Background ( )
|
|
- Arlene Andrews
- 8 years ago
- Views:
Transcription
1 2013 Overview
2 Why Participate? Explore: Discover the world of cybersecurity Encourage: Motivate participants towards cybersecurity careers Educate: Learn or improve cybersecurity skills Enhance: Teamwork, collaboration, and critical thinking Enrich: Compete for meaningful scholarships and/or cash prizes Enjoy: A fun challenge. Contestant Requirements: Basic understanding of Windows/Unix and the Internet + Willingness to Learn, Work as a Team, and Desire to Have Fun. 2
3 Background ( ) 700 competitors and 115 teams over past 2 years 3 divisions (high school, college, professional) Team Sizes of 3-6 members Scholarship prizes from NSA for student finalists ($5000/$3000); more than $160,000 awarded in the past 2 years Internships offered to student winners Cash prizes for professional team winner Competition finals run alongside 2 day conference For 2013, it s open to teams nationwide! 3
4 Things to Remember When Building a Team You can represent your organization or create a team with members from multiple organizations and companies. Individual names will not be publicized nor will your company name. Your team name will likely be publicized particularly if you win Only first and second place winners will be made public Team ratings will be given only to teams and not released publically Pictures will be taken at the event for use to market the event in the future Sign up in July for $50 discount. Names will need to be locked in by Sept 9 th Identify your captain. This will be the main communication point throughout. 4
5 Challenge Timeline Registration Closes (Sept 9) Unscored Practice Rounds Windows (Aug 15) & Linux (Aug 29) Hardening Forensics (Sept 5) Qualification Round #1 (Sept 21) System Hardening for all competitors Qualification Round #2 (Sept 26) System Hardening for High School (different target) Forensics for College & Professionals Baltimore Convention Center Oct 8 (9AM-3PM) for High School Oct 9 (9AM-3PM) for College & Professionals Online 5
6 Challenge Game Types System Hardening (Practice/Qualifications) Analyze Windows & Linux systems for vulnerabilities or potential vulnerabilities and secure systems that are vulnerable. Forensics (College and Professional Practice/Qualifications) Finding and reporting evidence of intrusions, discovery of malware, analysis of payloads, log analysis, network analysis, and tracking of attackers on images either of computer systems or USB drives. The more details reported to the White Team, the more points they earn. Defense/CND (High School Finals) Defending a network being attacked by a live Red Team, while maintaining critical services and securing hosts, detecting and mitigating Red Team activity and other misuse, and communicating findings. Attack/Defend-CTF (College and Professional Finals) Compromise and control targets, maintain control of targets, and secure your own targets against other teams attacks. The longer a team holds a target and maintains its critical services (i.e., Capture and Defend ), the more points they earn. 6
7 Key Skills for Success System Hardening - Windows & Linux System Administration Forensics - Disk image analysis - File carving - Log file analysis - Network traffic (packet capture) analysis Attack/Defend-CTF - Windows & Linux System Administration - Log file analysis - Incident Response & Handling - Intrusion Detection Teamwork, Organization & Good Communication Skills are essential, too! 7
8 CyberMaryland Conference October 8-9, Baltimore Convention Center Runs simultaneously with the Maryland Cyber Challenge Two Days of technical and non-technical conference sessions appealing to a wide range of audiences, industries, and expertise. Exhibitor Fair Employer & Professional Networking Opportunities 8
9 Cyber Operations Key Skills 1. Maintain critical services even during moments of intrusion and misuse 2. Identify vulnerabilities and lock down systems (computers, network and security devices) 3. Recognize and respond to hacker and computer misuse activity (Monitor and Forensics) 4. Collect & Analyze Forensics Data 5. Penetration Testing 6. Communicate effectively Realistically Train as you expect to Operate 9
10 CyberNEXS: The Environment Instruct Classroom Instruction Learning of facts Question and answers Instructor Demonstrations Exercise Live Lab Reinforcement of learning Student Hands-on Trial-and-error with real-time feedback Compete Game Measure individual or team Learn new techniques from others Fun; stimulus to learn more Certify Demonstrate Practical Knowledge Final verification of level of capability Certified under pressure CyberNEXS is part of the SAIC System Administrator Security Training Curriculum CNSS 4013 Certification 10
11 CyberNEXS Experience Competed 7 years DefCon CTF (2 time winner) 100+ Training and Competition Events Mid-High School AFA National High School Cyber Defense Competition: Cyber Patriot I,II,III, & IV NDIA Cyber Challenge San Diego Mayor's Cyber Cup I, II State of Maine HS Cyber Defense Challenge I - II Thomas Jefferson HS tjstars Collegiate Mid-West Regional Cyber Defense Competition Mid-Atlantic Regional Cyber Defense Competition Navy Post-Graduate School National Collegiate Cyber Defense Competition Maryland Cyber Challenge Adult EUCOM, Joint and Coalition Forces University of California Naval Supply CISO Canadian Forces School of Communications FBI Singapore ToorCon 11
12 Qualification Round 1 Characteristics Requirements Contestant s computer requires 2GB RAM 20 GB Disk Space VMware Player (free) Contestant s internet connectivity requires 64Kbps up/down link There are no latency requirements For all Divisions 6 contiguous hours to complete during the round Contestant downloads VM target and hardens it on their own machine Download prior to the round; Decryption key sent 15 minutes prior to the start of the round Following system registration instructions is key Contestant maintains critical services on own machine Agent sends status to CyberNEXS Global Services which returns score to Contestant s Status Page No attacks nor trouble ticket activity performed (no red/white team required) Practice Rounds 1 and 2 will prepare teams 12
13 Qualification Round 2 (High School) Characteristics For High School Division only Same challenge as Qualification Round 1, but with a different target Practice Rounds 1 and 2 will prepare teams Requirements Same as for Qualification Round 1 13
14 Qualification Round 2 (College and Professional) Requirements Same as for Qualification Round 1 Tools for analyzing packet captures Tools for analyzing disk images Characteristics For College and Professional Divisions 6 contiguous hours to complete during the round Forensics Challenge Two of the following: Disk image analysis File carving Log file analysis Network trace (packet capture) analysis Download prior to the round; Decryption key sent 15 minutes prior to the start of the round Scoring will be based forensic analysis provided via the CyberNEXS trouble ticket system Practice Round 3 will prepare teams to use the scoring system, however the practice round will only have one short challenge 14
15 High School Finals Characteristics Teams log into their own CyberNEXS network Contestants harden systems in their network, maintain critical services and fill out trouble tickets, while a Red Team attacks the network Requirements Contestants computers will be supplied Understanding of Remote Desktop (Windows) and ssh (Linux) software is required Experience with previous rounds No electronic media/devices (Paper notes, printouts, books OK) No staged internet sites 15
16 College and Professional Finals Characteristics Teams log into a single CyberNEXS network Contestants identify and compromise targets, then plant flags Contestants harden systems in their network, maintain critical services and protect their systems while other teams try to attack Requirements Contestants computers will be supplied Understanding of Remote Desktop (Windows) and ssh (Linux) software is required Experience with previous rounds No electronic media/devices (Paper notes, printouts, books OK) No staged internet sites 16
17 Points of Contact Competition Coordinator: Dr. Richard Forno (UMBC) Competition Questions & GamePlay: Competition Technical Support: CyberNEXS Program Manager: Tim King MDC3 Event Publicity: Devaney & Associates
Contestant Requirements:
2014 Overview Why Participate? Explore: Discover the world of cybersecurity Encourage: Motivate participants towards cybersecurity careers Educate: Learn and improve cybersecurity skills Enhance: Teamwork,
More informationCyberNEXS Global Services
CyberNEXS Global Services CYBERSECURITY A cyber training, exercising, competition and certification product for maximizing the cyber skills of your workforce The Cyber Network EXercise System CyberNEXS
More informationTHE SAN DIEGO MAYORS CYBER CUP (SDMCC) ORIENTATION 10 NOVEMBER 2015
THE SAN DIEGO MAYORS CYBER CUP (SDMCC) ORIENTATION 10 NOVEMBER 2015 AGENDA Welcome & Introductions Overview/key dates Team Registration Overview of CyberNEXS Key changes Rules & Scoring Registering the
More informationInstruction Guide Mentor/Coach Free Play Practice Event November 2015
Instruction Guide Mentor/Coach Free Play Practice Event November 2015 1 San Diego Mayor s Cup Mentor/Coach Practice Round Guide Table of Contents Introduction 3 Tips for Success 3 Round Times 3 Linux Virtual
More informationThe Open Cyber Challenge Platform *
The Open Cyber Challenge Platform * Jacob Fonseca, Kevin Bryan, Lisa DiPippo, Victor Fay-Wolfe * Supported By The U.S. National Science Foundation grants: Federal Cyber Service Scholarship For Service
More informationCenter for Infrastructure Assurance and Security
Center for Infrastructure Assurance and Security CIAS Background Founded in 2001 Part of the Institute for Cyber Security at UTSA Focus areas: Infrastructure Assurance Programs Cyber Security Training
More informationCybersecurity High School and Beyond
Cybersecurity High School and Beyond High School Career Fair and Expo March 29, 2014 Diane G. Miller, CCP Director, Operations Northrop Grumman Information Security Program Director, CyberPatriot Topics
More information2015 CyberPatriot Conference
Air Force Association Educate - Advocate - Support 2015 CyberPatriot Conference September 12, 2015 1 Agenda 8:00 9:00 Conference Check-in and Refreshments 9:00 10:00 Conference Welcomes (Dick Jeffreys
More informationInstruction Guide Practice Round 2 High School August 2015
Instruction Guide Practice Round 2 High School August 2015 1 Maryland Cyber Challenge Practice Round Instruction Guide Table of Contents Introduction 3 Tips for Success 3 Round Times 3 Linux Virtual Machine
More informationCyber Defense Operations Graduate Certificate
The SANS Technology Institute makes shorter groups of courses available to students who are unable to commit to a full master s degree program. These certificate programs will augment your skills, provide
More informationINTERNATIONAL CYBEREX 2015
INTERNATIONAL CYBEREX 2015 www.oas.org INTERNATIONAL CYBEREX 2015 01. PURPOSE 02. TEAM PROFILE 03. PLANNING 04. CYBEREXERCISE ASSETS 4 5 7 8 4.1. Cyberexercise website 4.2. CTF Execution Platform 4.3.
More informationSecuring Networks, Securing Futures
CP_08_20150414 CyberPatriot is the premier national youth cyber education The National Youth Cyber Education Program program created to inspire high school and middle school students toward careers in
More informationSomeone s sitting in the shade today because someone planted a tree a long time ago. Warren Buffett. Ed Skoudis Mike Qaissaunee.
New Jersey Cyber Aces Academy at Brookdale: A Collaborative Public/Private Model to Secure the Nation A project funded through NSF SFS Grant DUE#1331170 Ed Skoudis Mike Qaissaunee April 30, 2014 Someone
More informationThe Importance of Using Hacker Contests and Mindset in Teaching Networks and Information Assurance
The Importance of Using Hacker Contests and Mindset in Teaching Networks and Information Assurance Thomas A. Babbitt This paper was completed and submitted in partial fulfillment of the Master Teacher
More informationCyber Exercises, Small and Large
First International Conference on Cyber Crisis Cooperation: Cyber Exercises 27 June 2012 Cyber Exercises, Small and Large Commander Mike Bilzor Computer Science Department U.S. Naval Academy Annpolis,
More informationTechnology Fee Proposal
Technology Fee Proposal Title: Virtual Environment for Information Security Education and Exploration Proposer: Joseph N. Wilson, Assistant Professor CISE Department Rm. E301 CSE Bldg. 42 Box 116120 Gainesville,
More informationCYBER DEFENSE COMPETITION: A TALE OF TWO TEAMS *
CYBER DEFENSE COMPETITION: A TALE OF TWO TEAMS * Yan Bei and Robert Kesterson Institute of Technology University of Washington, Tacoma Tacoma, WA 253-692-5863 yanb@u.washington.edu Kyle Gwinnup and Carol
More informationCyber Learning Solutions
Cyber Learning Solutions 2014 Extended Course Catalog Raytheon Cyber Solutions Inc. (RCSI) cyber-training@list.app.ray.com www.raytheon.com 1 Raytheon Cyber Learning Solutions 2014 Catalog CONTENTS The
More informationWasting Money on the Tools? Automating the Most Critical Security Controls. Mason Brown Director, The SANS Institute
Wasting Money on the Tools? Automating the Most Critical Security Controls Bonus: Gaining Support From Top Managers for Security Investments Mason Brown Director, The SANS Institute The Most Trusted Name
More informationSymantec Cyber Readiness Challenge Player s Manual
Symantec Cyber Readiness Challenge Player s Manual Version 1.6 January 20, 2014 Table of Contents Introduction... 3 1 The Cyber Readiness Challenge... 4 1.1 Your Credentials... 4 1.2 Accessing the Competition...
More informationCyber Security Day: Creating a Mock Cyber Competition Event to Increase Student Interest in Cyber Security
Cyber Security Day: Creating a Mock Cyber Competition Event to Increase Student Interest in Cyber Security Thomas R. Imboden timboden@siu.edu Nancy L. Martin nlmartin@siu.edu Belle S. Woodward bellew@siu.edu
More informationHackers are here. Where are you?
1 2 What is EC-Council Certified Security Analyst Licensed Penetration Tester Program You are an ethical hacker. Your last name is Pwned. You dream about enumeration and you can scan networks in your sleep.
More informationCAPTURE-THE-FLAG: LEARNING COMPUTER SECURITY UNDER FIRE
CAPTURE-THE-FLAG: LEARNING COMPUTER SECURITY UNDER FIRE LCDR Chris Eagle, and John L. Clark Naval Postgraduate School Abstract: Key words: In this paper, we describe the Capture-the-Flag (CTF) activity
More informationBuilding the Next Generation of Computer Security Professionals. Chris Simpson
Building the Next Generation of Computer Security Professionals Chris Simpson Overview Why teach computer security to high school students Deciding what to teach What I taught Community Support Lessons
More informationGuide for Designing Cyber Security Exercises
Guide for Designing Cyber Security Exercises VICTOR-VALERIU PATRICIU Computer Science Department Military Technical Academy Bucharest, Bd. George Cosbuc, no. 81-83 ROMANIA victorpatriciu@yahoo.com ADRIAN
More informationOVERVIEW DEGREES & CERTIFICATES
OVERVIEW DEGREES & CERTIFICATES 015 The best. Made better. SANS graduate programs are the ultimate expression of our 25 years dedicated to the education and development of information security professionals.
More informationSmall-Scale Cyber Security Competitions
Small-Scale Cyber Security Competitions Mike O Leary Towson University 16th Colloquium for Information Systems Security Education Orlando, FL June 11-13, 2012 M. O Leary (Towson University) Small-Scale
More informationThe Collegiate Cybersecurity Championship Cup. Gregory B. White, Ph.D. National Initiative for CYBERSECURITY Education (NICE) 19 September 2013
The Collegiate Cybersecurity Championship Cup Gregory B. White, Ph.D. National Initiative for CYBERSECURITY Education (NICE) 19 September 2013 Why Conduct Cyber Security Competitions? Raise the level of
More informationExploring a National Cyber Security Exercise for Community Colleges
Exploring a National Cyber Security Exercise for Community Colleges Casey W. O'Brien Co-PI, CyberWatch Center Community College of Baltimore County Baltimore, Maryland :: CyberWatch :: Current Cyber Exercise
More informationAir Force Association s CyberPatriot The National High School Cyber Defense Competition. Online Coaches Meetings March 12, 2014
Air Force Association s CyberPatriot The National High School Cyber Defense Competition Online Coaches Meetings March 12, 2014 13:34:41 GCCS Organization TimelineChart Air Force Association AFA CyberPatriot
More informationThe Future Is SECURITY THAT MAKES A DIFFERENCE. Overview of the 20 Critical Controls. Dr. Eric Cole
The Future Is SECURITY THAT MAKES A DIFFERENCE Overview of the 20 Critical Controls Dr. Eric Cole Introduction Security is an evolution! Understanding the benefit and know how to implement the 20 critical
More informationNational Cyber League Certified Ethical Hacker (CEH) TM Syllabus
National Cyber League Certified Ethical Hacker (CEH) TM Syllabus Note to Faculty This NCL Syllabus is intended as a supplement to courses that are based on the EC- Council Certified Ethical Hacker TM (CEHv8)
More informationAir Force Association s CyberPatriot The National High School Cyber Defense Competition
Air Force Association s CyberPatriot The National High School Cyber Defense Competition September 2012 1 America: A Cyber Nation U.S. critically dependent on cyber systems for industry, commerce, public
More informationCYBER SECURITY TRAINING SAFE AND SECURE
CYBER SECURITY TRAINING KEEPING YOU SAFE AND SECURE Experts in Cyber Security training. Hardly a day goes by without a cyber attack being reported. With this ever-increasing threat there is a growing need
More informationCAPTURE-THE-FLAG: LEARNING COMPUTER SECURITY UNDER FIRE
CAPTURE-THE-FLAG: LEARNING COMPUTER SECURITY UNDER FIRE LCDR Chris Eagle, and John L. Clark Naval Postgraduate School Abstract: Key words: In this paper, we describe the Capture-the-Flag (CTF) activity
More informationUniversity Road Show 2015
University Road Show 2015 What we will cover Working in Cyber Security The Challenge The Prizes Hints & Tips Q&A Working in Cyber Security Life as a Cyber Security Professional Varied Valued Interesting
More informationThe National Cybersecurity Workforce Framework. 2015 Delaware Cyber Security Workshop September 29, 2015
The National Cybersecurity Workforce Framework 2015 Delaware Cyber Security Workshop September 29, 2015 Bill Newhouse NICE Program Office at the National Institute of Standards and Technology NICE is a
More informationHackers are here. Where are you?
1 2 What is EC-Council Certified Security Analyst Licensed Penetration Tester Program You are an ethical hacker. Your last name is Pwned. You dream about enumeration and you can scan networks in your sleep.
More informationInformation Security Engineering
Master of Science In Information Security Engineering Course Descriptions November 2014 Master of Science in Information Security Engineering The program of study for the Master of Science in Information
More informationUNM Information Assurance Scholarship for Service (SFS) Program
UNM Information Assurance Scholarship for Service (SFS) Program What is Information Assurance? Committee on National Security Systems (CNSS) defines information assurance (IA): Measures that protect and
More informationEC-Council C E. Hacking Technology. v8 Certified Ethical Hacker
EC-Council Hacking Technology C Certified E Ethical Hacker Certified Ethical Hacker v8 Certified Ethical Hacker Course Description CEHv8 is a comprehensive Ethical Hacking and Information Systems Security
More informationEC-Council Certified Security Analyst (ECSA)
EC-Council Certified Security Analyst (ECSA) v8 Eğitim Tipi ve Süresi: 5 Days VILT 5 Day VILT EC-Council Certified Security Analyst (ECSA) v8 Learn penetration testing methodologies while preparing for
More informationExperiences with Honey-Patching in Active Cyber Security Education
ERIK JONSSON SCHOOL OF ENGINEERING AND COMPUTER SCIENCE Cybersecurity Research and Education Institute Experiences with Honey-Patching in Active Cyber Security Education Frederico Araujo Mohammad Shapouri
More informationSecurity Intelligence Services. Cybersecurity training. www.kaspersky.com
Kaspersky Security Intelligence Services. Cybersecurity training www.kaspersky.com CYBERSECURITY TRAINING Leverage Kaspersky Lab s cybersecurity knowledge, experience and intelligence through these innovative
More informationVirtual Learning Tools in Cyber Security Education
Virtual Learning Tools in Cyber Security Education Dr. Sherly Abraham Faculty Program Director IT and Cybersecurity Dr. Lifang Shih Associate Dean School of Business & Technology, Excelsior College Overview
More informationLearning and Playing: Integrating Competition Experiences Into Formal Curriculum. 2014 3CS Palos Hills, IL
Learning and Playing: Integrating Competition Experiences Into Formal Curriculum 2014 3CS Palos Hills, IL Discussion What is the NCL? Partnerships Features Enrichment & Assessment Preparation for Certifications
More informationHow To Get A Computer Hacking Program
CHFI v8(computer Hacking Forensics Investigator) Course Description & Overview Overview CHFIv8 Course Description EC-Council releases the brand new Version 8 of the Computer Hacking Forensics Investigator
More informationCourse Descriptions November 2014
Master of Science In Information Security Management Course Descriptions November 2014 Master of Science in Information Security Management The Master of Science in Information Security Management (MSISM)
More informationAC 2012-4887: WORK-IN-PROGRESS: CREATING AN INTRUSION DE- TECTION EXPERIMENTAL ENVIRONMENT USING CLOUD-BASED VIR- TUALIZATION TECHNOLOGY
AC 2012-4887: WORK-IN-PROGRESS: CREATING AN INTRUSION DE- TECTION EXPERIMENTAL ENVIRONMENT USING CLOUD-BASED VIR- TUALIZATION TECHNOLOGY Mr. John M. Jones, East Carolina University John Jones is currently
More informationNSA/DHS Centers of Academic Excellence for Information Assurance/Cyber Defense
NSA/DHS Centers of Academic Excellence for Information Assurance/Cyber Defense Cyber Investigations Data Management Systems Security Data Security Analysis Digital Forensics Health Care Security Industrial
More informationActive Learning with the CyberCIEGE Video Game
Active Learning with the CyberCIEGE Video Game 2011 Michael F. Thompson and Dr. Cynthia E. Irvine Department of Computer Science Naval Postgraduate School Monterey, CA USA The CyberCIEGE Educational Video
More informationHosted by Lunarline: School of Cyber Security
Hosted by Lunarline: School of Cyber Security Please Fax Government Purchase Orders and SF 182s To (22) 315-33 Cybersecurity is one of the hottest issues for today s Federal and DOD Agencies and commercial
More informationThe GW CyberCorps Program
The GW CyberCorps Program www.seas.gwu.edu/cybercorps Introduction The need for educated personnel in the government s cyber security workforce is critical to the nation s security. As evidenced by remarks
More informationThe fast track to top skills and top jobs in cyber. Guaranteed.
The fast track to top skills and top jobs in cyber. Guaranteed. FREE TO TRANSITIONING VETERANS FAST TRACK Four steps to a cybersecurity career QUALIFY Earn Acceptance TRAIN Build Elite Skills CERTIFY Earn
More informationIDS and Penetration Testing Lab ISA 674
IDS and Penetration Testing Lab ISA 674 Ethics Statement Network Security Student Certification and Agreement I,, hereby certify that I read the following: University Policy Number 1301: Responsible Use
More informationAnthony J. Keane, MSc, PhD and Jason Flood, MSc Information Security & Digital Forensics Research Group Institute of Technology Blanchardstown
Anthony J. Keane, MSc, PhD and Jason Flood, MSc Information Security & Digital Forensics Research Group Institute of Technology Blanchardstown 1 Protected networks are continuously being successfully attacked
More informationHow To Build A Cybersecurity Company
A Service Disabled Veteran Owned Small Business Maryland 2014 The Cybersecurity Industry Window of Opportunity John M. Leitch President & CEO Winquest Engineering Corporation V1.3 1 Agenda Industry Windows
More informationData Access Request Service
Data Access Request Service Guidance Notes on Security Version: 4.0 Date: 01/04/2015 1 Copyright 2014, Health and Social Care Information Centre. Introduction This security guidance is for organisations
More informationCANVAS: a Regional Assessment Exercise for Teaching Security Concepts
CANVAS: a Regional Assessment Exercise for Teaching Security Concepts Michael Collins, Dino Schweitzer, United States Air Force Academy, and Dan Massey, Colorado State University Abstract Competitive exercises
More informationCyberPatriot Program Update April 2015
AIR FORCE ASSOCIATION S CYBERPATRIOT NATIONAL YOUTH CYBER EDUCATION PROGRAM CyberPatriot Program Update April 2015 www.uscyberpatriot.org Cyber Is Everywhere Finance Manufacturing Logistics Transportation
More informationProtecting against cyber threats and security breaches
Protecting against cyber threats and security breaches IBM APT Survival Kit Alberto Benavente Martínez abenaventem@es.ibm.com IBM Security Services Jun 11, 2015 (Madrid, Spain) 12015 IBM Corporation So
More informationFedVTE Training Catalog SUMMER 2015. advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov
FedVTE Training Catalog SUMMER 2015 advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov Access FedVTE online at: fedvte.usalearning.gov If you need any assistance please
More informationCertification Programs
Certification Programs 2014 The SBS Institute serves community banks by providing educational programs that will certify a banker has the knowledge and skills to protect against todays information security
More informationDefending Against Data Beaches: Internal Controls for Cybersecurity
Defending Against Data Beaches: Internal Controls for Cybersecurity Presented by: Michael Walter, Managing Director and Chris Manning, Associate Director Protiviti Atlanta Office Agenda Defining Cybersecurity
More informationWyoming Community College Commission Request for New, Pilot or Revised Degree or Certificate Program
Community Commission Request for New, Pilot or Revised Degree or Certificate Program A. : Laramie County Community B. Date submitted to WCCC: C. Program 1. Request for: X New Program Pilot Program Revised
More informationTrain Like You Will Fight
Train Like You Will Fight Reliability First Workshop 1 October 2015 Dr. Joe Adams Disclaimer 2 The content of this presentation is based on personal and professional experience of the speaker. The content
More informationLocked Shields 2013. Kaur Kasak 24 Sept 2013
Locked Shields 2013 Kaur Kasak 24 Sept 2013 Disclaimer: This briefing is a product of the CCD COE. It does not represent the opinions or policies of NATO and is designed to provide an independent position.
More informationCyber Defense Exercise: A Service Provider Model
Cyber Defense Exercise: A Service Provider Model Jeffrey A. Mattson Software Engineering Institute, Carnegie Mellon University, 4500 5th Avenue, Pittsburgh, PA 15218 jmattson@cert.org Abstract. Cyber Defense
More informationDesigning a Network Defense Scenario Using the Open Cyber Challenge Platform
University of Rhode Island DigitalCommons@URI Open Access Master's Theses 2013 Designing a Network Defense Scenario Using the Open Cyber Challenge Platform Richard H. Wagner University of Rhode Island,
More informationEC-Council. Certified Ethical Hacker. Program Brochure
EC-Council C Certified E Ethical Hacker Program Brochure Course Description The (CEH) program is the core of the most desired information security training system any information security professional
More informationWyoming Community College Commission Request for New, Pilot or Revised Degree or Certificate Program
Wyoming Community College Commission Request for New, Pilot or Revised Degree or Certificate Program A. College: Laramie County Community College B. Date submitted to WCCC: C. Program 1. Request for: X
More information2014 Entry Form (Complete one for each entry.) Fill out the entry name exactly as you want it listed in the program.
2014 Entry Form (Complete one for each entry.) Fill out the entry name exactly as you want it listed in the program. Entry Name HFA Submission Contact Phone Email Qualified Entries must be received by
More informationSECURE POWER SYSTEMS PROFESSIONALS (SPSP) PROJECT PHASE 3, FINAL REPORT: RECRUITING, SELECTING, AND DEVELOPING SECURE POWER SYSTEMS PROFESSIONALS
1 SECURE POWER SYSTEMS PROFESSIONALS (SPSP) PROJECT PHASE 3, FINAL REPORT: RECRUITING, SELECTING, AND DEVELOPING SECURE POWER SYSTEMS PROFESSIONALS Synopsis SPSP Project Overview Phase I Summary Phase
More informationSCADA Security Training
SCADA Security Training 1-Day Course Outline Wellington, NZ 6 th November 2015 > Version 3.1 web: www.axenic.co.nz phone: +64 21 689998 page 1 of 6 Introduction Corporate Background Axenic Ltd Since 2009,
More informationSPSP Phase III Recruiting, Selecting, and Developing Secure Power Systems Professionals: Job Profiles
PNNL-24138 SPSP Phase III Recruiting, Selecting, and Developing Secure Power Systems Professionals: Job Profiles March 2015 LR O Neil TJ Conway DH Tobey FL Greitzer AC Dalton PK Pusey Prepared for the
More informationIntroduction to Cyber Defense Competition. Module 16
Introduction to Cyber Defense Competition Module 16 Objectives of the CDC Establish a safe and functional environment that: Encourages students to discover the applied meaning of information/cyber security
More informationNETWORK SECURITY (W/LAB) Course Syllabus
6111 E. Skelly Drive P. O. Box 477200 Tulsa, OK 74147-7200 NETWORK SECURITY (W/LAB) Course Syllabus Course Number: NTWK-0008 OHLAP Credit: Yes OCAS Code: 8131 Course Length: 130 Hours Career Cluster: Information
More informationCybernetic Proving Ground
Cybernetic Proving Ground Penetration Testing Scenario Jakub Čegan, Martin Vizváry, Michal Procházka cegan@ics.muni.cz Institute of Computer Science, Masaryk University About The Scenario "In this game
More informationImpact of Cybersecurity Education in High Schools and Small Businesses in Hawaii. Challenges and Opportunities NICE Conference 2015
Impact of Cybersecurity Education in High Schools and Small Businesses in Hawaii Challenges and Opportunities NICE Conference 2015 Debasis Bhattacharya University of Hawaii Maui College debasisb@hawaii.edu
More informationNess Cyber Security Services
Ness Cyber Security Services. This document discloses subject matter in which Ness A.T. Ltd. has proprietary rights. Neither the furnishing, receipt nor possession thereof confers or transfers any right
More informationCyber Security. BDS PhantomWorks. Boeing Energy. Copyright 2011 Boeing. All rights reserved.
Cyber Security Automation of energy systems provides attack surfaces that previously did not exist Cyber attacks have matured from teenage hackers to organized crime to nation states Centralized control
More informationComputer Security Curriculum at the Univ. of Wisconsin Eau Claire. Paul J. Wagner wagnerpj@uwec.edu
Computer Security Curriculum at the Univ. of Wisconsin Eau Claire Paul J. Wagner wagnerpj@uwec.edu Background! Attended week-long workshop at Indiana University of Pennsylvania in 2002 with colleague Andy
More informationA New Era. A New Edge. Phishing within your company
Phishing within your company Learning Objectives What is phishing and how to minimize its impact Obtain a basic understanding of how to use virtual machines Use BackTrack, a tool used by many security
More informationCollective Views of the NSA/CSS Cyber Defense Exercise on Curricula and Learning Objectives
Collective Views of the NSA/CSS Cyber Defense Exercise on Curricula and Learning Objectives William J. Adams Efstratios L. Gavas Tim Lacey Sylvain P. Leblanc United States Military Academy United States
More informationStrategic Plan On-Demand Services April 2, 2015
Strategic Plan On-Demand Services April 2, 2015 1 GDCS eliminates the fears and delays that accompany trying to run an organization in an unsecured environment, and ensures that our customers focus on
More informationNGA Paper. Act and Adjust: A Call to Action for Governors. for cybersecurity;
NGA Paper Act and Adjust: A Call to Action for Governors for Cybersecurity challenges facing the nation. Although implementing policies and practices that will make state systems and data more secure will
More informationInfoSec Academy Forensics Track
Fundamental Courses Foundational Courses InfoSec Academy Specialized Courses Advanced Courses Certification Preparation Courses Certified Information Systems Security Professional (CISSP) Texas Security
More informationCybersecurity Certificate Programs
Cybersecurity Certificate Programs Maryland Workforce Outlook Forum May 26th, 2016 Homer Minnick, Director, Cybersecurity Academy, UMBC Training Centers umbctraining.com 443-692-6600 About UMBC Training
More informationGREAT PLAINS TECHNOLOGY CENTER COURSE OF STUDY. Adult Students: 1050 Hours
GREAT PLAINS TECHNOLOGY CENTER COURSE OF STUDY Career Cluster: Career Pathway: Career Major: Career Major Hours: Information Technology (IT) Network Systems (IT001) Cyber Security Forensics Specialist
More informationNERC CIP Ports & Services. Part 2: Complying With NERC CIP Documentation Requirements
NERC CIP Ports & Services Part 2: Complying With NERC CIP Documentation Requirements White Paper FoxGuard Solutions, Inc. November 2014 Defining Ports And Services In part 2 of our Ports and Services white
More informationInformation Assurance Curricula and Certifications
Information Assurance Curricula and Certifications Abstract Victor Piotrowski Department of Mathematics and Computer Science University of Wisconsin-Superior vpiotrow@uwsuper.edu Although there have been
More informationFedVTE Training Catalog SPRING 2015. advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov
FedVTE Training Catalog SPRING 2015 advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov If you need any assistance please contact the FedVTE Help Desk here or email the
More informationCombating a new generation of cybercriminal with in-depth security monitoring. 1 st Advanced Data Analysis Security Operation Center
Combating a new generation of cybercriminal with in-depth security monitoring 1 st Advanced Data Analysis Security Operation Center The Challenge Don t leave your systems unmonitored. It takes an average
More informationA Case for Managed Security
A Case for Managed Security By Christopher Harper Managing Director, Security Superior Managed IT & Security Services 1. INTRODUCTION Most firms believe security breaches happen because of one key malfunction
More informationInfoSec Academy Pen Testing & Hacking Track
Fundamental Courses Foundational Courses InfoSec Academy Specialized Courses Advanced Courses Certification Preparation Courses Certified Information Systems Security Professional (CISSP) Texas Security
More informationAnalyzing Security for Retailers An analysis of what retailers can do to improve their network security
Analyzing Security for Retailers An analysis of what retailers can do to improve their network security Clone Systems Business Security Intelligence Properly Secure Every Business Network Executive Summary
More informationIDS and Penetration Testing Lab ISA656 (Attacker)
IDS and Penetration Testing Lab ISA656 (Attacker) Ethics Statement Network Security Student Certification and Agreement I,, hereby certify that I read the following: University Policy Number 1301: Responsible
More informationInformation Systems Security Certificate Program
Information Technologies Programs Information Systems Security Certificate Program Accelerate Your Career extension.uci.edu/infosec University of California, Irvine Extension s professional certificate
More informationMinnesota State Community and Technical College Detroit Lakes Campus
Computer Network Security Minnesota State Community and Technical College Detroit Lakes Campus Overview Philosophy Note on 2 year Colleges Certifications Program Courses CCDC Program Numbers Faculty Future
More information