Skip to content

Community Recommended Pathways/Technology Application Course

Community Recommended Pathways/Technology Application Course

Section titled “Community Recommended Pathways/Technology Application Course”

Congratulations on completing the Technology Application Course! We’re thrilled about your enthusiasm and are here to help you make the most of it. This guide is a step-by-step plan to help you improve your skills and access the appropriate community resources.

a. Join Learning Platforms

  • Hack The Box (HTB)

    • Website: Hack The Box
    • Purpose: Practice ethical hacking in a safe environment.
    • Steps:
  • Sign up and start with retired machines, then progress to active challenges.

  • TryHackMe (THM)

    • Website: TryHackMe
    • Purpose: Guided lessons and labs in cybersecurity.
    • Steps:
  • Create an account, complete learning paths, and engage with the community.

b. Join the Purple Team Chat

  • Purpose: Community and mentorship for Red and Blue team topics.

  • Signal Group: Join the Purple Team Signal Group for networking and guidance.

c. Read Community Wiki Pages

d. Engage with the Community

a. Choose Your Hardware

  • Options include PCs with virtualization software, SBCs like Raspberry Pi, and free cloud services.

  • Specifications: Minimum 16GB RAM, multi-core processor.

  • Virtual Environments Guide

b. Configure Virtual Machines (VMs)

  • Windows Server VMs: Practice with Active Directory setups.

  • Linux VMs: Use distributions like Ubuntu, Kali, Mint, DragonOS for learning.

c. Deploy Services Using Docker and Ansible

  • Install Docker: Set up Docker on a Linux VM and deploy services like Pi-hole, Jellyfin, and Matrix.

d. Practice with Monitoring Tools

  • Wazuh: Deploy for security monitoring.

  • Security Onion: Set up for network security monitoring and intrusion detection.

  • Regularly assess your skills, document configurations, and maintain lab systems with updates and backups.
  • Build services (web, database, email) and simulate a small enterprise network.
  • Python: Automate tasks and understand exploit code.

  • Bash and PowerShell: Scripting for Linux and Windows.

  • Participate in CTFs: Use CTFtime, PicoCTF, and OverTheWire.

  • Contribute to Open Source: Improve cybersecurity tools or share your own.

  • General Tech Discussions: Join Tech Chat (General).

  • Special Interests: Join RF/SDR and AI/ML groups.

  • TCM Security Courses: Enroll in PEH, PNPT, or CPTS for cybersecurity skills.
  • Develop training modules on phishing, OPSEC, and wireless surveying topics.
  • Mentor recent Technology Application Course grads, share your knowledge, and learn from them.
  • Options include Web Application Security, RF Security, Malware Analysis, and AI/ML.
  • Master concepts like OSCP and develop training tailored to your unit’s needs.
  • Research and develop new tools, mentor others, and contribute to knowledge sharing.
  • Guide new members, encourage growth, and provide constructive feedback.
  • Consider furthering education with a degree in cybersecurity or a related field.
  • Ethical Conduct: Operate legally, respect privacy.

  • Stay Curious and Adaptable: Embrace new challenges and reflect on learning.

  • Balance and Well-being: Prioritize tasks, stay active, and avoid burnout.