top of page
Cyber Security Resources.png

Security Training

Study Group for people interested in the new CyberOps Associate certification by Cisco Systems. This group was created by Chelin S. as a way for people across the world to learn the material for this certification as a group and be able to help others along the way. If you are interested in this, please click on View More!

security map.jpg

"Cybrary is a cybersecurity and IT workforce development platform. Its ecosystem of people, companies, content, and technologies converge to create an ever-growing catalog of online courses and experiential tools that provide IT and cybersecurity learning opportunities to anyone, anywhere, anytime."

cybrary.png

"The Cisco Learning Network is a social learning community focused on the IT industry. Our mission at the Cisco Learning Network is to provide learning tools, training resources, and industry guidance to anyone interested in building an IT career through Cisco certifications. The certification preparation materials offered on the Cisco Learning Network do not constitute a complete self-study program but are supplemental materials to enhance core learning programs."

network cables.jpg

"As changes in technology have accelerated, it’s become even more essential for people to master technology to be productive, invaluable employees who optimize, program and invent solutions—and even grow companies of their own. For 35 years, New Horizons has provided more than 30 million students with industry-leading technical training that delivers the most relevant and intuitive computer courses and certifications."

newhorizons.jpg

Security Associations

"The Information Systems Security Association (ISSA)® is a not-for-profit, international organization of information security professionals and practitioners. It provides educational forums, publications, and peer interaction opportunities that enhance the knowledge, skill, and professional growth of its members."

issa_edited.jpg

"The OWASP (Open Web Application Security Project) Foundation came online on December 1st, 2001 it was established as a not-for-profit charitable organization in the United States on April 21, 2004, to ensure the ongoing availability and support for our work at OWASP. OWASP is an international organization and the OWASP Foundation supports OWASP efforts around the world. OWASP is an open community dedicated to enabling organizations to conceive, develop, acquire, operate, and maintain applications that can be trusted."

owasp-100709974-large.jpg

"As an independent, nonprofit, global association, ISACA engages in the development, adoption and use of globally accepted, industry-leading knowledge and practices for information systems. Previously known as the Information Systems Audit and Control Association, ISACA now goes by its acronym only, to reflect the broad range of IT governance professionals it serves."

isaca-logo-1.jpg

International Information Systems Security Certification Consortium - "(ISC)² is an international, nonprofit membership association for information security leaders like you. We’re committed to helping our members learn, grow and thrive. More than 140,000 certified members strong, we empower professionals who touch every aspect of information security."

ISC2-3.png

"SANS is the most trusted and by far the largest source for information security training and security certification in the world. It also develops, maintains, and makes available at no cost, the largest collection of research documents about various aspects of information security, and it operates the Internet's early warning system - the Internet Storm Center."

Cybersecurity.jpg

"CULTIVATING A NATIONAL COMMUNITY THAT SUPPORTS STUDENTS IN THEIR CYBERSECURITY ENDEAVORS THROUGH EXTRACURRICULAR ACTIVITIES, CAREER OPPORTUNITIES, MENTORING, AND  KEEPING THEM AT THE FOREFRONT OF CYBERSECURITY TRENDS."

national cybersecurity student associati

"The Cloud Security Alliance (CSA) is the world’s leading organization dedicated to defining and raising awareness of best practices to help ensure a secure cloud computing environment."

Cloud Security.jpeg

Cyber Security CTFs

Order of the Overflow is currently the host for the DEFCON CTF Qualifier. The DEFCON CTF Qualifier determines who is eligible for the DEFCON CTF Finals that are done at DEFCON in Las Vegas, NV in August.

DEFCON CTF Qualifier.png

Google has done a CTF for three (3) years now and will have their 4th CTF event happening in June 2019. The prize for this year's CTF is $31,337.00 and the qualifier takes place June 22 and 23. The top 10 teams qualify for onsite final (location to be determined). For information, click "view more."

Google CTF.png

Order of the Overflow currently hosts the DEFCON CTF Finals at DEFCON security conference in Las Vegas, NV in August. Finalists compete for the top honor in this CTF. This site is the CTF Archive that has accounts, walkthroughs and other resources of Capture the Flag at DEFCON.

DEFCON CTF.jpg

"The International Capture The Flag ("iCTF") is a distributed, wide-area security exercise, which aims to test the security skills of the participants. It is the world's largest and longest-running educational hacking competition that integrates both attack and defense aspects in a live setting.

 

iCTF is held once a year. Recent iCTF contests are organized by Prof. Giovanni Vigna of the Department of Computer Science at UC Santa Barbara together with Shellphish, as well as Prof. Adam Doupé together with pwndevils."

UCSB iCTF.png
bottom of page