“The attackers must be right.” As a defender, you must be right that it is time.
—Cybersecurity Expert Jim Risler
It is a well -known modern trop in movies and television shows. A lonely figure, head covered, decreases above the keyboard in the dark. Immosiely You know you are looking at a hacker who does harmful things.
Hacking, however, is not always fictitious. Data violations are increasing and costing companies millions. From 2021 to 2023, there were a 72% increase in data violation, with the most common malware vector. It is believed that data violations will cost an average of $ 4.88 million in 2024. It is more important than ever to raise their network teams – and it is an open labor market for those who want to learn cyber security.
I talked to the creators of the contents of a new capture of flag problems inside Cisco U. – Jim Risler, product manager Cisco Learning, supervising security races and Paul Ostrowski, Cisco – Cisco Technical Education Developer – his So important for anyone who is interested in cyber security career.
What is the challenge for cyber safety of the flag?
First, what does the symptom (CTF) mean? Baselles, is it a game in which? It could be a sports event for children or adults. In this context, the flag captures is a challenge for cyber security.
It has long been used to capture the flag in the technical community to practice their skills in cyber security. The largest event in the world is def ctf and takes place every year in Las Vegas. Flag challenges also use large corporations and universities to train people in cyber security.
It is usually a competition between the team: a crime (red team) and defense (Blue Team); However, if both sides are processed simultaneously, the purple team. It could be in person, online, we have more personal team or with individual competitors.
How can I take part in Cisco U. to capture the challenge of the flag?
You can be at any time in the world to participate in Cisco U. Participation is individual. Here’s how to start.
Completion of one CTF Challenge plus race Cisco Networking Academy will receive a Cisco certificate in ethical hacking.
How does Cisco U. Capture the challenge of the flag?
Each challenge will work a little differently. The first challenges (ongoing 2/11/2025) do not separate you on blue or red teams. “In Cisco U. Two CTFS now we have more blue team because you are doing an investigation and testing your ability to detect attacks,” Ostrowski notes. “You work as an investigator in both missions.”
Now that Cisco U. Expect a series of CTF, including red team focused, where you infiltrate the net and expose your injury.
Each challenge consists of a series of steps- currently 11 steps- you must complete one by one to go through. The first step will guide you by setting up your laboratory environment that you will need for the rest of the challenge.
What scores do you need to go through the challenge of Cisco U.
Is there at least a score that you have to go through? Not at all.
“The original idea was to make this hunting score, but now it’s just a passage or failure,” Ostrowski notes. “So if you get to step 11 and answer it correctly, you went through.”
Tips are available. If you use the help, you will get points taken, but it’s structured, so you go through the look of Whiteher, which you are correctly ARESWER correctly.
“There’s an old technology, as the geeks say, as My Lysself says,” says Risler. “RTFM.” Read a friendly manual. It’s all for you. “His hints will tell you where to look if the lady.
Do you need more training before completing the Cisco Networking Academy?
“You don’t technically do other training, but you should understand networks,” Risking advises. “The Academy of Cisco Networking Academy has several bases in the network to give you a good foundation.”
Building a strong network foundation is crucial that as an instructor at the university, he sees students of universities who lack this foundation who jumps into a more complex training of cyber security and then tries to catch up. “Their professors.” Is not geeks like me,, they…just Say children Study things in your book and another thing you know … Students are Like: “Why is the IP address important?” If yeahAT Don‘t understand that, yeahAT Don‘t understand network. ” And yeahAT won‘t be successful in cyber security.
Who should Cisco U. capture the flag online?
Anyone who is interested in cyber security should jump on the CTF challenge to learn and test skills. “The aim of CTF is to bridge the gap between the input level and the professionals in cyber security, to provide practical learning with knowledge, skills and abilities in the real world,” says Risler. “Many companies say they have this gap.” They could book education in the field of cyber security, but programs make laboratories or practical, or it’s all on Windows. In our CTF they go through an ethical hacker race and taught at the DNS environment (domain name)/laboratory environment and then knowledge and skills are used in an almost real world.
What training Cisco U. should I complete after capturing the flag?
So you made both CTF challenges in Cisco U. Congratulations! What do you do, besides waiting for our next challenge to do more?
According to Risler, there are only two ways. “I really think we’re complicated,” he says. “There is engineering thinking: building architecture and network securing. Or advocates a network, which is someone looking for threats in the network.
If you are in network defunding, other areas you can study are:
Between Cisco U. and Cisco Networking Academy you can get all the education you need for any security career. Cisco is a leader of cyber security with protective productive such as cisco umbrella and Talos news center, which analyzes 4 TB of threat data every day. “In Cisco, we teach you how successful cyber attacks are,” says Risler. “You will learn how to get somewhere on Fotlold and so why did the target attack work?” Why did malware attack on the British health care system? How could you defend yourself? “Cisco is a unique position to look at cyber attacks from a purple perspective when he saw what comes next and stops what comes now – and passes all this knowledge to students.
Risler recommends:
The Sandworm by Andy Greenberg. The true story of the most destructive Akum of cyber arrangement in history and desperate hunting identify and watch the elite Russian agents behind it. It is a great reading for anyone who is interested in cyber security and a fantastic selection of a book club.
Tell us what is exciting for you to capture the flag in the comments below. Thanks for reading!
Sign up to Cisco U Join the Cisco Learning Network.
Follow the learning and certification of Cisco
X| Fibers Facebook | LinkedIn | Instagram| YouTube
Wears #Ciscou and#CiscocertJoin the conversation.
Secure organizations by thinking like a hacker
Share: