Gettyimages 1328602525 612x612

Olympic Heights Cyber Security Club!

  • Career Paths

    Career Paths
    Now, CyberSecurity can be expanded into multiple career paths, and some of these will be explained, using what you learn from this club will give you basic knowledge in order to break into the career path you want, but won't automatically make you an expert in any field you choose, these fundamentals which will be taught, will. The following popular career paths will be explained:
    - 1) Analyst (SCR)
    - 2) Engineers (SCR)
    - 3) Specialists (SCR)
    - 4) Incident Responders
    - 5) Penetration tester
  • Different Threat Actors Explained

    Different Threat Actors Explained
    Today we'll be discussing threat actors and the roles, motivation, goals, and funding they have in mind. Remember, in order to secure something you need to nkow WHAT you're securing it against. We'll be looking at political, geopolitical, nation state APT, and script kiddy hackers and how you protect against these opponents.
  • Encryption and Hashing Tools

    Encryption and Hashing Tools
    Today we'll be discussing the tools and softwares used to protect data on the systems you want to protect against malicious parties. First cryptography and hashing will be explained with numerous examples and how and why they're used and the vulnerabilities and fail-safes these have as well.
  • Vulnerabilities vs Threats

    Vulnerabilities vs Threats
    Today we'll be discussing the difference between vulnerabilities and threats and how they compliment or cancel each other out. Sometimes you may have a vulnerability but it may not pivot into a threat and vice versa. Moreover, we'll be looking into some common vulnerabilities cyber security personnels understand and can secure against.
  • AntiViruses Explained

    AntiViruses Explained
    Today, we'll be looking into different Anti-viruses and how they work (Heuristics vs Certificates vs signatures). Then we'll be diving deep into how AVs work. Remember, AVs aren't the keep all solve all problem, if that were the case this club wouldn't even be a thing, so keep that in mind as we dive into the fundamentals of AVs and endpoint detections.
  • Data Loss Prevention (DPL)

    Data Loss Prevention (DPL)
    Today, we'll be learning about how Cyber Security Personnels use softwares and tools in order to ensure the integrity and preservation of critical data on their systems in order to maintain their safety and ensure they're not misused by any internal or third-party vendors/employees.
  • Laws and Regulations

    Laws and Regulations
    Today, we'll be looking at some of the popular laws and regulations cyber security personnels in the real world need to be aware of in order to maintain their ethical boundaries. One of the most popular ones being GDPR and PCI DSS and examples and real-world stories of each.
  • Protection Against Bots

    Protection Against Bots
    Today, we'll be learning about the protection personnels use in order to protect against spamming, bruteforcing, DDOSing, etc. This knowledge can be applied to Applications, Web services, Cloud services, and almost any login forms.
  • Quiz Time!

    Quiz Time!
    Today we'll be doing a few quizzes and questions to ensure everyone's on board and understands the concepts taught so far. Don't be stressed or worried if you get these wrong, today will be merely focused on making sure the fundamentals we've learned up to this point are understood.
  • Cloud Security Basics

    Cloud Security Basics
    Today, we'll be learning about Cloud security, services, how the cloud works, and all the basics will be explained. Moreover, some of these services include:
    - AWS (Amazon Web Services)
    - AZURE (Microsoft)
    - Linode (Akamai)
    - GCP (Google)
    - Tencent Cloud
    - more
  • Introduction to CTFs

    Introduction to CTFs
    Today, you'll be applying some of your knowledge and using critical thinking in order to solve puzzles on PicoCTF a beginner friendly CTF (Capture the Flag) platform. Moreover, before you begin I will be reviewing some fundamentals. Remember, ask your peers for guidance and I'm always here as well!
  • Stakeholders Explained

    Stakeholders Explained
    Remember, the focus of a cybersecurity personnel is to LOWER the risk of security faults, remember one cannot 100% secure a system against 100% of the attacks, if someone wants to get in, they will, all you can do is protect yourself as much as possible and not to miss anything in the process. We'll be learning the following:
    - Role stakeholders play in CyberSecurity
    - Realistic Expectations
    - Key Concepts/Steps to follow in the industry
  • What is Cyber Security?

    What is Cyber Security?
    Here we will discuss what Cyber Security even means and why it's essential in today's world. For example, we'll be discussing the basic fundamentals of cyber security and "who", "what", and "why" we're doing what we're doing. We'll take a look at some threat actors we'll be protecting our systems and companies against, some common terms are:
    - Whitehat (Ethical, Legal I.E: GOOD)
    - Grayhat (Semi-Ethical, Illegal, BAD)
    - Blackhat (Malicious, Highly Illegal, Very BAD, protecting against them).
  • Firewalls Explained

    Firewalls Explained
    Today we'll be looking into Firewalls and the different types (WAFs, Static, Dynamic, etc). And will be looking at how they work and some of the faults they contain within them.
  • What's happening in the world?

    What's happening in the world?
    Today, we'll be learning about real-life cases, stories, and ways these cases could've been prevented by the companies by simple mistakes and fundamentals which they overlooked.
  • How computers and networks work

    How computers and networks work
    Today, we'll be learning how computers actually work, of course you know how computers work. Press the power button, boom... not quite, I'm talking about the hardware, such as the following:
    - CPU
    - RAM
    - SSD/HDD
    - Registry
    - BIOS (chip)
    - USB2.0 vs USB3.0
    - ETHERNET It's essential to know how a computer actually works if you're going to be using one in the first place, this doesn't just apply to cyber security
  • More Technicalities

    More Technicalities
    Today, we'll be doing the boring stuff sigh, we'll be learning the following: What are?
    - TLDR
    - DNS
    - Subnets
    - Domains
    - Subdomains
    - Docker
    - VMs
    - Sockets
    - Ports
    - Packets
  • More Cyber Security Terms

    More Cyber Security Terms
    Today, we'll be discussing more cybersecurity terms in-depth, we'll start off with the powerpoint and it'll cover these basics: How to protect against (Chapter):
    - 1) Social Engineering
    - 2) Threat actors (Internal & External)
    - 3) What is an AV/Firewall?
    - 4) Reverse/SSH/TCP Shells
    - 5) IP, SSL, TLS, HTTP(S), JS, HTML, CSS, C/C++/Python
    - 6) Real life stories (Google, Facebook, Twitter)
    - 7) GDPR Explained
    - 8) Dorking Platforms to learn more:
    - 1) Youtube
    - 2) Google Querying
    - 3) ChatGPT