you the best of luck during the competition. If you would like to know more about the competition and how to prepare, then definitely check out the directory for it! Here, I'll even help you out, just click the blue button:

Blue Button

Meet the Crimson Defense H@ckers

Everyone, from begginer level to advanced, is welcome and encouraged to join the competition team. It is a great opportunity to learn more about cyber security and really dive deep into what it takes to solve complex cyber security problems. The competition team is comprised of individuals motivated and driven to protect the world from any potential exploit or vulnerability. While both focused on hardening systems and pentesting systems to make sure they are as secure as they can be, the Crimson Defense H@ckers work tirelessly day in and day out. They are an elite security group, and there isn't a problem too difficult for them to solve. Head over to the Crimson Defense H@ckers directory and meet the team!

Before You Start!

Looking to start solving your own challenges and learning about how to compete? If you do not already have a virtual machine set up on which you can solve these challenges, go ahead and check out the Virtual Machines section and follow the instructions on how to set up your own Ubuntu, Kali Linux, or Parrot OS virtual machine!

Where do I even start?

This is one of most puzzling things to figure out, especially when trying to start learning about Cyber Security. There is so much to learn, which is one of the reasons why it is so great. But with there being so much information out there, it can be hard to figure out where to even begin. This folder will help those brand new to Cyber Security, individuals who have little to no experience and want to get started but don't know where to go. Hopefully, the resources here will help you understand what Cyber Security is all about.

How can I get a certification?

There are many certifications to choose from. Check out the Security+ directory and see which one grabs your attention!

CTF

Capture the flag events are a lot of fun. They test your skills across a variety topics. These topics include Forensics, Cryptography, Web Exploitation, Reverse Engineering, Binary Exploitation, and more!

Check out each individual CTF topic's directory to learn more about them and find out which tools you can be using right now to help you with solving CTF challenges!

Different topics you might come across in a CTF event include:
Forensics
Cryptography
Web Exploitation
Reverse Engineering
Binary Exploitation