Cyber Security and Digital Forensics Training Platform

Similar documents
Teaching Penetration Testing and Malware Analysis within a Cloud-based Environment

CYBER SECURITY TRAINING SAFE AND SECURE

Edinburg Napier University. Cloud-based Digital Forensics Evaluation Test (D-FET) Platform

Plymouth University. Faculty of Science and Engineering. School of Computing Electronics and Mathematics. Programme Specification

Computing 2015/16. courses

Nettitude Ltd. (FHEQ) level 7] MSc Postgraduate Diploma Postgraduate Certificate. British Computer Society (BCS) Master s Degree in Computing

Programme In Information Security Management

CyberNEXS Global Services

NICE and Framework Overview

Cyber Security Conference Abstracts

Towards closer EU-ASEAN collaboration in cybersecurity

CESG Certification of Cyber Security Training Courses

Bursaries. University of Lincoln International Study Centre Degree preparation for Undergraduate and Masters courses

BEng/ BEng (Hons) Networked Systems Engineering, BSc/ BSc (Hons) Cyber Security and Networks BEng/ BEng (Hons) Digital Security, Forensics and

Security Intelligence Services. Cybersecurity training.

i Network, Inc Technology Solutions, Products & Services Providing the right information, to the right customer, at the right time.

Council of Europe Project on Cybercrime in Georgia Report by Virgil Spiridon and Nigel Jones. Tbilisi 28-29, September 2009

The fast track to top skills and top jobs in cyber. Guaranteed.

Masters in Applied Cyber Security Upskilling Existing Employees

Programme Specification and Curriculum Map for BSc (Hons) Computer Forensics

Plymouth University. Faculty of Science and Engineering. School of Computing Electronics and Mathematics. Programme Specification

General Approaches to evaluating student learning Qatar University, 2010

ICSS2015: International Cyber Security Strategy Congress: Cyber Security and Forensic Readiness

Forensic Psychiatry Research Society. Academic medicine is in crisis (Clark, 2005; Clark and Tugwell, 2004; ICRAM, 2004).

Michelle Govan & Anand Philip Network & Security Engineering

Assessment of Critical Thinking Institutional Learning Outcome (ILO)

Survey Results and Further Issues in Construction Automation Education

Cyber DTU. Lars Ramkilde Knudsen

MSc Studies in Computing

Developing and Enhancing Cyber Security Capabilities in the Region. Khaled Gamo Technology Advisor Ministry of communication and informatics

5957/1/10 REV 1 GS/np 1 DG H 2 B LIMITE EN

ASEAN Regional Forum Cyber Incident Response Workshop Republic of Singapore 6-7 September Co-Chair s Summary Report

MS in Computer Science with specialization in Computer Security. Prof. Clifford Neuman

UVic Department of Electrical and Computer Engineering

70250 Graduate Certificate in Digital Forensics

Course Bachelor of Information Technology majoring in Network Security or Data Infrastructure Engineering

JOB DESCRIPTION. 1. JOB TITLE: Senior Lecturer in Computer Science (Cyber Security)

Certification Programs

Programme Specification and Curriculum Map for MSc Network Security and Pen Testing

The purpose of this Unit is to develop an awareness of the knowledge and skills used by ethical and malicious hackers.

Certification Programs

National Cyber Security Policy -2013

Cyber Resilience Implementing the Right Strategy. Grant Brown Security specialist,

Release of the Draft Cybersecurity Procurement Language for Energy Delivery Systems

ITU-IMPACT Training and Skills Development Course Catalogue

MSc Forensic Information Technology

Tackling Cyber Crime in the UK. Andy Archibald Deputy Director National Cyber Crime Unit

MALAYSIA ANTI-CORRUPTION ACADEMY: GLOBAL COMMITMENT TOWARDS ANTI-CORRUPTION CAPACITY BUILDING

Network that Know. Rasmus Andersen Lead Security Sales Specialist North & RESE

SERVICE DEFINITION CYBER SECURITY SERVICES CONTENTS

Unit 3 Cyber security

Hackers are here. Where are you?

Speaker: Ms Stephanie Chan, Psychologist, MSc in Forensic Psychology. Director: Dr A Majeed B A Khander, concurrently Deputy Director of Police

ESKISP Manage security testing

JOB DESCRIPTION. 1. JOB TITLE: Senior Lecturer in Computer Science (Cyber Security)

POSTGRADUATE OPEN DAY

Bellevue University Cybersecurity Programs & Courses

SICSA* Scottish Informatics and Computer Science Alliance. Cyber Security in Scottish Universities

Psychology. Further information Admissions and Course Enquiries T: +44 (0) E: 210

EC-Council. Certified Ethical Hacker. Program Brochure

Workshop on Building international cooperation WG2 : Network Information Security / cyber security

Why study Forensic Psychology?

Training Plan CONTOSO, LTD MICROSOFT DYNAMICS AX SOLUTION

Secure your cloud applications by building solid foundations with enterprise (security ) architecture

Programme Specification and Curriculum Map for BSc Psychology with Human Resource Management

Supporting CSIRTs in the EU Marco Thorbruegge Head of Unit Operational Security European Union Agency for Network and Information Security

Discuss the ethical, moral and professional issues relating to computer security, ethical hacking and incident response.

A Systems Engineering Approach to Developing Cyber Security Professionals

On the European experience in critical infrastructure protection

University of Bradford. 1 year full time, 2 years part-time

ENISA TRAINING. Tentative agenda for workshop. Supported and co- organised by: TLP WHITE JANUARY 2016

IFE Strategic Plan

Finnish Cyber Security Strategy. Permanent Secretary, LTG Arto Räty Chairman of the Security Committee , Geneva

Knowledge for a successful forensic chain provided by The Netherlands Forensic Institute. NFI Academy

Global Cyber Range (GCR) Empowering the Cybersecurity Professional (CyPro)

Executive MSc Strategic Project Management

Welcome to Stockholm University (SU) and the Department of Computer and Systems Sciences (DSV) Uno GH Fors, DDS, PhD Professor Vice head of DSV

ICS-SCADA testing and patching: Recommendations for Europe

KASPERSKY SECURITY INTELLIGENCE SERVICES. EXPERT SERVICES.

Towards defining priorities for cybersecurity research in Horizon 2020's work programme Contributions from the Working Group on Secure ICT

Cyber security Indian perspective & Collaboration With EU

College of Science, Engineering and Technology. School of Computing. college of science, engineering and technology. Learn without limits.

Lecturer Teaching and Research - Socio-Cultural Studies. Dean of School / Director of Learning and Teaching

Cybercrime & Cybersecurity: the Ongoing Battle International Hellenic University

CYSPA - EC projects supporting NIS

Programme Specification: MSc Electronic Commerce

Cybersecurity in the Digital Economy Challenges and Threats to the Financial Services Sector

Research Topics in the National Cyber Security Research Agenda

Electrical Engineering

Train Like You Will Fight

Transcription:

Cyber Security and Digital Forensics Training Platform Adrian Smales and Prof Bill Buchanan

DFET Project Outline: DFET creates new training methods/techniques to support judicial authorities, law enforcement agencies and associated stakeholders in the fight against cybercrime through the development of a virtual (cloudbased) cybercrime training environment to include real life simulation and scenario analysis. Aim: To improve crime detection rates by providing scenario-based training in line with the dynamic nature of cybercrime. Overall DFET aims to create a training infrastructure which can share cyber training across Europe, and allow access to hands-on environments, no matter the physical location of trainer. Partial Funding: DG Home Prevention Of and Fight against Crime. Partners: Edinburgh Napier University, Joseph Stefan Institute (JSI), Stockholm University, Police Scotland, and Aconite Internet Solutions. Dates: Jan 2013 Dec 2015.

DFET Project Contribution Creation of a Cloud-based training infrastructure for Law Enforcement, Industry and Academia. Real-life virtualized practical sessions, with on-line support. Uses real-life devices, tools and systems. Credit rating of training against academic framework. Coverage of a range of subjects, including cryptography, network forensics, digital forensics, malware analysis, and so on.

Cyber Security and Digital Forensics Training Platform Vision and Features

Vision Law Enforcement Triage systems Training Public Sector Evaluation of systems. Training. Industry Training/sharing materials. Professional certification Government Define standards Evaluate products DFET Training Cloud Infrastructure for training and sharing of material Academia Training/sharing materials Virtualised environments Public clouds Software Vendors: Test environments. Promoting products. Providing floating licences Existing Academic Clouds

Features Full coverage of cyber security. MSc integration. Fully virtualised practical environments. On-line lectures/demonstrations. Integration with Professional Certification. Ever changing challenges. Integrated feedback. On-site or remote training. Cryptography Mobile Device Forensics Network Security Digital Forensics DFET Cybercrime And Risk Data Loss Prevention Network/Live Forensics Open Source Investigations

Forthcoming Events Creation of CyberFET.com On-line material with Cloud integration. Creation of The Cyber Academy (launch 6 May 2015). Supported by a wide range of organisations, including Scottish Government, Standard Life, Lloyds, and many others. Roll-out of training material from Sept 2015.

Cyber Security and Digital Forensics Training Platform Architecture

DFET Architecture Feedback Scenario Compilation [Evaluation abstraction] Evaluation Engine Instructor [Ontology abstraction] [Artifact creation] [Simulation agents] [Evaluation metrics] [Evaluation metrics] DFET DFET Translate Engine Cloud Training Infrastructure Trainees User interactions Interface rendering Ontology definition Virtual machine calls Robotic agents and attack traffic Creation of virtual hosts, networks, devices, and so on.

DFET EDUFORS Platform Partially funded by DG Home Prevention Of and Fight against Crime.

DFET EDUFORS Platform Partially funded by DG Home Prevention Of and Fight against Crime.

DFET Pedagogy Mapping Top-level script definition (Instructor created) Leader Expert Professional Associate Professional Practice Evaluate Synthesize Analysis Application Comprehension Knowledge Abstract Pedagogy and Scripting [Scenario] has [Learning Elements] which are assessed by [Metric Evaluators] with [Metric Grades] Internalize or characterise Organise or Conceptualize Value Respond Receive Origination Adaptation Complex Overt Response Mechanism Guided Response Set Perception Flag find Time Method Correctness Justification Level 13 (PhD) Level 12 (MPhil) Level 11 (MSc) Level 10 (BEng Hons) Level 9 (BEng) Level 8 Level 7 Academic Levels of Achievement Postgraduate Undergraduate Cognitive Domain Affective Domain Psychomotor domain Standard Pedagogy Evaluators

Cyber Security and Digital Forensics Training Platform

CyberFET.com Subjects: Network and Live Forensics; Security Fundamentals; Cryptography; Malware Analysis; Security Architectures; Data Loss Prevention; Open Source Investigations; Security Risk and Compliance; Cyber Crime; Host-based Forensics; Mobile Device Forensics; Penetration Testing; Incident Response; and Law and Ethics. 14 books released to support on-line material. Each subject has six teaching elements. 3 hr training elements. Each element with Lecture, Test and Practical Lab. Formal test taking with score fed back to student/instructor. Virtualised challenges with ever changing challenges. New courses being created: DDoS Investigation, Mac Forensics.

The Cyber Academy

Aims Integrate Teaching, Professional Practice and Research into an advanced academic infrastructure. Provide international leadership in Cyber Security, especially related to education and professional development. Support the development of flexible training programmes, with academic credits. Support innovation in Cyber Security from the initial ideas, through funded PhD programs, and onto the end-product. Provide a platform for the debate and articulation of key issues in Cyber Security. Provide access to members to an advanced and virtualized training infrastructure for Cyber Security, for both evaluation and training. Provide integrated academic support for a range of roles from Apprentice Cyber Security professionals to Advanced Research-focused levels. Provide a mechanism for increased interaction between organisations and students. Integrate with the requirements of law enforcement, industry and the public sector.

How will it work? Collaborative and inclusive model. The Cyber Academy is a partnership between academia, law enforcement, industry and the public sector, and aims to collaborate with a wide range of organisations on delivering on the key aims for the benefit of its partners. Membership. It is free to join the Academy at Associate-level, and which will allow organisations to be part of the infrastructure with support for a strong working relationship. Other levels of membership, such as around research and innovation sponsorship, are available and can be discussed with the team. Dissemination. The Cyber Academy will support a wide range of Conferences, Symposiums and Workshops, each focusing on key topics related to Cyber Security, with a special focus on Innovation, Professional Development and Education. Professional Development. The Cyber Academy integrates with a wide range of professional bodies, and aims to fully integrate academic structures with professional practice and training.

Cyber Security and Digital Forensics Training Platform In Conclusion

In Conclusion 6 May 2015 launch of The Cyber Academy. DFET Project looking for partners within the Academy. Raid the Flag/EU Cyber Team of the Year On-line Challenge. June 2015. October 2015 Symposium of Cyber Security Education Police College, Tulliallan, Scotland. Full roll-out of Virtualised Training in Autumn 2015. Evaluators welcome.

Cyber Security and Digital Forensics Training Platform Adrian Smales and Prof Bill Buchanan Partially funded by EU DG Home Prevention of and Fight against Crime