Cyber Security Overview Madison County Career Technical Center February 17, Timothy Mullican Cyber Defense Analyst, Aleta Technologies

Size: px
Start display at page:

Download "Cyber Security Overview Madison County Career Technical Center February 17, 2014. Timothy Mullican Cyber Defense Analyst, Aleta Technologies"

Transcription

1 Cyber Security Overview Madison County Career Technical Center February 17, 2014 Timothy Mullican Cyber Defense Analyst, Aleta Technologies

2 #whoami Timothy Mullican, 17 years old Cyber Defense Analyst at Aleta Technologies Internship from Jan 2013 Jan 2014 Senior at Laurel Springs School Online, accredited, private K- 12 school Sophomore at Calhoun Community College Will graduate with Associate of Science degree in December Plan to cononue working at Aleta and transfer to a 4- year University to finish B.S. degree in Cyber Security online Programmer, app designer, ethical hacker

3 What does a Cyber Defense Anlayst Do? Someone in this career needs to: Have several years of experience using mulople operaong systems (Linux, Windows, etc) Have knowledge of computer hardware Have experience computer programming/scripong in mulople languages (Perl, Bash, Python, C++, etc) Understand ethics and legal consequences Be proficient in various hacking techniques and know why/ how they work and how to defend against them Have an understanding of computer forensics Be able to get a security clearance (no criminal record, etc) Be a creaove problem solver who can work under pressure

4 Why are cyber security experts important? Cyber Security careers are growing in number Some work for government, some for contractors, some for private companies United States Strategic Command Began in 2010 U.S. Cyber Command (USCYBERCOM) U.S. Army Cyber Command Fleet Cyber Command (Navy) Air Forces Cyber Marine Corps Cyberspace Command

5 Every person or business who stores or accesses informaoon on computers should be concerned about cyber security U.S. resources are under constant aback Banks Healthcare Government Power, water, traffic control systems, etc Home appliances Anything with a connecoon to the internet can be potenoally abacked by someone via the internet

6 How can I get started? In addioon to high school computer courses, learn programming and become very familiar with different operaong systems Be ethical recognize and avoid illegal acovioes! Recommended Books: The Linux Command Line: A Complete IntroducOon (William E. Shobs) Programming Python (Mark Lutz) Learning Python (Mark Lutz) These are more advanced: Hacking: The Art of ExploitaOon, 2 nd ed. (Jon Erickson) Metasploit, The PenetraOon Tester s Guide (David Kennedy) O Reilly books on specific operaong system and programming topics

7 Experiment with Virtual Machines If your PC or laptop has enough disk space and RAM: Install Oracle VirtualBox (free) hbp:// Run a combinaoon of Windows and Linux Virtual Machines (VMs) while your PC operaong system remains up and running If you want to start over, you can delete and re- create the VMs May need to buy addioonal RAM and a second hard drive for PC (or a bigger hard drive for laptop)

8 Learning online Learning to program takes Ome Lots of reading and trial and error pracoce Be paoent! Learn where to get help (books, internet) In addioonal to reading books, use websites to pracoce programming skills and see examples (free) (free) developers.google.com/edu/python (free) many others

9 School events Cyber Patriot CompeOOon hbp:// Sponsored by the US Air Force and Northrop Grumman Teams represent the school and compete online throughout the school year (starts in the fall) Top teams travel to final compeooon Learn how to secure Windows and Linux operaong systems

10 Community Events Even though you are soll in high school, you can abend cyber security events (some of these require a fee) Bsides Huntsville security conference Feb 2015, hbp:// North Alabama Cyber Security Summit June 2014, hbp://northalabama.issa.org Takedowncon cyber security conference Aug 2014, hbp://

11 WriOng Apps PracOce what you learn by wriong iphone or Android apps Publishing to the app store is not free Learn the basics at a summer camp idtech summer camps at Vanderbilt or Emory I abended three summers at idtech hbp://

12 CerOficaOons CerOficaOons are a good addioon to your resume, but you also need pracocal work experience Study on your own, or take a ceroficaoon prep class You can earn ceroficaoons while soll in high school CompTIA A+ ceroficaoon is considered entry- level Some ceroficaoons require work experience Some ceroficaoons have expiraoon dates Cost is usually $100 - $200 per exam (some are mulople exams) If you wait unol you have a job, your employer may pay for them

13 My ceroficaoons CompTIA Security+ CompTIA Linux+ CompTIA Mobility+ EC- Council CEH (CerOfied Ethical Hacker) Linux Professional InsOtute LPIC- 1 SUSE CerOfied Linux Administrator Microsom MTA: Security EssenOals, MCP My next goal is to become a CISSP Associate (CerOfied InformaOon Systems Security Professional)

14 Colleges As of right now, UA and Auburn do not have specialized cyber security degrees They offer Computer Science or Computer Engineering May be adding a cyber security degree in the near future? Some schools offer specialized degrees in cyber security University of Maryland Champlain College (Vermont) Southern New Hampshire University Mercy College (New York) Others.

15 Careers Work for the government Protect computer systems and networks against terrorist abacks Work for a private company Protect against hackers, spyware, and viruses Typical job Otles include: cyber security analyst security specialist cyber security manager security system engineer cyber forensic specialist penetraoon tester

16 QuesOons? This presentaoon can be viewed on my website: hbp://

Information Systems Technology & Cybersecurity Programs

Information Systems Technology & Cybersecurity Programs Information Systems Technology & Cybersecurity Programs Stay close. Go far. Computer Studies Faculty Trudy Gift Professor, Information Systems Technology 240-500-2214 tgift@hagestowncc.edu Carrie Pifer

More information

Learning Tree Training Pre-approved Training for Continuing Education Units (CEUs)

Learning Tree Training Pre-approved Training for Continuing Education Units (CEUs) Learning Tree Training Pre-approved Training for Continuing Education Units (CEUs) Note: Approved training courses in this document are subject to change without prior notification. Training submitted

More information

New-Age Master s Programme

New-Age Master s Programme New-Age Master s Programme MCA (Information Security Management Services) (3 Year Full-Time Programme) Academic Year 2015 Page 1 Course Objective MCA (Information Security Management Services) This unique

More information

New-Age Undergraduate Programme

New-Age Undergraduate Programme New-Age Undergraduate Programme BCA - Information Security & Mobile Applications (3 Year Full-Time Programme) Academic Year 2015 Page 1 Course Objective This unique course provides dual career options

More information

Cybersecurity High School and Beyond

Cybersecurity High School and Beyond Cybersecurity High School and Beyond High School Career Fair and Expo March 29, 2014 Diane G. Miller, CCP Director, Operations Northrop Grumman Information Security Program Director, CyberPatriot Topics

More information

New-Age Undergraduate Programme BCA Cloud Technology & Information Security (3 Year Full-Time Programme)

New-Age Undergraduate Programme BCA Cloud Technology & Information Security (3 Year Full-Time Programme) New-Age Undergraduate Programme BCA Cloud Technology & Information Security (3 Year Full-Time Programme) Academic Year 2015 Page 1 Course Objective The course provides dual career options for students

More information

CCA CYBER SECURITY TRACK

CCA CYBER SECURITY TRACK CCA CYBER SECURITY TRACK 2013-2014 CCA Advanced Cyber Security Track A detailed description of the advanced cyber security track. Courses to be offered in the CCA Advanced Cyber Security Track 2013-2014

More information

New-Age Undergraduate Programme

New-Age Undergraduate Programme New-Age Undergraduate Programme B. Tech - Cloud Technology & Information Security (4 Year Full-Time Programme) Academic Year 2015 Page 1 Course Objective B. Tech - Cloud Technology & Information Security

More information

Cybersecurity Education Doesn t Always Take Place in the Classroom

Cybersecurity Education Doesn t Always Take Place in the Classroom Cybersecurity Education Doesn t Always Take Place in the Classroom Margaret Spivey, Stephen Shank, Anthony Hanners Community College Cyber Summit, 3CS Moraine Valley CC, Palos Hills, IL, July 21, 2014

More information

167 th Air Wing Fast Track Cyber Security Blue Ridge Community and Technical College

167 th Air Wing Fast Track Cyber Security Blue Ridge Community and Technical College 167 th Air Wing Fast Track Cyber Security Blue Ridge Community and Technical College Information Security Certificate: Designed to introduce students to programming, security basics, network monitoring,

More information

Pathways to Digital Employment

Pathways to Digital Employment Pathways to Digital Employment Course Outlines Network design, installation and operation Computer networks are critical to the successful running of businesses of all sizes by enabling file, hardware

More information

167 th Air Wing Fast Track Cyber Program Blue Ridge Community and Technical College

167 th Air Wing Fast Track Cyber Program Blue Ridge Community and Technical College 167 th Air Wing Fast Track Cyber Program Blue Ridge Community and Technical College Information Security Certificate: Designed to introduce students to programming, security basics, network monitoring,

More information

CyberSecurity: Trends, Careers, & the Next Generation

CyberSecurity: Trends, Careers, & the Next Generation CyberSecurity: Trends, Careers, & the Next Generation Ludwig Goon March 2-4, 2016 Disclaimer: The view and opinions expressed in the presentation are that of the presenter and is not affiliated with employers.

More information

Why Certify? Why IT? Brian Matzelle

Why Certify? Why IT? Brian Matzelle Why Certify? Why IT? Brian Matzelle CompTIA Academy Team Alan Rowland Business Development Director Brian Matzelle Education Sales Senior Manager Jill Thielmann Manager, Inside Sales Kirk Smallwood Senior

More information

John Smith Prattville, AL career@hashbangsecurity.com

John Smith Prattville, AL career@hashbangsecurity.com John Smith Prattville, AL career@hashbangsecurity.com Career Objective I am a certified and skilled senior security and UNIX systems administrator with over twenty years of experience. I am seeking a position

More information

New-Age Undergraduate Programme

New-Age Undergraduate Programme New-Age Undergraduate Programme B. Tech Cloud Technology & Information Security (4 Year Full Time Programme) Academic Year 2015 Page 1 Course Objective This unique B. Tech course provides dual career options

More information

Computer Security and Investigations

Computer Security and Investigations Computer Security and Investigations Program Locations: Program Code: Coordinator: Credential: Peterborough CSI Blair Brown Ontario College Advanced Diploma Start Dates: September 06, 2016 January 09,

More information

Monitor and Secure Linux System with Open Source Tripwire

Monitor and Secure Linux System with Open Source Tripwire Cyber Forensics Laboratory 1 Monitor and Secure Linux System with Open Source Tripwire Copyright c 2012 Hui Li, Michael McGinty and Xinwen Fu, University of Massachusetts Lowell Permission is granted to

More information

Brandman University. School of CCNA

Brandman University. School of CCNA Information Technology Certifications CCNA The Cisco CCNA Training Package (ICND: Parts 1 and 2) includes expert instructor-led training modules with customized presentations, practice exam simulators

More information

FedVTE Training Catalog SPRING 2015. advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov

FedVTE Training Catalog SPRING 2015. advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov FedVTE Training Catalog SPRING 2015 advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov If you need any assistance please contact the FedVTE Help Desk here or email the

More information

ONLINE MASTER OF BUSINESS ADMINISTRATION. Open for Business. Designed for You.

ONLINE MASTER OF BUSINESS ADMINISTRATION. Open for Business. Designed for You. ONLINE MASTER OF BUSINESS ADMINISTRATION Open for Business. Designed for You. Our MBA is different. It s designed for you. Today s global workplace is ever-evolving and increasingly competitive. To succeed,

More information

Welcome to New Horizons Orlando!

Welcome to New Horizons Orlando! Welcome to New Horizons Orlando! New Horizons Certification & Job Placement Assistance Program! Job Skills IT Certification Career Advancement Job Placement! New Horizons Gets Students Jobs! Symantec view

More information

How To Get A Computer Hacking Program

How To Get A Computer Hacking Program CHFI v8(computer Hacking Forensics Investigator) Course Description & Overview Overview CHFIv8 Course Description EC-Council releases the brand new Version 8 of the Computer Hacking Forensics Investigator

More information

Cyber Security at NSU

Cyber Security at NSU Cyber Security at NSU Aurelia T. Williams, Ph.D. Chair, Department of Computer Science Associate Professor of Computer Science June 9, 2015 Background Undergraduate computer science degree program began

More information

Hands-On Ethical Hacking and Network Defense - Second Edition Chapter 1. After reading this chapter and completing the exercises, you will be able to:

Hands-On Ethical Hacking and Network Defense - Second Edition Chapter 1. After reading this chapter and completing the exercises, you will be able to: Objectives After reading this chapter and completing the exercises, you will be able to: Describe the role of an ethical hacker Describe what you can do legally as an ethical hacker Describe what you can

More information

Cybersecurity Workforce Training Partnership

Cybersecurity Workforce Training Partnership Cybersecurity Workforce Training Partnership NSA Cyber Command AACC @ Arundel Mills CAE-2Y NSA and DHS designated AACC as a National Center of Academic Excellence in Information Assurance 2-Year Education

More information

2016 Course Release Schedule Updated 12/22/2015

2016 Course Release Schedule Updated 12/22/2015 2016 Course Release Schedule Updated 12/22/2015 January Course: MTA Mobility and Device Fundamentals Exam: 98-368 Description: The MTA Mobility and Device Fundamentals course will prepare users to take

More information

How Do We Prepare the Next. Generation ofcyber Warrior? Education v. Experience. April 30, 2014. Jesse Mayer and RobbMayeski.

How Do We Prepare the Next. Generation ofcyber Warrior? Education v. Experience. April 30, 2014. Jesse Mayer and RobbMayeski. How Do We Prepare the Next Generation ofcyber Warrior? Education v. Experience April 30, 2014 Jesse Mayer and RobbMayeski Northrop Grumman Cyber Security Operations Center Overview Who are we? Introduction

More information

How To Be A Computer Forensics Examiner

How To Be A Computer Forensics Examiner Richard A. Peacock 410.346.7288 (Office) 443.398.5246 (Cell) rich@realforensicanalysis.com EnCase Certified Examiner (EnCE) Access Data Certified Examiner (ACE) Access Data Mobile Phone Certified Examiner

More information

New-Age Undergraduate Programme

New-Age Undergraduate Programme New-Age Undergraduate Programme B. Tech Mobile Applications & Information Security (4 Year Full Time Programme) Academic Year 2015 Page 1 Course Objective This unique course provides dual career options

More information

Bachelor of Science Degree Cyber Security Advancing the nation s workforce one graduate at a time

Bachelor of Science Degree Cyber Security Advancing the nation s workforce one graduate at a time Flexible Online Bachelor s Degree Completion Programs Bachelor of Science Degree Cyber Security Advancing the nation s workforce one graduate at a time Cyber Security Major The Program You ve heard about

More information

FedVTE Training Catalog SUMMER 2015. advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov

FedVTE Training Catalog SUMMER 2015. advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov FedVTE Training Catalog SUMMER 2015 advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov Access FedVTE online at: fedvte.usalearning.gov If you need any assistance please

More information

COMPUTER SCIENCE & INFORMATION TECHNOLOGY

COMPUTER SCIENCE & INFORMATION TECHNOLOGY ST. JOHNS RIVER STATE COLLEGE COMPUTER SCIENCE & INFORMATION TECHNOLOGY Computer Information Technology Computer Network Engineering Technology Computer Programming and Analysis Computer Programmer Computer

More information

Hackers are here. Where are you?

Hackers are here. Where are you? 1 2 What is EC-Council Certified Security Analyst Licensed Penetration Tester Program You are an ethical hacker. Your last name is Pwned. You dream about enumeration and you can scan networks in your sleep.

More information

A New Era. A New Edge. Phishing within your company

A New Era. A New Edge. Phishing within your company Phishing within your company Learning Objectives What is phishing and how to minimize its impact Obtain a basic understanding of how to use virtual machines Use BackTrack, a tool used by many security

More information

IT and Cybersecurity. Workforce Development with CompTIA Certification

IT and Cybersecurity. Workforce Development with CompTIA Certification IT and Cybersecurity Workforce Development with CompTIA Certification CompTIA solutions meet the federal IT security workforce challenge Federal agencies and contractors face an urgent and unrelenting

More information

CIT and CIS Advisory Board Committee Meeting April 10, 2015 2:00 pm

CIT and CIS Advisory Board Committee Meeting April 10, 2015 2:00 pm CIT and CIS Advisory Board Committee Meeting April 10, 2015 2:00 pm Attendees: Achla Agarwal, Professor, BPCC Zac Burson, Transition/Mentoring Coordinator, Bossier Parish Schools Jeremy Cave, Technical

More information

IT and Cyber Security Training Courses

IT and Cyber Security Training Courses AN FORAS RIARACHÁIN INSTITUTE OF PUBLIC ADMINISTRATION IT and Cyber Security Training s Spring 2016 Protection Through Knowledge, Skills, Practice Institute of Public Administration / 01 240 3600 IT Security

More information

Information Technology 2015 Programmes

Information Technology 2015 Programmes Information Technology 2015 Programmes Well connected. Right here Innovation, intelligence and ingenuity. Do you have what it takes to make technology work? IT is a booming industry worth an estimated

More information

Cybersecurity Strategic Talent Management. March, 2012

Cybersecurity Strategic Talent Management. March, 2012 Cybersecurity Strategic Talent Management March, 2012 Cyber Operations - Starts with People Exploit Intel Attack Cyber Operations Defend Enablers 2 Talent Management Challenge Mission: Attract, Develop,

More information

Track 2: Introductory Track PREREQUISITE: BASIC COMPUTER EXPERIENCE

Track 2: Introductory Track PREREQUISITE: BASIC COMPUTER EXPERIENCE Anne Arundel Community College Tracks Anne Arundel Community College s computer technologies courses have been organized into 10 suggested tracks. The tracks are arranged to ensure that students have the

More information

GREAT PLAINS TECHNOLOGY CENTER COURSE OF STUDY. Adult Students: 1050 Hours

GREAT PLAINS TECHNOLOGY CENTER COURSE OF STUDY. Adult Students: 1050 Hours GREAT PLAINS TECHNOLOGY CENTER COURSE OF STUDY Career Cluster: Career Pathway: Career Major: Career Major Hours: Information Technology (IT) Network Systems (IT001) Cyber Security Forensics Specialist

More information

Social Media Security Training and Certifications. Stay Ahead. Get Certified. Ultimate Knowledge Institute. ultimateknowledge.com

Social Media Security Training and Certifications. Stay Ahead. Get Certified. Ultimate Knowledge Institute. ultimateknowledge.com Ultimate Knowledge Institute ultimateknowledge.com Social Media Security Training and Certifications Social Media Security Professional (SMSP) Social Media Engineering & Forensics Professional (SMEFP)

More information

For more information, please contact Anne Arundel Community College s Center for Workforce Solutions at 410-777-2732.

For more information, please contact Anne Arundel Community College s Center for Workforce Solutions at 410-777-2732. Anne Arundel Community College is an academic partner in the Pathways to Cybersecurity Careers Consortium in the State of Maryland. The Pathways to Cybersecurity Consortium consists of workforce, academic,

More information

Learn the fundamentals of Software Development and Hacking of the iphone Operating System.

Learn the fundamentals of Software Development and Hacking of the iphone Operating System. Course: Duration: 5 Day Hands-On Lab & Lecture Course Price: $ 3,495.00 Description: Learn the fundamentals of Software Development and Hacking of the iphone Operating System. provides an Instructor-led

More information

TTS EXPLORE. Fall 2014 Course Schedule. Technology Training Solutions (TTS) IT Certifications. Mobile Apps. Webmaster. Software Social Media

TTS EXPLORE. Fall 2014 Course Schedule. Technology Training Solutions (TTS) IT Certifications. Mobile Apps. Webmaster. Software Social Media IT Certifications EXPLORE Mobile Apps TTS Software Social Media Webmaster Fiber Optics Online Software Harness Productivity Tools to Improve Efficiency Page 3 Mobile Apps Be Competitive with Mobile Apps

More information

IT Security Training. Why Security Certification? A Serious Business - Fear Drives the Demand High Demand Freedom to Make and Break Rules

IT Security Training. Why Security Certification? A Serious Business - Fear Drives the Demand High Demand Freedom to Make and Break Rules IT Security Training Why Security Certification? A Serious Business - Fear Drives the Demand High Demand Freedom to Make and Break Rules Benefits of Certification Provides Assurance to Employers Certification

More information

Future Appointed Counsel Training (FACT) Program Class of 2014

Future Appointed Counsel Training (FACT) Program Class of 2014 1201 Franklin Street, 13 th Floor Houston, Texas 77002 713.368.0016 Office # 713.368.9278 Fax # http://harriscountypublicdefender.org Future Appointed Counsel Training (FACT) Program Class of 2014 Applications

More information

Hypervisor Software and Virtual Machines. Professor Howard Burpee SMCC Computer Technology Dept.

Hypervisor Software and Virtual Machines. Professor Howard Burpee SMCC Computer Technology Dept. Hypervisor Software and Virtual Machines Learning Objectives Understand the common features of today s desktop virtualization products Select and implement a desktop virtualization option on a Linux, Mac,

More information

Homeland Security Education: The Current State. The Naval Postgraduate School, Center for Homeland Defense and Security

Homeland Security Education: The Current State. The Naval Postgraduate School, Center for Homeland Defense and Security Homeland Security Education: The Current State and The Naval Postgraduate School, Center for Homeland Defense and Security Dr. Stan Supinski Director, Partnership Programs 1 Homeland Security Education

More information

State of South Carolina InfoSec and Privacy Career Path Model

State of South Carolina InfoSec and Privacy Career Path Model State of South Carolina InfoSec and Privacy Career Path Model Start Introduction This Career Path Model for the State of South Carolina (State) is designed to help define the various career options available

More information

Installing Windows On A Macintosh Or Linux Using A Virtual Machine

Installing Windows On A Macintosh Or Linux Using A Virtual Machine Installing Windows On A Macintosh Or Linux Using A Virtual Machine At Shaw Programs, the software we develop is made using Microsoft Access. As with all Microsoft Software it requires Windows in order

More information

IBM Security. Managed Security Services. SOC Poland / GSOC. Damian Staroscic Security Operations Center (SOC) Manager.

IBM Security. Managed Security Services. SOC Poland / GSOC. Damian Staroscic Security Operations Center (SOC) Manager. IBM Security Managed Security Services SOC Poland / GSOC Damian Staroscic Security Operations Center (SOC) Manager IBM Security Damian.Staroscic@pl.ibm.com +48-727-036-464 November 27, 2015 Why setting

More information

Using Linux VMware and SMART to Create a Virtual Computer to Recreate a Suspect's Computer. By:

Using Linux VMware and SMART to Create a Virtual Computer to Recreate a Suspect's Computer. By: Using Linux VMware and SMART to Create a Virtual Computer to Recreate a Suspect's Computer By: Senior Special Agent Ernest Baca United States Customs Service Office of Investigations Resident Agent in

More information

DEPARTMENT OF THE ARMY Your Organizational Unit Post / Camp / Station. Office Symbol

DEPARTMENT OF THE ARMY Your Organizational Unit Post / Camp / Station. Office Symbol DEPARTMENT OF THE ARMY Your Organizational Unit Post / Camp / Station REPLY TO ATTENTION OF: Office Symbol Date: MEMORANDUM FOR Commandant, United States Army Cyber School. ATTN: Director, Office of the

More information

PROGRAMS STUDY. Information Technology

PROGRAMS STUDY. Information Technology PROGRAMS STUDY of COMPUTER INFORMATION SYSTEMS 011 Associate in Applied Science degree (A.A.S.) 60 Credit Hours (CH) The study of basic business and technical principles used in programming and operating

More information

IT courses For Senior Managers

IT courses For Senior Managers Protection Through Knowledge, Skills, Practice provide expert-led training courses for IT professionals and senior managers across Ireland. www.senseicybersecurity.ie Training Course Summary provide expert-led

More information

The Case for Support: The Center for Cyber Security Studies at the U. S. Naval Academy

The Case for Support: The Center for Cyber Security Studies at the U. S. Naval Academy The Case for Support: The Center for Cyber Security Studies at the U. S. Naval Academy Computer and network security threats of the future are of concern today, and new strategies are required to ensure

More information

WILLIAM OETTINGER PHONE (702) 292-4645 WOETTINGER@GMAIL.COM

WILLIAM OETTINGER PHONE (702) 292-4645 WOETTINGER@GMAIL.COM WILLIAM OETTINGER PHONE (702) 292-4645 WOETTINGER@GMAIL.COM SUMMARY OF QUALIFICATIONS Veteran investigator in a traditional and computer-related environment. A leader experienced in organizing, directing,

More information

2015 NTX-ISSA Cyber Security Conference (Spring) Kid Proofing the Internet of Things

2015 NTX-ISSA Cyber Security Conference (Spring) Kid Proofing the Internet of Things 2015 NTX-ISSA Cyber Security Conference (Spring) Kid Proofing the Internet of Things April 24-25, 2015 Copyright 2015 NTX-ISSA 2015 Raytheon Cyber Security Company. Conference All rights (Spring) reserved.

More information

UBS Training Course Catalog

UBS Training Course Catalog 2014 COURSE CATALOG SECURITY COURSES Advanced Ethical Hacking Secure Android Development Secure ios Development C/C++ Programming Security Complete Windows Security Cryptography Overview Designing Secure

More information

PALMETTO Cyber Security Summer Camp 2015

PALMETTO Cyber Security Summer Camp 2015 PALMETTO Cyber Security Summer Camp 2015 Student Registration Form Full Name of Student: Parent/Guardian Name: Parent/Guardian Email: Parent/Guardian Phone Number: County: Tee-Shirt Size: S M L XL XXL

More information

CompTIA Tools & Resources for the JD-NEG Program

CompTIA Tools & Resources for the JD-NEG Program CompTIA Tools & Resources for the JD-NEG Program Gretchen Koch Executive Director, Workforce Development Programs CompTIA Copyright (c) 2014 CompTIA Properties, LLC. All Rights Reserved. CompTIA.org Today

More information

Information Systems Security Certificate Program

Information Systems Security Certificate Program Information Technologies Programs Information Systems Security Certificate Program Accelerate Your Career extension.uci.edu/infosec University of California, Irvine Extension s professional certificate

More information

Securing Networks, Securing Futures

Securing Networks, Securing Futures CP_08_20150414 CyberPatriot is the premier national youth cyber education The National Youth Cyber Education Program program created to inspire high school and middle school students toward careers in

More information

How To Build A Cybersecurity Company

How To Build A Cybersecurity Company A Service Disabled Veteran Owned Small Business Maryland 2014 The Cybersecurity Industry Window of Opportunity John M. Leitch President & CEO Winquest Engineering Corporation V1.3 1 Agenda Industry Windows

More information

Curriculum Committee Meeting Approved March 20, 2014

Curriculum Committee Meeting Approved March 20, 2014 Approved Members Present: Mr. David Epstein, Mr. Brian Foley, Ms. Barbara Gershman, Ms. Barbara Hopkins, Ms. Ann-Marie John, Dr. Julie Leidig, Ms. Lisa Riggleman-Gross, Dr. Sharon Robertson, Ms. Maria

More information

CYBER SECURITY WORKFORCE

CYBER SECURITY WORKFORCE Department of the Navy CYBER SECURITY WORKFORCE SCHEDULE A HIRING AUTHORITY FINAL IMPLEMENTING GUIDANCE Prepared by: DONCIO USMC SPAWAR NAVY CYBER FORCES FFC OCHR HRO HRSC 1 Table of Contents I. Introduction

More information

of Highly Effective Security Professionals By Sondra Schneider CEO Security University s0ndra@securityuniversity.net 203.357.7744

of Highly Effective Security Professionals By Sondra Schneider CEO Security University s0ndra@securityuniversity.net 203.357.7744 6 Skills of Highly Effective Security Professionals By Sondra Schneider CEO Security University s0ndra@securityuniversity.net 203.357.7744 Basic Principles The Basic Principles of InfoSecurity are Universal

More information

Bridging the Cybersecurity Talent Gap Cybersecurity Employment and Opportunities for Engagement

Bridging the Cybersecurity Talent Gap Cybersecurity Employment and Opportunities for Engagement Bridging the Cybersecurity Talent Gap Cybersecurity Employment and Opportunities for Engagement 2015 Burning Glass Technologies Cybersecurity has a Big Problem Attacks are rising Cyber incidents jumped

More information

TechTarget Virtualization Media. E-Guide

TechTarget Virtualization Media. E-Guide TechTarget Virtualization Media E-Guide Desktop Virtualization: Expert Guide to VDI, Hypervisors, and More Many businesses fail to understand that the desktop virtualization space extends far beyond just

More information

Global Cyber Range (GCR) Empowering the Cybersecurity Professional (CyPro)

Global Cyber Range (GCR) Empowering the Cybersecurity Professional (CyPro) Global Cyber Range (GCR) Empowering the Cybersecurity Professional (CyPro) NICE Conference 2014 CYBERSECURITY RESILIENCE A THREE TIERED SOLUTION NIST Framework for Improving Critical Infrastructure Cybersecurity

More information

Hackers are here. Where are you?

Hackers are here. Where are you? 1 2 What is EC-Council Certified Security Analyst Licensed Penetration Tester Program You are an ethical hacker. Your last name is Pwned. You dream about enumeration and you can scan networks in your sleep.

More information

Certification Programs

Certification Programs Certification Programs 2014 The SBS Institute serves community banks by providing educational programs that will certify a banker has the knowledge and skills to protect against todays information security

More information

CompTIA Security+ Pre-approved Training for CompTIA Security+ Continuing Education Units (CEUs)

CompTIA Security+ Pre-approved Training for CompTIA Security+ Continuing Education Units (CEUs) CompTIA Security+ Pre-approved Training for CompTIA Security+ Continuing Education Units (CEUs) Note: Approved training courses in this document are subject to change without prior notification. Training

More information

Construction Management at USM

Construction Management at USM Construction Management at USM Department of Technology The Department of Technology in the School of Engineering and Physical Sciences provides degree programs and services related to manufacturing, construction,

More information

Course overview. CompTIA A+ Certification (Exam 220 902) Official Study Guide (G188eng verdraft)

Course overview. CompTIA A+ Certification (Exam 220 902) Official Study Guide (G188eng verdraft) Overview This 5-day course is intended for those wishing to qualify with. A+ is a foundation-level certification designed for IT professionals with around 1 year's experience whose job role is focused

More information

Expert Reference Series of White Papers. Planning a Career Path in Cybersecurity

Expert Reference Series of White Papers. Planning a Career Path in Cybersecurity Expert Reference Series of White Papers Planning a Career Path in Cybersecurity 1-800-COURSES www.globalknowledge.com Planning a Career Path in Cybersecurity James Michael Stewart, CISSP, ISSAP, SSCP,

More information

Minnesota State Community and Technical College Detroit Lakes Campus

Minnesota State Community and Technical College Detroit Lakes Campus Computer Network Security Minnesota State Community and Technical College Detroit Lakes Campus Overview Philosophy Note on 2 year Colleges Certifications Program Courses CCDC Program Numbers Faculty Future

More information

General Service Level Agreement

General Service Level Agreement General Service Level Agreement Pricing We offer an unlimited Break / Fix for each device. Cost is below. Server Management = $199 / month per server Network Management = $199 / month per company Desktop

More information

School of Graduate Studies Doctor of Philosophy (PhD)

School of Graduate Studies Doctor of Philosophy (PhD) School of Graduate Studies Doctor of Philosophy (PhD)! 1 Welcome Asia e University School of Graduate Studies A PhD is the abbreviaoon of Doctor of Philosophy. It is the top academic degree represenong

More information

Building the Next Generation of Cyber Defenders

Building the Next Generation of Cyber Defenders Building the Next Generation of Cyber Defenders Tapping into the League of Wounded Warriors to help Protect and Defend the Nation s Information Systems Sam Maroon Jim Wiggins Speaker Introduction Mr. Sam

More information

Getting Started in Cybersecurity: How to Hone Your Hacking Skills. Dr. Davina Pruitt-Mentle CyberWatch K12 Ed Tech Policy, Research and Outreach

Getting Started in Cybersecurity: How to Hone Your Hacking Skills. Dr. Davina Pruitt-Mentle CyberWatch K12 Ed Tech Policy, Research and Outreach Getting Started in Cybersecurity: How to Hone Your Hacking Skills Dr. Davina Pruitt-Mentle CyberWatch K12 Ed Tech Policy, Research and Outreach What do you know about Cybersecurity? The Net --- Eagle Eye

More information

Technology Fee Proposal

Technology Fee Proposal Technology Fee Proposal Title: Virtual Environment for Information Security Education and Exploration Proposer: Joseph N. Wilson, Assistant Professor CISE Department Rm. E301 CSE Bldg. 42 Box 116120 Gainesville,

More information

Cyber Defense Operations Graduate Certificate

Cyber Defense Operations Graduate Certificate The SANS Technology Institute makes shorter groups of courses available to students who are unable to commit to a full master s degree program. These certificate programs will augment your skills, provide

More information

Principles of Information Assurance Syllabus

Principles of Information Assurance Syllabus Course Number: Pre-requisite: Career Cluster/Pathway: Career Major: Locations: Length: 8130 (OHLAP Approved) Fundamentals of Technology or equivalent industry certifications and/or work experience. Information

More information

Behind of the Penetration testing. J@50n L33

Behind of the Penetration testing. J@50n L33 Behind of the Penetration testing J@50n L33 AGENDA 1. WHO I AM!! 2. PENETRATION TESTING 3. WHY DO YOU NEED THE PENETRATION TESTING 4. HOW DO YOU PERFORM THE PENETRATION TESTING 5. WHAT ABOUT THIS, THERE

More information

Background (2011-2013)

Background (2011-2013) 2013 Overview Why Participate? Explore: Discover the world of cybersecurity Encourage: Motivate participants towards cybersecurity careers Educate: Learn or improve cybersecurity skills Enhance: Teamwork,

More information

Someone s sitting in the shade today because someone planted a tree a long time ago. Warren Buffett. Ed Skoudis Mike Qaissaunee.

Someone s sitting in the shade today because someone planted a tree a long time ago. Warren Buffett. Ed Skoudis Mike Qaissaunee. New Jersey Cyber Aces Academy at Brookdale: A Collaborative Public/Private Model to Secure the Nation A project funded through NSF SFS Grant DUE#1331170 Ed Skoudis Mike Qaissaunee April 30, 2014 Someone

More information

MEETING THE NATION S INFORMATION SECURITY CHALLENGES

MEETING THE NATION S INFORMATION SECURITY CHALLENGES MEETING THE NATION S INFORMATION SECURITY CHALLENGES TO ADDRESS SKILLS AND WORKFORCE SHORTAGES IN THE INFORMATION SECURITY INDUSTRY, THE NATIONAL SECURITY AGENCY AND THE DEPARTMENT OF HOMELAND SECURITY

More information

Computer Support & Network Administration

Computer Support & Network Administration Computer Support & Network Administration What You Will Learn MCTC s Information Technology program has two A.A.S. awards: Computer Support and Network Administration and Software Development, as well

More information

Higher Education Provider Charts (Undergraduate Students from Alabama by County)

Higher Education Provider Charts (Undergraduate Students from Alabama by County) Higher Education Provider Charts (Undergraduate Students from Alabama by County) Calhoun Community College Compiled by Office of Planning, Research and Grants August 2013 TOTAL LAWRENCE COUNTY STUDENTS

More information

Course and Service Portfolio Specialized IT courses for IT professional and organizations willing to take benefit from the competitive advantages

Course and Service Portfolio Specialized IT courses for IT professional and organizations willing to take benefit from the competitive advantages Course and Service Portfolio Specialized IT courses for IT professional and organizations willing to take benefit from the competitive advantages provided by international certifications Cyber & IT Governance

More information

Curriculum Vitae -Joel H. Bush

Curriculum Vitae -Joel H. Bush Curriculum Vitae -Joel H. Bush Joel H. Bush Email: jbush@rmcc.edu Home: 360 Polk 75 Mena, AR 71953 Cell: 479-216-4553 Rich Mountain Community College 1100 College Drive Mena, AR 71953 479-394-7622 X1356

More information

MassTLC Security Community Advisory Board Meeting JANUARY 15, 2016

MassTLC Security Community Advisory Board Meeting JANUARY 15, 2016 MassTLC Security Community Advisory Board Meeting JANUARY 15, 2016 Guest Speakers: Will Markow Senior Analyst, Burning Glass Lou Piazza Director, BATEC Bridging the Cybersecurity Talent Gap 2015 Burning

More information

Computer Information Technology

Computer Information Technology Computer Information Technology Business and Social Sciences Division, Room A44, (847) 543-04 The Computer Information Technology degree programs provide five specialty options with a common core of general

More information

Professional Experience

Professional Experience Professional Experience IT Operations & Cyber Security Manager Contractor United States Federal Government, National Security 09/2015 PRESENT Adjunct Faculty Public College Information Technology Department

More information

Cybersecurity Certificate Programs

Cybersecurity Certificate Programs Cybersecurity Certificate Programs Maryland Workforce Outlook Forum May 26th, 2016 Homer Minnick, Director, Cybersecurity Academy, UMBC Training Centers umbctraining.com 443-692-6600 About UMBC Training

More information

2015 CyberPatriot Conference

2015 CyberPatriot Conference Air Force Association Educate - Advocate - Support 2015 CyberPatriot Conference September 12, 2015 1 Agenda 8:00 9:00 Conference Check-in and Refreshments 9:00 10:00 Conference Welcomes (Dick Jeffreys

More information