Awards
Solves
Challenge | Category | Value | Time |
The big hack | When bad things happen | 15 | |
It is the best | Conversions | 37 | |
How many cybersecurity jobs? | Cybersecurity Workforce | 25 | |
Linux is funny | CLI | 59 | |
Linux search | CLI | 15 | |
Linux is awesome | CLI | 15 | |
Linux file permissions | CLI | 15 | |
File Manipulation | CLI | 15 | |
File content | CLI | 15 | |
Disk usage | CLI | 15 | |
Balancing Security | CIA Triad | 12 | |
We are in demand | certifications | 15 | |
Breakout of Crime | Breakouts | 36 | |
Attendees like math | Attendee Question | 4 | |
There is so much data | Attack Vectors | 12 | |
What is the domain? | Active Directory | 114 | |
Who's the Boss? | Acronyms & Initialisms | 11 | |
Cincinnati ISSA | Acronyms & Initialisms | 10 | |
It's all mine | Acronyms & Initialisms | 9 |