Cyber Security Overview Madison County Career Technical Center February 17, Timothy Mullican Cyber Defense Analyst, Aleta Technologies
|
|
- Grant Lane
- 8 years ago
- Views:
Transcription
1 Cyber Security Overview Madison County Career Technical Center February 17, 2014 Timothy Mullican Cyber Defense Analyst, Aleta Technologies
2 #whoami Timothy Mullican, 17 years old Cyber Defense Analyst at Aleta Technologies Internship from Jan 2013 Jan 2014 Senior at Laurel Springs School Online, accredited, private K- 12 school Sophomore at Calhoun Community College Will graduate with Associate of Science degree in December Plan to cononue working at Aleta and transfer to a 4- year University to finish B.S. degree in Cyber Security online Programmer, app designer, ethical hacker
3 What does a Cyber Defense Anlayst Do? Someone in this career needs to: Have several years of experience using mulople operaong systems (Linux, Windows, etc) Have knowledge of computer hardware Have experience computer programming/scripong in mulople languages (Perl, Bash, Python, C++, etc) Understand ethics and legal consequences Be proficient in various hacking techniques and know why/ how they work and how to defend against them Have an understanding of computer forensics Be able to get a security clearance (no criminal record, etc) Be a creaove problem solver who can work under pressure
4 Why are cyber security experts important? Cyber Security careers are growing in number Some work for government, some for contractors, some for private companies United States Strategic Command Began in 2010 U.S. Cyber Command (USCYBERCOM) U.S. Army Cyber Command Fleet Cyber Command (Navy) Air Forces Cyber Marine Corps Cyberspace Command
5 Every person or business who stores or accesses informaoon on computers should be concerned about cyber security U.S. resources are under constant aback Banks Healthcare Government Power, water, traffic control systems, etc Home appliances Anything with a connecoon to the internet can be potenoally abacked by someone via the internet
6 How can I get started? In addioon to high school computer courses, learn programming and become very familiar with different operaong systems Be ethical recognize and avoid illegal acovioes! Recommended Books: The Linux Command Line: A Complete IntroducOon (William E. Shobs) Programming Python (Mark Lutz) Learning Python (Mark Lutz) These are more advanced: Hacking: The Art of ExploitaOon, 2 nd ed. (Jon Erickson) Metasploit, The PenetraOon Tester s Guide (David Kennedy) O Reilly books on specific operaong system and programming topics
7 Experiment with Virtual Machines If your PC or laptop has enough disk space and RAM: Install Oracle VirtualBox (free) hbp:// Run a combinaoon of Windows and Linux Virtual Machines (VMs) while your PC operaong system remains up and running If you want to start over, you can delete and re- create the VMs May need to buy addioonal RAM and a second hard drive for PC (or a bigger hard drive for laptop)
8 Learning online Learning to program takes Ome Lots of reading and trial and error pracoce Be paoent! Learn where to get help (books, internet) In addioonal to reading books, use websites to pracoce programming skills and see examples (free) (free) developers.google.com/edu/python (free) many others
9 School events Cyber Patriot CompeOOon hbp:// Sponsored by the US Air Force and Northrop Grumman Teams represent the school and compete online throughout the school year (starts in the fall) Top teams travel to final compeooon Learn how to secure Windows and Linux operaong systems
10 Community Events Even though you are soll in high school, you can abend cyber security events (some of these require a fee) Bsides Huntsville security conference Feb 2015, hbp:// North Alabama Cyber Security Summit June 2014, hbp://northalabama.issa.org Takedowncon cyber security conference Aug 2014, hbp://
11 WriOng Apps PracOce what you learn by wriong iphone or Android apps Publishing to the app store is not free Learn the basics at a summer camp idtech summer camps at Vanderbilt or Emory I abended three summers at idtech hbp://
12 CerOficaOons CerOficaOons are a good addioon to your resume, but you also need pracocal work experience Study on your own, or take a ceroficaoon prep class You can earn ceroficaoons while soll in high school CompTIA A+ ceroficaoon is considered entry- level Some ceroficaoons require work experience Some ceroficaoons have expiraoon dates Cost is usually $100 - $200 per exam (some are mulople exams) If you wait unol you have a job, your employer may pay for them
13 My ceroficaoons CompTIA Security+ CompTIA Linux+ CompTIA Mobility+ EC- Council CEH (CerOfied Ethical Hacker) Linux Professional InsOtute LPIC- 1 SUSE CerOfied Linux Administrator Microsom MTA: Security EssenOals, MCP My next goal is to become a CISSP Associate (CerOfied InformaOon Systems Security Professional)
14 Colleges As of right now, UA and Auburn do not have specialized cyber security degrees They offer Computer Science or Computer Engineering May be adding a cyber security degree in the near future? Some schools offer specialized degrees in cyber security University of Maryland Champlain College (Vermont) Southern New Hampshire University Mercy College (New York) Others.
15 Careers Work for the government Protect computer systems and networks against terrorist abacks Work for a private company Protect against hackers, spyware, and viruses Typical job Otles include: cyber security analyst security specialist cyber security manager security system engineer cyber forensic specialist penetraoon tester
16 QuesOons? This presentaoon can be viewed on my website: hbp://
Information Systems Technology & Cybersecurity Programs
Information Systems Technology & Cybersecurity Programs Stay close. Go far. Computer Studies Faculty Trudy Gift Professor, Information Systems Technology 240-500-2214 tgift@hagestowncc.edu Carrie Pifer
More informationLearning Tree Training Pre-approved Training for Continuing Education Units (CEUs)
Learning Tree Training Pre-approved Training for Continuing Education Units (CEUs) Note: Approved training courses in this document are subject to change without prior notification. Training submitted
More informationNew-Age Master s Programme
New-Age Master s Programme MCA (Information Security Management Services) (3 Year Full-Time Programme) Academic Year 2015 Page 1 Course Objective MCA (Information Security Management Services) This unique
More informationNew-Age Undergraduate Programme
New-Age Undergraduate Programme BCA - Information Security & Mobile Applications (3 Year Full-Time Programme) Academic Year 2015 Page 1 Course Objective This unique course provides dual career options
More informationCybersecurity High School and Beyond
Cybersecurity High School and Beyond High School Career Fair and Expo March 29, 2014 Diane G. Miller, CCP Director, Operations Northrop Grumman Information Security Program Director, CyberPatriot Topics
More informationNew-Age Undergraduate Programme BCA Cloud Technology & Information Security (3 Year Full-Time Programme)
New-Age Undergraduate Programme BCA Cloud Technology & Information Security (3 Year Full-Time Programme) Academic Year 2015 Page 1 Course Objective The course provides dual career options for students
More informationCCA CYBER SECURITY TRACK
CCA CYBER SECURITY TRACK 2013-2014 CCA Advanced Cyber Security Track A detailed description of the advanced cyber security track. Courses to be offered in the CCA Advanced Cyber Security Track 2013-2014
More informationNew-Age Undergraduate Programme
New-Age Undergraduate Programme B. Tech - Cloud Technology & Information Security (4 Year Full-Time Programme) Academic Year 2015 Page 1 Course Objective B. Tech - Cloud Technology & Information Security
More informationCybersecurity Education Doesn t Always Take Place in the Classroom
Cybersecurity Education Doesn t Always Take Place in the Classroom Margaret Spivey, Stephen Shank, Anthony Hanners Community College Cyber Summit, 3CS Moraine Valley CC, Palos Hills, IL, July 21, 2014
More information167 th Air Wing Fast Track Cyber Security Blue Ridge Community and Technical College
167 th Air Wing Fast Track Cyber Security Blue Ridge Community and Technical College Information Security Certificate: Designed to introduce students to programming, security basics, network monitoring,
More informationPathways to Digital Employment
Pathways to Digital Employment Course Outlines Network design, installation and operation Computer networks are critical to the successful running of businesses of all sizes by enabling file, hardware
More information167 th Air Wing Fast Track Cyber Program Blue Ridge Community and Technical College
167 th Air Wing Fast Track Cyber Program Blue Ridge Community and Technical College Information Security Certificate: Designed to introduce students to programming, security basics, network monitoring,
More informationCyberSecurity: Trends, Careers, & the Next Generation
CyberSecurity: Trends, Careers, & the Next Generation Ludwig Goon March 2-4, 2016 Disclaimer: The view and opinions expressed in the presentation are that of the presenter and is not affiliated with employers.
More informationWhy Certify? Why IT? Brian Matzelle
Why Certify? Why IT? Brian Matzelle CompTIA Academy Team Alan Rowland Business Development Director Brian Matzelle Education Sales Senior Manager Jill Thielmann Manager, Inside Sales Kirk Smallwood Senior
More informationJohn Smith Prattville, AL career@hashbangsecurity.com
John Smith Prattville, AL career@hashbangsecurity.com Career Objective I am a certified and skilled senior security and UNIX systems administrator with over twenty years of experience. I am seeking a position
More informationNew-Age Undergraduate Programme
New-Age Undergraduate Programme B. Tech Cloud Technology & Information Security (4 Year Full Time Programme) Academic Year 2015 Page 1 Course Objective This unique B. Tech course provides dual career options
More informationComputer Security and Investigations
Computer Security and Investigations Program Locations: Program Code: Coordinator: Credential: Peterborough CSI Blair Brown Ontario College Advanced Diploma Start Dates: September 06, 2016 January 09,
More informationMonitor and Secure Linux System with Open Source Tripwire
Cyber Forensics Laboratory 1 Monitor and Secure Linux System with Open Source Tripwire Copyright c 2012 Hui Li, Michael McGinty and Xinwen Fu, University of Massachusetts Lowell Permission is granted to
More informationBrandman University. School of CCNA
Information Technology Certifications CCNA The Cisco CCNA Training Package (ICND: Parts 1 and 2) includes expert instructor-led training modules with customized presentations, practice exam simulators
More informationFedVTE Training Catalog SPRING 2015. advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov
FedVTE Training Catalog SPRING 2015 advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov If you need any assistance please contact the FedVTE Help Desk here or email the
More informationONLINE MASTER OF BUSINESS ADMINISTRATION. Open for Business. Designed for You.
ONLINE MASTER OF BUSINESS ADMINISTRATION Open for Business. Designed for You. Our MBA is different. It s designed for you. Today s global workplace is ever-evolving and increasingly competitive. To succeed,
More informationWelcome to New Horizons Orlando!
Welcome to New Horizons Orlando! New Horizons Certification & Job Placement Assistance Program! Job Skills IT Certification Career Advancement Job Placement! New Horizons Gets Students Jobs! Symantec view
More informationHow To Get A Computer Hacking Program
CHFI v8(computer Hacking Forensics Investigator) Course Description & Overview Overview CHFIv8 Course Description EC-Council releases the brand new Version 8 of the Computer Hacking Forensics Investigator
More informationCyber Security at NSU
Cyber Security at NSU Aurelia T. Williams, Ph.D. Chair, Department of Computer Science Associate Professor of Computer Science June 9, 2015 Background Undergraduate computer science degree program began
More informationHands-On Ethical Hacking and Network Defense - Second Edition Chapter 1. After reading this chapter and completing the exercises, you will be able to:
Objectives After reading this chapter and completing the exercises, you will be able to: Describe the role of an ethical hacker Describe what you can do legally as an ethical hacker Describe what you can
More informationCybersecurity Workforce Training Partnership
Cybersecurity Workforce Training Partnership NSA Cyber Command AACC @ Arundel Mills CAE-2Y NSA and DHS designated AACC as a National Center of Academic Excellence in Information Assurance 2-Year Education
More information2016 Course Release Schedule Updated 12/22/2015
2016 Course Release Schedule Updated 12/22/2015 January Course: MTA Mobility and Device Fundamentals Exam: 98-368 Description: The MTA Mobility and Device Fundamentals course will prepare users to take
More informationHow Do We Prepare the Next. Generation ofcyber Warrior? Education v. Experience. April 30, 2014. Jesse Mayer and RobbMayeski.
How Do We Prepare the Next Generation ofcyber Warrior? Education v. Experience April 30, 2014 Jesse Mayer and RobbMayeski Northrop Grumman Cyber Security Operations Center Overview Who are we? Introduction
More informationHow To Be A Computer Forensics Examiner
Richard A. Peacock 410.346.7288 (Office) 443.398.5246 (Cell) rich@realforensicanalysis.com EnCase Certified Examiner (EnCE) Access Data Certified Examiner (ACE) Access Data Mobile Phone Certified Examiner
More informationNew-Age Undergraduate Programme
New-Age Undergraduate Programme B. Tech Mobile Applications & Information Security (4 Year Full Time Programme) Academic Year 2015 Page 1 Course Objective This unique course provides dual career options
More informationBachelor of Science Degree Cyber Security Advancing the nation s workforce one graduate at a time
Flexible Online Bachelor s Degree Completion Programs Bachelor of Science Degree Cyber Security Advancing the nation s workforce one graduate at a time Cyber Security Major The Program You ve heard about
More informationFedVTE Training Catalog SUMMER 2015. advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov
FedVTE Training Catalog SUMMER 2015 advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov Access FedVTE online at: fedvte.usalearning.gov If you need any assistance please
More informationCOMPUTER SCIENCE & INFORMATION TECHNOLOGY
ST. JOHNS RIVER STATE COLLEGE COMPUTER SCIENCE & INFORMATION TECHNOLOGY Computer Information Technology Computer Network Engineering Technology Computer Programming and Analysis Computer Programmer Computer
More informationHackers are here. Where are you?
1 2 What is EC-Council Certified Security Analyst Licensed Penetration Tester Program You are an ethical hacker. Your last name is Pwned. You dream about enumeration and you can scan networks in your sleep.
More informationA New Era. A New Edge. Phishing within your company
Phishing within your company Learning Objectives What is phishing and how to minimize its impact Obtain a basic understanding of how to use virtual machines Use BackTrack, a tool used by many security
More informationIT and Cybersecurity. Workforce Development with CompTIA Certification
IT and Cybersecurity Workforce Development with CompTIA Certification CompTIA solutions meet the federal IT security workforce challenge Federal agencies and contractors face an urgent and unrelenting
More informationCIT and CIS Advisory Board Committee Meeting April 10, 2015 2:00 pm
CIT and CIS Advisory Board Committee Meeting April 10, 2015 2:00 pm Attendees: Achla Agarwal, Professor, BPCC Zac Burson, Transition/Mentoring Coordinator, Bossier Parish Schools Jeremy Cave, Technical
More informationIT and Cyber Security Training Courses
AN FORAS RIARACHÁIN INSTITUTE OF PUBLIC ADMINISTRATION IT and Cyber Security Training s Spring 2016 Protection Through Knowledge, Skills, Practice Institute of Public Administration / 01 240 3600 IT Security
More informationInformation Technology 2015 Programmes
Information Technology 2015 Programmes Well connected. Right here Innovation, intelligence and ingenuity. Do you have what it takes to make technology work? IT is a booming industry worth an estimated
More informationCybersecurity Strategic Talent Management. March, 2012
Cybersecurity Strategic Talent Management March, 2012 Cyber Operations - Starts with People Exploit Intel Attack Cyber Operations Defend Enablers 2 Talent Management Challenge Mission: Attract, Develop,
More informationTrack 2: Introductory Track PREREQUISITE: BASIC COMPUTER EXPERIENCE
Anne Arundel Community College Tracks Anne Arundel Community College s computer technologies courses have been organized into 10 suggested tracks. The tracks are arranged to ensure that students have the
More informationGREAT PLAINS TECHNOLOGY CENTER COURSE OF STUDY. Adult Students: 1050 Hours
GREAT PLAINS TECHNOLOGY CENTER COURSE OF STUDY Career Cluster: Career Pathway: Career Major: Career Major Hours: Information Technology (IT) Network Systems (IT001) Cyber Security Forensics Specialist
More informationSocial Media Security Training and Certifications. Stay Ahead. Get Certified. Ultimate Knowledge Institute. ultimateknowledge.com
Ultimate Knowledge Institute ultimateknowledge.com Social Media Security Training and Certifications Social Media Security Professional (SMSP) Social Media Engineering & Forensics Professional (SMEFP)
More informationFor more information, please contact Anne Arundel Community College s Center for Workforce Solutions at 410-777-2732.
Anne Arundel Community College is an academic partner in the Pathways to Cybersecurity Careers Consortium in the State of Maryland. The Pathways to Cybersecurity Consortium consists of workforce, academic,
More informationLearn the fundamentals of Software Development and Hacking of the iphone Operating System.
Course: Duration: 5 Day Hands-On Lab & Lecture Course Price: $ 3,495.00 Description: Learn the fundamentals of Software Development and Hacking of the iphone Operating System. provides an Instructor-led
More informationTTS EXPLORE. Fall 2014 Course Schedule. Technology Training Solutions (TTS) IT Certifications. Mobile Apps. Webmaster. Software Social Media
IT Certifications EXPLORE Mobile Apps TTS Software Social Media Webmaster Fiber Optics Online Software Harness Productivity Tools to Improve Efficiency Page 3 Mobile Apps Be Competitive with Mobile Apps
More informationIT Security Training. Why Security Certification? A Serious Business - Fear Drives the Demand High Demand Freedom to Make and Break Rules
IT Security Training Why Security Certification? A Serious Business - Fear Drives the Demand High Demand Freedom to Make and Break Rules Benefits of Certification Provides Assurance to Employers Certification
More informationFuture Appointed Counsel Training (FACT) Program Class of 2014
1201 Franklin Street, 13 th Floor Houston, Texas 77002 713.368.0016 Office # 713.368.9278 Fax # http://harriscountypublicdefender.org Future Appointed Counsel Training (FACT) Program Class of 2014 Applications
More informationHypervisor Software and Virtual Machines. Professor Howard Burpee SMCC Computer Technology Dept.
Hypervisor Software and Virtual Machines Learning Objectives Understand the common features of today s desktop virtualization products Select and implement a desktop virtualization option on a Linux, Mac,
More informationHomeland Security Education: The Current State. The Naval Postgraduate School, Center for Homeland Defense and Security
Homeland Security Education: The Current State and The Naval Postgraduate School, Center for Homeland Defense and Security Dr. Stan Supinski Director, Partnership Programs 1 Homeland Security Education
More informationState of South Carolina InfoSec and Privacy Career Path Model
State of South Carolina InfoSec and Privacy Career Path Model Start Introduction This Career Path Model for the State of South Carolina (State) is designed to help define the various career options available
More informationInstalling Windows On A Macintosh Or Linux Using A Virtual Machine
Installing Windows On A Macintosh Or Linux Using A Virtual Machine At Shaw Programs, the software we develop is made using Microsoft Access. As with all Microsoft Software it requires Windows in order
More informationIBM Security. Managed Security Services. SOC Poland / GSOC. Damian Staroscic Security Operations Center (SOC) Manager.
IBM Security Managed Security Services SOC Poland / GSOC Damian Staroscic Security Operations Center (SOC) Manager IBM Security Damian.Staroscic@pl.ibm.com +48-727-036-464 November 27, 2015 Why setting
More informationUsing Linux VMware and SMART to Create a Virtual Computer to Recreate a Suspect's Computer. By:
Using Linux VMware and SMART to Create a Virtual Computer to Recreate a Suspect's Computer By: Senior Special Agent Ernest Baca United States Customs Service Office of Investigations Resident Agent in
More informationDEPARTMENT OF THE ARMY Your Organizational Unit Post / Camp / Station. Office Symbol
DEPARTMENT OF THE ARMY Your Organizational Unit Post / Camp / Station REPLY TO ATTENTION OF: Office Symbol Date: MEMORANDUM FOR Commandant, United States Army Cyber School. ATTN: Director, Office of the
More informationPROGRAMS STUDY. Information Technology
PROGRAMS STUDY of COMPUTER INFORMATION SYSTEMS 011 Associate in Applied Science degree (A.A.S.) 60 Credit Hours (CH) The study of basic business and technical principles used in programming and operating
More informationIT courses For Senior Managers
Protection Through Knowledge, Skills, Practice provide expert-led training courses for IT professionals and senior managers across Ireland. www.senseicybersecurity.ie Training Course Summary provide expert-led
More informationThe Case for Support: The Center for Cyber Security Studies at the U. S. Naval Academy
The Case for Support: The Center for Cyber Security Studies at the U. S. Naval Academy Computer and network security threats of the future are of concern today, and new strategies are required to ensure
More informationWILLIAM OETTINGER PHONE (702) 292-4645 WOETTINGER@GMAIL.COM
WILLIAM OETTINGER PHONE (702) 292-4645 WOETTINGER@GMAIL.COM SUMMARY OF QUALIFICATIONS Veteran investigator in a traditional and computer-related environment. A leader experienced in organizing, directing,
More information2015 NTX-ISSA Cyber Security Conference (Spring) Kid Proofing the Internet of Things
2015 NTX-ISSA Cyber Security Conference (Spring) Kid Proofing the Internet of Things April 24-25, 2015 Copyright 2015 NTX-ISSA 2015 Raytheon Cyber Security Company. Conference All rights (Spring) reserved.
More informationUBS Training Course Catalog
2014 COURSE CATALOG SECURITY COURSES Advanced Ethical Hacking Secure Android Development Secure ios Development C/C++ Programming Security Complete Windows Security Cryptography Overview Designing Secure
More informationPALMETTO Cyber Security Summer Camp 2015
PALMETTO Cyber Security Summer Camp 2015 Student Registration Form Full Name of Student: Parent/Guardian Name: Parent/Guardian Email: Parent/Guardian Phone Number: County: Tee-Shirt Size: S M L XL XXL
More informationCompTIA Tools & Resources for the JD-NEG Program
CompTIA Tools & Resources for the JD-NEG Program Gretchen Koch Executive Director, Workforce Development Programs CompTIA Copyright (c) 2014 CompTIA Properties, LLC. All Rights Reserved. CompTIA.org Today
More informationInformation Systems Security Certificate Program
Information Technologies Programs Information Systems Security Certificate Program Accelerate Your Career extension.uci.edu/infosec University of California, Irvine Extension s professional certificate
More informationSecuring Networks, Securing Futures
CP_08_20150414 CyberPatriot is the premier national youth cyber education The National Youth Cyber Education Program program created to inspire high school and middle school students toward careers in
More informationHow To Build A Cybersecurity Company
A Service Disabled Veteran Owned Small Business Maryland 2014 The Cybersecurity Industry Window of Opportunity John M. Leitch President & CEO Winquest Engineering Corporation V1.3 1 Agenda Industry Windows
More informationCurriculum Committee Meeting Approved March 20, 2014
Approved Members Present: Mr. David Epstein, Mr. Brian Foley, Ms. Barbara Gershman, Ms. Barbara Hopkins, Ms. Ann-Marie John, Dr. Julie Leidig, Ms. Lisa Riggleman-Gross, Dr. Sharon Robertson, Ms. Maria
More informationCYBER SECURITY WORKFORCE
Department of the Navy CYBER SECURITY WORKFORCE SCHEDULE A HIRING AUTHORITY FINAL IMPLEMENTING GUIDANCE Prepared by: DONCIO USMC SPAWAR NAVY CYBER FORCES FFC OCHR HRO HRSC 1 Table of Contents I. Introduction
More informationof Highly Effective Security Professionals By Sondra Schneider CEO Security University s0ndra@securityuniversity.net 203.357.7744
6 Skills of Highly Effective Security Professionals By Sondra Schneider CEO Security University s0ndra@securityuniversity.net 203.357.7744 Basic Principles The Basic Principles of InfoSecurity are Universal
More informationBridging the Cybersecurity Talent Gap Cybersecurity Employment and Opportunities for Engagement
Bridging the Cybersecurity Talent Gap Cybersecurity Employment and Opportunities for Engagement 2015 Burning Glass Technologies Cybersecurity has a Big Problem Attacks are rising Cyber incidents jumped
More informationTechTarget Virtualization Media. E-Guide
TechTarget Virtualization Media E-Guide Desktop Virtualization: Expert Guide to VDI, Hypervisors, and More Many businesses fail to understand that the desktop virtualization space extends far beyond just
More informationGlobal Cyber Range (GCR) Empowering the Cybersecurity Professional (CyPro)
Global Cyber Range (GCR) Empowering the Cybersecurity Professional (CyPro) NICE Conference 2014 CYBERSECURITY RESILIENCE A THREE TIERED SOLUTION NIST Framework for Improving Critical Infrastructure Cybersecurity
More informationHackers are here. Where are you?
1 2 What is EC-Council Certified Security Analyst Licensed Penetration Tester Program You are an ethical hacker. Your last name is Pwned. You dream about enumeration and you can scan networks in your sleep.
More informationCertification Programs
Certification Programs 2014 The SBS Institute serves community banks by providing educational programs that will certify a banker has the knowledge and skills to protect against todays information security
More informationCompTIA Security+ Pre-approved Training for CompTIA Security+ Continuing Education Units (CEUs)
CompTIA Security+ Pre-approved Training for CompTIA Security+ Continuing Education Units (CEUs) Note: Approved training courses in this document are subject to change without prior notification. Training
More informationConstruction Management at USM
Construction Management at USM Department of Technology The Department of Technology in the School of Engineering and Physical Sciences provides degree programs and services related to manufacturing, construction,
More informationCourse overview. CompTIA A+ Certification (Exam 220 902) Official Study Guide (G188eng verdraft)
Overview This 5-day course is intended for those wishing to qualify with. A+ is a foundation-level certification designed for IT professionals with around 1 year's experience whose job role is focused
More informationExpert Reference Series of White Papers. Planning a Career Path in Cybersecurity
Expert Reference Series of White Papers Planning a Career Path in Cybersecurity 1-800-COURSES www.globalknowledge.com Planning a Career Path in Cybersecurity James Michael Stewart, CISSP, ISSAP, SSCP,
More informationMinnesota State Community and Technical College Detroit Lakes Campus
Computer Network Security Minnesota State Community and Technical College Detroit Lakes Campus Overview Philosophy Note on 2 year Colleges Certifications Program Courses CCDC Program Numbers Faculty Future
More informationGeneral Service Level Agreement
General Service Level Agreement Pricing We offer an unlimited Break / Fix for each device. Cost is below. Server Management = $199 / month per server Network Management = $199 / month per company Desktop
More informationSchool of Graduate Studies Doctor of Philosophy (PhD)
School of Graduate Studies Doctor of Philosophy (PhD)! 1 Welcome Asia e University School of Graduate Studies A PhD is the abbreviaoon of Doctor of Philosophy. It is the top academic degree represenong
More informationBuilding the Next Generation of Cyber Defenders
Building the Next Generation of Cyber Defenders Tapping into the League of Wounded Warriors to help Protect and Defend the Nation s Information Systems Sam Maroon Jim Wiggins Speaker Introduction Mr. Sam
More informationGetting Started in Cybersecurity: How to Hone Your Hacking Skills. Dr. Davina Pruitt-Mentle CyberWatch K12 Ed Tech Policy, Research and Outreach
Getting Started in Cybersecurity: How to Hone Your Hacking Skills Dr. Davina Pruitt-Mentle CyberWatch K12 Ed Tech Policy, Research and Outreach What do you know about Cybersecurity? The Net --- Eagle Eye
More informationTechnology Fee Proposal
Technology Fee Proposal Title: Virtual Environment for Information Security Education and Exploration Proposer: Joseph N. Wilson, Assistant Professor CISE Department Rm. E301 CSE Bldg. 42 Box 116120 Gainesville,
More informationCyber Defense Operations Graduate Certificate
The SANS Technology Institute makes shorter groups of courses available to students who are unable to commit to a full master s degree program. These certificate programs will augment your skills, provide
More informationPrinciples of Information Assurance Syllabus
Course Number: Pre-requisite: Career Cluster/Pathway: Career Major: Locations: Length: 8130 (OHLAP Approved) Fundamentals of Technology or equivalent industry certifications and/or work experience. Information
More informationBehind of the Penetration testing. J@50n L33
Behind of the Penetration testing J@50n L33 AGENDA 1. WHO I AM!! 2. PENETRATION TESTING 3. WHY DO YOU NEED THE PENETRATION TESTING 4. HOW DO YOU PERFORM THE PENETRATION TESTING 5. WHAT ABOUT THIS, THERE
More informationBackground (2011-2013)
2013 Overview Why Participate? Explore: Discover the world of cybersecurity Encourage: Motivate participants towards cybersecurity careers Educate: Learn or improve cybersecurity skills Enhance: Teamwork,
More informationSomeone s sitting in the shade today because someone planted a tree a long time ago. Warren Buffett. Ed Skoudis Mike Qaissaunee.
New Jersey Cyber Aces Academy at Brookdale: A Collaborative Public/Private Model to Secure the Nation A project funded through NSF SFS Grant DUE#1331170 Ed Skoudis Mike Qaissaunee April 30, 2014 Someone
More informationMEETING THE NATION S INFORMATION SECURITY CHALLENGES
MEETING THE NATION S INFORMATION SECURITY CHALLENGES TO ADDRESS SKILLS AND WORKFORCE SHORTAGES IN THE INFORMATION SECURITY INDUSTRY, THE NATIONAL SECURITY AGENCY AND THE DEPARTMENT OF HOMELAND SECURITY
More informationComputer Support & Network Administration
Computer Support & Network Administration What You Will Learn MCTC s Information Technology program has two A.A.S. awards: Computer Support and Network Administration and Software Development, as well
More informationHigher Education Provider Charts (Undergraduate Students from Alabama by County)
Higher Education Provider Charts (Undergraduate Students from Alabama by County) Calhoun Community College Compiled by Office of Planning, Research and Grants August 2013 TOTAL LAWRENCE COUNTY STUDENTS
More informationCourse and Service Portfolio Specialized IT courses for IT professional and organizations willing to take benefit from the competitive advantages
Course and Service Portfolio Specialized IT courses for IT professional and organizations willing to take benefit from the competitive advantages provided by international certifications Cyber & IT Governance
More informationCurriculum Vitae -Joel H. Bush
Curriculum Vitae -Joel H. Bush Joel H. Bush Email: jbush@rmcc.edu Home: 360 Polk 75 Mena, AR 71953 Cell: 479-216-4553 Rich Mountain Community College 1100 College Drive Mena, AR 71953 479-394-7622 X1356
More informationMassTLC Security Community Advisory Board Meeting JANUARY 15, 2016
MassTLC Security Community Advisory Board Meeting JANUARY 15, 2016 Guest Speakers: Will Markow Senior Analyst, Burning Glass Lou Piazza Director, BATEC Bridging the Cybersecurity Talent Gap 2015 Burning
More informationComputer Information Technology
Computer Information Technology Business and Social Sciences Division, Room A44, (847) 543-04 The Computer Information Technology degree programs provide five specialty options with a common core of general
More informationProfessional Experience
Professional Experience IT Operations & Cyber Security Manager Contractor United States Federal Government, National Security 09/2015 PRESENT Adjunct Faculty Public College Information Technology Department
More informationCybersecurity Certificate Programs
Cybersecurity Certificate Programs Maryland Workforce Outlook Forum May 26th, 2016 Homer Minnick, Director, Cybersecurity Academy, UMBC Training Centers umbctraining.com 443-692-6600 About UMBC Training
More information2015 CyberPatriot Conference
Air Force Association Educate - Advocate - Support 2015 CyberPatriot Conference September 12, 2015 1 Agenda 8:00 9:00 Conference Check-in and Refreshments 9:00 10:00 Conference Welcomes (Dick Jeffreys
More information