Logo
  • About
  • Competition
  • Students
  • Educators
  • Supporters
  • News

NCL Categories Database

Name
URL
Tags
Description
Web Application Security

Identify actionable exploits and vulnerabilities and use them to bypass the security measures in online services.

Enumeration and Exploitation

Identify actionable exploits and vulnerabilities and use them to bypass the security measures in code and compiled binaries.

Password Cracking

Identify types of password hashes and apply various techniques to efficiently determine plain text passwords.

Forensics

Utilize the proper tools and techniques to analyze, process, recover, and/or investigate digital evidence in a computer-related incident.

Scanning

Identify and use the proper tools to gain intelligence about a target including its services and potential vulnerabilities.

Network Traffic Analysis

Identify malicious and benign network traffic to demonstrate an understanding of potential security breaches.

Cryptography

Identify techniques used to encrypt or obfuscate messages and leverage tools to extract the plain text.

Open Source Intelligence

Utilize publicly available information such as search engines, public repositories, social media, and more to gain in-depth knowledge on a topic or target.

Log Analysis

Utilize the proper tools and techniques to establish a baseline for normal operation and identify malicious activities using log files from various services.

FAQ

Privacy Policy

Subscribe

Media

Terms of Use

Contact Us

© National Cyber League

DiscordLinkedInYouTube