Virtual Training Environment Information Assurance and Forensics Training



Similar documents
DoD IA Training Products, Tools Integration, and Operationalization

STEPfwd Quick Start Guide

Solving a Specialized Workforce Skills Gap The Way The Professionals Do

Reinventing Virtual Learning: Delivering Hands-On Training using Cloud Computing

NICE 2015 Conference

COURSE NAVIGATOR DEMO QUICK GUIDE

Introducing... FedVTE and FedCTE

Training Catalog

COURSE NAVIGATOR DEMO QUICK GUIDE

(ICON) Company Facts and Figures. Case: Symbiosis Centre for Distance Learning. Introduction. Why Technology based Learning?

Minimum Computer System Requirements

CyberNEXS Global Services

LabSim. Anytime, anywhere learning. self-paced learning.

Microsoft Labs Online

ReadyConnect Web Meeting Premium Edition User Guide

CERT/CC Overview & CSIRT Development Team Activities

Cyber Security at NSU

A PLM Certificate Program Update: Teaching PLM Online Using VMs in the Cloud

QAD Learning Center Demonstration Guide. July 2, 2015

C HFI C HFI. EC-Council. EC-Council. Computer Hacking Forensic Investigator. Computer. Computer. Hacking Forensic INVESTIGATOR

Document Management. Document Management for the Agile Enterprise. AuraTech Pte Ltd

online training for the asphalt pavement industry

Before You Begin Your Computer Must Meet the System Requirements to Access Cloud9

Getting Started in the Cambridge LMS - Students

ARE YOU READY FOR TOMORROW S IT? Discover ITpreneurs full curriculum of Virtualization and Cloud Computing competence development programs

LEARNING CATALOG WINTER 2015

Known limitations The following table lists features and their known limitations in Internet Explorer 8 (64-bit) and Internet Explorer 9 (64-bit).

LoneStar College Tomball Cisco Networking Academy

Managing Enterprise Security with Cisco Security Manager

Cyber Defense Exercise: A Service Provider Model

Systems must meet the following requirements when using the Matrix WebConnect service: Average Network Bandwidth Utilization

Dell SonicWALL Secure Virtual Assist: Clientless remote support over SSL VPN

Why Using a Learning Management System Alone May Miss the Learning Curve. ProEd. Five Guidelines for Improving Your Corporate Learning Outcomes

Social Media Security Training and Certifications. Stay Ahead. Get Certified. Ultimate Knowledge Institute. ultimateknowledge.com

MyMathLab & CourseCompass

Call for Proposals: Developing U.S. Geological Survey (USGS) Courses for Online Delivery (FY 2016)

C HFI C HFI. EC-Council. EC-Council. Computer Hacking Forensic Investigator. Computer. Computer. Hacking Forensic INVESTIGATOR

How To Understand The Architecture Of An Ulteo Virtual Desktop Server Farm

INUVIKA OPEN VIRTUAL DESKTOP FOUNDATION SERVER

Web Conferencing Version 8.3 Troubleshooting Guide

Before You Begin, Your Computer Must Meet the System Requirements

U.S. Army Training Support Center TCM-TADLP-Courseware Standards and Certification Division. Mobile Best Practices

SERVICE DEFINITION DOCUMENT MANAGEMENT IN THE CLOUD

TRAINING. OneShield.com Leadership. Service. Technology. That s our policy.

ORACLE BUSINESS INTELLIGENCE WORKSHOP. Prerequisites for Oracle BI Workshop

Online Collaboration For Organizational Training And Development

Course overview. CompTIA A+ Certification (Exam ) Official Study Guide (G188eng verdraft)

Project and Task Management Solution

Joining a Meeting. Before You Join a Meeting

Introducing the AT&T Connect Web Participant Integrated/Enterprise Edition Version 9 January 2011

Java. How to install the Java Runtime Environment (JRE)

WOS Cloud. ddn.com. Personal Storage for the Enterprise. DDN Solution Brief

Upgrading to Websense Web Security v7.6

Developing an Efficient Remote Lab Environment for Online IDS Courses 1

Enabling Java and ActiveX Settings of Internet Explorer:

An Oracle White Paper August Oracle Service Cloud Integration with Oracle Siebel Service

Replicating and Sharing Computer Security Laboratory Environments

Merge CADstream. For IT Professionals. Merge CADstream,

Application Tracking System for Brokers and Agents

Credits: Some of the slides are based on material adapted from

Educational Services: Network Based Education. Bee Ng, Ph.D. Director, Educational Services October 12, 2005

Accessing Windows 7 in the Student Labs

Service Manager 9.41 Smart Analytics Demo Script

A Monitored Student Testing Application Using Cloud Computing

Documentum Document Management in the Cloud Service Definition

Virtual Training Labs: Delivering Hands-On Classrooms in Cloud Environments

Class and Office Hours. Course Requirements. Concepts to Learn. CMPUT 499: Introduction

Unified Communications In the Manufacturing Industry

Implementing and Managing Windows Server 2008 Hyper-V

The fast track to top skills and top jobs in cyber. Guaranteed.

VMware ESXi in a Cloud-based Lab David Davis, VCP, VCAP, and vexpert

Cyber Incident Forensic Response (CIFR) 2015

elearning Course Catalog

MCITP: Enterprise Messaging Administrator 2010 Boot Camp

INSTALLING MALTED 3.0 IN LINUX MALTED: INSTALLING THE SYSTEM IN LINUX. Installing Malted 3.0 in LINUX

Operations Manager 2012 Administration Bootcamp

AUTOMATED CONFERENCE CD-ROM BUILDER AN OPEN SOURCE APPROACH Stefan Karastanev

Global Cyber Range (GCR) Empowering the Cybersecurity Professional (CyPro)

IT Academy Lesson Plan

DottsConnected SHAREPOINT 2010 ADMIN TRAINING. Exercise 1: Create Dedicated Service Accounts in Active Directory

RSA SecurID Two-factor Authentication

Boost elearning IT Training INSTRUCTIONAL DESIGN, LEARNING PATHS, AND COURSE CATALOGUE

CYBER SECURITY TRAINING SAFE AND SECURE

ENTERPRISE VIDEO PLATFORM

Microsoft Labs Online

Infor CRM Education on Infor Campus

Automating Management of DWI/DUI and Substance Abuse Programs A Case Study

Track-It! 8.5. The World s Most Widely Installed Help Desk and Asset Management Solution

Computer Virtualization (ITNW 1313)

Outline SSS Microsoft Windows Server 2008 Hyper-V Virtualization

Cisco Unified Intelligence Center for Advanced Users

Flexible, Life-Cycle Support for Unique Mission Requirements

Instructor Getting Started Guide for Canvas Users

ON24 CAPABILITIES STATEMENT

To participate in the hands-on labs in this class, you need to bring a laptop computer with the following:

Cautela Labs Cloud Agile. Secured. Threat Management Security Solutions at Work

Training & Certification Allegro University

User Guide FOR TOSHIBA STORAGE PLACE

CUICAU: Cisco Unified Intelligence Center for Advanced Users v1.x

SAP HANA Cloud Portal Overview and Scenarios

Transcription:

Virtual Training Environment Information Assurance and Forensics Training James Wrubel Anywhere, Anytime VTE Platform Lead, CERT 2006 by Carnegie Mellon University

About CERT Carnegie Mellon University U.S. Government Center of Excellence in Cyber- Security Software Engineering Institute Federally funded Research and Development Center (FFRDC) Sponsor is DoD CERT Internet s Hub for Cyber Security 2006 by Carnegie Mellon University 2

CERT s Training Problem History Issues Four-course IA and Forensics training curriculum (14 instruction days) Targeted at system administrators and first responders Captured to DVD for retention Logistics Bringing students to material Bringing material to students Accessibility Replicating Lab environment Installing DVDs Time! 2006 by Carnegie Mellon University 3

CERT s Solution - VTE Web-based individual training on IA/IT topics Worldwide availability Deep, integrated instruction Leverages curriculum model and material Establish expert network to add/improve content Content Types Documents: Handbooks, technical notes, white papers Demos: Narrated recordings of instructors configuring systems and software Lectures: Video-captured course deliveries including student interactions Labs: Hands-on environments using virtual machine technology 2006 by Carnegie Mellon University 4

CERT s Solution VTE (2) Library Mode Open, public access (except for Labs) Quick access to specific topics and content Training Mode Instructor-facilitated courses online using CERT material Robust progress tracking and reporting Quizzes Content neutral 2006 by Carnegie Mellon University 5

How VTE Helps No Logistics Necessary Travel, lodging, perdiem, opportunity cost The lab in the basement Rich, Interactive, Accessible Content Visible Training Progress Quizzes Group and Individual Reporting Context Scenarios woven through content Video from student POV Time! Interrupt-driven workforce Impact of turnover 2006 by Carnegie Mellon University 6

The VTE Power Curve [Students retain] 10 percent of what they read, 26 percent of what they hear, 30 percent of what they see, 50 percent of what they see and hear, 70 percent of what they say, and 90 percent of what they say as they do something. (Stice 1987). READ IT HEAR IT SEE IT DO IT Documents White papers Technical briefs Lecture modules Recorded demonstrations Hands-on training labs Mastery Content Richness 2006 by Carnegie Mellon University 7

What You Can Do With VTE Take instructor-facilitated courses online Individual Workforce Report compliance with training mandates DoD 8570 FISMA Consolidate or Eliminate Training Labs Host Your Own Content Any type VTE can present Access-controlled Partner with CERT to develop new material 2006 by Carnegie Mellon University 8

VTE System Requirements Web Browser: IE 6.0 + or Mozilla Firefox 1.0 + Screen Resolution: 1024x768 + Broadband Internet Connection (>200kbps) Sometimes a problem in deployed environments For Curriculum/Library/Video: Macromedia Flash 6.0 r65 + For Lab environment: Internet Explorer must be configured to allow signed ActiveX or Signed Applets to run For Firefox, Java VM 1.4.2 or 1.5 must be installed 2006 by Carnegie Mellon University 9

Who s Using VTE: DoD The Army Reserve Information Operations Command uses VTE to: Quickly spin up new soldiers Train in deployed environments (including Iraq) Certify soldiers on VTE material Build a Cisco Network Device security specialization The Marine Forces Pacific is using VTE to: Pilot 8570 compliance training requirements Train in deployed environments Build a Cisco Network Device security specialization 2006 by Carnegie Mellon University 10

Who s Using VTE: Federal Agencies The U.S. Department of Homeland Security uses VTE to: Develop and deploy custom training material for gap areas such as Computer Forensics Support intra-agency training Improve Cyber Incident Response capabilities The U.S. Secret Service will use VTE to: Support anywhere, anytime access to computer forensics material (including podcasting) Maintain a robust on-demand training capability for forensic tools such as EnCase Enterprise Edition, AccessData Forensic Toolkit, and OnlineDFS 2006 by Carnegie Mellon University 11

VTE: Demonstrations 2006 by Carnegie Mellon University 12

VTE: Training Mode Launch Multiple training tracks using outline-style navigation Lectures, demos, labs, quizzes System handles progress and completion reporting 2006 by Carnegie Mellon University 13

VTE: Viewing Lecture Topics Launch Synchronized slide and video with available searchable transcript VCR-style controls Remembers where you left off 2006 by Carnegie Mellon University 14

VTE: Assessments Launch 2006 by Carnegie Mellon University 15

VTE: Hands-on Labs Launch Browser-based, embedded desktop Uses virtual machine technology Deploys on demand 2006 by Carnegie Mellon University 16

Questions? Trial Accounts? 2006 by Carnegie Mellon University 17