Space Grand Challenge Student Training
SGC Student Training
Welcome! Introduction Space Grand Challenge ©Cal Poly CCI
Space Grand Challenge Mission
Issues arise please contact support for this course.
Cybersecurity Education_WhitepaperFINAL
CyberSafety course ( 8 Mins) Created by student Sabina Sokol
NICE "Ten things to know about Cybersecurity Competitions "
Spoiler Alert not for students Teacher Guide Parachute
Students, Coaches, Mentors, and Parents Commitment & Learning Outcomes
Lessons 1, 2, 3, (Google Slides) (Start Here) Students & Coaches & Mentors
SGC CyberSecurity Intro Lesson PDF
SGC Cybesecurity Lesson 2 PDF
Practice Challenges 2022
SGC Cybersecurity Lesson 3 PDF
Why is this important? cybersecurity_is_everyones_job_v1.0
JPL Secret Message The Parachute
Home Router Security Bruce Schneier
Home RouterSecurity 2020 Bericht
Beginner CTF Training website with resources & Practice CTF from cyber.org & teacher curricula
IP addresses and DNS | Internet 101 | Computer Science | Khan Academy with Quiz
Safety Video Series, Ransomware, Phishing,Making Strong Passwords,Online Gaming Safety,Video Call Safety.
Learn by doing activity practice using SHA256 info on virustotal.com
Cybersecurity Glossaries
Satellites - Trilateration Try this exercise! Determine an unknown location given the signal readings of distance from three satellites ● Use formal geometric constructions to determine an unknown location ● Derive the equation of a circle given the cent
Satellites - Trilateration Original PDF
***HINT*** Practice Image Download 3 challenges Windows Persistence, Domain Generation Algorithm(DGA), Web Server exploitation,AutoRuns Tutorial, Long Tail Analysis in DNS, Powershell, Linux wget command, Apache Logs, Web Server status codes
What are IP Addresses
Concepts to be aware of... • Python Stacks • Key Logger • Ping of Death • Phishing Site • DoS Attack • Simple Java Script • VPN
SPACE Course 30 mins of videos Echelon Catapult
Crypto CTF Try and learn some about these cryptopals challenges!
Mobile Forensics Training for SGC ©Cal Poly CCI
Windows Forensics Training for CCIC ©Cal Poly CCI
Autopsy Videos Student created Thanks to Echelon Catapult!
AWS TRAINING COURSES
Part 1 Essential Training for Students Wireshark & Tools (Required Learning for Competition)
Part 2 Essential Reading Space and Cybersecurity (Required Learning for Competition)
Meta Geek Founder Ryan Woodings-wifiathome basics
Linux Game Terminus
Hacksplaining sql injection & Command Execution (Python)
Satellites AWS LEOLABS/Basic Satellite Communications and Security Issues/Mollie Raymond Chief of Space Force Spouse Videos
HDIS209_Satellite_Cyberattack_ and Security whitepaper 2021
Software Defined Radios Use Case for Satellites & Antennae Design
Amatuer Satellites For Beginners website
Constellations and the Sky
Stack Data Structure
Satellite Hacking _ Security 2023 presentation Henry
Deep Space Networking Learning Try and challenge your ability to investigate and find important data within complicated technological communications. Trace file provided by Vint Cerf from the original test lab for Delay and Disruption Tolerant Networking.
Deep Space Networking (pdfs and pcaps) Laura Chappell
HITCHHIKER’S GUIDE TO THE DEEP SPACE NETWORK/ION Laura Chappell & Ginny Spicer & Wireshark 2022
SGC Cal Poly Nice mini Challenge ©Cal Poly CCI
Workforce Framework for Cybersecurity (NICE Framework) NIST.SP.800-181r1
Intro To Cybersecurity Ethics Santa Clara
Cybersecurity Games & Cognitive Rewards
What is a CVE? CVE® is a list of publicly disclosed cybersecurity vulnerabilities that is free to search, use, and incorporate into products and services, per the terms of use.
Cyberseek Analytics and Careers Workforce Development & Live Cyber Attacks around the globe
Cybersecurity Career Guide_Start Engineering
DoD information systems must complete the Cyber Awareness Challenge to maintain awareness of cybersecurity.
S2ME is a simple evaluation of your information security habits.
Our Cyber Aptitude Typology Indicator, or CATI, is a metric-based assessment that identifies an individual's aptitude and matches their learning preference, personality characteristics, and skillsets with their optimal cyber work role.
Blockchain Basics Teen Edition Workbook By Jacqueline Hayes
SGC Recap ©Cal Poly CCI
SGC FAQ ©Cal Poly CCI
Cyber To Schools Lessons ©Cal Poly CCI
Sample Letter ©Cal Poly CCI
Sample Letter in Word Document Format
Falkenthal and Byrne Distributed Leadership in Collegiate Esports S&G.cleaned
Development of Leadership through eSports
How to be a Leader in Esports _ Esports Evolved Ep. 05
Making Sense of Complexity - an introduction to Cynefin & Leadership