Contestant Requirements:
|
|
- Teresa Reynolds
- 2 years ago
- Views:
Transcription
1 2014 Overview
2 Why Participate? Explore: Discover the world of cybersecurity Encourage: Motivate participants towards cybersecurity careers Educate: Learn and improve cybersecurity skills Enhance: Teamwork, collaboration, critical thinking Enrich: Compete for scholarships and/or cash prizes Enjoy: A fun challenge Contestant Requirements: Basic understanding of Windows/Unix and the Internet Willingness to Learn Work as a Team Desire to Have Fun
3 Background Over 700 Competitors and 115 teams over the past 3 years 3 Divisions High School College Professional Team Sizes of 3-6 members Over $250,000 in student prizes awarded in the past 3 years Internships offered to student winners and runners-up Trophies, cash, and/or professional development prizes for professional team winner Competition finals run alongside 2 day conference Open to teams Nationwide!
4 Building a Team You can represent your organization or create a team with members from various organizations and companies Individual names will not be publicized nor will your company name (unless it s part of your team name) Your team name will be publicized. Only first and second place winners will be made public Team rankings will be given only to teams and not released publically Pictures will be taken at the event for use to market the event in the future Register soon! Team rosters will be locked on September 9 th Identify your captain. This will be the main communication point throughout the event.
5 Challenge Timeline Registration Closed September 9, 2014 Practice Round #1 (unscored) Windows August 12, 2014 Linux August 18, 2014 Forensics August 20, 2014 Practice Round #2 (unscored) Windows August 25, 2014 Linux August 27, 2014 Qualification Round 1 (Scored) - September 13-15, 2014 System Hardening for all competitors Qualification Round #2 (Scored) September 21-23, 2014 System Hardening for High School (different target) Forensics for College & Professionals Baltimore Convention Center October 29 for College & Professionals October 30 for High School Online
6 Challenge Game Types System Hardening (Practice/Qualifications) Analyze Windows & Linux systems for vulnerabilities or potential vulnerabilities and secure systems that are vulnerable Forensics (College and Professional) Finding and reporting evidence of intrusions, discovery of malware, analysis of payloads, log analysis, network analysis, and tracking of attackers on images either of computer systems or USB drives. The more details reported to the White Team, the more points earned. Defense/CND (High School) Defending a network being attacked by a live Red Team, while maintaining critical services and securing hosts, detecting and mitigating Red Team activity and other misuse, and communicating findings. Attack/Defend Capture the Flag (College and Professional) Compromise and control targets, maintain control of targets, and secure your own targets against other teams attacks. The longer a team holds a target and maintains its critical services (i.e., Capture and Defend ), the more points earned.
7 Key Skills for Success System Hardening Windows & Linux System Administration knowledge Forensics Disk image analysis File carving Log file analysis Network traffic (Packet Capture) analysis Attack/Defend Capture the Flag Windows & Linux System Administration Log File Analysis Incident Response & Handling Intrusion Detection Teamwork, Organization, & Good communications skills are essential!
8 Helpful Hints During each round, you can download and work on as many VMs as you wish to make effective use of your team s time. However, only one VM may connect into CyberNEXS to represent your team for scoring purposes. Multiple logins from the same team may result in disqualification.
9 Cyber Maryland Conference October 29-30, Baltimore Convention Center Runs simultaneously with the Maryland Cyber Challenge Two Days of technical and non-technical conference sessions appealing to a wide range of audiences, industries, and expertise Exhibitor Fair Employer & Professional Networking Opportunities
10 Cyber Operations Key Skills Maintain critical services even during moments of intrusion and misuse Identify vulnerabilities and lock down systems (computers, network and security devices) Recognize and respond to hacker and computer misuse activity (Monitor and Forensics) Collect and Analyze Forensics Data Penetration Testing Communicate Effectively Realistically Train as you expect to Operate
11 CyberNEXS: The Environment Instruct Classroom Instruction Learning of facts Question and answers Instructor demonstrations Exercise Live Lab Reinforcement of learning Student hands-on Trail and error with real-time feedback Compete Game Measure individual or team Learn new techniques from others Fun; stimulus to learn more Certify Demonstrate Practical Knowledge Final verification of level of capability Certified under pressure
12 Qualification Round 1 Contestant Computer Requirements 2GB RAM 20GB Disk Space VMware Player (free) Internet Connectivity Requirements 64Kbps up/down link No latency requirements Characteristics For all Divisions 6 contiguous hours once connected to complete the round Prior to the round, contestant downloads VM target to their own machine. Decryption key sent 15 minutes prior to the start of the round Following system registration instructions is crucial! Contestant maintains critical services on own machine & conducts system hardening Agent sends status to CyberNEXS Global Services which returns score to Contestant s Status Page No attacks nor trouble ticket activity performed (no red/white team required) Practice Rounds 1 and 2 will prepare teams
13 Qualification Round 2 High School Contestant Computer Requirements 2GB RAM 20GB Disk Space VMware Player (free) Internet Connectivity Requirements 64Kbps up/down link No latency requirements Characteristics 6 contiguous hours once connected to complete the round Before the round, contestant downloads VM target to their own machine Decryption key sent 15 minutes prior to the start of the round Following system registration instructions is crucial! Contestant maintains critical services on own machine & conducts hardening. Agent sends status to CyberNEXS Global Services which returns score to Contestant s Status Page No attacks nor trouble ticket activity performed (no red/white team required) Practice Rounds 1 and 2 will prepare teams
14 Qualification Round 2 College & Professional Contestant Computer Requirements 2GB RAM 20GB Disk Space VMware Player (free) Internet Connectivity Requirements 64Kbps up/down link No latency requirements Characteristics 6 contiguous hours to complete during the round once connected Prior to the round, contestant downloads VM target and instructions to their own machine. Decryption key sent 15 minutes prior to the start of the round Following system registration instructions is crucial! Contestants conduct forensics analysis and report their findings to the White Team. Agent sends status to CyberNEXS Global Services which returns score to Contestant s Status Page Practice Round 3 will prepare teams
15 Finals (in-person) High School Teams log into their own CyberNEXS network Contestants harden systems in their network, maintain critical services and fill out trouble tickets, while Red Team attacks their network Contestant Computers will be supplied Understanding of Remote Desktop (Windows) and ssh (Linux) software is required along with system admin & security skills. No electronic media/devices Books & paper notes OK No staged internet sites or outside tools No coaching
16 Finals College and Professional Teams log into their own CyberNEXS network Contestants identify and compromise targets, then plant flags Contestants harden systems in their network, maintain critical services and protect their systems (and those they own by planting flags) while other teams try to attack Contestant Computers will be supplied Understanding of Remote Desktop (Windows) and ssh (Linux) software is required, along with system admin & security skills. No electronic media/devices Books & paper notes OK No staged internet sites or outside tools No coaching
17 Points of Contact Competition Director: Dr. Richard Forno (UMBC) Competition Questions & GamePlay: Competition Technical Support: CyberNEXS Program Manager: Susan Crowe MDC3 Event Media/PR: Tia Howard Maryland Cyber Challenge Website
Background (2011-2013)
2013 Overview Why Participate? Explore: Discover the world of cybersecurity Encourage: Motivate participants towards cybersecurity careers Educate: Learn or improve cybersecurity skills Enhance: Teamwork,
CyberNEXS Global Services
CyberNEXS Global Services CYBERSECURITY A cyber training, exercising, competition and certification product for maximizing the cyber skills of your workforce The Cyber Network EXercise System CyberNEXS
THE SAN DIEGO MAYORS CYBER CUP (SDMCC) ORIENTATION 10 NOVEMBER 2015
THE SAN DIEGO MAYORS CYBER CUP (SDMCC) ORIENTATION 10 NOVEMBER 2015 AGENDA Welcome & Introductions Overview/key dates Team Registration Overview of CyberNEXS Key changes Rules & Scoring Registering the
Instruction Guide Mentor/Coach Free Play Practice Event November 2015
Instruction Guide Mentor/Coach Free Play Practice Event November 2015 1 San Diego Mayor s Cup Mentor/Coach Practice Round Guide Table of Contents Introduction 3 Tips for Success 3 Round Times 3 Linux Virtual
Instruction Guide Practice Round 2 High School August 2015
Instruction Guide Practice Round 2 High School August 2015 1 Maryland Cyber Challenge Practice Round Instruction Guide Table of Contents Introduction 3 Tips for Success 3 Round Times 3 Linux Virtual Machine
The Open Cyber Challenge Platform *
The Open Cyber Challenge Platform * Jacob Fonseca, Kevin Bryan, Lisa DiPippo, Victor Fay-Wolfe * Supported By The U.S. National Science Foundation grants: Federal Cyber Service Scholarship For Service
Symantec Cyber Readiness Challenge Player s Manual
Symantec Cyber Readiness Challenge Player s Manual Version 1.6 January 20, 2014 Table of Contents Introduction... 3 1 The Cyber Readiness Challenge... 4 1.1 Your Credentials... 4 1.2 Accessing the Competition...
Someone s sitting in the shade today because someone planted a tree a long time ago. Warren Buffett. Ed Skoudis Mike Qaissaunee.
New Jersey Cyber Aces Academy at Brookdale: A Collaborative Public/Private Model to Secure the Nation A project funded through NSF SFS Grant DUE#1331170 Ed Skoudis Mike Qaissaunee April 30, 2014 Someone
INTERNATIONAL CYBEREX 2015
INTERNATIONAL CYBEREX 2015 www.oas.org INTERNATIONAL CYBEREX 2015 01. PURPOSE 02. TEAM PROFILE 03. PLANNING 04. CYBEREXERCISE ASSETS 4 5 7 8 4.1. Cyberexercise website 4.2. CTF Execution Platform 4.3.
2015 CyberPatriot Conference
Air Force Association Educate - Advocate - Support 2015 CyberPatriot Conference September 12, 2015 1 Agenda 8:00 9:00 Conference Check-in and Refreshments 9:00 10:00 Conference Welcomes (Dick Jeffreys
Cyber Defense Operations Graduate Certificate
The SANS Technology Institute makes shorter groups of courses available to students who are unable to commit to a full master s degree program. These certificate programs will augment your skills, provide
Cyber Exercises, Small and Large
First International Conference on Cyber Crisis Cooperation: Cyber Exercises 27 June 2012 Cyber Exercises, Small and Large Commander Mike Bilzor Computer Science Department U.S. Naval Academy Annpolis,
Technology Fee Proposal
Technology Fee Proposal Title: Virtual Environment for Information Security Education and Exploration Proposer: Joseph N. Wilson, Assistant Professor CISE Department Rm. E301 CSE Bldg. 42 Box 116120 Gainesville,
Securing Networks, Securing Futures
CP_08_20150414 CyberPatriot is the premier national youth cyber education The National Youth Cyber Education Program program created to inspire high school and middle school students toward careers in
Cyber Learning Solutions
Cyber Learning Solutions 2014 Extended Course Catalog Raytheon Cyber Solutions Inc. (RCSI) cyber-training@list.app.ray.com www.raytheon.com 1 Raytheon Cyber Learning Solutions 2014 Catalog CONTENTS The
Information Security Engineering
Master of Science In Information Security Engineering Course Descriptions November 2014 Master of Science in Information Security Engineering The program of study for the Master of Science in Information
2011 Cisco NetRiders EMEA National Competitions Frequently Asked Questions (FAQ)
2011 Cisco NetRiders EMEA National Competitions Frequently Asked Questions (FAQ) NOTE: This FAQ includes some generic answers for the National NetRiders competitions in EMEA (Europe, Middle East and Africa)
Creating a Linux Virtual Machine using Virtual Box
A. Install Virtual Box: Creating a Linux Virtual Machine using Virtual Box 1. Download the Virtualbox installer http://www.virtualbox.org/wiki/downloads 2. Run the installer and have the installer complete.
Hackers are here. Where are you?
1 2 What is EC-Council Certified Security Analyst Licensed Penetration Tester Program You are an ethical hacker. Your last name is Pwned. You dream about enumeration and you can scan networks in your sleep.
OVERVIEW DEGREES & CERTIFICATES
OVERVIEW DEGREES & CERTIFICATES 015 The best. Made better. SANS graduate programs are the ultimate expression of our 25 years dedicated to the education and development of information security professionals.
Virtual Learning Tools in Cyber Security Education
Virtual Learning Tools in Cyber Security Education Dr. Sherly Abraham Faculty Program Director IT and Cybersecurity Dr. Lifang Shih Associate Dean School of Business & Technology, Excelsior College Overview
National Cyber League Certified Ethical Hacker (CEH) TM Syllabus
National Cyber League Certified Ethical Hacker (CEH) TM Syllabus Note to Faculty This NCL Syllabus is intended as a supplement to courses that are based on the EC- Council Certified Ethical Hacker TM (CEHv8)
IDS and Penetration Testing Lab ISA656 (Attacker)
IDS and Penetration Testing Lab ISA656 (Attacker) Ethics Statement Network Security Student Certification and Agreement I,, hereby certify that I read the following: University Policy Number 1301: Responsible
University Road Show 2015
University Road Show 2015 What we will cover Working in Cyber Security The Challenge The Prizes Hints & Tips Q&A Working in Cyber Security Life as a Cyber Security Professional Varied Valued Interesting
Data Access Request Service
Data Access Request Service Guidance Notes on Security Version: 4.0 Date: 01/04/2015 1 Copyright 2014, Health and Social Care Information Centre. Introduction This security guidance is for organisations
Anthony J. Keane, MSc, PhD and Jason Flood, MSc Information Security & Digital Forensics Research Group Institute of Technology Blanchardstown
Anthony J. Keane, MSc, PhD and Jason Flood, MSc Information Security & Digital Forensics Research Group Institute of Technology Blanchardstown 1 Protected networks are continuously being successfully attacked
Small-Scale Cyber Security Competitions
Small-Scale Cyber Security Competitions Mike O Leary Towson University 16th Colloquium for Information Systems Security Education Orlando, FL June 11-13, 2012 M. O Leary (Towson University) Small-Scale
EC-Council Certified Security Analyst (ECSA)
EC-Council Certified Security Analyst (ECSA) v8 Eğitim Tipi ve Süresi: 5 Days VILT 5 Day VILT EC-Council Certified Security Analyst (ECSA) v8 Learn penetration testing methodologies while preparing for
Introduction to Cyber Defense Competition. Module 16
Introduction to Cyber Defense Competition Module 16 Objectives of the CDC Establish a safe and functional environment that: Encourages students to discover the applied meaning of information/cyber security
IDS and Penetration Testing Lab ISA 674
IDS and Penetration Testing Lab ISA 674 Ethics Statement Network Security Student Certification and Agreement I,, hereby certify that I read the following: University Policy Number 1301: Responsible Use
Linux Boot Camp. Our Lady of the Lake University Computer Information Systems & Security Department Kevin Barton Artair Burnett
Linux Boot Camp Our Lady of the Lake University Computer Information Systems & Security Department Kevin Barton Artair Burnett Schedule for the Week Schedule for the Week Mon Welcome from Enrollment Management
Wyoming Community College Commission Request for New, Pilot or Revised Degree or Certificate Program
Wyoming Community College Commission Request for New, Pilot or Revised Degree or Certificate Program A. College: Laramie County Community College B. Date submitted to WCCC: C. Program 1. Request for: X
Protecting against cyber threats and security breaches
Protecting against cyber threats and security breaches IBM APT Survival Kit Alberto Benavente Martínez abenaventem@es.ibm.com IBM Security Services Jun 11, 2015 (Madrid, Spain) 12015 IBM Corporation So
Hackers are here. Where are you?
1 2 What is EC-Council Certified Security Analyst Licensed Penetration Tester Program You are an ethical hacker. Your last name is Pwned. You dream about enumeration and you can scan networks in your sleep.
National Cyber League (NCL) Syllabus
Note to Faculty The NCL Syllabus is intended as a supplement to a CompTIA Security+ class, or related Network Security course. A primary goal of the NCL is to integrate exercises and competitions into
HP Virtual Controller and Virtual Firewall for VMware vsphere 1-proc SW LTU
HP Virtual Controller and Virtual Firewall for VMware vsphere 1-proc SW LTU Data sheet Product overview The HP TippingPoint Virtual Controller + Virtual Firewall (vcontroller+vfw) extends our leading intrusion
Cybersecurity Certificate Programs
Cybersecurity Certificate Programs Maryland Workforce Outlook Forum May 26th, 2016 Homer Minnick, Director, Cybersecurity Academy, UMBC Training Centers umbctraining.com 443-692-6600 About UMBC Training
AC 2012-4887: WORK-IN-PROGRESS: CREATING AN INTRUSION DE- TECTION EXPERIMENTAL ENVIRONMENT USING CLOUD-BASED VIR- TUALIZATION TECHNOLOGY
AC 2012-4887: WORK-IN-PROGRESS: CREATING AN INTRUSION DE- TECTION EXPERIMENTAL ENVIRONMENT USING CLOUD-BASED VIR- TUALIZATION TECHNOLOGY Mr. John M. Jones, East Carolina University John Jones is currently
Post Exploitation. n00bpentesting.com
Post Exploitation n00bpentesting.com Prerequisites Hardware Software Topics Covered A Note Before You Begin Lab 0ne Post Exploitation What s Next? 3 3 3 4 4 4 5 8 2 Prerequisites Thank you for downloading
Penetration Testing LAB Setup Guide
Penetration Testing LAB Setup Guide (Internal Attacker - Beginner version) By: magikh0e - magikh0e@ihtb.org Last Edit: July 07 2012 This guide assumes a few things... 1. You have installed Backtrack before
Cybernetic Proving Ground
Cybernetic Proving Ground Penetration Testing Scenario Jakub Čegan, Martin Vizváry, Michal Procházka cegan@ics.muni.cz Institute of Computer Science, Masaryk University About The Scenario "In this game
Wyoming Community College Commission Request for New, Pilot or Revised Degree or Certificate Program
Community Commission Request for New, Pilot or Revised Degree or Certificate Program A. : Laramie County Community B. Date submitted to WCCC: C. Program 1. Request for: X New Program Pilot Program Revised
PND at a glance: The World s Premier Online Practical Network Defense course. Self-paced, online, flexible access
The World s Premier Online Practical Network Defense course PND at a glance: Self-paced, online, flexible access 1500+ interactive slides (PDF, HTML5 and Flash) 7+ hours of video material 10 virtual labs
Global Cyber Range (GCR) Empowering the Cybersecurity Professional (CyPro)
Global Cyber Range (GCR) Empowering the Cybersecurity Professional (CyPro) NICE Conference 2014 CYBERSECURITY RESILIENCE A THREE TIERED SOLUTION NIST Framework for Improving Critical Infrastructure Cybersecurity
INDUSTRIAL CONTROL SYSTEMS CYBER SECURITY DEMONSTRATION
INDUSTRIAL CONTROL SYSTEMS CYBER SECURITY DEMONSTRATION Prepared for the NRC Fuel Cycle Cyber Security Threat Conference Presented by: Jon Chugg, Ken Rohde Organization(s): INL Date: May 30, 2013 Disclaimer
A New Era. A New Edge. Phishing within your company
Phishing within your company Learning Objectives What is phishing and how to minimize its impact Obtain a basic understanding of how to use virtual machines Use BackTrack, a tool used by many security
Cybersecurity Health Check At A Glance
This cybersecurity health check provides a quick view of compliance gaps and is not intended to replace a professional HIPAA Security Risk Analysis. Failing to have more than five security measures not
NETWORK SECURITY (W/LAB) Course Syllabus
6111 E. Skelly Drive P. O. Box 477200 Tulsa, OK 74147-7200 NETWORK SECURITY (W/LAB) Course Syllabus Course Number: NTWK-0008 OHLAP Credit: Yes OCAS Code: 8131 Course Length: 130 Hours Career Cluster: Information
Learning and Playing: Integrating Competition Experiences Into Formal Curriculum. 2014 3CS Palos Hills, IL
Learning and Playing: Integrating Competition Experiences Into Formal Curriculum 2014 3CS Palos Hills, IL Discussion What is the NCL? Partnerships Features Enrichment & Assessment Preparation for Certifications
How to use the VMware Workstation / Player to create an ISaGRAF (Ver. 3.55) development environment?
Author Janice Hong Version 1.0.0 Date Mar. 2014 Page 1/56 How to use the VMware Workstation / Player to create an ISaGRAF (Ver. 3.55) development environment? Application Note The 32-bit operating system
WA2192 Introduction to Big Data and NoSQL. Classroom Setup Guide. Web Age Solutions Inc. Copyright Web Age Solutions Inc. 1
WA2192 Introduction to Big Data and NoSQL Classroom Setup Guide Web Age Solutions Inc. Copyright Web Age Solutions Inc. 1 Table of Contents Part 1 - Minimum Hardware Requirements...3 Part 2 - Minimum Software
Lab 12: Mitigation and Deterrent Techniques - Anti-Forensic
CompTIA Security+ Lab Series Lab 12: Mitigation and Deterrent Techniques - Anti-Forensic CompTIA Security+ Domain 3 - Threats and Vulnerabilities Objective 3.6: Analyze and differentiate among types of
Center for Infrastructure Assurance and Security
Center for Infrastructure Assurance and Security CIAS Background Founded in 2001 Part of the Institute for Cyber Security at UTSA Focus areas: Infrastructure Assurance Programs Cyber Security Training
Symantec Protection Suite Enterprise Edition for Servers Complete and high performance protection where you need it
Complete and high performance protection where you need it Overview delivers high-performance protection against physical and virtual server downtime with policy based prevention, using multiple protection
The fast track to top skills and top jobs in cyber. Guaranteed.
The fast track to top skills and top jobs in cyber. Guaranteed. FREE TO TRANSITIONING VETERANS FAST TRACK Four steps to a cybersecurity career QUALIFY Earn Acceptance TRAIN Build Elite Skills CERTIFY Earn
CYBER SECURITY TRAINING SAFE AND SECURE
CYBER SECURITY TRAINING KEEPING YOU SAFE AND SECURE Experts in Cyber Security training. Hardly a day goes by without a cyber attack being reported. With this ever-increasing threat there is a growing need
AIR FORCE ASSOCIATION S CYBERPATRIOT NATIONAL YOUTH CYBER EDUCATION PROGRAM UNIT THREE. Computer Basics and Virtual Machines. www.uscyberpatriot.
AIR FORCE ASSOCIATION S CYBERPATRIOT NATIONAL YOUTH CYBER EDUCATION PROGRAM UNIT THREE Computer Basics and Virtual Machines www.uscyberpatriot.org AIR FORCE ASSOCIATION S CYBERPATRIOT NATIONAL YOUTH CYBER
Course Descriptions November 2014
Master of Science In Information Security Management Course Descriptions November 2014 Master of Science in Information Security Management The Master of Science in Information Security Management (MSISM)
FedVTE Training Catalog SUMMER 2015. advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov
FedVTE Training Catalog SUMMER 2015 advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov Access FedVTE online at: fedvte.usalearning.gov If you need any assistance please
Security Event Management. February 7, 2007 (Revision 5)
Security Event Management February 7, 2007 (Revision 5) Table of Contents TABLE OF CONTENTS... 2 INTRODUCTION... 3 CRITICAL EVENT DETECTION... 3 LOG ANALYSIS, REPORTING AND STORAGE... 7 LOWER TOTAL COST
Creating a Windows XP Virtual Machine using Virtual Box
A. Install Virtual Box: Creating a Windows XP Virtual Machine using Virtual Box 1. Download the Virtualbox installer http://www.virtualbox.org/wiki/downloads 2. Run the installer and have the installer
LEARNING COMPUTER SYSTEMS VULNERABILITIES EXPLOITATION THROUGH PENETRATION TEST EXPERIMENTS
1 LEARNING COMPUTER SYSTEMS VULNERABILITIES EXPLOITATION THROUGH PENETRATION TEST EXPERIMENTS Te-Shun Chou and Tijjani Mohammed Department of Technology Systems East Carolina University chout@ecu.edu Abstract
Firewalls and Software Updates
Firewalls and Software Updates License This work by Z. Cliffe Schreuders at Leeds Metropolitan University is licensed under a Creative Commons Attribution-ShareAlike 3.0 Unported License. Contents General
Vulnerability analysis
Vulnerability analysis License This work by Z. Cliffe Schreuders at Leeds Metropolitan University is licensed under a Creative Commons Attribution-ShareAlike 3.0 Unported License. Contents License Contents
IT-ADVENTURES PLAYGROUND (ISERINK) Remote Setup Guide IOWA STATE UNIVERSITY INFORMATION ASSURANCE CENTER
IT-ADVENTURES PLAYGROUND (ISERINK) Remote Setup Guide IOWA STATE UNIVERSITY INFORMATION ASSURANCE CENTER Spring 2014 Gaining access to your systems Since ISERink runs on a simulated internet provided by
Intro to Virtualization
Intro to Virtualization Preprepared by Phil Grimes Coach / Mentor - Security Consultant Small changes & Additions by Dr. Enis Karaarslan, 2014 What is a Virtual Machine? Computer within a computer It's
AIR FORCE ASSOCIATION S CYBERPATRIOT NATIONAL YOUTH CYBER EDUCATION PROGRAM UNIT FIVE. Microsoft Windows Security. www.uscyberpatriot.
AIR FORCE ASSOCIATION S CYBERPATRIOT NATIONAL YOUTH CYBER EDUCATION PROGRAM UNIT FIVE Microsoft Windows Security www.uscyberpatriot.org AIR FORCE ASSOCIATION S CYBERPATRIOT NATIONAL YOUTH CYBER EDUCATION
FedVTE Training Catalog SPRING 2015. advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov
FedVTE Training Catalog SPRING 2015 advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov If you need any assistance please contact the FedVTE Help Desk here or email the
Guide for Designing Cyber Security Exercises
Guide for Designing Cyber Security Exercises VICTOR-VALERIU PATRICIU Computer Science Department Military Technical Academy Bucharest, Bd. George Cosbuc, no. 81-83 ROMANIA victorpatriciu@yahoo.com ADRIAN
INFORMATION SECURITY TRAINING CATALOG (2015)
INFORMATICS AND INFORMATION SECURITY RESEARCH CENTER CYBER SECURITY INSTITUTE INFORMATION SECURITY TRAINING CATALOG (2015) Revision 3.0 2015 TÜBİTAK BİLGEM SGE Siber Güvenlik Enstitüsü P.K. 74, Gebze,
Computer Security Curriculum at the Univ. of Wisconsin Eau Claire. Paul J. Wagner wagnerpj@uwec.edu
Computer Security Curriculum at the Univ. of Wisconsin Eau Claire Paul J. Wagner wagnerpj@uwec.edu Background! Attended week-long workshop at Indiana University of Pennsylvania in 2002 with colleague Andy
Analyzing Security for Retailers An analysis of what retailers can do to improve their network security
Analyzing Security for Retailers An analysis of what retailers can do to improve their network security Clone Systems Business Security Intelligence Properly Secure Every Business Network Executive Summary
A Case for Managed Security
A Case for Managed Security By Christopher Harper Managing Director, Security Superior Managed IT & Security Services 1. INTRODUCTION Most firms believe security breaches happen because of one key malfunction
Cybersecurity Kill Chain. William F. Crowe, CISA, CISM, CRISC, CRMA September 2015 ISACA Jacksonville Chapter Meeting August 13, 2015
Cybersecurity Kill Chain William F. Crowe, CISA, CISM, CRISC, CRMA September 2015 ISACA Jacksonville Chapter Meeting August 13, 2015 Who Am I? Over 20 years experience with 17 years in the financial industry
EC-Council C E. Hacking Technology. v8 Certified Ethical Hacker
EC-Council Hacking Technology C Certified E Ethical Hacker Certified Ethical Hacker v8 Certified Ethical Hacker Course Description CEHv8 is a comprehensive Ethical Hacking and Information Systems Security
Incident Response. Six Best Practices for Managing Cyber Breaches. www.encase.com
Incident Response Six Best Practices for Managing Cyber Breaches www.encase.com What We ll Cover Your Challenges in Incident Response Six Best Practices for Managing a Cyber Breach In Depth: Best Practices
Kerry Kidwell-Slak and Kate Phelps Assistant Directors, Professional Practice UMBC Shriver Center
Kerry Kidwell-Slak and Kate Phelps Assistant Directors, Professional Practice UMBC Shriver Center } Science: Biology, Chemistry, Biochemistry, Environmental, Physics, Psychology, Atmospheric Sciences
The SIEM Evaluator s Guide
Using SIEM for Compliance, Threat Management, & Incident Response Security information and event management (SIEM) tools are designed to collect, store, analyze, and report on log data for threat detection,
User Security Education and System Hardening
User Security Education and System Hardening Topic 1: User Security Education You have probably received some form of information security education, either in your workplace, school, or other settings.
When On-The-Job Training Is a Recipe for Disaster
When On-The-Job Training Is a Recipe for Disaster How security simulation prepares IT staff for APTs, breaches and data leakages Contents Sometimes On-The-Job Training Is a Lousy Idea... 2 On-The-Job Training
NSA/DHS Centers of Academic Excellence for Information Assurance/Cyber Defense
NSA/DHS Centers of Academic Excellence for Information Assurance/Cyber Defense Cyber Investigations Data Management Systems Security Data Security Analysis Digital Forensics Health Care Security Industrial
CHOOSE CONNECTRIA CLOUD AND MANAGED HOSTING
CHOOSE CONNECTRIA CLOUD AND MANAGED HOSTING There are hundreds of managed hosting providers that all claim to offer the best managed hosting. But there are vast differences in terms of their reliability,
Ovation Security Center Data Sheet
Features Scans for vulnerabilities Discovers assets Deploys security patches easily Allows only white-listed applications in workstations to run Provides virus protection for Ovation Windows stations Aggregates,
National Cyber League Certified Ethical Hacker (CEH) TM Syllabus
National Cyber League Certified Ethical Hacker (CEH) TM Syllabus Note to Faculty This NCL Syllabus is intended as a supplement to courses that are based on the EC- Council Certified Ethical Hacker TM (CEHv8)
Air Force Association s CyberPatriot The National High School Cyber Defense Competition. Online Coaches Meetings March 12, 2014
Air Force Association s CyberPatriot The National High School Cyber Defense Competition Online Coaches Meetings March 12, 2014 13:34:41 GCCS Organization TimelineChart Air Force Association AFA CyberPatriot
ISERink Overview. Version 1.1. February 1, 2015
ISERink Overview Version 1.1 February 1, 2015 First developed to support cyber defense competitions (CDCs), ISERink is a virtual laboratory environment that allows students an opportunity to undertake
Network/Internet Forensic and Intrusion Log Analysis
Course Introduction Enterprises all over the globe are compromised remotely by malicious hackers each day. Credit card numbers, proprietary information, account usernames and passwords, and a wealth of
InfoSec Academy Pen Testing & Hacking Track
Fundamental Courses Foundational Courses InfoSec Academy Specialized Courses Advanced Courses Certification Preparation Courses Certified Information Systems Security Professional (CISSP) Texas Security
EC-Council. Certified Ethical Hacker. Program Brochure
EC-Council C Certified E Ethical Hacker Program Brochure Course Description The (CEH) program is the core of the most desired information security training system any information security professional
FORENSIC ANALYSIS Aleš Padrta
FORENSIC ANALYSIS Aleš Padrta CESNET, CESNET-CERTS, FLAB CESNET Czech NREN operator CESNET-CERTS 2004 Established 2008 Accredited CSIRT FLAB Forensic LABoratory Established 6/2011 Support team for CESNET-CERTS
API Cybersecurity Conference Industrial Control Systems Workshop. Sponsored by Alpine Security
API Cybersecurity Conference Industrial Control Systems Workshop Sponsored by Alpine Security www.alpinesecurity.com Intro Incidents ICS Overview Lab Environment ICS Discovery ICS Vulnerability Scanning
Unified Security Management
Unified Security Reduce the Cost of Compliance Introduction In an effort to achieve a consistent and reliable security program, many organizations have adopted the standard as a key compliance strategy
Desktop Virtualization @ U-M. September 28, 2011 Ryan Henyard ITS Desktop Infrastructure
Desktop Virtualization @ U-M September 28, 2011 Ryan Henyard ITS Desktop Infrastructure Overview Introduction to Desktop Virtualization MyDesktop Service How We Got There Use Cases Takeaways Future Plans
Name of the Project: e.g. Organization Development. By Roland Cheung @HKCERT
Name of the Project: e.g. Organization Development By Roland Cheung @HKCERT Agenda Malware Trend Security Risk on Industry Sector Case Study Security Mitigations Malware Trend Reason Fun Profit Direct
Issues in Information Systems Volume 16, Issue I, pp. 219-225, 2015
MOVING TOWARD A SERVER-BASED VIRTUAL MACHINE HOSTING ENVIRONMENT IN SUPPORT OF UNIVERSITY INFORMATION TECHNOLOGY PROGRAMMING COURSES George Stefanek, PhD, Purdue University North Central, stefanek@pnc.edu
Security Intelligence Services. Cybersecurity training. www.kaspersky.com
Kaspersky Security Intelligence Services. Cybersecurity training www.kaspersky.com CYBERSECURITY TRAINING Leverage Kaspersky Lab s cybersecurity knowledge, experience and intelligence through these innovative
Ovation Security Center Data Sheet
Features Scans for vulnerabilities Discovers assets Deploys security patches transparently Allows only white-listed applications to run in workstations Provides virus protection for Ovation Windows workstations
GAINING THE ADVANTAGE. Applying Cyber Kill Chain Methodology to Network Defense
GAINING THE ADVANTAGE Applying Cyber Kill Chain Methodology to Network Defense THE MODERN DAY ATTACKER Cyberattacks aren t new, but the stakes at every level are higher than ever. Adversaries are more
AIR FORCE ASSOCIATION S CYBERPATRIOT NATIONAL YOUTH CYBER EDUCATION PROGRAM UNIT SIX. Microsoft Windows Basics and MSDN. www.uscyberpatriot.
AIR FORCE ASSOCIATION S CYBERPATRIOT NATIONAL YOUTH CYBER EDUCATION PROGRAM UNIT SIX Microsoft Windows Basics and MSDN www.uscyberpatriot.org Learning Objectives Participants will understand what the Microsoft
C HFI C HFI. EC-Council. EC-Council. Computer Hacking Forensic Investigator. Computer. Computer. Hacking Forensic INVESTIGATOR
1 TM C HFI Computer C HFI Computer Hacking Forensic INVESTIGATOR Hacking Forensic INVESTIGATOR TM v8 v8 2 Be the leader. Deserve a place in the CHFI certified elite class. Earn cutting edge skills in computer