Cracking the code on an IT career

Size: px
Start display at page:

Download "Cracking the code on an IT career"

Transcription

1 Cracking the code on an IT career Jade Khoo Patrick Hosseini & Laura Deans James Hamlyn-Harris CRICOS 00111D, TOID 3069

2 Snapshot of stories that made news 2

3 Hacks that leave you exposed The Australian government department has reported that the average cost of cybercrime attack to a business is around $276,000 Identity fraud up by 57% as thieves hunt on social media 95% of web attacks are financially motivated Hacker steals 45 million accounts from hundreds of car, tech, sports forums Siri is always listening As we share more of our lives online, we open ourselves to being exploited In WWII we bombed and destroyed the electrical infrastructure of our enemies. Now we have the ability, through a cyberattack, to just shut the grid down. Nearly 30% of people open phishing s, 12% do click the link or open attached files 93% of cases hackers took just minutes to breach, while companies took weeks or months to discover 3

4 Things that look secure By Pat and Laura CRICOS 00111D, TOID 3069

5 March 2016 Facebook vulnerability

6 Bug bounties and ethical hacking Organisations set up bug bounty programs to reward hackers who find security flaws in their products Security researcher Aanand Prakash was paid $15,000 USD for finding the aforementioned Facebook exploit Rewards skilled hackers and helps further secure applications Professional hackers employed to audit Information Security at your worksite are called Penetration Testers

7 Hacking is the bypassing of systems Social engineering Gaining physical access by manipulating human behaviour From being polite to dumpster diving Trust is exploitable Acquiring physical access to a system is the best possible result for a malicious person

8 Guess which password is more secure? Password A: Jd#$1jiA$%g Password B: MyNameIsP4trickAndIAmC00l

9 Password policies Writing down passwords on sticky notes or in notebooks Storing said sticky notes and notebooks nearby in a desk maybe the lower one so that its not totally obvious Passwords vs Passphrases

10 What is a capture the flag challenge? Public competitions where people perform hacking techniques to reveal flags to submit and score points for their team Vary in difficulty Designed to train and test various skills used in penetration testing Free CTF challenges provide a good way for students to self-teach

11 Thank you Questions? 11

12 Swinburne IT courses James Hamlyn-Harris CRICOS 00111D, TOID 3069

13 Information Technology courses Bachelor of Computer Science (Professional) Bachelor of Computer Science Majors: Cybersecurity Network Design Internet of Things Data Science Software Design Software Development Games Development Bachelor of Information and Communication Technology Majors: Business Systems Network Technology Systems Analysis Systems Management Software Technology Double degrees: Bachelor of Engineering (Honours) Bachelor of Games and Interactivity Bachelor of Laws 13

14 Entry requirements Course Expected 2018 ATAR Bachelor of Computer Science (Professional) 80+ Bachelor of Computer Science 70+ Bachelor of Information and Communication Technologies 60+ Diploma of Information Technology (UniLink) (pathway into second year) 50+ VCE prerequisites: Units 3 and 4: a minimum study score of 25 in English (or equivalent) or 30 in English (EAL); and Units 1 and 2: satisfactory completion in two units (any study combination) of any Mathematics. 14

15 Vocational education/tafe qualifications Courses Advanced Diploma of Computer Systems Technology Diploma of Software Development Diploma in Information Technology Networking Certificate IV in Information Technology Networking Certificate IV in Computer Systems Technology Certificate IV in Information Technology Entry requirements Entry into this program is based on an applicant s study and/or relevant work history. Some additional criteria may also apply.

16 Where are our graduates working? 16

17 Thank you Questions? 17

Bachelor of Information Technology

Bachelor of Information Technology Higher Education Northern Sydney Institute Bachelor of Information Technology [ Network security ] www.nsi.tafensw.edu.au/itsecuritydegree Bachelor of Information Technology [ Network security ] Cybercrime

More information

Information Technology

Information Technology Courses - Victoria 2017 This document has been developed to assist students and parents in researching undergraduate information technology and computer science courses. It isn t an exhaustive list, and

More information

ISDP 2018 Industry Skill Development Program In association with

ISDP 2018 Industry Skill Development Program In association with ISDP 2018 Industry Skill Development Program In association with Penetration Testing What is penetration testing? Penetration testing is simply an assessment in a industry computer network to test the

More information

Certified Cyber Security Analyst VS-1160

Certified Cyber Security Analyst VS-1160 VS-1160 Certified Cyber Security Analyst Certification Code VS-1160 Vskills certification for Cyber Security Analyst assesses the candidate as per the company s need for cyber security and forensics. The

More information

Part 1: Anatomy of an Insider Threat Attack

Part 1: Anatomy of an Insider Threat Attack Part 1: Anatomy of an Insider Threat Attack Shiri Margel Data Security Research Team Lead Imperva Carrie McDaniel Emerging Products Team Lead Imperva Shiri Margel Data Security Research Team Lead Masters

More information

Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 1 Introduction to Security

Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 1 Introduction to Security Security+ Guide to Network Security Fundamentals, Third Edition Chapter 1 Introduction to Security Objectives Describe the challenges of securing information Define information security and explain why

More information

Introduction to Ethical Hacking. General Introduction to Ethical Hacking Practitioner

Introduction to Ethical Hacking. General Introduction to Ethical Hacking Practitioner Introduction to Ethical Hacking General Introduction to Ethical Hacking Practitioner General Information 3 SECO-Institute Cyber Security & Governance Certification Program 4 In General The Ethical Hacking

More information

GRADUATE CERTIFICATE IN MANAGEMENT SYSTEMS ADMINISTRATION

GRADUATE CERTIFICATE IN MANAGEMENT SYSTEMS ADMINISTRATION GRADUATE CERTIFICATE IN MANAGEMENT SYSTEMS ADMINISTRATION If you are looking to develop expertise in a specialized area and broaden your knowledge base, but time and cost limitations are interfering with

More information

Hidden Figures: Women in Cybersecurity

Hidden Figures: Women in Cybersecurity Hidden Figures: Women in Cybersecurity This is not a webinar. This is a topic relevant to the community and our initiatives. What is a virtual community meeting? We want to hear from you! Join into the

More information

DIS10.1 Ethical Hacking and Countermeasures

DIS10.1 Ethical Hacking and Countermeasures DIS10.1 Ethical Hacking and Countermeasures ABOUT DIS Why choose Us. Data and internet security council is the worlds top most information security certification body. Our uniquely designed course for

More information

BTEC LEVEL 4 Higher National Certificate in Business

BTEC LEVEL 4 Higher National Certificate in Business BTEC LEVEL 4 Higher National Certificate in Business HNC Business (RQF programme) HNC Programme Specification 1. Qualification HNC 2. Programme Title Business 3. UCAS Code 4. Programme Type Full time 5.

More information

Security+ Guide to Network Security Fundamentals, Fourth Edition. Chapter 1 Introduction to Security

Security+ Guide to Network Security Fundamentals, Fourth Edition. Chapter 1 Introduction to Security Security+ Guide to Network Security Fundamentals, Fourth Edition Chapter 1 Introduction to Security Objectives Describe the challenges of securing information Define information security and explain why

More information

Introduction to Penetration Testing: Part One. Eugene Davis UAH Information Security Club February 21, 2013

Introduction to Penetration Testing: Part One. Eugene Davis UAH Information Security Club February 21, 2013 Introduction to Penetration Testing: Part One Eugene Davis UAH Information Security Club February 21, 2013 Ethical Considerations: Pen Testing Ethics of penetration testing center on integrity (ISC)² Code

More information

Master of Cyber Security, Strategy and Risk Management. CECS PG Information Session April 17, 2018

Master of Cyber Security, Strategy and Risk Management. CECS PG Information Session April 17, 2018 Master of Cyber Security, Strategy and Risk Management CECS PG Information Session April 17, 2018 2 Program Purpose Provide a working understanding of information, network and software security, across

More information

Business Studies. Bachelor Of

Business Studies. Bachelor Of Bachelor Of Business Studies Upgrade your Advanced Diploma to a Charles Sturt University Bachelor of Business Studies at NSI in as little as 12 months nsi.csu@tafensw.edu.au 131 674 www.nsi.tafensw.edu.au

More information

CYBER SECURITY TRAINING

CYBER SECURITY TRAINING CYBER Security skills for the digital age. Cyber Crime has never been more predominant. The number of breaches is exponentially rising year on year leading to an ever increasing Cyber Security threat.

More information

DIS10.1:Ethical Hacking and Countermeasures

DIS10.1:Ethical Hacking and Countermeasures 1 Data and Information security Council DIS10.1:Ethical Hacking and Countermeasures HACKERS ARE NOT BORN, THEY BECOME HACKER About DIS :Data and Internet Security Council DIS is the Globally trusted Brand

More information

GRADUATE CERTIFICATE IN INFORMATION SECURITY MANAGEMENT

GRADUATE CERTIFICATE IN INFORMATION SECURITY MANAGEMENT GRADUATE CERTIFICATE IN INFORMATION SECURITY MANAGEMENT If you are looking to develop expertise in a specialized area and broaden your knowledge base, but time and cost limitations are interfering with

More information

Spillemyndigheden s Certification Programme. Instructions on Penetration Testing SCP EN.1.1

Spillemyndigheden s Certification Programme. Instructions on Penetration Testing SCP EN.1.1 SCP.04.00.EN.1.1 Table of contents Table of contents... 2 1 Objectives of the... 3 1.1 Scope of this document... 3 1.2 Version... 3 1.3 Applicability... 3 2 Certification... 4 2.1 Certification frequency...

More information

DIS10.2. DIS10.2:Advanced Penetration Testing and Security Analyst Certification. Online Training Classroom Training Workshops Seminars

DIS10.2. DIS10.2:Advanced Penetration Testing and Security Analyst Certification. Online Training Classroom Training Workshops Seminars Online Training Classroom Training Workshops Seminars DIS10.2 Data and Information security Council of India DIS10.2:Advanced Penetration Testing and Security Analyst Certification HACKERS ARE NOT BORN,

More information

The fast track to top skills and top jobs in cyber. Guaranteed.

The fast track to top skills and top jobs in cyber. Guaranteed. The fast track to top skills and top jobs in cyber. Guaranteed. NO COST TO SELECTED PARTICIPANTS WELCOME The SANS Institute is presenting the SANS CyberTalent Immersion Academy for Women to encourage women

More information

The fast track to top skills and top jobs in cyber. Guaranteed. FREE TO TRANSITIONING VETERANS

The fast track to top skills and top jobs in cyber. Guaranteed. FREE TO TRANSITIONING VETERANS The fast track to top skills and top jobs in cyber. Guaranteed. FREE TO TRANSITIONING VETERANS WELCOME SANS Institute is presenting the SANS VetSuccess Immersion Academy in the DC Metro area. For transitioning

More information

Computer Information Systems (CIS) CIS 105 Current Operating Systems/Security CIS 101 Introduction to Computers

Computer Information Systems (CIS) CIS 105 Current Operating Systems/Security CIS 101 Introduction to Computers Computer Information Systems (CIS) CIS 101 Introduction to Computers This course provides an overview of the computing field and its typical applications. Key terminology and components of computer hardware,

More information

Advanced Ethical Hacking & Penetration Testing. Ethical Hacking

Advanced Ethical Hacking & Penetration Testing. Ethical Hacking Summer Training Internship Program 2017 (STIP - 2017) is a practical oriented & industrial level training program for all students who have aspiration to work in the core technical industry domain. This

More information

Security Awareness. Chapter 2 Personal Security

Security Awareness. Chapter 2 Personal Security Security Awareness Chapter 2 Personal Security Objectives After completing this chapter, you should be able to do the following: Define what makes a weak password Describe the attacks against passwords

More information

Cyber Security Updates and Trends Affecting the Real Estate Industry

Cyber Security Updates and Trends Affecting the Real Estate Industry Cyber Security Updates and Trends Affecting the Real Estate Industry What, Why, and How? Agenda Cyber Security Today Changes to Security Standards and Trends Protecting Yourself and Your Organization Takeways

More information

You knew the job was dangerous when you took it! Defending against CS malware

You knew the job was dangerous when you took it! Defending against CS malware You knew the job was dangerous when you took it! Defending against CS malware Presented By: Doug Cavit Microsoft Where PI geeks meet 9/23/2010 NERC HILF 6/10 Adequately addressing vulnerabilities will

More information

Information Technology

Information Technology Information Technology 2017-2018 Well connected. Right here 2 Contents weltec.ac.nz/it Introductory NZ Certificate in Information Technology Essentials 6 NZ Diploma in Information Technology (Technical

More information

Understanding the Changing Cybersecurity Problem

Understanding the Changing Cybersecurity Problem Understanding the Changing Cybersecurity Problem Keith Price BBus, MSc, CGEIT, CISM, CISSP Founder & Principal Consultant 1 About About me - Specialise in information security strategy, architecture, and

More information

Security Stream for Computer Science

Security Stream for Computer Science Security Stream for Computer Science Compulsory COMP3441 Security Engineering or COMP6442 Extended Security Engineering Electives and three electives drawn from the elective list (below) COMP4442 -- Advanced

More information

Principles of ICT Systems and Data Security

Principles of ICT Systems and Data Security Principles of ICT Systems and Data Security Ethical Hacking Ethical Hacking What is ethical hacking? Ethical Hacking It is a process where a computer security expert, who specialises in penetration testing

More information

STUDENT LEARNING OUTCOMES Beacom College of Computer and Cyber Sciences

STUDENT LEARNING OUTCOMES Beacom College of Computer and Cyber Sciences STUDENT LEARNING OUTCOMES Beacom College of Computer and Cyber Sciences Undergraduate Programs - Bachelor B.S. Computer Game Design Upon completion of the B.S. degree in Computer Game Design, students

More information

Penetration testing.

Penetration testing. Penetration testing Penetration testing is a globally recognized security measure that can help provide assurances that a company s critical business infrastructure is protected from internal or external

More information

RastaLabs Red Team Simulation Lab

RastaLabs Red Team Simulation Lab RastaLabs Red Team Simulation Lab LAB OUTLINE Description RastaLabs is a virtual Red Team Simulation environment, designed to be attacked as a means of learning and honing your engagement skills. The focus

More information

A Review Paper on Network Security Attacks and Defences

A Review Paper on Network Security Attacks and Defences EUROPEAN ACADEMIC RESEARCH Vol. IV, Issue 12/ March 2017 ISSN 2286-4822 www.euacademic.org Impact Factor: 3.4546 (UIF) DRJI Value: 5.9 (B+) A Review Paper on Network Security Attacks and ALLYSA ASHLEY

More information

Security and Authentication

Security and Authentication Security and Authentication Authentication and Security A major problem with computer communication Trust Who is sending you those bits What they allow to do in your system 2 Authentication In distributed

More information

Hands-On Hacking Course Syllabus

Hands-On Hacking Course Syllabus Hands-On Hacking Course Syllabus Version 0. 1 Hands-On Hacking 1 Table of Contents HANDS-ON HACKING... 1 TABLE OF CONTENTS... 2 COURSE SYLLABUS... 3 Course... 3 Student Pre-requisites... 3 Laptop Requirements...

More information

Security. Protect your business from security threats with Pearl Technology. The Connection That Matters Most

Security. Protect your business from security threats with Pearl Technology. The Connection That Matters Most Security Protect your business from security threats with Pearl Technology The Connection That Matters Most Committed to Your Future When it comes to your business, security can mean many things. But to

More information

Cyber fraud and its impact on the NHS: How organisations can manage the risk

Cyber fraud and its impact on the NHS: How organisations can manage the risk Cyber fraud and its impact on the NHS: How organisations can manage the risk Chair: Ann Utley, Preparation Programme Manager, NHS Providers Arno Franken, Cyber Specialist, RSM Sheila Pancholi, Partner,

More information

CyberSecurity Training and Capacity Building: A Starting Point for Collaboration and Partnerships. from the most trusted name in information security

CyberSecurity Training and Capacity Building: A Starting Point for Collaboration and Partnerships. from the most trusted name in information security CyberSecurity Training and Capacity Building: A Starting Point for Collaboration and Partnerships About SANS The SANS (SysAdmin, Audit, Network, Security) Institute Established in 1989 Cooperative research

More information

Building new cybersecurity pipelines. NICE Conference 2017 November 8, Strengthening Cyber Workforce Development sans.

Building new cybersecurity pipelines. NICE Conference 2017 November 8, Strengthening Cyber Workforce Development sans. Building new cybersecurity pipelines NICE Conference 2017 November 8, 2017 Strengthening Cyber Workforce Development sans.org/cybertalent Cybersecurity: The Current State Skills Mismatch Emphasis on theory

More information

CIM LEVEL 6 DIPLOMA IN PROFESSIONAL MARKETING

CIM LEVEL 6 DIPLOMA IN PROFESSIONAL MARKETING CIM LEVEL 6 DIPLOMA IN PROFESSIONAL MARKETING QUALIFICATION OVERVIEW The aim of the CIM Level 6 Diploma in Professional Marketing is to provide the practising marketer with relevant, contemporary marketing

More information

PROGRAMME SPECIFICATION

PROGRAMME SPECIFICATION PROGRAMME SPECIFICATION Master of Computing (Hons) in Computer Security Awarding institution Teaching institution UCAS Code JACS Code Programme Duration Language of Programme Liverpool John Moores University

More information

The fast track to top skills and top jobs in cyber. Guaranteed. FREE TO TRANSITIONING VETERANS

The fast track to top skills and top jobs in cyber. Guaranteed. FREE TO TRANSITIONING VETERANS The fast track to top skills and top jobs in cyber. Guaranteed. FREE TO TRANSITIONING VETERANS WELCOME SANS Institute is presenting the SANS VetSuccess Immersion Academy in San Diego. For transitioning

More information

DIABLO VALLEY COLLEGE CATALOG

DIABLO VALLEY COLLEGE CATALOG COMPUTER NETWORK TECHNOLOGY CNT Despina Prapavessi, Dean Math and Computer Sciences Division Math Building, Room 267 Possible career opportunities These CNT-courses prepare students for a career path in

More information

Training on CREST Practitioner Security Analyst (CPSA)

Training on CREST Practitioner Security Analyst (CPSA) 1 Training on CREST Practitioner Security Analyst (CPSA) Objectives This programme introduces to you to the CPSA, CREST Practitioner Security Analyst, and certification. This instructor led course covers

More information

You will choose to study units from one of four specialist pathways depending on the career you wish to pursue. The four pathways are:

You will choose to study units from one of four specialist pathways depending on the career you wish to pursue. The four pathways are: Qualification Title: OCR Level 3 Cambridge Technical Diploma in IT Qualification Number: 601/7101/7 Overview This qualification is designed for you if you re 16 years old or over and prefer to study IT

More information

DIS10.3:CYBER FORENSICS AND INVESTIGATION

DIS10.3:CYBER FORENSICS AND INVESTIGATION DIS10.3:CYBER FORENSICS AND INVESTIGATION ABOUT DIS Why choose Us. Data and internet security council is the worlds top most information security certification body. Our uniquely designed course for information

More information

Trustwave Managed Security Testing

Trustwave Managed Security Testing Trustwave Managed Security Testing SOLUTION OVERVIEW Trustwave Managed Security Testing (MST) gives you visibility and insight into vulnerabilities and security weaknesses that need to be addressed to

More information

Effective IT Training Qualifications and Programs

Effective IT Training Qualifications and Programs APEC Policy Forum for SME Informatization Seoul 15-16 16 July 2004 Effective IT Training Qualifications and Programs Murray Judd [Australia] 15 July 2004 IT Training Qualifications Suite of nationally

More information

Express Monitoring 2019

Express Monitoring 2019 Express Monitoring 2019 WHY CHOOSE PT EXPRESS MONITORING PT Express Monitoring provides a quick evaluation of the current signaling network protection level. This service helps to discover critical vulnerabilities

More information

Standard Course Outline IS 656 Information Systems Security and Assurance

Standard Course Outline IS 656 Information Systems Security and Assurance Standard Course Outline IS 656 Information Systems Security and Assurance I. General Information s Course number: IS 656 s Title: Information Systems Security and Assurance s Units: 3 s Prerequisites:

More information

Assessment for all units is ongoing and continuous consisting of tests, assignments and reports. Most units have a final two-hour examination.

Assessment for all units is ongoing and continuous consisting of tests, assignments and reports. Most units have a final two-hour examination. Diploma of Computing Course Outline (T3, 2017) Campus Intake CRICOS Course Duration Teaching Methods Assessment Course Structure Units Melbourne Burwood Campus / Jakarta Campus, Indonesia March, June,

More information

10 Cybersecurity Questions for Bank CEOs and the Board of Directors

10 Cybersecurity Questions for Bank CEOs and the Board of Directors 4 th Annual UBA Bank Executive Winter Conference February, 2015 10 Cybersecurity Questions for Bank CEOs and the Board of Directors Dr. Kevin Streff Founder, Secure Banking Solutions 1 Board of Directors

More information

Programme Specification for BSc (Hons) Business Intelligence 2012/2013

Programme Specification for BSc (Hons) Business Intelligence 2012/2013 Programme Specification for BSc (Hons) Business Intelligence 2012/2013 Teaching Institution: London South Bank University Accredited by: Faculty of origin: BCIM Highest Award within the Programme: BSc

More information

Scanning. Introduction to Hacking. Networking Concepts. Windows Hacking. Linux Hacking. Virus and Worms. Foot Printing.

Scanning. Introduction to Hacking. Networking Concepts. Windows Hacking. Linux Hacking. Virus and Worms. Foot Printing. I Introduction to Hacking Important Terminology Ethical Hacking vs. Hacking Effects of Hacking on Business Why Ethical Hacking Is Necessary Skills of an Ethical Hacker What Is Penetration Testing? Networking

More information

The fast track to top skills and top jobs in cyber. Guaranteed. FREE TO TRANSITIONING VETERANS

The fast track to top skills and top jobs in cyber. Guaranteed. FREE TO TRANSITIONING VETERANS The fast track to top skills and top jobs in cyber. Guaranteed. FREE TO TRANSITIONING VETERANS WELCOME SANS Institute, in collaboration with RP6, is presenting the SANS VetSuccess CyberTalent Immersion

More information

Ethical Hacking Foundation Exam Syllabus

Ethical Hacking Foundation Exam Syllabus 1 Table of contents Table of contents... 2 Exam Syllabus: Ethical Hacking Foundation... 3 Context... 3 Course objectives... 3 Target audience... 3 Prerequisites... 4 Exam information... 4 Examination details...

More information

CCNA Cybersecurity Operations. Program Overview

CCNA Cybersecurity Operations. Program Overview Table of Contents 1. Introduction 2. Target Audience 3. Prerequisites 4. Target Certification 5. Curriculum Description 6. Curriculum Objectives 7. Virtual Machine Requirements 8. Course Outline 9. System

More information

School of Engineering & Built Environment

School of Engineering & Built Environment School of Engineering & Built Environment BEng (Hons) in Digital Security, Forensics & Ethical Hacking Programme Specification Proforma (PSP) August 2015 P a g e 1 GLASGOW CALEDONIAN UNIVERSITY Programme

More information

OPSEC and defense agains social engineering for devels, execs, and sart-ups

OPSEC and defense agains social engineering for devels, execs, and sart-ups OPSEC and defense agains social engineering for devels, execs, and sart-ups @KirilsSolovjovs on twitter http://kirils.org for more Mg.sc.comp. Kirils Solovjovs Possible Security Problem: Social Engineering

More information

EC-Council - EC-Council Certified Security Analyst (ECSA) v8

EC-Council - EC-Council Certified Security Analyst (ECSA) v8 EC-Council - EC-Council Certified Security Analyst (ECSA) v8 Code: 3402 Lengt h: URL: 5 days View Online The EC-Council Certified Security Analyst (ECSA) program teaches information security professionals

More information

I am pleased to confirm that the following exemptions will be granted to your Bachelor of Accounting (Hons) graduates.

I am pleased to confirm that the following exemptions will be granted to your Bachelor of Accounting (Hons) graduates. 15 February 2016 Dr. Yu Sing Ong PTD64888,15KM, Jalan Skudai P.O. Box 76 81300 Skudai Johor Malaysia Dear Dr Yu Advance with CIMA Bachelor of (Hons) Thank you for your programme submission on 22 January

More information

Security Breaches: How to Prepare and Respond

Security Breaches: How to Prepare and Respond Security Breaches: How to Prepare and Respond BIOS SARAH A. SARGENT Sarah is a CIPP/US- and CIPP/E-certified attorney at Godfrey & Kahn S.C. in Milwaukee, Wisconsin. She specializes in cybersecurity and

More information

Qualification details

Qualification details Qualification details Title New Zealand Certificate in Business (First Line Management) (Level 4) Version 1 Qualification type Certificate Level 4 Credits 60 NZSCED 080301 Management and Commerce > Business

More information

Term 2 Grade 12 Project Task 3 Teacher s Guidelines Ethical Hacking Picture 1 Picture 2

Term 2 Grade 12 Project Task 3 Teacher s Guidelines Ethical Hacking Picture 1 Picture 2 Term 2 Grade 12 Project Task 3 Teacher s Guidelines Ethical Hacking Picture 1 PRESENTATION Picture 2 Page 1 of 8 IMPORTANT NOTICE Dear teachers, in case your school is facing any software issues with EthiLAB,

More information

No More Excuses: Feds Need to Lead with Strong Authentication!

No More Excuses: Feds Need to Lead with Strong Authentication! No More Excuses: Feds Need to Lead with Strong Authentication! Dr. Sarbari Gupta sarbari@electrosoft-inc.com Annual NCAC Conference on Cybersecurity March 16, 2016 Electrosoft Services, Inc. 1893 Metro

More information

BOARD OF REGENTS ACADEMIC AFFAIRS COMMITTEE 4 STATE OF IOWA SEPTEMBER 12-13, 2018

BOARD OF REGENTS ACADEMIC AFFAIRS COMMITTEE 4 STATE OF IOWA SEPTEMBER 12-13, 2018 STATE OF IOWA SEPTEMBER 12-13, 2018 REQUEST FOR NEW PROGRAM AT IOWA STATE UNIVERSITY: BACHELOR OF SCIENCE IN CYBER SECURITY ENGINEERING Contact: Rachel Boon Action Requested: Consider approval of the request

More information

ITU CBS. Digital Security Capacity Building: Role of the University GLOBAL ICT CAPACITY BUILDING SYMPOSIUM SANTO DOMINGO 2018

ITU CBS. Digital Security Capacity Building: Role of the University GLOBAL ICT CAPACITY BUILDING SYMPOSIUM SANTO DOMINGO 2018 GLOBAL ICT CAPACITY BUILDING SYMPOSIUM ITU CBS SANTO DOMINGO 2018 Digital Capacity Building: Role of the University 18 20 June 2018 Santo Domingo, Dominican Republic Dr. Nizar Ben Neji Faculty of Sciences

More information

ISACA West Florida Chapter - Cybersecurity Event

ISACA West Florida Chapter - Cybersecurity Event ISACA West Florida Chapter - Cybersecurity Event Presented by Sri Sridharan Managing Director & Chief Operating Officer Florida Center for Cybersecurity CURRENT TRENDS Top Cybersecurity Trends of 2015

More information

This Online Gaming Company Didn t Want to Roll the Dice on Security That s Why it Worked with BlackBerry

This Online Gaming Company Didn t Want to Roll the Dice on Security That s Why it Worked with BlackBerry This Online Gaming Company Didn t Want to Roll the Dice on Security That s Why it Worked with BlackBerry At a Glance With offices across the country, this gaming company has been in operation for decades.

More information

The fast track to top skills and top jobs in cyber. FREE TO TRANSITIONING VETERANS

The fast track to top skills and top jobs in cyber. FREE TO TRANSITIONING VETERANS The fast track to top skills and top jobs in cyber. FREE TO TRANSITIONING VETERANS FAST TRACK Three steps to a cybersecurity career QUALIFY Take the qualifying exam, complete the application process, and

More information

European Risk Management Certification. Candidate Information Guide

European Risk Management Certification. Candidate Information Guide European Risk Management Certification Candidate Information Guide Presentation of FERMA Certification 3 Benefits 4 Eligibility criteria 5 Application and fees Examination details Syllabus: FERMA rimap

More information

Hacker Academy UK. Black Suits, White Hats!

Hacker Academy UK. Black Suits, White Hats! Hacker Academy UK Black Suits, White Hats! Cyber Security Training and Services Do your devices Protect you against Cyber-attacks? Chinese hackers have allegedly stolen 50 terabytes of data on F-35 aircraft,

More information

CPTE: Certified Penetration Testing Engineer

CPTE: Certified Penetration Testing Engineer www.peaklearningllc.com CPTE: Certified Penetration Testing Engineer (5 Days) *Includes exam voucher, course video, an exam preparation guide About this course Certified Penetration Testing Engineer certification

More information

Instructor: Eric Rettke Phone: (every few days)

Instructor: Eric Rettke Phone: (every few days) Instructor: Eric Rettke Phone: 818 364-7775 email: rettkeeg@lamission.edu (every few days) Fall 2016 Computer Science 411 - Principles of Cyber Security 1 Please keep a copy of the syllabus handy for the

More information

EC-Council Certified Incident Handler v2. Prepare to Handle and Respond to Security Incidents EC-COUNCIL CERTIFIED INCIDENT HANDLER 1

EC-Council Certified Incident Handler v2. Prepare to Handle and Respond to Security Incidents EC-COUNCIL CERTIFIED INCIDENT HANDLER 1 EC-Council Certified Incident Handler v2 Prepare to Handle and Respond to Security Incidents EC-COUNCIL CERTIFIED INCIDENT HANDLER 1 THE CRITICAL NATURE OF INCIDENT HANDLING READINESS An organized and

More information

Specialized Security Services, Inc. REDUCE RISK WITH CONFIDENCE. s3security.com

Specialized Security Services, Inc. REDUCE RISK WITH CONFIDENCE. s3security.com Specialized Security Services, Inc. REDUCE RISK WITH CONFIDENCE s3security.com Security Professional Services S3 offers security services through its Security Professional Services (SPS) group, the security-consulting

More information

Train as you Fight: Are you ready for the Red Team?

Train as you Fight: Are you ready for the Red Team? Train as you Fight: Are you ready for the Red Team? An inside look at Red Teaming Yves Morvan Twitter: @morvan_yves Email: Yves@securenorth.ca Agenda Introduction What is Red Teaming? VA s vs. Penetration

More information

Chapter 10: Security and Ethical Challenges of E-Business

Chapter 10: Security and Ethical Challenges of E-Business Chapter 10: Security and Ethical Challenges of E-Business Learning Objectives Identify several ethical issues in IT that affect employment, individuality, working condition, privacy, crime health etc.

More information

Diploma Of Computing

Diploma Of Computing Diploma Of Computing Course Outline Campus Intake CRICOS Course Duration Teaching Methods Assessment Course Structure Units Melbourne Burwood Campus / Jakarta Campus, Indonesia March, June, October 022638B

More information

Cyber Fraud What can you do about it?

Cyber Fraud What can you do about it? Cyber Fraud What can you do about it? Eric Wright Shareholder June 10, 2014 What is Cyber Fraud? NetLingo definition: Cyber fraud refers to any type of deliberate deception for unfair or unlawful gain

More information

Cyber Threat Landscape April 2013

Cyber Threat Landscape April 2013 www.pwc.co.uk Cyber Threat Landscape April 2013 Cyber Threats: Influences of the global business ecosystem Economic Industry/ Competitors Technology-led innovation has enabled business models to evolve

More information

Computer Information Systems (CIS) CIS 105 Current Operating Systems/Security CIS 101 Introduction to Computers

Computer Information Systems (CIS) CIS 105 Current Operating Systems/Security CIS 101 Introduction to Computers Computer Information Systems (CIS) CIS 101 Introduction to Computers This course provides an overview of the computing field and its typical applications. Key terminology and components of computer hardware,

More information

160 DEPARTMENT OF COMPUTING

160 DEPARTMENT OF COMPUTING 160 DEPARTMENT OF COMPUTING 161 DEPARTMENT OF COMPUTING With over 90,000 people employed in ICT, Ireland is currently the world s largest exporter of computer software with unparalleled employment prospects

More information

It Takes the Village to Secure the Village SM

It Takes the Village to Secure the Village SM It Takes the Village to Secure the Village SM Stan Stahl, Ph.D. President Information Systems Security Association Los Angeles Chapter September 30, 2013 2 Online Bank Fraud is Major Challenge. Victim

More information

ITSY 2330 Intrusion Detection Course Syllabus

ITSY 2330 Intrusion Detection Course Syllabus ITSY 2330 Intrusion Detection Course Syllabus Instructor Course Reference Number (CRN) Course Description: Course Prerequisite(s) Course Semester Credit Hours (SCH) (Lecture, Lab) Name: Hung Le Tel: Office:

More information

THE TRUSTED NETWORK POWERING GLOBAL SUPPLY CHAINS AND THEIR COMMUNITIES APPROVED EDUCATION PROVIDER INFORMATION PACK

THE TRUSTED NETWORK POWERING GLOBAL SUPPLY CHAINS AND THEIR COMMUNITIES APPROVED EDUCATION PROVIDER INFORMATION PACK GAIN RECOGNITION AS AN APPROVED PROVIDER UNDER ISO/IEC 17024 AND JOIN OUR NETWORK OF TRUSTED PROVIDERS THE TRUSTED NETWORK POWERING GLOBAL SUPPLY CHAINS AND THEIR COMMUNITIES APPROVED EDUCATION PROVIDER

More information

Security Course. WebGoat Lab sessions

Security Course. WebGoat Lab sessions Security Course WebGoat Lab sessions WebGoat Lab sessions overview Initial Setup Tamper Data Web Goat Lab Session 4 Access Control, session information stealing Lab Session 2 HTTP Basics Sniffing Parameter

More information

Bachelor of Science Information Studies School of Information Program Summary

Bachelor of Science Information Studies School of Information Program Summary Bachelor of Science Information Studies School of Information Program Summary Students admitted to the program beginning the Summer 2011 semester follow the proposed catalog guidelines below. Program Pre-Requisites

More information

How Security Breaches Effect Loyalty Programs

How Security Breaches Effect Loyalty Programs How Security Breaches Effect Loyalty Programs RESEARCH NOW OVERVIEW To be the global leader in permission based digital data collection and reporting to power insight Operate in over 40 countries from

More information

Perspectives on Cybersecurity

Perspectives on Cybersecurity Perspectives on Cybersecurity Beau Woods Cyber Safety Innovation Fellow, Atlantic Council Leader, I Am The Cavalry (.org) 2019 Winter Conference February 2, 2019 What s at stake Mirai took out large parts

More information

The Value of Automated Penetration Testing White Paper

The Value of Automated Penetration Testing White Paper The Value of Automated Penetration Testing White Paper Overview As an information security expert and the security manager of the company, I am well aware of the difficulties of enterprises and organizations

More information

CCNA Cybersecurity Operations 1.1 Scope and Sequence

CCNA Cybersecurity Operations 1.1 Scope and Sequence CCNA Cybersecurity Operations 1.1 Scope and Sequence Last updated June 18, 2018 Introduction Today's organizations are challenged with rapidly detecting cybersecurity breaches and effectively responding

More information

CompTIA Security+ Malware. Threats and Vulnerabilities Vulnerability Management

CompTIA Security+ Malware. Threats and Vulnerabilities Vulnerability Management CompTIA Security+ Lecture Six Threats and Vulnerabilities Vulnerability Management Copyright 2011 - VTC Malware Malicious code refers to software threats to network and systems, including viruses, Trojan

More information

Introduction to Ethical Hacking. Chapter 1

Introduction to Ethical Hacking. Chapter 1 Introduction to Ethical Hacking Chapter 1 Definition of a Penetration Tester Sometimes called ethical hackers though label is less preferred Pen testers are: People who assess security of a target Specially

More information

BSIT 1 Technology Skills: Apply current technical tools and methodologies to solve problems.

BSIT 1 Technology Skills: Apply current technical tools and methodologies to solve problems. Bachelor of Science in Information Technology At Purdue Global, we employ a method called Course-Level Assessment, or CLA, to determine student mastery of Course Outcomes. Through CLA, we measure how well

More information

GRADUATE CERTIFICATE IN BUSINESS CONTINUITY MANAGEMENT

GRADUATE CERTIFICATE IN BUSINESS CONTINUITY MANAGEMENT GRADUATE CERTIFICATE IN BUSINESS CONTINUITY MANAGEMENT If you are looking to develop expertise in a specialized area and broaden your knowledge base, but time and cost limitations are interfering with

More information

Initial CITP and CSci (partial fulfilment). *Confirmation of full accreditation will be sought in 2020.

Initial CITP and CSci (partial fulfilment). *Confirmation of full accreditation will be sought in 2020. PROGRAMME SPECIFICATION Master of Computing (Hons) in Computer Forensics Awarding institution Teaching institution UCAS Code JACS Code Programme Duration Language of Programme Liverpool John Moores University

More information

Programme Specification

Programme Specification Programme title Award and level of final and intermediate Awards Awarding Body Location of Delivery Mode of Study Nescot Course Code Programme Specification BTEC HND Computing and Systems Development HNC/D

More information