The USNA Cyber Program



Similar documents
The Case for Support: The Center for Cyber Security Studies at the U. S. Naval Academy

Computer Science Department United States Naval Academy. With Knowledge we Serve our Friends... With Knowledge we Defeat our Enemies

Center of Academic Excellence Cyber Operations Program 2013 Application

Certifications and Standards in Academia. Dr. Jane LeClair, Chief Operating Officer National Cybersecurity Institute

Bellevue University Cybersecurity Programs & Courses

A Systems Engineering Approach to Developing Cyber Security Professionals

Cyber Exercises, Small and Large

MASTER OF SCIENCE IN INFORMATION ASSURANCE PROGRAM DEPARTMENT OF COMPUTER SCIENCE HAMPTON UNIVERSITY

TEACHING COMPUTER SECURITY WITH A HANDS-ON COMPONENT

Cyber Security at NSU

Introduction to Cyber Security / Information Security

COMPSCIDEPTINST Dec Purpose. This instruction updates the Computer Science Department s Assessment Plan.

Securing Data on Microsoft SQL Server 2012

Course Content Summary ITN 261 Network Attacks, Computer Crime and Hacking (4 Credits)

National Cyber League Certified Ethical Hacker (CEH) TM Syllabus

Soran University Faculty of Science and Engineering Computer Science Department Information Security Module Specification

COURSE NAME: INFORMATION SECURITY INTERNSHIP PROGRAM

MS-55096: Securing Data on Microsoft SQL Server 2012

Information Assurance Program at West Point

e-code Academy Information Security Diploma Training Discerption

National Cyber League Certified Ethical Hacker (CEH) TM Syllabus

INFORMATION SCIENCE. INFSCI 0010 INTRODUCTION TO INFORMATION SCIENCE 3 cr. INFSCI 0015 DATA STRUCTURES AND PROGRAMMING TECHNIQUES 3 cr.

InfoSec Academy Application & Secure Code Track

CSCI 454/554 Computer and Network Security. Instructor: Dr. Kun Sun

Security Goals Services

Information Fusion (Hard and Soft) For Intelligence, Surveillance & Reconnaisance (ISR) Joint Symposium IST-106 and SET-189

Department of Computer Science

Cyber Learning Solutions

About the Authors Preface Acknowledgements List of Acronyms

SCADA/ICS Security in an.

NSA/DHS Centers of Academic Excellence for Information Assurance/Cyber Defense

Principles of Information Assurance Syllabus

CEH Version8 Course Outline

CRYPTUS DIPLOMA IN IT SECURITY

Curran, K. Tutorials. Independent study (including assessment) N/A

CCA CYBER SECURITY TRACK

Computer Security. Introduction to. Michael T. Goodrich Department of Computer Science University of California, Irvine. Roberto Tamassia PEARSON

Computer Scientist. Conduct research in latest computer and network security technologies for high assurance system security solutions

Ethical Hacking and Information Security. Foundation of Information Security. Detailed Module. Duration. Lecture with Hands On Session: 90 Hours

EC Council Certified Ethical Hacker V8

CSSIA CompTIA Security+ Domain. Network Security. Network Security. Network Security. Network Security. Network Security

Triangle InfoSeCon. Alternative Approaches for Secure Operations in Cyberspace

2015 Michigan NASCIO Award Nomination. Cyber Security Initiatives: Michigan Cyber Disruption Response Strategy

FRONT RUNNER DIPLOMA PROGRAM INFORMATION SECURITY Detailed Course Curriculum Course Duration: 6 months

Certified Cyber Security Analyst VS-1160

Secure Software Programming and Vulnerability Analysis

Implementing Cisco IOS Network Security

New-Age Master s Programme

Security + Certification (ITSY 1076) Syllabus

CYBERTRON NETWORK SOLUTIONS

FORBIDDEN - Ethical Hacking Workshop Duration

Capacity Building in Cyber Security Literacy: An Inter-disciplinary Approach

IINS Implementing Cisco Network Security 3.0 (IINS)

Security in Wireless Local Area Network

How To Pass The Information And Network Security Certificate

DESIGNING WEB LABS FOR TEACHING SECURITY CONCEPTS ABSTRACT

Computer Security Curriculum at the Univ. of Wisconsin Eau Claire. Paul J. Wagner

CWNA Instructor Led Course Outline

Certified Cyber Security Analyst VS-1160

PATRIOTWATCHTM PATRIOTSHIELDTM PATRIOTSWORDTM

EC-Council. Certified Ethical Hacker. Program Brochure

Professional Penetration Testing Techniques and Vulnerability Assessment ...

Department of Information Systems and Cyber Security

Building the Next Generation of Computer Security Professionals. Chris Simpson

Certified Ethical Hacker Exam Version Comparison. Version Comparison

Course Design Document. IS403: Advanced Information Security and Trust

Security Threats on National Defense ICT based on IoT

Master of Science in Information Systems & Security Management. Courses Descriptions

Global Cyber Range (GCR) Empowering the Cybersecurity Professional (CyPro)

KEN VAN WYK. Fundamentals of Secure Coding and how to break Software MARCH 19-23, 2007 RESIDENZA DI RIPETTA - VIA DI RIPETTA, 231 ROME (ITALY)

Information Technology Career Cluster Introduction to Cybersecurity Course Number:

CS 356 Lecture 29 Wireless Security. Spring 2013

Problems of Security in Ad Hoc Sensor Network

Designing and Coding Secure Systems

University of Maryland Cybersecurity Center (MC 2 )

NSA/DHS CAE in IA/CD 2014 Mandatory Knowledge Unit Checklist 4 Year + Programs

Networking: Certified Wireless Network Administrator Wi Fi Engineering CWNA

CCNA Security v1.0 Scope and Sequence

LINUX / INFORMATION SECURITY

Cybersecurity education for the next generation Emerging best practices

Information Security Services

Computer Science at James Madison University

Computer Science & Engineering Department. Robert McCartney Director of Undergraduate Computing Education ITE robert@engr.uconn.

Loophole+ with Ethical Hacking and Penetration Testing

2. Cyber security research in the Netherlands

Protecting Your Organisation from Targeted Cyber Intrusion

A COMPARITIVE ANALYSIS OF WIRELESS SECURITY PROTOCOLS (WEP and WPA2)

What is Web Security? Motivation

Information Systems Security Certificate Program

[CEH]: Ethical Hacking and Countermeasures

CS 340 Cyber Security Weisberg Division of Computer Science College of Information Technology & Engineering Marshall University

Transcription:

The USNA Cyber Program Turning Midshipmen into Cyber Warriors CAPT Paul Tortora, USN Director, Center for Cyber Security Studies

Bottom Line Up Front All Midshipmen now take two Cyber Security Courses (Plebe year, Junior year) USNA now offers an interdisciplinary Cyber Operations Undergraduate Major Cyber-Domain as an Operational Domain, so USNA is expanding Cyber across the 4-year curriculum, inside and outside the classroom

What do all these images have in common? They all use electronic wireless communications, perhaps with a cloud service but how is it protected? What are potential threats? Is it secure? Are these communications guaranteed?

What s Next in the Battlespace? Unmanned, Autonomous & Wireless

CCSS Mission To enhance the education of midshipmen in all areas of cyber warfare, to facilitate the sharing of expertise and perspective in cyber warfare from across the Yard, and to enhance inter-disciplinary research in cyber warfare at USNA. Transforming the Navy 1,100 Midshipmen at a time

Overview of Cyber Education at USNA Programs and Facilities Curricular Elements Cyber Internships Cyber Defense Exercise (CDX) Cyber Warfare Club Cyber Lecture series Few Many Cyber Operations major Senior Design projects Single/multi-disciplinary electives Professional Core Competencies All 2 required Cyber core courses Goal: Prepare Graduates to Lead in an Evolving Cyber Domain

Cyber 1 Plebe Year Mandatory for all USNA students starting with Class of 2015, our current seniors who will be the bowwave of enhanced Cyber awareness to the Fleet Course focuses on cyber operations Context motivated by current events Technical emphasis; non-technical related to context Fundamentals of risks and threats Hands-on experiences Tie-in topics to Fleet operations when possible

Plebe Cyber I Topics Cyber Battlefield Digital Data: Bits & Bytes Computer Architecture OS Basics & File Systems Java Scripting, conditionals, Loops Basic Web & HTML Client Side Scripting Server Side Scripting, Injection Attacks & XSS Networking Basics,Ports Protocols, Layers Build Wired & Wireless Network Security Tools Symmetric, Asymmetric Encryption Hashing & Passwords Cryptography/ Digital Cryptography Digital Certificates Lab Port security, Firewalls Steganography, Hidden files Risk assessment Cyber Operations Digital Forensics, Forensics Lab Malware, Case Studies Reconnaissance: Phases of a Cyber Attack & Cyber Recon, Cyber Recon Lab Attack:, Cyber Attack, Cyber Attack Lab, Cyber Attack Lab Debrief Defense: Cyber Defense, Cyber Defense Lab, Cyber Defense Lab Debrief

Cyber 2 Junior Year Started last year (Class of 2015) Technical focus; non-technical context Emphasize networks and electrical/electronics applications Deeper awareness and understanding of the cyber realm Project Based Learning focus Initially based on required EE course, modified to provide Cyber/IW/EW context Requires laptops and lab equipment Topics that directly relate to Communications and use of the Electro-Magnetic Spectrum in the Fleet

Cyber 2 Junior Year Cyber Security Operating Systems, Assembly Language Basics Data Management / Memory Management Privilege Management Buffer Overflow & Prevention Network Protocol Hierarchies and Reference Models Internet / Network Layers Encryption: Symmetric / Asymmetric / 802.11, WEP, WPA Transport Layer Security Electro-Magnetic Spectrum Principles of the RF Spectrum Signals, Gain, and db Bandwidth Sharing/ Multiplexing Digital Modulation Schemes / Information Theory Antennae and RF Propagation Eavesdropping, Jamming, Spoofing Spread Spectrum Frequency Hopping

New Cyber Operations Academic Major Initiated last Academic Year (one of 25 Academic Majors) 28 MIDN from Class of 2016 in the major 59 from Class 2017 Interdisciplinary approach in its inception and execution Developed with inputs from all departments 50 credits for major, 142 total credit loading Professors and Military faculty from across academic departments Cyber context drives each course in the major New courses distinct from existing ones SCY is a technical (STEM) major, but maintains 3-5 non-technical courses to keep an appropriate balance Seeking ABET Accreditation with similar programs nationwide

Cyber Operations Major Courses & Content Technical Courses Cyber Fundamentals Cyber Systems Engineering Programming Web / Database For Cyber Data Structures Architecture (H/W Plus Assembly Language) Networking & Wireless Comms Systems Programming / OS Fundamentals Security Fundamental Principles Cyber Offense / Cyber Defense Non-Technical Courses: Cyber Planning & Policy Cyber Law/Ethics Social Engineering (Cyber Psychology) Electives (2 from below): History of Technology & Cyber-warfare, Applied Cryptography, Cyber Defense Strategies SCADA Mobile Programming Forensics Other: NSA, DOD, Navy and Civilian Cyber-related Internships, projects being expanded

CCSS Staff & Faculty A desired blend of Operational experience Technical experts (CS, EE, WSE) Experts on attack and defense techniques Policy / law experts World-class thought leaders who are helping to create the nation s policy and law Currently heavily reliant on other USNA departments and Cyber Fellows Goal: LEAD the nation in undergraduate cyber operations education and beyond

The Many: CCSS Lecture Series ADM Dennis Blair ADM Mike Rogers Kevin Mandia Dr. Martin Libicki GEN James Cartwright GEN Mike Hayden GEN Keith Alexander Mr. David Gompert Jane Holl Lute, DHS Mark Bowden Richard Clarke Kevin Mitnick

What Cyber SHOULD Look Like

Proposed Cyber Building FY15 Budget Item: $120M for construction, target completion 2018/19 Will co-locate similarly focused academic majors: Cyber Operations, Computer Science, Information Technology, Computer Engineering, Systems Engineering and Electrical Engineering Will have SCIF classrooms and lecture space

Questions?