Main Page

From ETA CyberPatriot Wiki
Revision as of 16:42, 21 November 2019 by Beck (talk | contribs)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)
Jump to: navigation, search

Roosevelt CyberPatriot Resources


Here is what this wiki should and should not contain:
This Wiki should:
-Be divided into clear sections where each sub-page represents a specific concept
-Contain links to articles, forum posts, and resources that deal will service hardening and advanced concepts

This Wiki Should Not:
-Contain links to specific score/checklist type documents
-Contain how-to's or detailed notes that have been written by students in Roosevelt Cyberpatriot.

Essentially, this Wiki should reference external resources relevant to competition. Editing this wiki requires special formatting. You'll need to reference everything. --Good skill set though!

Editing MediaWiki Help


The main discussion page will be used to propose new pages and improvements that could be made.
Remember Correct Formatting on Discussion Pages, Using The Talk Page Rules


Follow Mr. Beck on Twitter: @ETA_Technology

Sections

General

Learning the Basics
== The Basics page contains guides to basic concepts and actions in Windows and Linux, and is ideal for beginners.
Downloads
== The Downloads page contains links to useful downloads.
Outside Sources
== The Outside Sources page contains links to sites with consistently high quality articles and tutorials regarding cybersecurity.
Scripting
== The Scripting resource page contains examples of scripting languages/techniques and guides on the basics of scripting.
Backdoors
== The Backdoors page contains information on backdoors and how to write and detect them.

Installed Software

Web Servers

Apache
== The Apache page contains links and references relating to Apache configuration and hardening.
NGINX
== The NGINX page contains links and references relating to NGINX configuration and hardening.
Internet Information Server
== The IIS configuration page contains links and references relating to IIS configuration and hardening.

Databases

SQL
== The SQL page contains links and references relating to using SQL and defending against SQL based attacks.
MySQL
== The MySQL configuration page contains links and references relating to MySQL configuration and hardening.
PostgreSQL
== The PostgreSQL configuration page contains links and references relating to PostgreSQL configuration and hardening.

Content Management Systems

Wordpress
== The Wordpress page contains information on Wordpress security and configuration.
Drupal
== The Drupal page contains information on Drupal security and configuration.
Joomla
== The Joomla page contains information on Joomla security and configuration.

File Sharing Services

Samba
== The Samba page contains links and references relating to Samba configuration and hardening.
File Transfer Protocol (FTP)
== The FTP page contains links and references relating to FTP configuration and hardening.

Other

Firefox
== The Firefox page contains links and references relating to Firefox configuration and hardening.
SSH and Telnet
== The SSH and Telnet page contains links and references relating to SSH and Telnet configuration and hardening.
Bind9
== The Bind9 page contains links and references relating to Bind9 configuration and hardening.
Powershell
== The Powershell page contains links and references relating to the Powershell Command Line, as well as scripting.

Linux

Linux Hardening
== The Linux configuration and hardening page contains links and references relating to Linux configuration and hardening.
LAMP Stack
== The LAMP Stack page contains links and references relating to LAMP Stack configuration and hardening.
Auditing Linux Systems
== The Auditing page contains links and references relating to Auditing configuration and hardening.

Windows

Windows Hardening
== The Windows hardening page contains links and references relating to Windows configuration and hardening.
Windows Registry
== The Windows Registry page contains links and references relating to Windows Registry configuration and hardening.