Someone s sitting in the shade today because someone planted a tree a long time ago. Warren Buffett. Ed Skoudis Mike Qaissaunee.



Similar documents
CyberSkills Management Support Initiative

SANS CyberTalent VetSuccess Immersion Academy. VetSuccess

The fast track to top skills and top jobs in cyber. Guaranteed.

The fast track to top skills and top jobs in cyber. Guaranteed.

An Accelerated Pathway to Careers in Cybersecurity for Transitioning Veterans. NICE Annual Conference November 2015

VetSuccess. Top employers providing America s veterans with careers in cybersecurity

Information Security Engineering

OVERVIEW DEGREES & CERTIFICATES

Course Descriptions November 2014

Contestant Requirements:

Securing Networks, Securing Futures

MASTER S DEGREES & GRADUATE CERTIFICATES REGIONAL ACCREDITATION FUNDING OPTIONS

Background ( )

CCA CYBER SECURITY TRACK

Protecting Energy s Infrastructure and Beyond: Cybersecurity for the Smart Grid

DoD Directive (DoDD) 8570 & GIAC Certification

NICE 2015 Conference

Impact of Cybersecurity Education in High Schools and Small Businesses in Hawaii. Challenges and Opportunities NICE Conference 2015

Encouraging young people to develop the aptitude and skills to become the core of a strong cybersecurity community.

ACADEMIC AFFAIRS COUNCIL ******************************************************************************

167 th Air Wing Fast Track Cyber Security Blue Ridge Community and Technical College

Undergraduate and Post-baccalaureate Program Initial Application Process Procedure:

167 th Air Wing Fast Track Cyber Program Blue Ridge Community and Technical College

MEETING THE NATION S INFORMATION SECURITY CHALLENGES

Cyber Exercises, Small and Large

Building the Next Generation of Computer Security Professionals. Chris Simpson

Cybersecurity High School and Beyond

[STAFF WORKING DRAFT]

Cyber Defense Operations Graduate Certificate

Make this your next step. The State of New Jersey Certified Public Manager Program

A. Centrality to institutional mission statement and planning priorities:

Wyoming Community College Commission Request for New, Pilot or Revised Degree or Certificate Program

2015 CyberPatriot Conference

Track 2: Introductory Track PREREQUISITE: BASIC COMPUTER EXPERIENCE

Wyoming Community College Commission Request for New, Pilot or Revised Degree or Certificate Program

HR 2272 Conference Report STEM Education Provisions Summary

New-Age Master s Programme

SELECTION // ASSESSMENT // TRAINING EXAMINATION //GRADUATION

National Cyber League Certified Ethical Hacker (CEH) TM Syllabus

GENERAL QUESTIONS FAQS

How to use the National Cybersecurity Workforce Framework. Your Implementation Guide

Quarterly Cybersecurity BILT Meeting November 19, Meeting Minutes

DHS. CMSI Webinar Series

Strategy and Resources to Strengthen IT Programs. Academic Leadership Conference May 28, 2015

Lakeland Community College Campus Completion Plan

Transform Your Life! Choose a Berkeley City College Learning Community to help ensure your college success!

Cybersecurity Real World Connections Summer Boot Camp at NJIT

Allegany College of Maryland. 239 Cisco Networking 2 * Offered Fall semester and

Kerry Kidwell-Slak and Kate Phelps Assistant Directors, Professional Practice UMBC Shriver Center

TURNING THE RISING TIDE OF CYBERSECURITY THREATS

1. What are the philosophical underpinnings of the program?

Master of Arts PUBLIC POLICY. Graduate PROGRAMS

Design and Configuration of a Network Security and Forensics Lab

National Cyber Security Awareness Month. Week Five: Building the Next Generation of Cyber Professionals

SUNY Empire State College Information Presentation

ITS425: Ethical Hacking and Penetration Testing

THE SAN DIEGO MAYORS CYBER CUP (SDMCC) ORIENTATION 10 NOVEMBER 2015

National Cyber League Certified Ethical Hacker (CEH) TM Syllabus

Exploring a National Cyber Security Exercise for Community Colleges

Computer Security and Investigations

Minnesota State Community and Technical College Detroit Lakes Campus

School & Program Guide. A Family Centered Public Cyber Charter School

Interdisciplinary Program in Information Security and Assurance. By Kossi Edoh NC A&T State University Greensboro

Understanding the Skills Gap

Advanced Cybersecurity Experience for Students (ACES) Program

Define & Assess Skills - Smart Grid Security Specialists

Specialized Certificate in Healthcare Information Technology:

A. Centrality to institutional mission statement and planning priorities:

NATIONAL INITIATIVE FOR CYBERSECURITY EDUCATION SAN DIEGO, CA

Principles of Information Assurance Syllabus

SECURE AND TRUSTWORTHY CYBERSPACE (SaTC)

E M P I R E C O L L E G E

SECURE POWER SYSTEMS PROFESSIONALS (SPSP) PROJECT PHASE 3, FINAL REPORT: RECRUITING, SELECTING, AND DEVELOPING SECURE POWER SYSTEMS PROFESSIONALS

ICT and Networking Courses Prepare and Inspire Future Innovators

University of North Georgia

USING INFORMATION ASSURANCE CURRICULUM STANDARDS AS A BASIS FOR A GRADUATE DEGREE

Cybersecurity AAS Program

LAKELAND BUSINESS ENGINEERING TECHNOLOGIES. Opportunity. and. starts HERE COMMUNITY COLLEGE.

Cyber threats are growing.

Cyber Security at NSU

Homeland Security Graduate Programs

Course Design Document. Information Security Management. Version 2.0

Brandman University. School of CCNA

GRADUATE PROGRAM CURRICULUM

INVESTMENT STRATEGIES FOR DEVELOPING TECH TALENT

How To Become A Cybersecurity Consultant

Michelle Govan & Anand Philip Network & Security Engineering

National Initiative for Cyber Security Education

How to Pursue a Career in. human resources. Five Simple Steps to Success

For more information, please contact Anne Arundel Community College s Center for Workforce Solutions at

Partners in. Preparation. A Survey

MIS 5208 Data Analytics for IT Auditors Introduction & Course Overview

The Center for Educational Leadership

Talented People to Secure Our Future. Judy Baker, Director Cyber Security Challenge UK

UNM Information Assurance Scholarship for Service (SFS) Program

CYBER SECURITY TRAINING SAFE AND SECURE

Information Security Attack Tree Modeling for Enhancing Student Learning

CHAPTER 77 STANDARDS FOR TEACHER INTERN PREPARATION PROGRAMS

::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::: Trends

Technology Fee Proposal

Transcription:

New Jersey Cyber Aces Academy at Brookdale: A Collaborative Public/Private Model to Secure the Nation A project funded through NSF SFS Grant DUE#1331170 Ed Skoudis Mike Qaissaunee April 30, 2014 Someone s sitting in the shade today because someone planted a tree a long time ago. Warren Buffett

Agenda Introductions & Overview Motivation Phase 1: Recruitment and Essential Knowledge Development Phase 2: State Finals Phase 3: Coursework SANS Virtual Mentors Lab weekends Phase 4: Residencies Conclusions Q & A

MOTIVATION: To Align to and Help Support DHS Task Force on CyberSkills Recommendations

Objective III: Radically expand the pipeline of highly qualified candidates for technical mission-critical jobs through innovative partnerships with community colleges, universities, organizers of cyber competitions, and other federal agencies. Recommendation 6: Establish a two-year, community-college-based program that identifies and trains large numbers of talented men and women to prepare them for mission-critical jobs in cybersecurity (Page 17). Recommendation 7: Raise the eligibility criteria for designation as CAE and SFS schools to ensure that graduates are prepared to perform technical mission- critical cybersecurity jobs (Page 19). Recommendation 8: Launch a major, sustained initiative to enhance the opportunities for U.S. veterans to be trained for and hired in mission-critical cybersecurity jobs (Page 21).

New Jersey Cyber Aces Academy at Brookdale Pilot Single state pilot in NJ Conceived July and August 2012 Launched Fall 2012 Funded March 22, 2013 (NSF) Active progress on the project since then

4 Phase NJ Cyber Aces Academy Pilot Phase 1 Cyber Aces Training & Quizzes Approximately 250-300 people for pilot Phase 2 Face-to-face State Finals; Online NetWars Approximately 50-75 people for pilot Phase 3 Brookdale Curriculum & SANS Training Approximately 10-30 people for pilot Phase 4 Placement at Residency Approximately 5-8 people

4 Phase NJ Cyber Aces Pilot Participants who do not move to the next level still have useful skills The program will help place them with State, Federal, and commercial organizations

New Jersey Cyber Aces Academy at Brookdale Pilot Cohort from Year 1 underway (half-way done with Phase 3) Year two launched Fall 2013 on-line competitions and March 22, 2014 face-toface competition Six additional states starting Phase 1 now

Phase 1 Cyber Aces Online Training & Quizzes Approximately 250-300 people for pilot

Cyber Aces Online: Entry to the Funnel Cyber Aces Online is designed to prepare students in the fundamentals of information technology: Operating Systems (Windows and Linux config and usage) Networking (TCP/IP, routing, DNS, etc.) System administration for the enterprise (scripting with Bash, PowerShell, Perl, PHP, and more)

Cyber Aces Online: Entry to the Funnel Cyber Foundations consists of: Written training materials (with hands-on labs several based on downloadable virtual machines supported by Microsoft and VMware) Streaming audio and slides (through AuthorStream) Three on-line, competitive quizzes, offered every other week Whole program takes 6 to 7 weeks to complete across the Internet We offer it in the Fall each academic year Just finished our sixth run with over 3,000 participants Direct linkage to existing Brookdale courses (supplementary)

Cyber Aces Online: Entry to the Funnel Year Two Numbers Registration for Year 2, Phase 1 Turnout for Year 2, Test 1 Intro to Operating Systems

Cyber Aces Online: NJ Stats

Phase 2 Face-to-face NetWars Competition Approximately 50-75 people for pilot

NJ Governor s CyberChallenge March 23, 2013 Top Cyber Aces Online (Phase 1) participants competed in a face-to-face NetWars challenge, the system used by the US Military, US Government agencies, and many commercial companies to evaluate and train their people Verify participants really have capabilities and skills Give program organizers a chance to meet participants

http://www.youtube.com/watch?v=d5msf_stdj4

Phase 2 2nd Annual NJ NetWars competition March 22, 2014 Six other states also in Spring 2014

Phase 3 Brookdale Curriculum & SANS Training Approximately 10-30 people for pilot

Curriculum Currently funded by grants from SANS and NSF implementation in additional states contingent on availability of funding

NJCCB New Jersey Cyber Aces Academy at Brookdale Immerse the winners (top 10-30) of the NJ Governor s Cyber Aces State Championship competition in rigorous and intensive Cyber Security curriculum. The pilot of the NJ Cyber Aces Academy program will utilize existing Brookdale courses and established SANS Institute training (available at a significant discount and further subsidized by a SANS grant), taught via distance learning across the Internet.

NJCCB New Jersey Cyber Aces Academy at Brookdale Brookdale faculty, local SANS faculty, and industry experts will supervise the training, provide support to the students and meet periodically with the students to ensure their progress. NOTE: Beyond the pilot, the Program can opt to continue the use of SANS training or substitute an alternate training organization that provides the same skills at a comparable quality to ensure consistency of the program

NJCAAB Curriculum Linked to Cyber Aces Online Most of the courses are ~ 50% hands-on Courses delivered online, face-to-face, and hybrid.

NJCAAB Curriculum In addition to the normal course of study for an associate degree, these individuals will be immersed in a program of information security courses to prepare them for part-time work during and full-time work immediately following completion of the course of study. NOTE: For a BCC student, completion of the entire Program requires nine courses (four from BCC and five from SANS)

Curriculum Secure Configuration Penetration Testing Advanced Forensics Step 2: 3 courses in one of 3 areas of focus Step 1: 2 core courses: SEC401: Security Essential Bootcamp Style SEC504: Hacker Techniques, Exploits and Incident Handling

Secure Configuration SEC502: Perimeter Protection In-Depth SEC505: Securing Windows and Resisting Malware SEC506: Securing Linux/Unix

Penetration Testing SEC560: Network Penetration Testing and Ethical Hacking SEC542: Web App Penetration Testing and Ethical Hacking SEC575: Mobile Device Security and Ethical Hacking

Advanced Forensics SEC408: Computer Forensic Investigations- Windows In-Depth SEC508: Advanced Computer Forensic Analysis and Incident Response SEC610: Reverse-Engineering Malware: Malware Analysis Tools and Techniques

SANS Virtual Mentors SANS top virtual mentors for distance learning are available to help the cohort with technical issues Six people standing by E-mail, or voice if needed Help ensure learning and progress through the program

Build hands-on skills (not just book smarts) Conduct research Develop communication skills (presentations and writing) Build camaraderie Prepare for residencies

Lab Weekends

Phase 4 Placement at Residency Approximately 5-8 people

Stick Time Focus on hands-on skills Each course 35 to 50 % hands-on labs Plus supplementary lab weekends Further develop and validate with residencies

Objective for NJ Cyber Aces Residency Academy Program Residency Build a cohort of workplace-ready Cyber Warriors by combining the foundational knowledge and technical expertise developed in Phases 1, 2 and 3, with Phase 4 placement of highly-qualified students into a real-world, hands-on learning environment modeled after medical student residencies.

Residency Program Place the top 5 8 students in Residencies at government agencies, businesses, or other appropriate locations nationwide. These are paid positions where the student works on real-world projects in a team with experts to meet clients needs and develop actual hands-on experience in a cyber security job.

Residency Program Students will work under the supervision of practicing cyber security professionals and have actual deliverables associated with projects in digital forensics, attack analysis, vulnerability assessment, penetration testing, and other critical areas of cyber security.

Residency Program Each resident will be assigned a coach to provide supervision and guidance regarding project work, further skill refinement, and career development. We will monitor the residencies and conduct assessments and skills validations.

Residency Program Think internship, but with really talented individuals who have exceptional practical, hands-on training (not just book smarts and theory) actual work for actual pay * We need your help! Host organizations for residencies Mentors for residents Some have stepped forward already, but we need more! If interested in hosting a residency, or providing mentors, please let us know! * Some support available

Where We Are Now SECOND COHORT (2015 Completion) FIRST COHORT (2014 Completion)

Conclusion 2013 Pilot is underway: Phase 1 Ended 1/15/13 Phase 2 Finished 3/23/13 Phase 3 Underway (half-way done) Phase 4 (Residencies) will begin as soon as possible 2014 Second Round in Phase 1 Phase 1 Ended 12/15/13 Phase 2 Finished 3/22/14 Phase 3 Just starting Phase 4 Residencies We will document the entire process and lessons learned to share with other institutions.

Buckle up, and enjoy the ride. Q & A

Ed Skoudis ed@counterhack.com Contact Info Mike Qaissaunee mqaissaunee@brookdalecc.edu