2015 CyberPatriot Conference
|
|
|
- Merry Murphy
- 10 years ago
- Views:
Transcription
1 Air Force Association Educate - Advocate - Support 2015 CyberPatriot Conference September 12,
2 Agenda 8:00 9:00 Conference Check-in and Refreshments 9:00 10:00 Conference Welcomes (Dick Jeffreys & Deb Pint) Conference Objectives (Dick Jeffreys) Key Note Presentation (Chris Simpson) National Cyber Youth Education Program (Larry Torres) CyberPatriot in San Diego Student Experience Presentation (Ian Rodney) 10:00 11:45 11:45 12:00 12:00 LAUSD Beyond the Bell Presentation & Demonstration Wrap-up: What Can We Do For You? Conference Ends 2
3 Air Force Association Professional Aerospace Organization 501(c)(3) Non-Profit Open to Anyone Membership: National 95,000 & Chapter Missions: Educate Advocate Support Educational Focus: STEM (Science, Technology, Engineering, & Math) National Youth Cyber Education Program 3
4 Conference Objectives Get the word out. Introduce the CyberPatriot National Youth Cyber Education Program & National Youth Cyber Defense Competition. Present How does the competition work? through personal experiences. Answer competition questions & determine how we can help. 4
5 Air Force Association Educate - Advocate - Support National Youth Cyber Education Program Larry Torres Vice President, Programs September 12,
6 CyberPatriot Is The national youth cyber education program. The national youth cyber defense competition. Carefully structured to excite, educate, and motivate participants. Designed to instill in all participants the importance to our nation of cyber, cyber security, and good computer security practices. Designed to motivate all participants to consider STEM academic disciplines to meet our nation s needs. Designed to motivate many participants to become the next generation of cyber defenders and our nation s digital workforce. 6
7 CyberPatriot Is NOT Hacker training. Cyber ethics discussions are an important (and early) component in our curriculum. We don t teach hacking tools or techniques. Hacking in competition is strictly forbidden. A recruiting tool for the Air Force, the Department of Defense, or the Federal government. This is about building a strong national foundation for cyber skills throughout our high & middle schools. 7
8 Original Construct National High School Cyber Defense Competition 8
9 New Construct The National Youth Cyber Education Program National Youth Cyber Defense Competition AFA CyberCamp Program Elementary School Cyber Education Program 9
10 National Youth Cyber Defense Competition Puts teams of high & middle school students in the position of newly hired IT professionals tasked to manage the network of a small company. Teams are given a set of virtual images that represent an OS & are tasked with finding cybersecurity vulnerabilities within the images & hardening the system while maintaining critical services. Teams compete for top placement within their state & region. Top teams in the nation earn all-expense paid trips to Washington, DC for the National Finals Competition where they can earn national recognition & scholarship money (1st place - $2,000/competitor, 2d place - $1,500/competitor, 3d place - $1,000/competitor). Competitions take place on specified weekends throughout the school year. Teams must complete all their work during one (1) six consecutive-hour period on the Friday, Saturday, or Sunday of the competition windows. Cost: Open Division team is $195. Middle School Division team is $155. All Service Division teams and Civil Air Patrol teams are exempt. 10
11 Skills Participants Learn Leadership & teamwork Creative and analytical problem solving Non-technical cyber principles (e.g., social engineering, phishing, vishing, spear-phishing, etc.) Netiquette Cyber safety Cyber hygiene Computing & networking principles Operating systems Network topologies & cabling Foundational cyber security principles Cyber and system vulnerabilities Network security Vulnerability remediation Technical threats 11
12 Two High School Competition Divisions Open Division Open to any high school or middle school Public, private, parochial, magnet, home school 4H, Boys and Girls Clubs, Scouting units, other youth organizations Highly valued CyberPatriot competition attributes: Technical/STEM education Career preparation/development Teamwork All Service Division Open to any JROTC unit Air Force, Army, Navy, & Marine Corps Open to Civil Air Patrol squadrons and Naval Sea Cadet Corps units Highly valued CyberPatriot competition attributes: Teamwork Goal achievement Leadership 12
13 Middle School Division (CP-VI): Middle school pilot program highly successful (CP-VII): Full integration of middle school teams into competition. Competing in separate Middle School Division. Competition system modified to provide slightly less daunting network images (problem sets). Broad positive response from middle school educators. 13
14 Team Organization Coach(es) Teachers, JROTC instructors, staff members, etc. approved by a participating school or organization to act as the administrative lead of the team. Coaches are responsible for the following: Competitors Ensuring competitor safety. Protecting the competition's integrity & upholding rules, time limits, & download limits. Acting as the main point of contact for the team. Each team must consist of between 2 and 6 competitors enrolled in the participating school or organization; a maximum of five students are permitted to compete at any one time. Technical Mentor(s) Volunteer industry professionals, students, academics, & IT -experienced adults. Required to register on the CyberPatriot website & pass a background check. Can mentor multiple teams. Team Assistant(s) Provide non-technical support & encouragement. Required to register on the CyberPatriot website and pass a background check. 14
15 Train Train for the competition. Download updated training materials. Mentors provide advanced training. Prepare How it Works Before the Round Ensure all required hardware, software, & network capabilities are in place. Technical requirements are kept to a minimum. Download Review round instructions & links to download the virtual machine images (sent by the Program Office a week prior to comp). Download and ensure successful download of competition images before the round begins Usually two or three images per round. 15
16 How it Works During the Round (1/2) Extract Teams receive password to extract virtual machine images Friday morning of competition weekend. Load images in VMware Player & begin competing. Identify Fix Once images are opened, teams are prompted to enter a Team ID (ten-digit alphanumeric code). Find and fix vulnerabilities in their images. Some rounds include networking challenges (e.g., quizzes & Cisco Packet Tracer activities). 16
17 Score How it Works During the Round (2/2) Fix a vulnerability that is being checked = receive points. Take an action that makes a system less secure = lose points. Teams can also gain points by answering forensics questions about actions they took to solve their vulnerabilities. Teams can check their progress throughout competition. Compare Ask Live scoreboard is available for teams to see how they stack up against others in the country. Scores are unofficial & undergo review by CyberPatriot staff following the competition. Staff is available to answer technical support questions during the round by chat & by phone. Teams may not ask questions about vulnerabilities. 17
18 How it Works After the Round Delete All virtual machine images should be deleted after the round is over to maintain the integrity of the competition. Wait Staff reviews all the scores following the competition & releases official scores & standings to teams within a week after the round is over. 18
19 CP-VIII Competition Timeline 19
20 CP-VIII Competition Timeline Key Dates & Advancement (1/2) Open Division All Service Division 20
21 CP-VIII Competition Timeline Key Dates & Advancement (2/2) 21
22 Elementary School Cyber Education Initiative (ESCEI) Purpose: Educate on ubiquity of cyber systems. Teach cyber safety basics. Introduce concept cyber security. ~ 45 minute thing. Not a competition. Not purely a game. On-track for nationwide fielding On-line and hard copy distribution. Full instructions for AFA Chapters, educators, & parents. 22
23 ESCEI Program Details Interactive learning modules & associated curriculum are intended for instruction with all elementary school-level students. Interactive learning modules: Security Showdown is intended for K-3 graders. Introduction to basic personal security practices. Key Topics: Personal information. Students have the option to complete this module in English or Spanish. Clean_Up and DangerBots are intended for 4th-6th graders. Clean_Up is the cyber defense module. Clean_Up Key Topics: Phishing, Malware, Firewalls. DangerBots is another cyber defense module. DangerBots Key Topics: Malware, Defenses, Passwords. Modules may be used in the classroom, other group activities, or as an independent activity. Cost: FREE! Order online at 23
24 What Comes in an ESCEI Kit? Both digital and a hard-copy versions are available. Digital version is available instantly after completing the request form and includes the following materials: Three interactive learning modules. Curriculum slides to supplement the modules. Instructor's Guide containing installation instructions, module information, and instructor's notes for the curriculum. Cover letters that describe the ESCEI to parents, guardians, and educators. Brochure, social media guide, and press release template that can be used to promote the ESCEI. Template certificates to award students upon completion of the modules. The hard-copy version of the kit includes the following: All of the above on a DVD. Printed copies of the Instructor's Guide, ESCEI brochure, and stickers to be awarded to students. Everyone who orders the hard-copy also receives the digital kit immediately after completing the request form. 24
25 CyberCamp Program Conceived to supplement CyberPatriot's annual National Youth Cyber Defense Competition & allow educational institutions to engage students in cybersecurity education throughout the year. The AFA CyberCamp Program includes two distinct kit offerings. CyberCamp Kit is designed to be executed over five days. Includes instruction modules, access to accompanying demonstration software, and access to novice Windows 7 & novice Ubuntu competition images on approved camp's scheduled competition day. CyberCamp Competition Kit is designed to supplement locally developed curriculum or support one-off competition events. Cost: $1050. Consists only of access to one or more competition images on an approved competition date. Order online at 25
26 CyberCamp Kit Curriculum kit consists of five four-hour instruction modules, accompanying instructor's guides, student workbooks, demonstration software, & competition software that will teach students important skills in cyber safety & cybersecurity. 20-hour curriculum is designed to be completed over five days, with the fifth day serving as a day of mock competition. CyberCamp Kit curriculum is organized as follows: Module 1: Introduction to the CyberPatriot National Youth Cyber Defense Competition, cybersecurity career opportunities, cyber ethics, online safety, how computers work, & cyber threats. Module 2: Cybersecurity principles, virtual machines, basic Windows security policies & tools, & account management. Module 3: Windows file protections, auditing and monitoring, introduction to Server 2008 & introduction to Linux. Module 4: Ubuntu terminology & concepts, basic graphical user interface security, basic command line security, & intermediate Ubuntu security. Module 5: Mock CyberPatriot competition. 26
27 CyberCamp Competition Kit Competition Kit is designed to complement locally developed curriculum or training regimens for the CyberPatriot National Youth Cyber Defense Competition. CyberCamp Competition Kit consists of the following: Mandatory thirty-minute cyber ethics module. Instructor's guide. Access to one or more CyberPatriot competition images on the requesting organization's scheduled competition day: novice Windows 7, novice Ubuntu, intermediate Windows 7. 27
28 Air Force Association Educate - Advocate - Support CyberPatriot in San Diego Dick Jeffreys Chapter President September 12,
29 The San Diego Experience Participation Competition National Local CyP I (2009) 8 N/A CyP II ( ) 200 N/A CyP III ( ) CyP IV ( ) 1, CyP V ( ) 1, CyP VI ( ) 1, CyP VII ( ) 2, CyP VIII ( )?
30 The San Diego Experience Successes Competition CyP III CyP V CyP VI CyP VII School/Organization Westview H. S. (2 nd Place, Open) Ramona H. S. NJROTC (Finalist, All Service) Naval Sea Cadet Corps (NSCC), Fort Fisher Division (Finalist, All Service) Patrick Henry H. S. NJROTC (3 rd Place, All Service)* NSCC Fort Fisher Division (Finalist, AS) NSCC Fort Fisher Division (3 rd Place, AS)* * Won 1 of 2 Cisco Networking Awards 30
31 CP-VIII San Diego County Registered Teams 31 Teams 31
32 Wrap-Up What can we do for you? Survey Points of contact: Dick Jeffreys at Larry Torres at Websites:
33 Discussion 33
CyberPatriot Program Update April 2015
AIR FORCE ASSOCIATION S CYBERPATRIOT NATIONAL YOUTH CYBER EDUCATION PROGRAM CyberPatriot Program Update April 2015 www.uscyberpatriot.org Cyber Is Everywhere Finance Manufacturing Logistics Transportation
Air Force Association s CyberPatriot The National High School Cyber Defense Competition
Air Force Association s CyberPatriot The National High School Cyber Defense Competition September 2012 1 America: A Cyber Nation U.S. critically dependent on cyber systems for industry, commerce, public
Securing Networks, Securing Futures
CP_08_20150414 CyberPatriot is the premier national youth cyber education The National Youth Cyber Education Program program created to inspire high school and middle school students toward careers in
Air Force Association s CyberPatriot The National High School Cyber Defense Competition. Online Coaches and Mentors Meetings August 18, 2014
Air Force Association s CyberPatriot The National High School Cyber Defense Competition Online Coaches and Mentors Meetings August 18, 2014 - Meeting Timeline Highlights Coach and Mentor of the Year Rules
Cybersecurity High School and Beyond
Cybersecurity High School and Beyond High School Career Fair and Expo March 29, 2014 Diane G. Miller, CCP Director, Operations Northrop Grumman Information Security Program Director, CyberPatriot Topics
Impact of Cybersecurity Education in High Schools and Small Businesses in Hawaii. Challenges and Opportunities NICE Conference 2015
Impact of Cybersecurity Education in High Schools and Small Businesses in Hawaii Challenges and Opportunities NICE Conference 2015 Debasis Bhattacharya University of Hawaii Maui College [email protected]
Innovation, Partnership, Development
Innovation, Partnership, Development ECEHDA Annual Conference March 13, 2015 Chris Valentino Director of Strategy The Need Access to top talent to address our nations most challenging problems Diverse
Air Force Association s CyberPatriot The National High School Cyber Defense Competition. Online Coaches Meetings March 12, 2014
Air Force Association s CyberPatriot The National High School Cyber Defense Competition Online Coaches Meetings March 12, 2014 13:34:41 GCCS Organization TimelineChart Air Force Association AFA CyberPatriot
Contestant Requirements:
2014 Overview Why Participate? Explore: Discover the world of cybersecurity Encourage: Motivate participants towards cybersecurity careers Educate: Learn and improve cybersecurity skills Enhance: Teamwork,
THE SAN DIEGO MAYORS CYBER CUP (SDMCC) ORIENTATION 10 NOVEMBER 2015
THE SAN DIEGO MAYORS CYBER CUP (SDMCC) ORIENTATION 10 NOVEMBER 2015 AGENDA Welcome & Introductions Overview/key dates Team Registration Overview of CyberNEXS Key changes Rules & Scoring Registering the
Someone s sitting in the shade today because someone planted a tree a long time ago. Warren Buffett. Ed Skoudis Mike Qaissaunee.
New Jersey Cyber Aces Academy at Brookdale: A Collaborative Public/Private Model to Secure the Nation A project funded through NSF SFS Grant DUE#1331170 Ed Skoudis Mike Qaissaunee April 30, 2014 Someone
An Accelerated Pathway to Careers in Cybersecurity for Transitioning Veterans. NICE Annual Conference November 2015
An Accelerated Pathway to Careers in Cybersecurity for Transitioning Veterans NICE Annual Conference November 2015 Panelists David Brown, Director of CyberTalent at the SANS Institute, a new business unit
COURSE PACKET. for. Exploring Certification. and Learning for Life Curriculum-Based Certification
COURSE PACKET for Exploring Certification and Learning for Life Curriculum-Based Certification Learning for Life 1329 West Walnut Hill Lane P.O. BOX 152225 Irving, TX 75038 P: 972 580 2433 E: [email protected]
Areas URI Cyber Research Funding:
Areas URI Cyber Research Funding: Law enforcement tools and technologies including steganography detection, digital evidence search string support, cell phone security, cloud forensics Trust Sensor Interface
CyberNEXS Global Services
CyberNEXS Global Services CYBERSECURITY A cyber training, exercising, competition and certification product for maximizing the cyber skills of your workforce The Cyber Network EXercise System CyberNEXS
Microsoft DreamSpark (MSDN) User Guide
AIR FORCE ASSOCIATION S CYBERPATRIOT NATIONAL YOUTH CYBER EDUCATION PROGRAM Microsoft DreamSpark (MSDN) User Guide www.uscyberpatriot.org AIR FORCE ASSOCIATION S CYBERPATRIOT NATIONAL YOUTH CYBER EDUCATION
EC-Council. Certified Ethical Hacker. Program Brochure
EC-Council C Certified E Ethical Hacker Program Brochure Course Description The (CEH) program is the core of the most desired information security training system any information security professional
NATIONAL INITIATIVE FOR CYBERSECURITY EDUCATION SAN DIEGO, CA
NATIONAL INITIATIVE FOR CYBERSECURITY EDUCATION SAN DIEGO, CA Dr. Aurelia T. Williams, NSU Ms. Kamilah Brown, CCSD Mr. Ronald Williams, DTC Mr. Tony Baylis, LLNL November 3, 2015 Who Are We? A collaborative
Building the Next Generation of Computer Security Professionals. Chris Simpson
Building the Next Generation of Computer Security Professionals Chris Simpson Overview Why teach computer security to high school students Deciding what to teach What I taught Community Support Lessons
Northrop Grumman. Foundation. Annual Report
2014 Northrop Grumman Foundation Annual Report A Message From the President On behalf of the Northrop Grumman Foundation and its Board of Directors, it is my pleasure to present our 2014 annual report.
CTY Programs: What s New for 2016
Welcome to the Webinar: CTY Programs: What s New for 2016 Before we get started Welcome and introductions Today s session will last 20 30 minutes Feel free to ask questions at any time by speaking into
About Carnegie Cadets: The MySecure Cyberspace Game
Introduction About Carnegie Cadets: The MySecureCyberspace Game Carnegie Cadets: The MySecureCyberspace Game is an interactive Flash game designed for fourth and fifth graders that teaches Internet safety
Cyber Exercises, Small and Large
First International Conference on Cyber Crisis Cooperation: Cyber Exercises 27 June 2012 Cyber Exercises, Small and Large Commander Mike Bilzor Computer Science Department U.S. Naval Academy Annpolis,
Wyoming Community College Commission Request for New, Pilot or Revised Degree or Certificate Program
Community Commission Request for New, Pilot or Revised Degree or Certificate Program A. : Laramie County Community B. Date submitted to WCCC: C. Program 1. Request for: X New Program Pilot Program Revised
How To Write A National Cybersecurity Act
ROCKEFELLER SNOWE CYBERSECURITY ACT SUBSTITUTE AMENDMENT FOR S.773 March 17, 2010 BACKGROUND & WHY THIS LEGISLATION IS IMPORTANT: Our nation is at risk. The networks that American families and businesses
Cybersecurity Real World Connections Summer Boot Camp at NJIT
Cybersecurity Real World Connections Summer Boot Camp at NJIT Connecting Learning to Life Summer 2016 The Program In Summer 2016, NJIT s Computer Science department/ RWC Program will offer its first Cybersecurity
167 th Air Wing Fast Track Cyber Security Blue Ridge Community and Technical College
167 th Air Wing Fast Track Cyber Security Blue Ridge Community and Technical College Information Security Certificate: Designed to introduce students to programming, security basics, network monitoring,
Cybersecurity AAS Program
Cybersecurity AAS Program New Program Proposal State Submission Steve Buchholz, Dean of Accreditation and Advancement July 2015 TABLE OF CONTENTS Executive Summary... 2 Identification and Description of
1. Could you describe your department in terms of the undergraduate and graduate programs offered?
1. Could you describe your department in terms of the undergraduate and graduate programs offered? The Information Systems and Business Analytics Department offers degree programs at the undergraduate
167 th Air Wing Fast Track Cyber Program Blue Ridge Community and Technical College
167 th Air Wing Fast Track Cyber Program Blue Ridge Community and Technical College Information Security Certificate: Designed to introduce students to programming, security basics, network monitoring,
MILITARY SCIENCE (MSC)
MILITARY SCIENCE (MSC) Requirements for the Military Science Minor A Minor in Military Science is offered through Marion Military Institute and consists of the following 20 hours: A. MSC 101 Military Science
PALMETTO Cyber Security Summer Camp 2015
PALMETTO Cyber Security Summer Camp 2015 Student Registration Form Full Name of Student: Parent/Guardian Name: Parent/Guardian Email: Parent/Guardian Phone Number: County: Tee-Shirt Size: S M L XL XXL
Introduction to Cybersecurity Overview. October 2014
Introduction to Cybersecurity Overview October 2014 Introduces the importance of cybersecurity and current trends Eight modules with presentations and panel discussions that feature industry experts Activities,
Wando High School Career and Technology Education Advanced Cyber Security. Planning Period: 4th block
Wando High School Career and Technology Education Advanced Cyber Security Teacher: Mr. Hundley School Phone #: 856 5800 ext 27385 Room/Office: L 310 Planning Period: 4th block Office Hours: T, TH, F 7:30
ITS425: Ethical Hacking and Penetration Testing
ITS425: Ethical Hacking and Penetration Testing Credit Hours: 3 Contact Hours: This is a 3-credit course, offered in accelerated format. This means that 16 weeks of material is covered in 8 weeks. The
AIR FORCE ASSOCIATION S CYBERPATRIOT. CyberPatriot Survey Results
AIR FORCE ASSOCIATION S CYBERPATRIOT NATIONAL YOUTH CYBER EDUCATION PROGRAM CyberPatriot Survey Results - CyberPatriot VI Post-Season Competitor Survey - CyberPatriot Student Alumni Survey www.uscyberpatriot.org
Organization: CPEP Connecticut Pre-Engineering Program. Program Contact: Mr. Noah Ratzan Senior Programs Manager
Organization: CPEP Connecticut Pre-Engineering Program Program Contact: Mr. Noah Ratzan Senior Programs Manager Internship title or position: Summer Program Assistant Manager Job description and goals
Cyber Defense Operations Graduate Certificate
The SANS Technology Institute makes shorter groups of courses available to students who are unable to commit to a full master s degree program. These certificate programs will augment your skills, provide
Adopt-A-School. Employer Guide
Adopt-A-School Toolkit Employer Guide Index Why Adopt-A-School Readiness Assessment Mission, Vision, Goals, Metrics Change Management Communication Safety first Department of labor Great Ideas to Implement
STATEMENT OF OBJECTIVES
STATEMENT OF OBJECTIVES The principal objectives of the Los Angeles Council of Black Professional Engineers (LACBPE) shall be to endeavor to enhance the educational and employment opportunities of minority
NAVSEA Leadership Development Continuum
NAVSEA Leadership Development Continuum The Continuum allows employees to focus on leadership development through various stages of their careers, in preparation for future opportunities with the organization.
SPSP Phase III Recruiting, Selecting, and Developing Secure Power Systems Professionals: Job Profiles
PNNL-24138 SPSP Phase III Recruiting, Selecting, and Developing Secure Power Systems Professionals: Job Profiles March 2015 LR O Neil TJ Conway DH Tobey FL Greitzer AC Dalton PK Pusey Prepared for the
Technology Fee Proposal
Technology Fee Proposal Title: Virtual Environment for Information Security Education and Exploration Proposer: Joseph N. Wilson, Assistant Professor CISE Department Rm. E301 CSE Bldg. 42 Box 116120 Gainesville,
Cyber Security Education: My Personal Thoughts. Bharat Doshi [email protected]
Cyber Security Education: My Personal Thoughts Bharat Doshi [email protected] Topics Personal Background Other situations: Similarities and Differences Cyber Vulnerabilities Student Types and Education/Training
National Cyber League Certified Ethical Hacker (CEH) TM Syllabus
National Cyber League Certified Ethical Hacker (CEH) TM Syllabus Note to Faculty This NCL Syllabus is intended as a supplement to courses that are based on the EC- Council Certified Ethical Hacker TM (CEHv8)
PREPARED TESTIMONY OF THE NATIONAL CYBER SECURITY ALLIANCE MICHAEL KAISER, EXECUTIVE DIRECTOR ON THE STATE OF CYBERSECURITY AND SMALL BUSINESS
PREPARED TESTIMONY OF THE NATIONAL CYBER SECURITY ALLIANCE MICHAEL KAISER, EXECUTIVE DIRECTOR ON THE STATE OF CYBERSECURITY AND SMALL BUSINESS BEFORE THE COMMITTEE ON HOUSE SMALL BUSINESS SUBCOMMITTEE
Cyber Security Day: Creating a Mock Cyber Competition Event to Increase Student Interest in Cyber Security
Cyber Security Day: Creating a Mock Cyber Competition Event to Increase Student Interest in Cyber Security Thomas R. Imboden [email protected] Nancy L. Martin [email protected] Belle S. Woodward [email protected]
CYBER SECURITY. A Guide to Programmes and Resources for Schools & Further Education
CYBER SECURITY A Guide to Programmes and Resources for Schools & Further Education March 2015 A Guide to Cyber Security Programmes and Resources for Schools and Further Education Providers Cyber security
ABET TAC CIP Report for the Academic Year 20010 2011. Mechanical Engineering Technology (MET) Program
ABET TAC CIP Report for the Academic Year 20010 2011 Mechanical Engineering Technology (MET) Program I. Introduction This document reports the findings and proposed changes resulting from analysis of data
AIR FORCE ASSOCIATION S CYBERPATRIOT NATIONAL YOUTH CYBER EDUCATION PROGRAM UNIT SIX. Microsoft Windows Basics and MSDN. www.uscyberpatriot.
AIR FORCE ASSOCIATION S CYBERPATRIOT NATIONAL YOUTH CYBER EDUCATION PROGRAM UNIT SIX Microsoft Windows Basics and MSDN www.uscyberpatriot.org Learning Objectives Participants will understand what the Microsoft
Implementing Security Education at a Small Community College
PRACTICAL SECURITY Implementing Security Education at a Small Community College Corrinne Sande Whatcom Community College Abstract: Key words: This paper discusses modifying an existing two-year degree
Cybersecurity Awareness for Executives
SESSION ID: SOP-R04 Cybersecurity Awareness for Executives Rob Sloan Head of Cyber Content and Data Dow Jones @_rob_sloan Session Overview Aim: Provide a high level overview of an effective cybersecurity
From K-12 Engineering Outreach to Community Engagement A Roadmap
From K-12 Engineering Outreach to Community Engagement A Roadmap Tanja Karp Toby Klameth Electrical and Computer Engineering J.T. Hutchinson Middle School Texas Tech University Lubbock ISD Richard Gale
Southwest Baptist University
Doctoral Program in Educational Leadership Application Packet Southwest Baptist University College of Education and Social Sciences Department of Graduate Studies in Education Page 1 Overview of Program
Lockheed Martin Mission Systems & Training(MST)
Lockheed Martin Mission Systems & Training(MST) 9500 Godwin Drive Manassas, VA 20110 Tashika Hussey Net-Centric Integration & Demonstration NCID Demonstration Portfolio Deputy Topics of Discussion Lockheed
Training Employees to Recognise & Avoid Advanced Threats
Training Employees to Recognise & Avoid Advanced Threats Joe Ferrara, President & CEO, Wombat Security Technologies Rashmi Knowles, Chief Security Architect EMEA, RSA The Security Division of EMC Session
MILITARY SCIENCE/LEADERSHIP EDUCATION
MILITARY SCIENCE/LEADERSHIP EDUCATION JUNIOR RESERVE OFFICERS TRAINING CORPS The Junior Reserve Officers Training Corps (JROTC) programs for each military service are available to all students in grades
Cybersecurity Education Doesn t Always Take Place in the Classroom
Cybersecurity Education Doesn t Always Take Place in the Classroom Margaret Spivey, Stephen Shank, Anthony Hanners Community College Cyber Summit, 3CS Moraine Valley CC, Palos Hills, IL, July 21, 2014
Online Learning: Policy Trends in the United States
Online Learning: Policy Trends in the United States Susan Patrick President and CEO, NACOL John Watson Founder, Evergreen Consulting K-12 Online Learning Benefits E-learning: strategy for addressing school
When a student leaves this intensive 5 day class they will have hands on understanding and experience in Ethical Hacking.
Ethical Hacking and Countermeasures Course Description: This class will immerse the student into an interactive environment where they will be shown how to scan, test, hack and secure their own systems.
NROTC Scholarship Application Instructions & Checklist
NROTC Scholarship Application Instructions & Checklist Please read this document completely before starting the application Privacy Act Statement Application Login Account General Instructions Application
Train Like You Will Fight
Train Like You Will Fight Reliability First Workshop 1 October 2015 Dr. Joe Adams Disclaimer 2 The content of this presentation is based on personal and professional experience of the speaker. The content
RICHARD KEVIN MAXWELL
RICHARD KEVIN MAXWELL EDUCATION Waynesburg College, Waynesburg, Pennsylvania Secondary Teacher Certification Program, August 1997 - May 1998 Student Teaching: West Greene Senior High School, Rogersville,
ITS425: Ethical Hacking and Penetration Testing
ITS425: Ethical Hacking and Penetration Testing Credit Hours: 3 Contact Hours: This is a 3-credit course, offered in accelerated format. This means that 16 weeks of material is covered in 8 weeks. The
Request for Proposals (RFP) Strategic Education Consulting Services December 2012 FILING DEADLINE: DECEMBER 21, 2012 (5 P.M. EST)
Request for Proposals (RFP) Strategic Education Consulting Services December 2012 FILING DEADLINE: DECEMBER 21, 2012 (5 P.M. EST) I. PROJECT OVERVIEW As a public media system leader, one of the Corporation
New-Age Master s Programme
New-Age Master s Programme MCA (Information Security Management Services) (3 Year Full-Time Programme) Academic Year 2015 Page 1 Course Objective MCA (Information Security Management Services) This unique
Principles of Information Assurance Syllabus
Course Number: Pre-requisite: Career Cluster/Pathway: Career Major: Locations: Length: 8130 (OHLAP Approved) Fundamentals of Technology or equivalent industry certifications and/or work experience. Information
Monroe County Department of Education. Technology Plan
Monroe County Department of Education Technology Plan Madisonville Tennessee 2011-2013 Office of Technology Gary Sharp, Director III. SYSTEM-WIDE GOALS AND OBJECTIVES Instructional Technology A. GOAL I:
UNIVERSITY OF SOUTH ALABAMA MILITARY SCIENCE 1
UNIVERSITY OF SOUTH ALABAMA MILITARY SCIENCE 1 Military Science Department Information Department of Military Science website http://www.southalabama.edu/armyrotc Military Science Our Mission: To commission
AIR FORCE ASSOCIATION S CYBERPATRIOT NATIONAL YOUTH CYBER EDUCATION PROGRAM UNIT THREE. Computer Basics and Virtual Machines. www.uscyberpatriot.
AIR FORCE ASSOCIATION S CYBERPATRIOT NATIONAL YOUTH CYBER EDUCATION PROGRAM UNIT THREE Computer Basics and Virtual Machines www.uscyberpatriot.org AIR FORCE ASSOCIATION S CYBERPATRIOT NATIONAL YOUTH CYBER
YOUR PRESENTERS TODAY S WORLD. Maryly Skallos Technology Coordinator St. Thomas the Apostle School [email protected]
CYBER SAFETY, CYBER ETHICS, CYBER SECURITY How to teach the kids about these concepts (a primer from staysafeonline.org program that is available free from the website) YOUR PRESENTERS Maryly Skallos Technology
Cybersecurity Health Check At A Glance
This cybersecurity health check provides a quick view of compliance gaps and is not intended to replace a professional HIPAA Security Risk Analysis. Failing to have more than five security measures not
Unless someone like YOU cares a whole awful lot, nothing is going to get better. It s NOT. The Lorax from Dr. Seuss
Calling all parents! We re looking for new volunteers for the 2014-15 school year! Come join us at our next PTC Meeting on Tuesday, March 4 th at 6:30 pm in the HBT Library! A community is only as wonderful
Seneca Valley Senior High School Cyber Teacher Center (across from the SHS Library on the 2 nd floor)
Course Game Design Modding and Prototyping Faculty Name Mr. Ken Macek Term 2015-2016 Meetings IHS Library Gaming Room (semester course two 42 minute periods combined with online instruction) Faculty s
