Welcome to the Summer Workshop on Cybersecurity for Faculty of Community Colleges in Texas The Program



Similar documents
How To Train On Information Security

Cyber Innovation and Research Consortium

Report on Internet-based. Meningococcal Exemption Requests for Public Junior and Community Colleges. SchoolYear2Ol

Texas Board of Nursing 2013 Enrollment, Graduation, and Admissions Professional Nursing Programs

CIS 253. Network Security

Subotal - Community and Technical Colleges 267

Dallas/Fort Worth Chapter WTS Undergraduate Scholarship. Application Checklist

Introduction to Cyber Security / Information Security

NATIONAL INITIATIVE FOR CYBERSECURITY EDUCATION SAN DIEGO, CA

Texas Board of Nursing 2013 Enrollment, Graduation, Admissions Vocational Nursing

Soran University Faculty of Science and Engineering Computer Science Department Information Security Module Specification

Certifications and Standards in Academia. Dr. Jane LeClair, Chief Operating Officer National Cybersecurity Institute

Bellevue University Cybersecurity Programs & Courses

TEXAS TESTING CENTERS

Peace Officer Tuition Exemption Eligible Programs

MODULES FOR TRAINING PROGRAMMES ON CYBER SECURITY

Dallas/Fort Worth Chapter WTS Undergraduate Leadership. Scholarship. Application Checklist

Building the Next Generation of Computer Security Professionals. Chris Simpson

Report of NCLEX-RN Examination Pass Rates for 2013

Outlet: Austin Business Journal (online) Date: December 17, 2014 Unique Visitors Per Month: 151,284 Link:

FY 2015 Hinson-Hazlewood Allocations

University of Maryland Cybersecurity Center (MC 2 )

CRYPTOGRAPHY AS A SERVICE

How To Understand The Internet Of S (Netware)

National Cyber League Certified Ethical Hacker (CEH) TM Syllabus

INTRA-STATE REGIONAL ASSOCIATIONS

National Cyber League Certified Ethical Hacker (CEH) TM Syllabus

TEXAS 2011 For a strong economy, the skills gap must be closed.

WTS Community College/Technical/Trade School Scholarship. Application Checklist

InfoSec Academy Application & Secure Code Track

LBB Performance Measures Comparison of FY 2009, FY 2011 & FY 2013 Big 10 Community Colleges with Statewide

Education and Training Voucher (ETV) Program TUTORING SERVICES & RESOURCES

Certificate in Cyber Security

SCADA Security Training

LBB Performance Measures FY 2013 Big 10 Community Colleges with Statewide

LSC-Montgomery. Institutions Attended, Fall 2009 Academic Students. LSC-Montgomery

(Instructor-led; 3 Days)

Testimony of Eunice Santos. House Oversight and Government Affairs Committee Subcommittee on Information Technology

The following table provides a comparison of Texas pass rates with the national average. Year % 9,290/11,


Computer Security (EDA263 / DIT 641)

1 State Tuition Reimbursement Prog ram ELIGIBLE SCHOOLS

Sabbatical Leave Application

Cybersecurity AAS Program

Dr. Dave Dampier Professor of Computer Science and Engineering

Center of Academic Excellence Cyber Operations Program 2013 Application

Computer Security. Principles and Practice. Second Edition. Amp Kumar Bhattacharjee. Lawrie Brown. Mick Bauer. William Stailings

BBA/MBA & Diversity Programming

CS 464/564 Networked Systems Security SYLLABUS

InfoSec Academy Forensics Track

Cybersecurity Definitions and Academic Landscape

CURRICULUM VITAE. American Association of Wound Management Alexandria, VA 2004 to present Re Certified March Shannon Home Health.

Cyber Security Awareness Workshop

FRONT RUNNER DIPLOMA PROGRAM INFORMATION SECURITY Detailed Course Curriculum Course Duration: 6 months

U. S. Attorney Office Northern District of Texas March 2013

The USNA Cyber Program

Course Outline Computing Science Department Faculty of Science. COMP Credits Computer Network Security (3,1,0) Fall 2015

Summer College Visits. School Tour Information Summer Tour Times / Dates ABILENE CHRISTIAN UNIVERSITY

Cybersecurity education for the next generation Emerging best practices

According to Texas Higher Education Coordinating Board data, the following ATC courses are available at these colleges. Please note that not all

Securing Data on Microsoft SQL Server 2012

90% of data breaches are caused by software vulnerabilities.

SECURITY PRACTICES FOR ADVANCED METERING INFRASTRUCTURE Elif Üstündağ Soykan, Seda Demirağ Ersöz , ICSG 2014

TRANSFER COURSES TYLER JUNIOR COLLEGE

Security in Smart Grid / IoT. Nenad Andrejević Comtrade Solutions Engineering

MS-55096: Securing Data on Microsoft SQL Server 2012

National Registry-Texas Pass Percentage December 1, 2012 to November 30, 2013

How To Use Pretty Good Privacy (Pgp) For A Secure Communication

Total Number of Foreign Students: 49,081. Part 1: Net Contribution to State Economy by Foreign Students ( )

MS in Computer Science with specialization in Computer Security. Prof. Clifford Neuman

UNM Information Assurance Scholarship for Service (SFS) Program

CYBER SECURITY, INTELLIGENCE AND AWARENESS COURSE PARK HOTEL THE HAGUE THE HAGUE, NETHERLANDS 26-30OCTOBER 2015

COURSE NAME: INFORMATION SECURITY INTERNSHIP PROGRAM

Georgia Tech Cybersecurity Leadership Certificate Program July 25 29, 2016

KEY TRENDS AND DRIVERS OF SECURITY

An Accelerated Pathway to Careers in Cybersecurity for Transitioning Veterans. NICE Annual Conference November 2015

Graduate Program in Information Security

How To Secure Cloud Computing

MySQL Security: Best Practices

Anthony J. Keane, MSc, PhD and Jason Flood, MSc Information Security & Digital Forensics Research Group Institute of Technology Blanchardstown

MASTER OF SCIENCE IN INFORMATION ASSURANCE PROGRAM DEPARTMENT OF COMPUTER SCIENCE HAMPTON UNIVERSITY

Transcription:

Welcome to the Summer Workshop on Cybersecurity for Faculty of Community Colleges in Texas The Program July 14-18, 2014 Computer Science Department Texas Tech University

Welcome To Texas Tech University It is our great pleasure to have you here Help in...****... (It is encrypted, will be decrypted in the end)

The Goals Promote Cybersecurity research, practice, and education in the Texas Build a cybersecurity capacity Introduce more cybersecurity related courses into the curricula offered at community colleges Transfer students from community colleges to four-year higher education institutes

The Goals Building a Community West Texas Cybersecurity Consortium Facebook Page https://www.facebook.com/pages/west-texas-cyber-security-consortium/179971908805946 The Web Site http://cybersec.orglearn.com

The Organizers Texas Tech University Dr. Rattikorn Hewett Software Security, Network Security Dr. Akbar Siami Namin Information and Data Security, Software Security Angelo State University Dr. James Phelps Cyber evidence and Forensic Dr. Fred Wilson An Introduction to cybersecurity University of California, Riverside Dr. Hamed Rad Smart Grid Security Evaluator Dr. Fethi Inan, Texas Tech University

The Graduate Students (Ph.Ds) Running Hands-on Experience Sessions Alaa Darabseh Elham Hojati Sara Sartoli Xiaozhen Xue

The Keynote Speakers Fatih Ari and Raymond Flores College of Education, Texas Tech University Jeffrey Zhang Moving Target Defense Research Texas Tech Application Development Section

The Lab Work A group form the Sandia National Lab Malware Analysis

The Participants 1. Jason Brown, Texas A & M University 2. Trevor Chandler, Houston Community College 3. Abel Danny Dominguez, El Paso Community College 4. Ervin Frenzel, Amarillo College 5. Misty Frenzel, Amarillo College 6. Gregg Greer, Lubbock Christian University 7. Debbie Lamprecht, Rangers College 8. Rajiv Malkan, Lone Star College Montgomery 9. Nicole Mitchell, Lamar Institute of Technology 10. Delfina Najera, El Paso Community College 11. Yu-Pa Ng, San Antonio College 12. Alexey Petrenko, Austin Community College 13. Lopa Roychoudhuri, Angelo State University 14. Diane Underwood, Southwest Texas Junior College 15. Ben Walton, South Plains College 16. Ira Wilsker, Lamar Institute of Technology

The Schedule

The Workshop History 2013 For the first time offered 16 faculty from community colleges participated For one week Six topics were covered The participants were mentored with the purpose of Building a community of cybersecurity Encouraging the participants to introduce a new course or a new module in cybersecurity into their curricula

Topics to be Covered and Discussed Six technical topic to give the participants a holistic view of cybersecurity including: 1. Computer Science, 2. Smart Grids and Power Plans, 3. and Cyber Crime and Forensics

Topic I Cybersecurity Fundamental Basic concepts in computer security, threat analysis, and security development life cycle Topics: Introduction to Security Security Technology Operational and Physical Security Sample Course Modules and Syllabus

Topic II Information and Data Security An overview of the principles and approaches to information and data security Topics: Data Security Principles Security Attacks Security Services Model of Network Security Cryptography. Symmetric Encryption Asymmetric Encryption. Authentication. Digital Signature

Topic III Network Security Basic concepts in network security and cyber attack and defense mechanisms Topics: Introduction to Network Security Network Defense and Technical Operational Security Network Layer Security Network Denial of Service

Topic IV Software Security Basic security issues in software system designs, and techniques for holistic approaches to verification and assessment of security properties of software systems Topics: Secure Software Development Life Cycle Web Security Vulnerability Case Studies

Topic V Smart Grid Security An overview of basic concepts in smart grid and smart grid security and privacy Topics: Introduction to Smart Grid Smart Grid Security and Privacy Challenges Case Studies Defense Mechanism

Topic VI Cyber Evidence and Forensics Basic concepts in evidence identification, collection, storage, and forensic analysis under current U.S. law Topics: Introduction of cybercrime law Cyber evidence collection Cyber Evidence Analysis Sample Courses and Syllabus

Topic VII Hands-On Experiences Damn Vulnerable Web Applications WebGoat and OWASP Backtrack Enviornment

The Procedure and Expectations Pre Workshop Fill out and sign the participation agreement Fill out the pre-workshop evaluation form Build a team of 1 or 2 Work together and develop the syllabus of a new course or module that you think you can introduce/integrate into your curriculum Give a short technical presentation of your selected topic that will be part of your course module Give a short description of your syllabus

The Procedure and Expectations During the Workshop Fill out pre/post session evaluation forms Be in time 8:00 to 6:00 for one week Give us feedback on how to improve the workshop

The Procedure and Expectations Post Workshop Fill out the post workshop evaluation Fill out the application plan form and participate in mentorship activities Present your course module and a summary of technical part (Thursday afternoon) Depending on the number of teams, the time will be allocated 20 30 presentation time minutes each team

The Help Needed Help in Building a Capacity and a Community of Cybersecurity Research and Education In Texas (The decrypted message)