This port is used for HTTP, but what is the port number?
What is Port 80?
This blue team tactic is a basic approach to protecting systems, whether it be through closing unnecessary ports or even just enforcing passwords.
What is hardening?
This red team method sounds like a bad phishing joke but is actually the art of pretending to be someone you're not—no, it’s not catfishing.
What is social engineering?
This tool’s like a high-powered magnifying glass, sniffing around for clues in the network traffic. Who needs Sherlock when you’ve got this?
What is Wireshark?
This career involves ethical hacking; Think of it as trying to break into house, but you've been invited in...hopefully
What is a penetration tester?
This networking layer is used primarily by TCP and UDP, which networking layer is this?
What is the transport layer?
This Blue Team Tactic is less tactic and more location; It's where the cool blues hang out and defend systems
This red team method is like recreating Mad Max, but instead of looking cool while driving through a desert wasteland, you're just driving around your neighborhood.
What is wardriving?
This tool is the most common OS of choice for both red team and blue team.
What is Kali Linux?
This career is basically IT’s version of 'Who ya gonna call?' But instead of ghosts, they’re busting malware.
What is a cybersecurity analyst?
This Layer 1 Networking Tool is an older device that is used to regenerate network signals
This blue team tactic is all about finding clues about previous breaches and using them to prevent future incidents
What are indicators of compromise
This red team tool is used for breaking into web servers running the PHP scripting language
What is PHP Reverse Shell
This tool is has a variety of uses, from aggregating data into a usable format to even being able to program special scripts to generate reports.
What is Splunk?
This career is like being the babysitter for a group of very annoying babies, only the babies are computers and servers, and the room is a network.
What is a network administrator?
The layer where data is translated into an acceptable format
What is the presentation layer
This blue team tactic is all about researching current threats and adapting your defenses against them
What is threat intelligence
This red team attack phase is all about getting more access to access confidential and sensitive files
What is privilege escalation
This tool is one of the most widely used firewalls in the business, and if you're working in IT or Cyber, you will most likely be using this product
What is Palo Alto?
This cybersecurity career is all about proactive defense; they find active and undetected threats in the network
What is a threat hunter
This staus code means that the HTTP transfer was a success
What is HTTP status code 200
This blue team field is all about finding clues inside the data and storage devices
What is digital forensics
This red team tactic is one of the major goals of the red team; it is all about taking the data you gained and getting it out of the network
What is data exfiltration
This tool is the most popular penetration testing frameworks available, thanks to its open source availability and extensive documentation
What is metasploit
This career is the top dog, the highest position available in the cyber security career field
What is the Chief Information Security Officer