2015 CyberPatriot Conference

Save this PDF as:
 WORD  PNG  TXT  JPG

Size: px
Start display at page:

Download "2015 CyberPatriot Conference"

Transcription

1 Air Force Association Educate - Advocate - Support 2015 CyberPatriot Conference September 12,

2 Agenda 8:00 9:00 Conference Check-in and Refreshments 9:00 10:00 Conference Welcomes (Dick Jeffreys & Deb Pint) Conference Objectives (Dick Jeffreys) Key Note Presentation (Chris Simpson) National Cyber Youth Education Program (Larry Torres) CyberPatriot in San Diego Student Experience Presentation (Ian Rodney) 10:00 11:45 11:45 12:00 12:00 LAUSD Beyond the Bell Presentation & Demonstration Wrap-up: What Can We Do For You? Conference Ends 2

3 Air Force Association Professional Aerospace Organization 501(c)(3) Non-Profit Open to Anyone Membership: National 95,000 & Chapter Missions: Educate Advocate Support Educational Focus: STEM (Science, Technology, Engineering, & Math) National Youth Cyber Education Program 3

4 Conference Objectives Get the word out. Introduce the CyberPatriot National Youth Cyber Education Program & National Youth Cyber Defense Competition. Present How does the competition work? through personal experiences. Answer competition questions & determine how we can help. 4

5 Air Force Association Educate - Advocate - Support National Youth Cyber Education Program Larry Torres Vice President, Programs September 12,

6 CyberPatriot Is The national youth cyber education program. The national youth cyber defense competition. Carefully structured to excite, educate, and motivate participants. Designed to instill in all participants the importance to our nation of cyber, cyber security, and good computer security practices. Designed to motivate all participants to consider STEM academic disciplines to meet our nation s needs. Designed to motivate many participants to become the next generation of cyber defenders and our nation s digital workforce. 6

7 CyberPatriot Is NOT Hacker training. Cyber ethics discussions are an important (and early) component in our curriculum. We don t teach hacking tools or techniques. Hacking in competition is strictly forbidden. A recruiting tool for the Air Force, the Department of Defense, or the Federal government. This is about building a strong national foundation for cyber skills throughout our high & middle schools. 7

8 Original Construct National High School Cyber Defense Competition 8

9 New Construct The National Youth Cyber Education Program National Youth Cyber Defense Competition AFA CyberCamp Program Elementary School Cyber Education Program 9

10 National Youth Cyber Defense Competition Puts teams of high & middle school students in the position of newly hired IT professionals tasked to manage the network of a small company. Teams are given a set of virtual images that represent an OS & are tasked with finding cybersecurity vulnerabilities within the images & hardening the system while maintaining critical services. Teams compete for top placement within their state & region. Top teams in the nation earn all-expense paid trips to Washington, DC for the National Finals Competition where they can earn national recognition & scholarship money (1st place - $2,000/competitor, 2d place - $1,500/competitor, 3d place - $1,000/competitor). Competitions take place on specified weekends throughout the school year. Teams must complete all their work during one (1) six consecutive-hour period on the Friday, Saturday, or Sunday of the competition windows. Cost: Open Division team is $195. Middle School Division team is $155. All Service Division teams and Civil Air Patrol teams are exempt. 10

11 Skills Participants Learn Leadership & teamwork Creative and analytical problem solving Non-technical cyber principles (e.g., social engineering, phishing, vishing, spear-phishing, etc.) Netiquette Cyber safety Cyber hygiene Computing & networking principles Operating systems Network topologies & cabling Foundational cyber security principles Cyber and system vulnerabilities Network security Vulnerability remediation Technical threats 11

12 Two High School Competition Divisions Open Division Open to any high school or middle school Public, private, parochial, magnet, home school 4H, Boys and Girls Clubs, Scouting units, other youth organizations Highly valued CyberPatriot competition attributes: Technical/STEM education Career preparation/development Teamwork All Service Division Open to any JROTC unit Air Force, Army, Navy, & Marine Corps Open to Civil Air Patrol squadrons and Naval Sea Cadet Corps units Highly valued CyberPatriot competition attributes: Teamwork Goal achievement Leadership 12

13 Middle School Division (CP-VI): Middle school pilot program highly successful (CP-VII): Full integration of middle school teams into competition. Competing in separate Middle School Division. Competition system modified to provide slightly less daunting network images (problem sets). Broad positive response from middle school educators. 13

14 Team Organization Coach(es) Teachers, JROTC instructors, staff members, etc. approved by a participating school or organization to act as the administrative lead of the team. Coaches are responsible for the following: Competitors Ensuring competitor safety. Protecting the competition's integrity & upholding rules, time limits, & download limits. Acting as the main point of contact for the team. Each team must consist of between 2 and 6 competitors enrolled in the participating school or organization; a maximum of five students are permitted to compete at any one time. Technical Mentor(s) Volunteer industry professionals, students, academics, & IT -experienced adults. Required to register on the CyberPatriot website & pass a background check. Can mentor multiple teams. Team Assistant(s) Provide non-technical support & encouragement. Required to register on the CyberPatriot website and pass a background check. 14

15 Train Train for the competition. Download updated training materials. Mentors provide advanced training. Prepare How it Works Before the Round Ensure all required hardware, software, & network capabilities are in place. Technical requirements are kept to a minimum. Download Review round instructions & links to download the virtual machine images (sent by the Program Office a week prior to comp). Download and ensure successful download of competition images before the round begins Usually two or three images per round. 15

16 How it Works During the Round (1/2) Extract Teams receive password to extract virtual machine images Friday morning of competition weekend. Load images in VMware Player & begin competing. Identify Fix Once images are opened, teams are prompted to enter a Team ID (ten-digit alphanumeric code). Find and fix vulnerabilities in their images. Some rounds include networking challenges (e.g., quizzes & Cisco Packet Tracer activities). 16

17 Score How it Works During the Round (2/2) Fix a vulnerability that is being checked = receive points. Take an action that makes a system less secure = lose points. Teams can also gain points by answering forensics questions about actions they took to solve their vulnerabilities. Teams can check their progress throughout competition. Compare Ask Live scoreboard is available for teams to see how they stack up against others in the country. Scores are unofficial & undergo review by CyberPatriot staff following the competition. Staff is available to answer technical support questions during the round by chat & by phone. Teams may not ask questions about vulnerabilities. 17

18 How it Works After the Round Delete All virtual machine images should be deleted after the round is over to maintain the integrity of the competition. Wait Staff reviews all the scores following the competition & releases official scores & standings to teams within a week after the round is over. 18

19 CP-VIII Competition Timeline 19

20 CP-VIII Competition Timeline Key Dates & Advancement (1/2) Open Division All Service Division 20

21 CP-VIII Competition Timeline Key Dates & Advancement (2/2) 21

22 Elementary School Cyber Education Initiative (ESCEI) Purpose: Educate on ubiquity of cyber systems. Teach cyber safety basics. Introduce concept cyber security. ~ 45 minute thing. Not a competition. Not purely a game. On-track for nationwide fielding On-line and hard copy distribution. Full instructions for AFA Chapters, educators, & parents. 22

23 ESCEI Program Details Interactive learning modules & associated curriculum are intended for instruction with all elementary school-level students. Interactive learning modules: Security Showdown is intended for K-3 graders. Introduction to basic personal security practices. Key Topics: Personal information. Students have the option to complete this module in English or Spanish. Clean_Up and DangerBots are intended for 4th-6th graders. Clean_Up is the cyber defense module. Clean_Up Key Topics: Phishing, Malware, Firewalls. DangerBots is another cyber defense module. DangerBots Key Topics: Malware, Defenses, Passwords. Modules may be used in the classroom, other group activities, or as an independent activity. Cost: FREE! Order online at 23

24 What Comes in an ESCEI Kit? Both digital and a hard-copy versions are available. Digital version is available instantly after completing the request form and includes the following materials: Three interactive learning modules. Curriculum slides to supplement the modules. Instructor's Guide containing installation instructions, module information, and instructor's notes for the curriculum. Cover letters that describe the ESCEI to parents, guardians, and educators. Brochure, social media guide, and press release template that can be used to promote the ESCEI. Template certificates to award students upon completion of the modules. The hard-copy version of the kit includes the following: All of the above on a DVD. Printed copies of the Instructor's Guide, ESCEI brochure, and stickers to be awarded to students. Everyone who orders the hard-copy also receives the digital kit immediately after completing the request form. 24

25 CyberCamp Program Conceived to supplement CyberPatriot's annual National Youth Cyber Defense Competition & allow educational institutions to engage students in cybersecurity education throughout the year. The AFA CyberCamp Program includes two distinct kit offerings. CyberCamp Kit is designed to be executed over five days. Includes instruction modules, access to accompanying demonstration software, and access to novice Windows 7 & novice Ubuntu competition images on approved camp's scheduled competition day. CyberCamp Competition Kit is designed to supplement locally developed curriculum or support one-off competition events. Cost: $1050. Consists only of access to one or more competition images on an approved competition date. Order online at 25

26 CyberCamp Kit Curriculum kit consists of five four-hour instruction modules, accompanying instructor's guides, student workbooks, demonstration software, & competition software that will teach students important skills in cyber safety & cybersecurity. 20-hour curriculum is designed to be completed over five days, with the fifth day serving as a day of mock competition. CyberCamp Kit curriculum is organized as follows: Module 1: Introduction to the CyberPatriot National Youth Cyber Defense Competition, cybersecurity career opportunities, cyber ethics, online safety, how computers work, & cyber threats. Module 2: Cybersecurity principles, virtual machines, basic Windows security policies & tools, & account management. Module 3: Windows file protections, auditing and monitoring, introduction to Server 2008 & introduction to Linux. Module 4: Ubuntu terminology & concepts, basic graphical user interface security, basic command line security, & intermediate Ubuntu security. Module 5: Mock CyberPatriot competition. 26

27 CyberCamp Competition Kit Competition Kit is designed to complement locally developed curriculum or training regimens for the CyberPatriot National Youth Cyber Defense Competition. CyberCamp Competition Kit consists of the following: Mandatory thirty-minute cyber ethics module. Instructor's guide. Access to one or more CyberPatriot competition images on the requesting organization's scheduled competition day: novice Windows 7, novice Ubuntu, intermediate Windows 7. 27

28 Air Force Association Educate - Advocate - Support CyberPatriot in San Diego Dick Jeffreys Chapter President September 12,

29 The San Diego Experience Participation Competition National Local CyP I (2009) 8 N/A CyP II ( ) 200 N/A CyP III ( ) CyP IV ( ) 1, CyP V ( ) 1, CyP VI ( ) 1, CyP VII ( ) 2, CyP VIII ( )?

30 The San Diego Experience Successes Competition CyP III CyP V CyP VI CyP VII School/Organization Westview H. S. (2 nd Place, Open) Ramona H. S. NJROTC (Finalist, All Service) Naval Sea Cadet Corps (NSCC), Fort Fisher Division (Finalist, All Service) Patrick Henry H. S. NJROTC (3 rd Place, All Service)* NSCC Fort Fisher Division (Finalist, AS) NSCC Fort Fisher Division (3 rd Place, AS)* * Won 1 of 2 Cisco Networking Awards 30

31 CP-VIII San Diego County Registered Teams 31 Teams 31

32 Wrap-Up What can we do for you? Survey Points of contact: Dick Jeffreys at Larry Torres at Websites:

33 Discussion 33

CyberPatriot Program Update April 2015

CyberPatriot Program Update April 2015 AIR FORCE ASSOCIATION S CYBERPATRIOT NATIONAL YOUTH CYBER EDUCATION PROGRAM CyberPatriot Program Update April 2015 www.uscyberpatriot.org Cyber Is Everywhere Finance Manufacturing Logistics Transportation

More information

Air Force Association s CyberPatriot The National High School Cyber Defense Competition

Air Force Association s CyberPatriot The National High School Cyber Defense Competition Air Force Association s CyberPatriot The National High School Cyber Defense Competition September 2012 1 America: A Cyber Nation U.S. critically dependent on cyber systems for industry, commerce, public

More information

Securing Networks, Securing Futures

Securing Networks, Securing Futures CP_08_20150414 CyberPatriot is the premier national youth cyber education The National Youth Cyber Education Program program created to inspire high school and middle school students toward careers in

More information

Air Force Association s CyberPatriot The National High School Cyber Defense Competition. Online Coaches and Mentors Meetings August 18, 2014

Air Force Association s CyberPatriot The National High School Cyber Defense Competition. Online Coaches and Mentors Meetings August 18, 2014 Air Force Association s CyberPatriot The National High School Cyber Defense Competition Online Coaches and Mentors Meetings August 18, 2014 - Meeting Timeline Highlights Coach and Mentor of the Year Rules

More information

Impact of Cybersecurity Education in High Schools and Small Businesses in Hawaii. Challenges and Opportunities NICE Conference 2015

Impact of Cybersecurity Education in High Schools and Small Businesses in Hawaii. Challenges and Opportunities NICE Conference 2015 Impact of Cybersecurity Education in High Schools and Small Businesses in Hawaii Challenges and Opportunities NICE Conference 2015 Debasis Bhattacharya University of Hawaii Maui College debasisb@hawaii.edu

More information

Cybersecurity High School and Beyond

Cybersecurity High School and Beyond Cybersecurity High School and Beyond High School Career Fair and Expo March 29, 2014 Diane G. Miller, CCP Director, Operations Northrop Grumman Information Security Program Director, CyberPatriot Topics

More information

Innovation, Partnership, Development

Innovation, Partnership, Development Innovation, Partnership, Development ECEHDA Annual Conference March 13, 2015 Chris Valentino Director of Strategy The Need Access to top talent to address our nations most challenging problems Diverse

More information

Background (2011-2013)

Background (2011-2013) 2013 Overview Why Participate? Explore: Discover the world of cybersecurity Encourage: Motivate participants towards cybersecurity careers Educate: Learn or improve cybersecurity skills Enhance: Teamwork,

More information

Air Force Association s CyberPatriot The National High School Cyber Defense Competition. Online Coaches Meetings March 12, 2014

Air Force Association s CyberPatriot The National High School Cyber Defense Competition. Online Coaches Meetings March 12, 2014 Air Force Association s CyberPatriot The National High School Cyber Defense Competition Online Coaches Meetings March 12, 2014 13:34:41 GCCS Organization TimelineChart Air Force Association AFA CyberPatriot

More information

Center for Infrastructure Assurance and Security

Center for Infrastructure Assurance and Security Center for Infrastructure Assurance and Security CIAS Background Founded in 2001 Part of the Institute for Cyber Security at UTSA Focus areas: Infrastructure Assurance Programs Cyber Security Training

More information

Contestant Requirements:

Contestant Requirements: 2014 Overview Why Participate? Explore: Discover the world of cybersecurity Encourage: Motivate participants towards cybersecurity careers Educate: Learn and improve cybersecurity skills Enhance: Teamwork,

More information

THE SAN DIEGO MAYORS CYBER CUP (SDMCC) ORIENTATION 10 NOVEMBER 2015

THE SAN DIEGO MAYORS CYBER CUP (SDMCC) ORIENTATION 10 NOVEMBER 2015 THE SAN DIEGO MAYORS CYBER CUP (SDMCC) ORIENTATION 10 NOVEMBER 2015 AGENDA Welcome & Introductions Overview/key dates Team Registration Overview of CyberNEXS Key changes Rules & Scoring Registering the

More information

Instruction Guide Mentor/Coach Free Play Practice Event November 2015

Instruction Guide Mentor/Coach Free Play Practice Event November 2015 Instruction Guide Mentor/Coach Free Play Practice Event November 2015 1 San Diego Mayor s Cup Mentor/Coach Practice Round Guide Table of Contents Introduction 3 Tips for Success 3 Round Times 3 Linux Virtual

More information

An Accelerated Pathway to Careers in Cybersecurity for Transitioning Veterans. NICE Annual Conference November 2015

An Accelerated Pathway to Careers in Cybersecurity for Transitioning Veterans. NICE Annual Conference November 2015 An Accelerated Pathway to Careers in Cybersecurity for Transitioning Veterans NICE Annual Conference November 2015 Panelists David Brown, Director of CyberTalent at the SANS Institute, a new business unit

More information

Someone s sitting in the shade today because someone planted a tree a long time ago. Warren Buffett. Ed Skoudis Mike Qaissaunee.

Someone s sitting in the shade today because someone planted a tree a long time ago. Warren Buffett. Ed Skoudis Mike Qaissaunee. New Jersey Cyber Aces Academy at Brookdale: A Collaborative Public/Private Model to Secure the Nation A project funded through NSF SFS Grant DUE#1331170 Ed Skoudis Mike Qaissaunee April 30, 2014 Someone

More information

LUNCH AND LEARN. BBP 3.0 STEM Outreach Focus. Strategic alignment between workforce needs and K-16 Capabilities. 9 Dec 2015

LUNCH AND LEARN. BBP 3.0 STEM Outreach Focus. Strategic alignment between workforce needs and K-16 Capabilities. 9 Dec 2015 LUNCH AND LEARN BBP 3.0 STEM Outreach Focus Jeff Craver DAU South Instructor 256-922-8153 Jeffrey.craver@dau.mil Strategic alignment between workforce needs and K-16 Capabilities 9 Dec 2015 BBP 3.0 STEM

More information

COURSE PACKET. for. Exploring Certification. and Learning for Life Curriculum-Based Certification

COURSE PACKET. for. Exploring Certification. and Learning for Life Curriculum-Based Certification COURSE PACKET for Exploring Certification and Learning for Life Curriculum-Based Certification Learning for Life 1329 West Walnut Hill Lane P.O. BOX 152225 Irving, TX 75038 P: 972 580 2433 E: exploring@lflmail.org

More information

Instruction Guide Practice Round 2 High School August 2015

Instruction Guide Practice Round 2 High School August 2015 Instruction Guide Practice Round 2 High School August 2015 1 Maryland Cyber Challenge Practice Round Instruction Guide Table of Contents Introduction 3 Tips for Success 3 Round Times 3 Linux Virtual Machine

More information

Wyoming Community College Commission Request for New, Pilot or Revised Degree or Certificate Program

Wyoming Community College Commission Request for New, Pilot or Revised Degree or Certificate Program Wyoming Community College Commission Request for New, Pilot or Revised Degree or Certificate Program A. College: Laramie County Community College B. Date submitted to WCCC: C. Program 1. Request for: X

More information

CyberNEXS Global Services

CyberNEXS Global Services CyberNEXS Global Services CYBERSECURITY A cyber training, exercising, competition and certification product for maximizing the cyber skills of your workforce The Cyber Network EXercise System CyberNEXS

More information

Microsoft DreamSpark (MSDN) User Guide

Microsoft DreamSpark (MSDN) User Guide AIR FORCE ASSOCIATION S CYBERPATRIOT NATIONAL YOUTH CYBER EDUCATION PROGRAM Microsoft DreamSpark (MSDN) User Guide www.uscyberpatriot.org AIR FORCE ASSOCIATION S CYBERPATRIOT NATIONAL YOUTH CYBER EDUCATION

More information

Wyoming Community College Commission Request for New, Pilot or Revised Degree or Certificate Program

Wyoming Community College Commission Request for New, Pilot or Revised Degree or Certificate Program Community Commission Request for New, Pilot or Revised Degree or Certificate Program A. : Laramie County Community B. Date submitted to WCCC: C. Program 1. Request for: X New Program Pilot Program Revised

More information

Northrop Grumman Corporation STEM Support

Northrop Grumman Corporation STEM Support Northrop Grumman Corporation STEM Support Scott Stewart Northrop Grumman's Corporate Lead Executive for NAVAIRSYSCOM scott.stewart@ngc.com Northrop Grumman s STEM Vision Northrop Grumman recognizes the

More information

Building the Next Generation of Computer Security Professionals. Chris Simpson

Building the Next Generation of Computer Security Professionals. Chris Simpson Building the Next Generation of Computer Security Professionals Chris Simpson Overview Why teach computer security to high school students Deciding what to teach What I taught Community Support Lessons

More information

National Cyber Security Awareness Month Seeks #TalentHack Solutions to Overcome the Cybersecurity Skills Gap

National Cyber Security Awareness Month Seeks #TalentHack Solutions to Overcome the Cybersecurity Skills Gap FOR IMMEDIATE RELEASE National Cyber Security Awareness Month Seeks #TalentHack Solutions to Overcome the Cybersecurity Skills Gap Closing the Cyber Talent Gap and Educating the Workforce of the Future

More information

Technology Fee Proposal

Technology Fee Proposal Technology Fee Proposal Title: Virtual Environment for Information Security Education and Exploration Proposer: Joseph N. Wilson, Assistant Professor CISE Department Rm. E301 CSE Bldg. 42 Box 116120 Gainesville,

More information

Cyber Exercises, Small and Large

Cyber Exercises, Small and Large First International Conference on Cyber Crisis Cooperation: Cyber Exercises 27 June 2012 Cyber Exercises, Small and Large Commander Mike Bilzor Computer Science Department U.S. Naval Academy Annpolis,

More information

CTY Programs: What s New for 2016

CTY Programs: What s New for 2016 Welcome to the Webinar: CTY Programs: What s New for 2016 Before we get started Welcome and introductions Today s session will last 20 30 minutes Feel free to ask questions at any time by speaking into

More information

Cybersecurity Real World Connections Summer Boot Camp at NJIT

Cybersecurity Real World Connections Summer Boot Camp at NJIT Cybersecurity Real World Connections Summer Boot Camp at NJIT Connecting Learning to Life Summer 2016 The Program In Summer 2016, NJIT s Computer Science department/ RWC Program will offer its first Cybersecurity

More information

The Computerworld Honors Program

The Computerworld Honors Program The Computerworld Honors Program Honoring those who use Information Technology to benefit society Year: 2013 Final Copy of Case Study Status: Laureate Organization Name: Cyber Defence Challenge Organization

More information

Education Programs Press Kit

Education Programs Press Kit Education Programs Press Kit Click on headings below to go directly to a specific page of the press kit. 1. Two Millionth Student Press Release 2. Education Programs Fact Sheet 3. Education by the Numbers

More information

STRATEGIC PLAN. For implementing safety training within communities of Symantec employees. All Rights Reserved

STRATEGIC PLAN. For implementing safety training within communities of Symantec employees. All Rights Reserved STRATEGIC PLAN For implementing safety training within communities of Symantec employees Executive Summary Identifying additional ways to reach and teach consumers about online safety, security, privacy

More information

Exploring Express A Method for Organizing New Explorer Posts and Clubs

Exploring Express A Method for Organizing New Explorer Posts and Clubs Exploring Express A Method for Organizing New Explorer Posts and Clubs Table of Contents Overview... 2 Exploring Express Campaign Checklist... 4 Staff Training Agenda... 5 Committee Training Agenda...

More information

EC-Council. Certified Ethical Hacker. Program Brochure

EC-Council. Certified Ethical Hacker. Program Brochure EC-Council C Certified E Ethical Hacker Program Brochure Course Description The (CEH) program is the core of the most desired information security training system any information security professional

More information

Cyber Defense Operations Graduate Certificate

Cyber Defense Operations Graduate Certificate The SANS Technology Institute makes shorter groups of courses available to students who are unable to commit to a full master s degree program. These certificate programs will augment your skills, provide

More information

ROCKEFELLER SNOWE CYBERSECURITY ACT SUBSTITUTE AMENDMENT FOR S.773

ROCKEFELLER SNOWE CYBERSECURITY ACT SUBSTITUTE AMENDMENT FOR S.773 ROCKEFELLER SNOWE CYBERSECURITY ACT SUBSTITUTE AMENDMENT FOR S.773 March 17, 2010 BACKGROUND & WHY THIS LEGISLATION IS IMPORTANT: Our nation is at risk. The networks that American families and businesses

More information

EKS is a coalition of over 200 organizations including community organizations, local government agencies, businesses, churches and many others

EKS is a coalition of over 200 organizations including community organizations, local government agencies, businesses, churches and many others 2014 TAX SEASON EKS is a coalition of over 200 organizations including community organizations, local government agencies, businesses, churches and many others The EKS Coalition provides free tax preparation

More information

NATIONAL INITIATIVE FOR CYBERSECURITY EDUCATION SAN DIEGO, CA

NATIONAL INITIATIVE FOR CYBERSECURITY EDUCATION SAN DIEGO, CA NATIONAL INITIATIVE FOR CYBERSECURITY EDUCATION SAN DIEGO, CA Dr. Aurelia T. Williams, NSU Ms. Kamilah Brown, CCSD Mr. Ronald Williams, DTC Mr. Tony Baylis, LLNL November 3, 2015 Who Are We? A collaborative

More information

MILITARY SCIENCE (MSC)

MILITARY SCIENCE (MSC) MILITARY SCIENCE (MSC) Requirements for the Military Science Minor A Minor in Military Science is offered through Marion Military Institute and consists of the following 20 hours: A. MSC 101 Military Science

More information

Introduction. Topics. ü c ü a & b ü a ü a & d. ü c ü c ü all subtopics ü a & d. Lesson 1 The Internet ü c ü all subtopics ü a

Introduction. Topics. ü c ü a & b ü a ü a & d. ü c ü c ü all subtopics ü a & d. Lesson 1 The Internet ü c ü all subtopics ü a Introduction About Carnegie Cadets: The MySecureCyberspace Game Carnegie Cadets: The MySecureCyberspace Game is an interactive Flash game designed for fourth and fifth graders that teaches Internet safety

More information

Northrop Grumman. Foundation. Annual Report

Northrop Grumman. Foundation. Annual Report 2014 Northrop Grumman Foundation Annual Report A Message From the President On behalf of the Northrop Grumman Foundation and its Board of Directors, it is my pleasure to present our 2014 annual report.

More information

Housekeeping. Twitter: #ACMWebinarSec

Housekeeping. Twitter: #ACMWebinarSec Housekeeping Twitter: #ACMWebinarSec Welcome to today s ACM Webinar. The presentation starts at the top of the hour. If you are experiencing any problems/issues, refresh your console by pressing the F5

More information

AIR FORCE ASSOCIATION S CYBERPATRIOT NATIONAL YOUTH CYBER EDUCATION PROGRAM UNIT THREE. Computer Basics and Virtual Machines. www.uscyberpatriot.

AIR FORCE ASSOCIATION S CYBERPATRIOT NATIONAL YOUTH CYBER EDUCATION PROGRAM UNIT THREE. Computer Basics and Virtual Machines. www.uscyberpatriot. AIR FORCE ASSOCIATION S CYBERPATRIOT NATIONAL YOUTH CYBER EDUCATION PROGRAM UNIT THREE Computer Basics and Virtual Machines www.uscyberpatriot.org AIR FORCE ASSOCIATION S CYBERPATRIOT NATIONAL YOUTH CYBER

More information

Areas URI Cyber Research Funding:

Areas URI Cyber Research Funding: Areas URI Cyber Research Funding: Law enforcement tools and technologies including steganography detection, digital evidence search string support, cell phone security, cloud forensics Trust Sensor Interface

More information

Building a Better Tomorrow, One Student at a Time

Building a Better Tomorrow, One Student at a Time Civil Air Patrol s School Enrichment Program Building a Better Tomorrow, One Student at a Time www.cap.gov/sp 1 Who is the Civil Air Patrol? Formed December 1, 1941, Civil Air Patrol is a nonprofit, humanitarian

More information

167 th Air Wing Fast Track Cyber Security Blue Ridge Community and Technical College

167 th Air Wing Fast Track Cyber Security Blue Ridge Community and Technical College 167 th Air Wing Fast Track Cyber Security Blue Ridge Community and Technical College Information Security Certificate: Designed to introduce students to programming, security basics, network monitoring,

More information

Tennessee-Wing_Layout 1 2/6/15 11:06 AM Page 1. civil air patrol REPORT TO CONGRESS. citizens serving communities. tennessee

Tennessee-Wing_Layout 1 2/6/15 11:06 AM Page 1. civil air patrol REPORT TO CONGRESS. citizens serving communities. tennessee Tennessee-Wing_Layout 1 2/6/15 11:06 AM Page 1 civil air patrol REPORT TO CONGRESS citizens serving communities tennessee Tennessee-Wing_Layout 1 2/6/15 11:06 AM Page 2 2014 STATISTICS Volunteer Members

More information

1. Could you describe your department in terms of the undergraduate and graduate programs offered?

1. Could you describe your department in terms of the undergraduate and graduate programs offered? 1. Could you describe your department in terms of the undergraduate and graduate programs offered? The Information Systems and Business Analytics Department offers degree programs at the undergraduate

More information

NAVSEA Leadership Development Continuum

NAVSEA Leadership Development Continuum NAVSEA Leadership Development Continuum The Continuum allows employees to focus on leadership development through various stages of their careers, in preparation for future opportunities with the organization.

More information

Cybersecurity Education Doesn t Always Take Place in the Classroom

Cybersecurity Education Doesn t Always Take Place in the Classroom Cybersecurity Education Doesn t Always Take Place in the Classroom Margaret Spivey, Stephen Shank, Anthony Hanners Community College Cyber Summit, 3CS Moraine Valley CC, Palos Hills, IL, July 21, 2014

More information

167 th Air Wing Fast Track Cyber Program Blue Ridge Community and Technical College

167 th Air Wing Fast Track Cyber Program Blue Ridge Community and Technical College 167 th Air Wing Fast Track Cyber Program Blue Ridge Community and Technical College Information Security Certificate: Designed to introduce students to programming, security basics, network monitoring,

More information

Cybersecurity AAS Program

Cybersecurity AAS Program Cybersecurity AAS Program New Program Proposal State Submission Steve Buchholz, Dean of Accreditation and Advancement July 2015 TABLE OF CONTENTS Executive Summary... 2 Identification and Description of

More information

AIR FORCE ASSOCIATION S CYBERPATRIOT. CyberPatriot Survey Results

AIR FORCE ASSOCIATION S CYBERPATRIOT. CyberPatriot Survey Results AIR FORCE ASSOCIATION S CYBERPATRIOT NATIONAL YOUTH CYBER EDUCATION PROGRAM CyberPatriot Survey Results - CyberPatriot VI Post-Season Competitor Survey - CyberPatriot Student Alumni Survey www.uscyberpatriot.org

More information

Renée DeLong Chomiak, Ed.D. Dean of Counseling Services. Stephen P. Clifford, Ph.D. ifalcon Project Director/Chair, English Dept.

Renée DeLong Chomiak, Ed.D. Dean of Counseling Services. Stephen P. Clifford, Ph.D. ifalcon Project Director/Chair, English Dept. Renée DeLong Chomiak, Ed.D. Dean of Counseling Services Stephen P. Clifford, Ph.D. ifalcon Project Director/Chair, English Dept. Introduction: JoAnna Schilling, Ph.D. VP, Academic Affairs Renée DeLong

More information

AIR FORCE ASSOCIATION S CYBERPATRIOT NATIONAL YOUTH CYBER EDUCATION PROGRAM UNIT SIX. Microsoft Windows Basics and MSDN. www.uscyberpatriot.

AIR FORCE ASSOCIATION S CYBERPATRIOT NATIONAL YOUTH CYBER EDUCATION PROGRAM UNIT SIX. Microsoft Windows Basics and MSDN. www.uscyberpatriot. AIR FORCE ASSOCIATION S CYBERPATRIOT NATIONAL YOUTH CYBER EDUCATION PROGRAM UNIT SIX Microsoft Windows Basics and MSDN www.uscyberpatriot.org Learning Objectives Participants will understand what the Microsoft

More information

INSPIRING THE NEXT GENERATION OF TECHNOLOGY INNOVATORS

INSPIRING THE NEXT GENERATION OF TECHNOLOGY INNOVATORS INSPIRING THE NEXT GENERATION OF TECHNOLOGY INNOVATORS Iridescent s mission is to equip and inspire underprivileged young people to develop curiosity, creativity and persistence through a powerful science,

More information

National Cyber League Certified Ethical Hacker (CEH) TM Syllabus

National Cyber League Certified Ethical Hacker (CEH) TM Syllabus National Cyber League Certified Ethical Hacker (CEH) TM Syllabus Note to Faculty This NCL Syllabus is intended as a supplement to courses that are based on the EC- Council Certified Ethical Hacker TM (CEHv8)

More information

Knox Technical Center IT Computer Systems & Networking

Knox Technical Center IT Computer Systems & Networking Knox Technical Center IT Computer Systems & Networking Knox Technical Center 308 Martinsburg Road Adult Education at KCCC Mount Vernon, OH 43050 Coordinator: Mark Furman School Phone: 740.393.2933 740.393.2933

More information

CYBER SECURITY. A Guide to Programmes and Resources for Schools & Further Education

CYBER SECURITY. A Guide to Programmes and Resources for Schools & Further Education CYBER SECURITY A Guide to Programmes and Resources for Schools & Further Education March 2015 A Guide to Cyber Security Programmes and Resources for Schools and Further Education Providers Cyber security

More information

PALMETTO Cyber Security Summer Camp 2015

PALMETTO Cyber Security Summer Camp 2015 PALMETTO Cyber Security Summer Camp 2015 Student Registration Form Full Name of Student: Parent/Guardian Name: Parent/Guardian Email: Parent/Guardian Phone Number: County: Tee-Shirt Size: S M L XL XXL

More information

Linux Boot Camp. Our Lady of the Lake University Computer Information Systems & Security Department Kevin Barton Artair Burnett

Linux Boot Camp. Our Lady of the Lake University Computer Information Systems & Security Department Kevin Barton Artair Burnett Linux Boot Camp Our Lady of the Lake University Computer Information Systems & Security Department Kevin Barton Artair Burnett Schedule for the Week Schedule for the Week Mon Welcome from Enrollment Management

More information

Cisco Network Specialist CCNA

Cisco Network Specialist CCNA Web Development I CIST 1510 3 Scripting Technologies CIST 1520 3 Web Graphics I CIST 1530 3 Information Security Fundamentals CIST 1601 3 PHP Programming I CIST 2351 4 Web Technologies CIST 2510 3 Web

More information

Information Technology Career Cluster Introduction to Cybersecurity Course Number: 11.48100

Information Technology Career Cluster Introduction to Cybersecurity Course Number: 11.48100 Information Technology Career Cluster Introduction to Cybersecurity Course Number: 11.48100 Course Description: Introduction to Cybersecurity is designed to provide students the basic concepts and terminology

More information

Welcome About RD Grant Impacts DSC Testimonials Grants Development Process Grants Management Process

Welcome About RD Grant Impacts DSC Testimonials Grants Development Process Grants Management Process Welcome About RD Grant Impacts DSC Testimonials Grants Development Process Grants Management Process Mission: To assist the College's faculty and staff in the identification, acquisition and management

More information

Online Learning: Policy Trends in the United States

Online Learning: Policy Trends in the United States Online Learning: Policy Trends in the United States Susan Patrick President and CEO, NACOL John Watson Founder, Evergreen Consulting K-12 Online Learning Benefits E-learning: strategy for addressing school

More information

Unless someone like YOU cares a whole awful lot, nothing is going to get better. It s NOT. The Lorax from Dr. Seuss

Unless someone like YOU cares a whole awful lot, nothing is going to get better. It s NOT. The Lorax from Dr. Seuss Calling all parents! We re looking for new volunteers for the 2014-15 school year! Come join us at our next PTC Meeting on Tuesday, March 4 th at 6:30 pm in the HBT Library! A community is only as wonderful

More information

Training Employees to Recognise & Avoid Advanced Threats

Training Employees to Recognise & Avoid Advanced Threats Training Employees to Recognise & Avoid Advanced Threats Joe Ferrara, President & CEO, Wombat Security Technologies Rashmi Knowles, Chief Security Architect EMEA, RSA The Security Division of EMC Session

More information

Accounting. Phone calls are welcomed and will usually be answered within 24 hours or less. My phone number will be provided after enrollment.

Accounting. Phone calls are welcomed and will usually be answered within 24 hours or less. My phone number will be provided after enrollment. Course Instructor and Communications Accounting Johnson Kim Phone calls are welcomed and will usually be answered within 24 hours or less. My phone number will be provided after enrollment. E-mails are

More information

ITS425: Ethical Hacking and Penetration Testing

ITS425: Ethical Hacking and Penetration Testing ITS425: Ethical Hacking and Penetration Testing Credit Hours: 3 Contact Hours: This is a 3-credit course, offered in accelerated format. This means that 16 weeks of material is covered in 8 weeks. The

More information

Southwest Baptist University

Southwest Baptist University Doctoral Program in Educational Leadership Application Packet Southwest Baptist University College of Education and Social Sciences Department of Graduate Studies in Education Page 1 Overview of Program

More information

Question Preparation Guide

Question Preparation Guide Question Preparation Guide Educational materials in preparation for the 2014 Big Data Analytics World Championships. All rights reserved. 1 This booklet provides participants, educators and event partners

More information

PREPARED TESTIMONY OF THE NATIONAL CYBER SECURITY ALLIANCE MICHAEL KAISER, EXECUTIVE DIRECTOR ON THE STATE OF CYBERSECURITY AND SMALL BUSINESS

PREPARED TESTIMONY OF THE NATIONAL CYBER SECURITY ALLIANCE MICHAEL KAISER, EXECUTIVE DIRECTOR ON THE STATE OF CYBERSECURITY AND SMALL BUSINESS PREPARED TESTIMONY OF THE NATIONAL CYBER SECURITY ALLIANCE MICHAEL KAISER, EXECUTIVE DIRECTOR ON THE STATE OF CYBERSECURITY AND SMALL BUSINESS BEFORE THE COMMITTEE ON HOUSE SMALL BUSINESS SUBCOMMITTEE

More information

Job Placement and Graduate Work for B.S. Graduates

Job Placement and Graduate Work for B.S. Graduates Job Placement and Graduate Work for B.S. Graduates In the fall of 2009, efforts were made to ask as many alumni as possible to complete the 2009 Alumni Survey. Alumni were contacted via email, website

More information

Wando High School Career and Technology Education Advanced Cyber Security. Planning Period: 4th block

Wando High School Career and Technology Education Advanced Cyber Security. Planning Period: 4th block Wando High School Career and Technology Education Advanced Cyber Security Teacher: Mr. Hundley School Phone #: 856 5800 ext 27385 Room/Office: L 310 Planning Period: 4th block Office Hours: T, TH, F 7:30

More information

Organization: CPEP Connecticut Pre-Engineering Program. Program Contact: Mr. Noah Ratzan Senior Programs Manager

Organization: CPEP Connecticut Pre-Engineering Program. Program Contact: Mr. Noah Ratzan Senior Programs Manager Organization: CPEP Connecticut Pre-Engineering Program Program Contact: Mr. Noah Ratzan Senior Programs Manager Internship title or position: Summer Program Assistant Manager Job description and goals

More information

Training Leaders for the Future That I May Serve. The Virginia Tech Corps of Cadets WELCOMES YOU

Training Leaders for the Future That I May Serve. The Virginia Tech Corps of Cadets WELCOMES YOU Training Leaders for the Future That I May Serve The Virginia Tech Corps of Cadets WELCOMES YOU Relationships between the ROTC Programs & VTCC ROTC Programs (all three: Air Force, Army, Naval including

More information

Computer Security and Investigations

Computer Security and Investigations Computer Security and Investigations Program Locations: Program Code: Coordinator: Credential: Peterborough CSI Blair Brown Ontario College Advanced Diploma Start Dates: September 06, 2016 January 09,

More information

*Registration is open to all interested entrepreneurs based in Canada. 2015 Cisco and/or its affiliates. All rights reserved.

*Registration is open to all interested entrepreneurs based in Canada. 2015 Cisco and/or its affiliates. All rights reserved. The Cisco Canada Women Entrepreneurs Academy was created as a part of the Cisco Women Entrepreneurs Circle. Through this program, Cisco is championing the success of women leading high-growth businesses

More information

Cyber Security Day: Creating a Mock Cyber Competition Event to Increase Student Interest in Cyber Security

Cyber Security Day: Creating a Mock Cyber Competition Event to Increase Student Interest in Cyber Security Cyber Security Day: Creating a Mock Cyber Competition Event to Increase Student Interest in Cyber Security Thomas R. Imboden timboden@siu.edu Nancy L. Martin nlmartin@siu.edu Belle S. Woodward bellew@siu.edu

More information

academic tutors, offering them access to tutor certification and numerous opportunities to master new techniques and methods.

academic tutors, offering them access to tutor certification and numerous opportunities to master new techniques and methods. WHO WE ARE We are a collective of tutors, parents, students, community members, grass roots organizations and business leaders with a shared desire to invest in the future prosperity of the San Francisco

More information

NICE 2015 Conference

NICE 2015 Conference NICE 2015 Conference Mission: Impossible? How to Advance the Skills of the Cyber Workforce When You ve Got Quality and Speed but Aren t Cheap November 4, 2015 Presenters: Allison Frankoski, Program Director

More information

Teacher Certification

Teacher Certification 100% online coursework Self-paced program Approved by the Texas Education Agency/State Board for Educator Certification Low upfront cost Teacher Certification Course Catalog www.etools4education.com Main

More information

Adopt-A-School. Employer Guide

Adopt-A-School. Employer Guide Adopt-A-School Toolkit Employer Guide Index Why Adopt-A-School Readiness Assessment Mission, Vision, Goals, Metrics Change Management Communication Safety first Department of labor Great Ideas to Implement

More information

UNIVERSITY OF SOUTH ALABAMA MILITARY SCIENCE 1

UNIVERSITY OF SOUTH ALABAMA MILITARY SCIENCE 1 UNIVERSITY OF SOUTH ALABAMA MILITARY SCIENCE 1 Military Science Department Information Department of Military Science website http://www.southalabama.edu/armyrotc Military Science Our Mission: To commission

More information

Leveraging Virtualization to Facilitate Online Delivery of Technical Courses

Leveraging Virtualization to Facilitate Online Delivery of Technical Courses Leveraging Virtualization to Facilitate Online Delivery of Technical Courses Stephen D. Gantz CISSP-ISSAP, CEH, CGEIT, CRISC, CIPP/G, C CISO Assoc. Professor of Information Assurance sgantz@faculty.umuc.edu

More information

Implementing Security Education at a Small Community College

Implementing Security Education at a Small Community College PRACTICAL SECURITY Implementing Security Education at a Small Community College Corrinne Sande Whatcom Community College Abstract: Key words: This paper discusses modifying an existing two-year degree

More information

Cybersecurity Awareness for Executives

Cybersecurity Awareness for Executives SESSION ID: SOP-R04 Cybersecurity Awareness for Executives Rob Sloan Head of Cyber Content and Data Dow Jones @_rob_sloan Session Overview Aim: Provide a high level overview of an effective cybersecurity

More information

Parents Information Handbook for Royal Canadian Sea Cadet Program

Parents Information Handbook for Royal Canadian Sea Cadet Program Parents Information Handbook for Royal Canadian Sea Cadet Program Introduction Welcome to the Royal Canadian Sea Cadet Program. Your child has joined one of Canada s premier youth organizations. Cadets

More information

Kerry Kidwell-Slak and Kate Phelps Assistant Directors, Professional Practice UMBC Shriver Center

Kerry Kidwell-Slak and Kate Phelps Assistant Directors, Professional Practice UMBC Shriver Center Kerry Kidwell-Slak and Kate Phelps Assistant Directors, Professional Practice UMBC Shriver Center } Science: Biology, Chemistry, Biochemistry, Environmental, Physics, Psychology, Atmospheric Sciences

More information

ABET TAC CIP Report for the Academic Year 20010 2011. Mechanical Engineering Technology (MET) Program

ABET TAC CIP Report for the Academic Year 20010 2011. Mechanical Engineering Technology (MET) Program ABET TAC CIP Report for the Academic Year 20010 2011 Mechanical Engineering Technology (MET) Program I. Introduction This document reports the findings and proposed changes resulting from analysis of data

More information

Recruitment & Hiring. How a disciplined hiring process can help schools choose the right team.

Recruitment & Hiring. How a disciplined hiring process can help schools choose the right team. Recruitment & Hiring How a disciplined hiring process can help schools choose the right team. MARCH 2012 The first step is choosing the right team. Recruitment and hiring can bring in strong teachers and

More information

Track 2: Introductory Track PREREQUISITE: BASIC COMPUTER EXPERIENCE

Track 2: Introductory Track PREREQUISITE: BASIC COMPUTER EXPERIENCE Anne Arundel Community College Tracks Anne Arundel Community College s computer technologies courses have been organized into 10 suggested tracks. The tracks are arranged to ensure that students have the

More information

SPSP Phase III Recruiting, Selecting, and Developing Secure Power Systems Professionals: Job Profiles

SPSP Phase III Recruiting, Selecting, and Developing Secure Power Systems Professionals: Job Profiles PNNL-24138 SPSP Phase III Recruiting, Selecting, and Developing Secure Power Systems Professionals: Job Profiles March 2015 LR O Neil TJ Conway DH Tobey FL Greitzer AC Dalton PK Pusey Prepared for the

More information

Naval Science I Course Syllabus 2009-2010 Instructor: Navy Counselor Chief Petty Officer (RET) David D. Aupperle daupperle@rvrhs.

Naval Science I Course Syllabus 2009-2010 Instructor: Navy Counselor Chief Petty Officer (RET) David D. Aupperle daupperle@rvrhs. Naval Science I Course Syllabus 2009-2010 Instructor: Navy Counselor Chief Petty Officer (RET) David D. Aupperle daupperle@rvrhs.com Open to both males and females, the purpose of this course is to introduce

More information

When a student leaves this intensive 5 day class they will have hands on understanding and experience in Ethical Hacking.

When a student leaves this intensive 5 day class they will have hands on understanding and experience in Ethical Hacking. Ethical Hacking and Countermeasures Course Description: This class will immerse the student into an interactive environment where they will be shown how to scan, test, hack and secure their own systems.

More information

From K-12 Engineering Outreach to Community Engagement A Roadmap

From K-12 Engineering Outreach to Community Engagement A Roadmap From K-12 Engineering Outreach to Community Engagement A Roadmap Tanja Karp Toby Klameth Electrical and Computer Engineering J.T. Hutchinson Middle School Texas Tech University Lubbock ISD Richard Gale

More information

Monroe County Department of Education. Technology Plan

Monroe County Department of Education. Technology Plan Monroe County Department of Education Technology Plan Madisonville Tennessee 2011-2013 Office of Technology Gary Sharp, Director III. SYSTEM-WIDE GOALS AND OBJECTIVES Instructional Technology A. GOAL I:

More information

IN PARTNERSHIP WITH PLYMOUTH UNIVERSITY. Highlands. Opportunities Achievement Success. Information Technology for Business Degrees

IN PARTNERSHIP WITH PLYMOUTH UNIVERSITY. Highlands. Opportunities Achievement Success. Information Technology for Business Degrees Highlands Opportunities Achievement Success IN Information Technology for Business Degrees Introduction Plymouth University in partnership with Highlands College offers unrivalled expertise and experience

More information

STEMM Programs: Next Steps Daniel J. Meixner, President Chaminade Julienne Catholic High School Dayton, Ohio

STEMM Programs: Next Steps Daniel J. Meixner, President Chaminade Julienne Catholic High School Dayton, Ohio STEMM Programs: Next Steps Daniel J. Meixner, President Chaminade Julienne Catholic High School Dayton, Ohio Our Model: CJ STEMM attempts to foster literacy in STEMM subjects, exposure to STEMM careers,

More information

Introduction to Cybersecurity Overview. October 2014

Introduction to Cybersecurity Overview. October 2014 Introduction to Cybersecurity Overview October 2014 Introduces the importance of cybersecurity and current trends Eight modules with presentations and panel discussions that feature industry experts Activities,

More information