Website of Chuck Easttom, Ph.D., D.Sc.

DoD Cybersecurity

cyberwar

Hypersonics   |   DoD DevSecOps  |  Cryptography | Quantum Computing | AI/ML |
DoD Systems Engineering | DoD Cybersecurity |Neuroscience and Brain Computer Interface | Digital Forensics

This website is meant as a general resrouce on hypersonic aerospace engineering and also contains information for a DoD hypersonics course I teach.

Note: this page is being updated regularly, you should check back from time to time. The lastest update date will always be displayed here 10/17/2025

Resources
U.S. Cyber Command
Cyber Resilient Weapon Systems Body of Knowledge (CRWS-BoK)
MITRE Threat Actor Groups

CVE's
CISA
OWASP Top 10 Web Vulnerabilities
OWASP Top 10 for Large Language Models
OWASP Top 10 IoT
OWASP Mobile Top 10
DoD Cybersecurity Awareness Hub
U.S. Airforce Cyber News
SANS Storm Center
CISA Known Exploited Vulnerabilities Catalog
Strategic Cyberwar Theory - A Foundation for Designing Decisive Strategic Cyber Operations
DOD Security Technical Implementation Guides (STIGs)
Tools
Kali Linux
MetaSploit
OWASP ZAP
SANS Cybersecurity Tools
List of Rainbow Tables
Hack the Box
Virtual Hacking Labs






Course Materials
Note:
These materials are being revised and updated. What is given here are older materials.
Lesson 1 Introduction to Cybersecurity
Lesson 2 Threats
Lesson 3 Risk management
Lesson 4 Cyberwarfare
Lesson 5 Threat intelligence
Lesson 6 Intro to Kali
Lesson 7 Metasploit
Lesson 8 Penetration Testing
Lesson 9 Introduction to cryptography
Lesson 9b Applications of cryptography
Lesson 10 Authentication
Lesson 11 Zero Trust and Cloud Security
Labs


Related Courses
The following courses material is not available via the web, the course is available upon request but only to DoD and related agencies:
Offensive Python: How to use Python programming for offensive security including scanning, vulnerability exploitation, hacking, etc.
Metasploit: This is a full course on Metasploit from beginner to expert level.
Malware creation: This course shows how to create malware using PowerShell, Office macros, and other programming tools.