1 Areas URI Cyber Research Funding: Law enforcement tools and technologies including steganography detection, digital evidence search string support, cell phone security, cloud forensics Trust Sensor Interface Power Grid Security
2 URI Cyber State-of-the-Art Teaching Facilities; Collaborations with Law Enforcement, Emergency Responders On Network Forensics; and Protection of Critical Infrastructure: On-line Teaching Command Center Virtual Instructional Lab, a RAVE node RI State Crime Lab located on campus, which is a model for state crime labs URI is under contract to the RI State Computer Crimes Unit, for use of the URI computer forensics lab URI is working with the State Cybersecurity Group cooperatively seeking funding for training and cyber-preparedness in RI URI is collaborating with local businesses on research related to Trust in Sensor Networks
3 Panel : Cyber Challenges for Workforce Development Introductions and Facilitator: Lisa DiPippo, Ph.D., Associate Professor, URI Department of Computer Science and Statistics Johan Uvin, Ph.D., Deputy Assistant Secretary of Policy and Strategic Initiatives, Office of Vocational and Adult Education, U.S. Department of Education Frank Zaborowski, Director, Competition Operations, CyberPatriot Vic Fay-Wolfe, Ph.D., Professor, URI Department of Computer Science and Statistics Panel Q & A Discussion
4 Johan Uvin, Ph.D. Deputy Assistant Secretary of Policy and Strategic Initiatives Office of Vocational and Adult Education U.S. Department of Education Cyber Challenges for Workforce Development
5 Cyber Crime is Worldwide Estimated 431 million adults/year victims of cybercrime $388 billion in estimated time and money lost Not just a criminal issue but a national security issue
6 Cyber Crime A Global Threat Cyber-based Terrorism Espionage Computer Intrusions Major Cyber Fraud Exploitation of minors National Security
7 Goals Tied to Federal Government Investments/National Security Interests Mark Weatherford, DHS Undersecretary of Cybersecurity: Achieving operational excellence Strengthening partnerships between the public and private sectors, particularly in the area of information sharing Building a powerful, cutting-edge cybersecurity workforce.
8 Fighting Cyber Crime thru Partnerships Operation Ghost Click A criminal cyber ring used malware to infect 4 million computers in more than 100 countries. 500,000 infections in the U.S. alone, including computers belonging to individuals, businesses, and government agencies such as NASA. Thieves made over $14 million in illicit fees. Partnerships are critical to solutions Government Private Sector Education FBI NASA OIG Estonian Police Dutch National Police Internet Systems Consortium National Cyber-Forensics & Training Alliance Mandiant Neustar Spamhaus Team Cymru Trend Micro University of Alabama at Birmingham Georgia Tech University
9 Shortage of Qualified & Certified Personnel A 2010 Report by the CSIS Commission on Cybersecurity for the 44 th Presidency A Human Capital Crisis in Cybersecurity Noted the shortfall in trained personnel Called for expanded education & rigorous certification
10 Labor Market for Critical Occupations Information Security Analysts, Web Developers, and Computer Network Architects 2010 Median Pay Entry-Level Education Work Experience in a Related Occupation On-the-job Training $75,660 per year $36.37 per hour Bachelor s degree 1 to 5 years None Number of Jobs, ,300 Job Outlook, Employment Change, % (> average) 65,700 Key Industries for These Jobs Computer Systems Design and Related Services Management of Companies and Enterprises Wired Telecommunications Carriers Management, Scientific &Technical Consulting Services Data Processing, Hosting, and Related Services Top Employment States/Metro Areas CA,TX, VA, FL, NY, MD, MA, WA, DC Washington-Arlington-Alexandria 19,070 New York-White Plains-Wayne 13,800 Los Angeles-Long Beach-Glendale 9,100 Seattle-Bellevue-Everett 7,910 Dallas-Plano-Irving 7,510 Boston-Cambridge-Quincy 7,010 Minneapolis-St. Paul-Bloomington 5,890 Atlanta-Sandy Springs-Marietta 5,850 San Jose-Sunnyvale-Santa Clara 5,710 Chicago-Joliet-Naperville 5,680
11 Creating a Pipeline of Skilled Workers Partners in Business and Industry Certified Industry Credential or Degree Cyber Security Student Federal Agencies Career Pathways (CTE/STEM)
12 Meeting the Workforce Challenge The National Security Agency (NSA) and the Department of Homeland Security (DHS) jointly sponsor the National Centers of Academic Excellence (CAE) Producing a growing pipeline of professionals with IT expertise in various disciplines 166 centers in 42 states URI's Digital Forensics and Cyber Security Center (2012) Creates cyber experts who help to protect national security and critical information infrastructure in both the private and public sectors
13 Start Early Ensure STEM Foundation for All Start Early (Pre-K thru Secondary) Career & Technical Education Programs (Secondary thru 2- and 4- year Post- Secondary) Labor Market Outcomes Good Jobs Security and Privacy
15 Maryland Programs of Study Computer Science and Cyber Security Foundations of Computer Science Computer Science Principles Computer Science: Advanced Placement (AP) CyberWatch: Microcomputer Operating Systems CyberWatch: Ethics and the Information Age Pathway spans K-12 and postsecondary Dual credit Industry certifications Strong partnerships: State, student organizations (competitions), Cyber-Watch, UMBC.
16 Resources for Furthering Cybersecurity Career opportunities and programs 31 emerging specialty areas Competencies and KSAs Internships & scholarships Teaching tools Hands-on experiences for students Examples of curriculum integration Competitions and cyber challenges Much more for parents, students, educators, employers and communities
17 Cybersecurity Challenges Many of the challenges and competitions are stand-alone events or supplement curriculum Need to find ways for better integration into programs/curricula
18 Virtual Cybersecurity Labs Government aims to establish a network of virtual cybersecurity laboratories that allow students and professionals alike to test out their latest cybersecurity technologies. The network of virtual cybersecurity labs will help provide easier, more coordinated access to the facilities to help test the technologies of tomorrow.
19 Returns for Students Will Be There Computer and Information Technology Bureau of Labor Statistics Occupational Profiles OCCUPATION ENTRY-LEVEL EDUCATION 2010 MEDIAN PAY Computer and Information Research Scientists Doctoral or professional degree $100,660 Computer Programmers Bachelor s degree $71,380 Computer Support Specialists Some college, no degree $46,260 Computer Systems Analysts Bachelor s degree $77,740 Database Administrators Bachelor s degree $73,490 Information Security Analysts, Web Developers, and Computer Network Architects Bachelor s degree $75,660 Network and Computer Systems Administrators Bachelor s degree $69,160 Software Developers Bachelor s degree $90,530
20 Closing Thoughts Start early STEM foundation is key for all Ethics are critical Cross-sector partnerships ensure relevance Bringing real-world cyber security challenges into the classroom can be improved Existing funding can be leveraged
21 Frank Zaborowski Director Competition Operations, CyberPatriot
22 Air Force Association s CyberPatriot The National High School Cyber Defense Competition Program Update May 2013
23 Cyber is everywhere in America Finance Manufacturing Logistics Transportation Retail Public Safety National defense
24 Requirement: A Cyber Workforce National cyber security can t exist without strong, indigenous cyber workforce We aren t graduating enough STEM scientists, technical grads, engineers, math majors, cyber experts We must motivate high-school youth to pursue STEM paths When compared to other nations, the math and science achievement of U.S. pupils and the rate of STEM degree attainment appear inconsistent with a nation considered the world leader in scientific innovation. In a recent international assessment of 15-year-old students, the U.S. ranked 28th in math literacy and 24th in science literacy. Moreover, the U.S. ranks 20th among all nations in the proportion of 24-year-olds who earn degrees in natural science or engineering Congressional Research Study Science, Technology, Engineering, and Mathematics (STEM) Education: Background, Federal Policy, and Legislative Action
25 Career Opportunities Cybersecurity jobs on average offer a premium of about $12,000 over average for all computer jobs. Average salary for cybersecurity jobs in 2012 was $100,733 versus $89,205 for all computer jobs. Demand for cybersecurity professionals over past five years grew 3.5 times faster than demand for other IT jobs and about 12 times faster than for all other jobs. Source: Computerworld, March 7, 2013 Over next year, need for 330,000 more IT security professionals worldwide. Julie Peeler, Director of ISC2 Foundation
26 What doesn t work What does Academic instruction is important, but students aren t particularly inspired by more class time, more lectures Multi-media instruction is a good tool, but they see plenty of that What excites, motivates: A well-organized, well-structured, competition
27 CyberPatriot Is 1. The national high school cyber defense competition. 2. Carefully structured to excite, educate, and motivate participants. 3. Designed to instill in all participants the importance to our nation of cyber, cyber security, and good computer security practices. 4. Designed to motivate all participants to consider STEM academic disciplines to meet our nation s needs. 5. Designed to motivate many participants to become the next generation of cyber defenders and our nation s digital workforce. We will begin a national campaign to promote cyber security awareness and digital literacy from our boardrooms to our classrooms, and to build a digital workforce for the 21st century. President Obama, May 2009
28 CyberPatriot Is Not 1. Hacker training We don t teach hacking tools or techniques, and hacking in competition is strictly forbidden. 2. A recruiting tool for the Air Force, the Department of Defense, or the Federal government This is about building a strong national foundation for cyber skills throughout our high schools. 3. Boring academic instruction CyberPatriot is designed with extremely high fun and excitement quotients.
29 History CP-I: Feb 2009 Concept Demonstration (Orlando, Florida) Eight teams (7 AFJROTC/1 CAP), all from Florida CP-III: Apr 2010 April 2011 First National Deployment All-Service Division: JROTC of all Services, CAP Open Division: Any high school 661 teams, 48 states CP-V: Apr 2012 March 2013 Most Recent Season All-Service Division: JROTC of all Services, CAP, U.S. Naval Sea Cadet Corps Open Division: Any high school 1,225 teams, 50 states, Canada CP-II: Apr 2009 Feb 2010 Pilot Deployment 200+ teams (AFJROTC/CAP) 42 States & Japan CP-IV: Apr 2011 April 2012 Second National Deployment All-Service Division: JROTC of all Services, CAP Open Division: Any high school 1,014 teams, 50 states, Canada CP-VI: Apr 2013 March 2014 Upcoming Season Open Division: Any high school All-Service Division: JROTC of all Services, CAP, U.S. Naval Sea Cadet Corps Goal: 3,000 teams 41
30 Team Structure Coach (Adult Leader): Supervises, chaperones team. Usually a teacher. Mentor (Technical Advisor)(Optional): Particularly useful when coach not cyber-savvy. Helps teach cyber concepts. AFA helps find them. Competitors: 2-5 students, 9th-12th grade, minimum age 13. National Finals Competition teams consist of six competitors (five primary and one alternate), one coach, and one chaperone.
31 Two Competition Divisions Open Division Open to any high school Public, private, parochial, magnet, home-school Highly valued CyberPatriot competition attributes: Technical/STEM education Career preparation/development Teamwork Goal-achievement All Service Division Open to any JROTC unit Army, Navy, Air Force, Marine Corps Naval Sea Cadet Corps Open to Civil Air Patrol cadet squadrons and composite squadrons Highly valued CyberPatriot competition attributes: Teamwork Goal-achievement Leadership
32 Skills Participants Learn Leadership and teamwork Creative and analytical problem solving Non-technical cyber principles (e.g. social engineering, phishing, vishing, spear-phishing, etc.) Netiquette Cyber safety Cyber hygiene Computing and networking principles Operating systems Network topologies Foundational cyber security principles Cyber and system vulnerabilities Network topology Vulnerability remediation Technical threats
33 CP-VI Competition Timeline 2 International Exhibition Teams (If no Canadian teams qualify) Open Division (Any High School) Exhibition Round Apr Practice Round Oct Round 1 Nov 1-3 Round 2 Dec 6-8 Semi-Finals 36 Teams Jan Finalist Teams Apr May Jun Jul Aug Sep Oct Nov Dec Jan Feb Mar Recruiting/Registration April 1 September 30 On-Line Consolation Round Feb National Finals Competition March 26-29, 2014 Washington, DC Apr May Jun Jul Aug Sep Oct Nov Dec Jan Feb Mar 14 Finalist Teams Exhibition Round Apr All Service Division (JROTC/CAP/Sea Cadets) Practice Round Oct Round 1 Nov 1-3 Round 2 Dec Teams Jan Semi-Finals 2 x Army JROTC 2 x Navy JROTC 2 x Marine Corps JROTC 2 x Air Force JROTC 2 x Civil Air Patrol 2 x US Naval Sea Cadet Corps 2 x Wild Card CP-VII Recruiting Pre-Registration Jan 1 Apr
34 What Participants See
35 What Participants See
36 CP Growth Surge in registrations: All Service Division: +26% Open Division: +113% Strong growth in female and underrepresented populations Canadian presence at National Finals Competition CyberPatriot Centers of Excellence established Enhanced focus, training, support #001: Los Angeles Unified School District #002: City of San Antonio, Texas #003: Spokane Public Schools #004: Rose State College, Oklahoma City
37 CP-V National Champions All Service Division: Marine Military Academy Harlingen,Texas Open Division: Chantilly Academy, Chantilly, Virginia
39 Our Biggest News Since Inception The CyberPatriot Middle School Program
40 Why We Are Doing This 1. We need to reach students earlier to effectively shape their education and career choices and draw them to math and science. 2. Youth need to be immunized against the growing on-line threats they face. 3. A strong middle school STEM presence will draw more high school students to high school programs.
41 Middle School Considerations Very different population Different learning processes Statutory implications Enormous opportunity 3x schools/students Numbers will be a challenge Ability to draw more females and minorities sooner Parental engagement different
42 Middle School Program Roll-Out LA-USD Lead Pilot ~12 schools COE Pilot ~ schools Development/Testing Feedback/ Revision Feedback/Revision National Recruitment Apr May Jun Jul Aug Sep Oct Nov Dec Jan Feb Mar Prime Pilot (LAUSD): Late summer 2013 ~12 schools Full Pilot: October 2013 COEs (~50-100) Full Deployment: school year
43 GCCS Timeline Facts CyberPatriot is contributing to reversing the STEM shortfall ~15,000 direct participants in 4 years ~150,000 broad contacts in 4 years CyberPatriot is placing young people on a path to educational, vocational, and professional success in an area of vital importance to our nation CyberPatriot is reaching underrepresented populations and giving them opportunities they likely would never have had Ours is a target rich environment 40,000 high schools in America
44 This isn t about AFA This isn t about the military This isn t about national defense This is about a way of life
45 Victor Fay-Wolfe, Ph.D. Professor Department of Computer Science and Statistics University of Rhode Island
46 The Open Cyber Challenge Platform * Dr. Victor Fay-Wolfe, PhD Director, URI Digital Forensics and Cyber Security Center * Supported By The U.S. National Science Foundation grants: Federal Cyber Service Scholarship For Service Program: Award Research Experience For Undergraduates: Award
47 Problem Need for realistic, up-to-date, hands-on ways to teach cyber security. Cyber challenges (team defends a real network data center from attacks) been proven effective in events and training. No low-cost option for establishing cyber challenge platform for high schools and colleges to use in their curriculum.
48 Current Cyber Challenges Some are restricted to government-only Xnet National Cyber Range Commercial packages are expensive >$100K plus maintenance Some are created from scratch each time National Collegiate Competition DEFCON Capture The Flag Challenges are typically free for all not designed to be configurable to test specific concepts
49 Solution Build cyber challenge platform Free/low-cost software Reasonable hardware requirements Architected to be configurable by organizations Open source so new configurations can be released back to the community to keep challenges current
50 OCCP Architecture Red Team attacks network to steal data and deny services Gray Team - is normal traffic and service requests that must be maintained Blue Team - defends network (patches vulnerabilities, etc) White Team officiates and scores challenge
51 Uses In Cyber Security Teaching/Training Network Defense Blue Team is students, Red Team is scripted attacks. Negative points assigned to Blue for data stolen and services denied Penetration Testing Red Team is students, Blue Team is scripted. Positive points assigned for data stolen and services denied Secure Programming Blue Team is student programmers, Red Team is scripted attacks (e.g. SQL injection). Negative points assigned for data stolen and services denied. Digital Forensics Red Team is scripted attack, Blue Team of students must find what data was stolen and who did it.
52 Virtual Target Network (VTN) VMWare vsphere package of virtual machines on a virtual network Runs on one low-end/moderate physical computer/server Virtual internal network, external (Internet) network, private white team network Current network defense scenario uses metasploitable, which is a virtual web server with vulnerabilities as part of the metasploit project.
53 Blue Team Humans in Network Defense, Secure Programming, and Forensics. Scripts in Penetration Testing In Network Defense: Blue Team gets short network administrator document showing network architecture, passwords, etc. Blue Team is given pre-training on the specific tools and components used (e.g. pfsense firewall) Blue Team is provided a network administrator virtual desktop with all required tools (and possibly an Internet connection to get other tools and documentation). E.g. WireShark Interface to Snort Intrusion Detection Putty and remote login tools Blue Team has an account on the network administrator desktop to which hints can be ed
54 Blue Team Tools Blue Team member using web interface from the Blue network administrator desktop to fix a weak firewall rule Blue Team member using web interface from the Blue network administrator desktop to examine the mail server system log
55 Red Team Attacks Network/Data Center Scripted for network defense, secure programming and forensics Human for penetration testing For current network defense scenario: Exploits come from Metasploit (open source) library Configuration file specifies attacks and timing Ruby (scripting language) scripts execute exploit attempts Red scripts report success to White scripts for scoring
56 Red Team In Demo Attacks Run Brute force login ssh rlogin Web application exploit tikiwiki php exec Exposed internal services Post Exploit Privilege escalation Backdoor accounts Stolen passwords Website defacement Erase logs
57 Gray Team Normal Service Requests Ruby scripts generate traffic What protocols, timing/density of requests, and specific VTN services are specified in configuration file Use of standard protocol libraries (e.g. http library) to generate traffic under Ruby scripting Gray scripts report to White Team successful receipt of services for scoring purposes
58 White Team Scores and Officiates Uses Nagios (open source network monitoring) to get status of services Uses Nagios messages to receive updates from the other teams In Network Defense scenario: Red team reports successful exploits (negative points) Gray team report successful services (positive points) and denied/incorrect service (negative points) Provides hint communication for White Team humans to help Blue Team humans Displays running score Provides monitoring of all parts of the system by White Team human administrators
59 Uses In Cyber Security Teaching/Training Network Defense Blue Team is students, Red Team is scripted attacks. Negative points assigned to Blue for data stolen and services denied Penetration Testing Red Team is students, Blue Team is scripted. Positive points assigned for data stolen and services denied Secure Programming Blue Team is student programmers, Red Team is scripted attacks (e.g. SQL injection). Negative points assigned for data stolen and services denied. Digital Forensics Red Team is scripted attack, Blue Team of students must find what data was stolen and who did it.
60 Status University of Rhode Island is building the OCCP under funding from the National Science Foundation Low cost/free hardware and VMware environment URI will release OCCP free and open source on web portal Description The Open Cyber Challenge Platform (OCCP) is a virtual environment for establishing cyber challenges to test cyber security concepts in teaching, training, and cyber competitions Supported By - The US National Science Foundation First network defense scenario developed and alpha tested Download, configure, teach, contribute! -Company X
61 The Open Cyber Challenge Platform * Dr. Victor Fay-Wolfe Director, URI Digital Forensics and Cyber Security Center Web: OCCP Project:
62 Panel : Cyber Challenges for Workforce Development Introductions and Facilitator: Lisa DiPippo, Ph.D., Associate Professor, URI Department of Computer Science and Statistics Johan Uvin, Ph.D., Deputy Assistant Secretary of Policy and Strategic Initiatives, Office of Vocational and Adult Education, U.S. Department of Education Frank Zaborowski, Director, Competition Operations, CyberPatriot Vic Fay-Wolfe, Ph.D., Professor, URI Department of Computer Science and Statistics Panel Q & A Discussion
Air Force Association s CyberPatriot The National High School Cyber Defense Competition September 2012 1 America: A Cyber Nation U.S. critically dependent on cyber systems for industry, commerce, public
AIR FORCE ASSOCIATION S CYBERPATRIOT NATIONAL YOUTH CYBER EDUCATION PROGRAM CyberPatriot Program Update April 2015 www.uscyberpatriot.org Cyber Is Everywhere Finance Manufacturing Logistics Transportation
Cybersecurity High School and Beyond High School Career Fair and Expo March 29, 2014 Diane G. Miller, CCP Director, Operations Northrop Grumman Information Security Program Director, CyberPatriot Topics
2013 Overview Why Participate? Explore: Discover the world of cybersecurity Encourage: Motivate participants towards cybersecurity careers Educate: Learn or improve cybersecurity skills Enhance: Teamwork,
CyberNEXS Global Services CYBERSECURITY A cyber training, exercising, competition and certification product for maximizing the cyber skills of your workforce The Cyber Network EXercise System CyberNEXS
2014/PPWE/SEM2/007 Agenda Item: 5 National Initiative for Cyber Security Education Submitted by: United States Women Business and Smart Technology Seminar Beijing, China 23 May 2014 NICE OVERVIEW Women
MEETING THE NATION S INFORMATION SECURITY CHALLENGES TO ADDRESS SKILLS AND WORKFORCE SHORTAGES IN THE INFORMATION SECURITY INDUSTRY, THE NATIONAL SECURITY AGENCY AND THE DEPARTMENT OF HOMELAND SECURITY
Technology Fee Proposal Title: Virtual Environment for Information Security Education and Exploration Proposer: Joseph N. Wilson, Assistant Professor CISE Department Rm. E301 CSE Bldg. 42 Box 116120 Gainesville,
EC-Council Certified Security Analyst (ECSA) v8 Eğitim Tipi ve Süresi: 5 Days VILT 5 Day VILT EC-Council Certified Security Analyst (ECSA) v8 Learn penetration testing methodologies while preparing for
Wyoming Community College Commission Request for New, Pilot or Revised Degree or Certificate Program A. College: Laramie County Community College B. Date submitted to WCCC: C. Program 1. Request for: X
NICE and Framework Overview Bill Newhouse NIST NICE Leadership Team Computer Security Division Information Technology Lab National Institute of Standards and Technology TABLE OF CONTENTS Introduction to
2014 Overview Why Participate? Explore: Discover the world of cybersecurity Encourage: Motivate participants towards cybersecurity careers Educate: Learn and improve cybersecurity skills Enhance: Teamwork,
Community Commission Request for New, Pilot or Revised Degree or Certificate Program A. : Laramie County Community B. Date submitted to WCCC: C. Program 1. Request for: X New Program Pilot Program Revised
An Accelerated Pathway to Careers in Cybersecurity for Transitioning Veterans NICE Annual Conference November 2015 Panelists David Brown, Director of CyberTalent at the SANS Institute, a new business unit
Air Force Association s CyberPatriot The National High School Cyber Defense Competition Online Coaches and Mentors Meetings August 18, 2014 - Meeting Timeline Highlights Coach and Mentor of the Year Rules
Protecting Energy s Infrastructure and Beyond: Cybersecurity for the Smart Grid Which is it? Cyber Security ~or~ Cybersecurity? Dr. Ernie Lara President Presenters Estrella Mountain Community College Dr.
TURNING THE RISING TIDE OF CYBERSECURITY THREATS With cyber attacks on the rise, there s a growing need for digital forensic professionals with the knowledge and skills to investigate technology crimes
"A Unique Resource for the Nation" Building Science and Engineering Talent SEA Qualification Statement Background and Need Science, mathematics, and engineering education in many countries is essential
Cybersecurity: A Shared Responsibility and Department of Homeland Security Priority A Presentation to the National Cyberwatch Center November 20, 2015 Webinar Protocol :: Mute your phone/mic when not talking
Cyber threats are growing. So are your career opportunities. Put the future of your cybersecurity career in the hands of a respected online education leader. Everything you need to succeed. Excelsior College
Air Force Association s CyberPatriot The National High School Cyber Defense Competition Online Coaches Meetings March 12, 2014 13:34:41 GCCS Organization TimelineChart Air Force Association AFA CyberPatriot
Centers of Academic Excellence in Cyber Security (CAE-C) Knowledge Units Review Review Process The Knowledge Unit (KU) Review Calendar divides the entire CAE-C KU list into 12 months for the purposes of
NATIONAL INITIATIVE FOR CYBERSECURITY EDUCATION SAN DIEGO, CA Dr. Aurelia T. Williams, NSU Ms. Kamilah Brown, CCSD Mr. Ronald Williams, DTC Mr. Tony Baylis, LLNL November 3, 2015 Who Are We? A collaborative
University of Rhode Island DigitalCommons@URI Open Access Master's Theses 2013 Designing a Network Defense Scenario Using the Open Cyber Challenge Platform Richard H. Wagner University of Rhode Island,
Impact of Cybersecurity Education in High Schools and Small Businesses in Hawaii Challenges and Opportunities NICE Conference 2015 Debasis Bhattacharya University of Hawaii Maui College firstname.lastname@example.org
Foundations of Computer Security Lecture 1: Dr. Bill Young Department of Computer Sciences University of Texas at Austin Lecture 1: 1 Course Topics Topics we will cover include: What is computer security?
Creating a Well-Trained and Highly Skilled Energy Workforce at AREVA Gary Mignogna Vice President, Engineering AREVA NP Inc. We Face a Major Shortfall in Technical Resources in the U.S. Baby Boomers total
Middle Class Economics: Cybersecurity Updated August 7, 2015 The President's 2016 Budget is designed to bring middle class economics into the 21st Century. This Budget shows what we can do if we invest
Cybersecurity Cybersecurity is the measures taken to protect a computer or computer system (as on the Internet) against unauthorized access or attack. Cybersecurity is the faster growing IT job, growing
THE NICE VISION National Initiative for Cybersecurity Education a national campaign to promote cybersecurity awareness and digital literacy from our boardrooms to our classrooms, and to build a digital
NSA/DHS Centers of Academic Excellence for Information Assurance/Cyber Defense Cyber Investigations Data Management Systems Security Data Security Analysis Digital Forensics Health Care Security Industrial
Cyber Security at NSU Aurelia T. Williams, Ph.D. Chair, Department of Computer Science Associate Professor of Computer Science June 9, 2015 Background Undergraduate computer science degree program began
Who Drives Cybersecurity in Your Business? Milan Patel, K2 Intelligence AIBA Quarterly Meeting September 10, 2015 The Answer 2 Everyone The relationship between the board, C-suite, IT, and compliance leaders
1 2 What is EC-Council Certified Security Analyst Licensed Penetration Tester Program You are an ethical hacker. Your last name is Pwned. You dream about enumeration and you can scan networks in your sleep.
Cisco Networking Academy: Delaware Profile Educating the Architects of the Networked Economy Now in its second decade, Cisco Networking Academy has provided more than two million students worldwide with
Computer Software Bugs and Other IT Threats to Critical Infrastructure: A Preliminary Set of Considerations for IT Governance Presentation for the Seventh European Academic Conference on Internal Audit
Information Systems Technology & Cybersecurity Programs Stay close. Go far. Computer Studies Faculty Trudy Gift Professor, Information Systems Technology 240-500-2214 email@example.com Carrie Pifer
Information Systems College of Engineering & Information Sciences Careers That Fit You Build your career around your talents Do you have an interest in computers and how their programs work? Do you have
Law, Public Safety, Corrections & Security Cluster Planning, managing, and providing legal, public safety, protective services and homeland security, including professional and technical support services.
New-Age Undergraduate Programme B. Tech - Cloud Technology & Information Security (4 Year Full-Time Programme) Academic Year 2015 Page 1 Course Objective B. Tech - Cloud Technology & Information Security
1 2 What is EC-Council Certified Security Analyst Licensed Penetration Tester Program You are an ethical hacker. Your last name is Pwned. You dream about enumeration and you can scan networks in your sleep.
New-Age Undergraduate Programme B. Tech Cloud Technology & Information Security (4 Year Full Time Programme) Academic Year 2015 Page 1 Course Objective This unique B. Tech course provides dual career options
LUNCH AND LEARN BBP 3.0 STEM Outreach Focus Jeff Craver DAU South Instructor 256-922-8153 Jeffrey.firstname.lastname@example.org Strategic alignment between workforce needs and K-16 Capabilities 9 Dec 2015 BBP 3.0 STEM
The National Cybersecurity Workforce Framework 2015 Delaware Cyber Security Workshop September 29, 2015 Bill Newhouse NICE Program Office at the National Institute of Standards and Technology NICE is a
Cybersecurity Real World Connections Summer Boot Camp at NJIT Connecting Learning to Life Summer 2016 The Program In Summer 2016, NJIT s Computer Science department/ RWC Program will offer its first Cybersecurity
BHEF s National Higher Education and Workforce Initiative Debbie Hughes Sr. Director of Higher Education & Workforce September 30, 2015 2015 BHEF About the Business-Higher Education Forum BHEF is a member
OVERVIEW DEGREES & CERTIFICATES 015 The best. Made better. SANS graduate programs are the ultimate expression of our 25 years dedicated to the education and development of information security professionals.
WHITE PAPER CHALLENGES Protecting company systems and data from costly hacker intrusions Finding tools and training to affordably and effectively enhance IT security Building More Secure Companies (and
How Do We Prepare the Next Generation ofcyber Warrior? Education v. Experience April 30, 2014 Jesse Mayer and RobbMayeski Northrop Grumman Cyber Security Operations Center Overview Who are we? Introduction
PROGRAMS STUDY of COMPUTER INFORMATION SYSTEMS 011 Associate in Applied Science degree (A.A.S.) 60 Credit Hours (CH) The study of basic business and technical principles used in programming and operating
Introducing Maryville University s CYBER SECURITY ONLINE PROGRAMS Bachelor of Science in Cyber Security & Master of Science in Cyber Security The cyber security industry is calling for more experts. And
Cybersecurity Education Issues & Approaches Derek A. Smith Director of Cybersecurity Initiatives at Excelsior College AFCEA November 18, 2014 Where we are now! Symantec: In a world of increased cybersecurity
UNM Information Assurance Scholarship for Service (SFS) Program What is Information Assurance? Committee on National Security Systems (CNSS) defines information assurance (IA): Measures that protect and
CYBER DEFENSE COMPETITION: A TALE OF TWO TEAMS * Yan Bei and Robert Kesterson Institute of Technology University of Washington, Tacoma Tacoma, WA 253-692-5863 email@example.com Kyle Gwinnup and Carol
Cisco Networking Academy Filling critical needs Certification and standards alignment Academy courses and content What is networking? Gathering and presenting data Analyzing and creating conclusions Creating
Walden University s Guide for Information Systems and Technology Careers Discover Career Opportunities in the Growing Fields of Information Systems and Information Technology Rapid advances in technology
RECOGNIZED PROVEN RESPECTED MARKETABLE FLEXIBLE Fernanda Tapia Student SCHOOL OF INFORMATION SYSTEMS AND TECHNOLOGY MASTER OF SCIENCE IN INFORMATION SYSTEMS Apply today: strayer.edu/apply FLEXIBLE / AFFORDABLE
Education for the future. The six schools of study at the ITT Technical Institutes 3 (School of Information Technology, School of Electronics Technology, School of Drafting and Design, School of Business,
HR 2272 Conference Report STEM Education Provisions Summary Title I Office of Science and Technology Policy (OSTP) Directs the President to convene a National Science and Technology Summit not more than
Atlanta Public Schools Career Academy Career Academy Planning Model 2012-2013 Market Analysis & Strategic Planning Research Labor Trends (Oct Dec) 2014 Engagement & Fundraising Visit Existing Career Academies
DHS CMSI Webinar Series Renee Forney Executive Director As the Executive Director for the Cyberskills Management Support Initiative (CMSI), Ms. Forney supports the Undersecretary for Management (USM) for
Summary of Mission Statement Mission and Goals Statement University of Maryland, College Park January 7, 2011 The mission of the University of Maryland, College Park is to provide excellence in teaching,
The Computerworld Honors Program Honoring those who use Information Technology to benefit society Year: 2013 Final Copy of Case Study Status: Laureate Organization Name: Cyber Defence Challenge Organization
New Jersey Cyber Aces Academy at Brookdale: A Collaborative Public/Private Model to Secure the Nation A project funded through NSF SFS Grant DUE#1331170 Ed Skoudis Mike Qaissaunee April 30, 2014 Someone
Certification Programs 2014 The SBS Institute serves community banks by providing educational programs that will certify a banker has the knowledge and skills to protect against todays information security
IT Security Training Why Security Certification? A Serious Business - Fear Drives the Demand High Demand Freedom to Make and Break Rules Benefits of Certification Provides Assurance to Employers Certification
National Cyber League Certified Ethical Hacker (CEH) TM Syllabus Note to Faculty This NCL Syllabus is intended as a supplement to courses that are based on the EC- Council Certified Ethical Hacker TM (CEHv8)
Bridging the Cybersecurity Talent Gap Cybersecurity Employment and Opportunities for Engagement 2015 Burning Glass Technologies Cybersecurity has a Big Problem Attacks are rising Cyber incidents jumped
Energy for Learning: From Education to Employment Chevron invested more than $100 million in education over the last three years in the U.S. and has pledged an additional $30 million through 2015 to support
CYBER SECURITY TRAINING KEEPING YOU SAFE AND SECURE Experts in Cyber Security training. Hardly a day goes by without a cyber attack being reported. With this ever-increasing threat there is a growing need
Deep Security Intrusion Detection & Prevention (IDS/IPS) Trend Micro, Incorporated A technical brief summarizing vulnerability coverage provided by Deep Security. The document also outlines a comparison
SOUTH DAKOTA BOARD OF REGENTS Committee on Academic and Student Affairs AGENDA ITEM: III A(3) DATE: April 3-4, 2013 ****************************************************************************** SUBJECT:
Microsoft s cybersecurity commitment Published January 2015 At Microsoft, we take the security and privacy of our customers data seriously. This focus has been core to our culture for more than a decade
Changing a Culture November 2005 Toward a 30% Increase in Degree Attainment in Stark County, Ohio Stark County is the 7th largest county in Ohio. In 2001 we formed a P-16 Compact and began looking at the
Testimony of Mr. Andrew J. Partynski, Congressional Field Hearing on STEM Education in Action Committee of Science Space & Technology Subcommittee on Research & Science Education April 30, 2012 Good morning
Strengthening the Nexus: Government-Business- University cooperation and collaboration on security, training and research November 1, 2011 Susan C. Aldridge, PhD University of Maryland University College
The trend of the Cyber Security and the efforts of NEC December 9 th, 2015 NEC Corporation Agenda 1. NEC Corporate Profile 2. NEC s Activity for Safer-City 3. NEC Cyber Security Solution 3.1 Security Operation
Becoming a Cyber Professional: A Discussion with Recent Graduates Moderator: George L. Heron, LifeJourney USA Panelists: Danielle Santos, Assistant Program Manager, Cyber Formal Education, DHS Scott Wallace.
INSPIRING THE NEXT GENERATION OF TECHNOLOGY INNOVATORS Iridescent s mission is to equip and inspire underprivileged young people to develop curiosity, creativity and persistence through a powerful science,
Small-Scale Cyber Security Competitions Mike O Leary Towson University 16th Colloquium for Information Systems Security Education Orlando, FL June 11-13, 2012 M. O Leary (Towson University) Small-Scale
Your consent to our cookies if you continue to use this website.