Networking and Ports
Blue Team Tactics
Red Team Shenanigans
Tools of the Trade
Cyber Fields
100

This port is used for HTTP, but what is the port number?

What is Port 80?

100

This blue team tactic is a basic approach to protecting systems, whether it be through closing unnecessary ports or even just enforcing passwords.

What is hardening?

100

This red team method sounds like a bad phishing joke but is actually the art of pretending to be someone you're not—no, it’s not catfishing.

What is social engineering?

100

This tool’s like a high-powered magnifying glass, sniffing around for clues in the network traffic. Who needs Sherlock when you’ve got this?

What is Wireshark?

100

This career involves ethical hacking; Think of it as trying to break into house, but you've been invited in...hopefully

What is a penetration tester?

200

This networking layer is used primarily by TCP and UDP, which networking layer is this?

What is the transport layer?

200

This Blue Team Tactic is less tactic and more location; It's where the cool blues hang out and defend systems

What is a Security Operations Center (SOC)?
200

This red team method is like recreating Mad Max, but instead of looking cool while driving through a desert wasteland, you're just driving around your neighborhood.

What is wardriving?

200

This tool is the most common OS of choice for both red team and blue team.

What is Kali Linux?

200

This career is basically IT’s version of 'Who ya gonna call?' But instead of ghosts, they’re busting malware.

What is a cybersecurity analyst?

300

This Layer 1 Networking Tool is an older device that is used to regenerate network signals

What is a repeater?
300

This blue team tactic is all about finding clues about previous breaches and using them to prevent future incidents

What are indicators of compromise

300

This red team tool is used for breaking into web servers running the PHP scripting language

What is PHP Reverse Shell


300

This tool is has a variety of uses, from aggregating data into a usable format to even being able to program special scripts to generate reports.

What is Splunk?

300

This career is like being the babysitter for a group of very annoying babies, only the babies are computers and servers, and the room is a network.

What is a network administrator?

400

The layer where data is translated into an acceptable format

What is the presentation layer

400

This blue team tactic is all about researching current threats and adapting your defenses against them

What is threat intelligence

400

This red team attack phase is all about getting more access to access confidential and sensitive files

What is privilege escalation

400

This tool is one of the most widely used firewalls in the business, and if you're working in IT or Cyber, you will most likely be using this product

What is Palo Alto?

400

This cybersecurity career is all about proactive defense; they find active and undetected threats in the network 

What is a threat hunter

500

This staus code means that the HTTP transfer was a success

What is HTTP status code 200

500

This blue team field is all about finding clues inside the data and storage devices

What is digital forensics

500

This red team tactic is one of the major goals of the red team; it is all about taking the data you gained and getting it out of the network

What is data exfiltration

500

This tool is the most popular penetration testing frameworks available, thanks to its open source availability and extensive documentation

What is metasploit

500

This career is the top dog, the highest position available in the cyber security career field

What is the Chief Information Security Officer