Presentations
Cybersecurity for Non-IT Majors is an elective course that satisfies the technological literacy requirement at Pennsylvania College of Technology. The course strives to educate students to identify and understand the risks – to both themselves and the organizations they represent – associated with their actions. Topics are arranged in (mostly) standalone modules that include protecting confidentiality, integrity and availability; network and wireless security; social engineering; policy, legal issues and professionalism; risk and contingency planning.
Cyber Space has joined air, land, sea and space as the latest domain of warfare. This course examines warfare in the cyber domain beginning with an understanding of how it fits within the context of traditional theory of war. The course examines how countries prepare and apply capabilities and strategies, the impacts of non-state actors, and the future development of cyber warfare. Students are prepared to understand the impact of the extension of warfare into the cyber domain.
Provides an introduction to the real-world aspects of defending an enterprise network. Students will gain hands-on experience performing system security tasks and handling incidents. The class begins with a basic introduction to enterprise cybersecurity, the attack sequence, and managing cybersecurity. Then lecture, homework and lab activities cover the center for internet security's twenty essential security controls.
Students enrolled in Pennsylvania College of Technology's Information Assurance and Cyber Security program are required to take a two one-credit course sequence called IAS Seminar during their final fall and spring enrolled in the program. The course was designed to be a transition from college to career and discusses topics related to that transition as well as current events.
A CISO’s world is daunting and overwhelming. Incremental improvements but more technical debt. A first principles mindset can help. The network defender’s atomic first principle: Reduce the probability of material impact to our organization.
The supply chain represents a massive attack surface for attackers given the ability to leverage one vulnerability at one company to impact hundreds or thousands of others. For several decades, supply chain management was focused on cost optimization via practices such as just-in-time inventory management. But today, several forces are impacting supply chain management. One of those forces, the evolving and increasing ransomware threats, is pushing supply chain cybersecurity in new directions. What does this mean for the next generation of cyber practitioners?
Cyber Defense Competitions provide students with challenging, hands-on, fun, and close to real world opportunities to learn, practice, and perform tasks that they will be expected to complete as cybersecurity professionals. The current availability of training resources focused on Cyber Defense Competitions is limited. We introduce CYOTEE: CYbersecurity Oriented Training Environment and Exercises.
Given the demand for Cybersecurity workforce, the goal of the RUSecure project at Radford University is to increase the pipeline of students who plan to pursue Computer Science/IT as a major with Cybersecurity as their focus. We identified a variety of challenges to the introduction of Cybersecurity topics in high school including lack of qualified teachers, limited number of students motivated to study IT topics, large number of prerequisite topics and scarcity of computing resources required for such topics.
Advanced persistent threats are causing several serious cybersecurity events due to their highly stealthy characteristics, advanced technology and tools, and complicated attacking strategies, making them an imminent challenge to cybersecurity professionals. To conquer such a challenge, a thorough and dedicated defense plan must be addressed, and we believe engaging advanced persistent threat learning experiences to computer science and cybersecurity students in the early stages of their college education will be the most important part of the plan.
DoD is migrating to the new CMMC framework in order to assess and enhance the cybersecurity posture of the Defense Industrial Base (DIB) sector. The CMMC is intended to serve as a verification mechanism to ensure that DIB companies implement appropriate cybersecurity practices and processes to protect Federal Contract Information (FCI) and Controlled Unclassified Information (CUI) within their unclassified networks.
Increased employment rate for graduates. Increased competitive advantage over other institutions. Market positioning: become the center of a cybersecurity ecosystem. Ensure curriculum stays current.
Hands on labs are a critical component of any cybersecurity program and a requirement to become an NSA/DHS Center of Academic Excellence. Several ways to deliver lab content: develop and deploy labs on internal or outsourced infrastructure; utilize labs from external lab providers; utilize free grant resourced labs; Use free and open source labs. Managing an internal lab environment is expensive.
Anecdotally, most cybersecurity curricula is based on the technical aspects of protecting, defending, and responding to cyber attacks. While these courses establish a solid foundation in the technical aspects of cybersecurity, what is often missing is establishing a foundation in cybersecurity law. Every individual who puts their hands on a keyboard operates within an uncertain ethical and legal framework.
The National Cyber League (NCL) is the most inclusive, performance-based, learning-centered collegiate cybersecurity competition today! The NCL, powered by Cyber Skyline, enables students to prepare and test themselves against practical cybersecurity challenges that they will likely face in the workforce, such as identifying hackers from forensic data, pentesting and auditing vulnerable websites, recovering from ransomware attacks, and much more!
Powered by Phoca Download
Copyright © 2024 CISSE™. All rights reserved.