CYBERPATRIOT NATIONAL YOUTH CYBER EDUCATION PROGRAM
|
|
- Lucas Casey
- 6 years ago
- Views:
Transcription
1 AIR FORCE ASSOCIATION S CYBERPATRIOT NATIONAL YOUTH CYBER EDUCATION PROGRAM SECURING NETWORK, SECURING FUTURES CyberPatriot Program Updated July
2 AFA The Air Force Association is: 501(c)(3) non-profit organization focused on: Educating the American public, advocating for strong national security, and supporting military members and their families Historical focus on advocating for strong national security policies We see STEM education today as a national security issue When compared to other nations, the math and science achievement of U.S. pupils and the rate of STEM degree attainment appear inconsistent with a nation considered the world leader in scientific innovation. In a recent international assessment of 15-year-old students, the U.S. ranked 28th in math literacy and 24th in science literacy. Moreover, the U.S. ranks 20th among all nations in the proportion of 24-year-olds who earn degrees in natural science or engineering Congressional Research Study Science, Technology, Engineering, and Mathematics (STEM) Education: Background, Federal Policy, and Legislative Action 2
3 CYBERPATRIOT IS The national youth cyber education program. The national youth cyber defense competition. Carefully structured to excite, educate, and motivate participants. Designed to instill in all participants the importance to our nation of cyber, cyber security, and good computer security practices. Designed to motivate all participants to consider STEM academic disciplines to meet our nation s needs. Designed to motivate many participants to become the next generation of cyber defenders and our nation s digital workforce. 3
4 CYBERPATRIOT IS NOT 1. Hacker training Cyber ethics discussions are an important (and early) component in our curriculum We don t teach hacking tools or techniques Hacking in competition is strictly forbidden 2. A recruiting tool for the Air Force, the Department of Defense, or the Federal government This is about building a strong national foundation for cyber skills throughout our high schools. 4
5 ORIGINAL CONSTRUCT National High School Cyber Defense Competition 5
6 NEW CONSTRUCT The National Youth Cyber Education Program National Youth Cyber Defense Competition AFA CyberCamp Program Elementary School Cyber Education Initiative 6
7 SKILLS WE TEACH Cyber ethics Leadership and teamwork Creative and analytical problem solving Non-technical cyber principles (e.g. social engineering, phishing, vishing, etc.) Netiquette Cyber safety Cyber hygiene Computing and networking principles Operating systems Network topologies & cabling Foundational cyber security principles Cyber and system vulnerabilities Network security Vulnerability remediation Technical threats 7
8 PRELIMINARY COMPETITION ROUNDS Teams are presented with virtual machine images in which cyber vulnerabilities are intentionally present Passwords, router settings, firewall settings, user permissions, etc. In a time constrained environment, they must identify and remediate (fix) those vulnerabilities Scored on how thoroughly they identify and fix the vulnerabilities 8
9 CP-X TIMELINE May Jun Jul Aug Sep Oct Nov Dec Jan Feb Mar Apr Exhibition Round 1 May 17-Jun 12 Exhibition Round 2 Jul 12-Aug 7 Training Round Sep 15-Oct 10 Practice Round Oct (TBD) Round 1 Nov 3-5 State Round 2 Rounds Dec 8-10 Jan Semifinals Feb 9-11 National Finals Practice Mar 6-16 Open Division (Any High School) All Service Division (JROTC/CAP/USNSCC) 12 Finalist Teams 13 Finalist Teams: National Finals Competition April 15-19, 2018 Baltimore, MD Middle School 3 Finalist Teams Team Registration Closes on October 5 Competitor Registration Closes on November 2 = Unscored Round = Scored Round 9
10 COMPETITION REGISTRATION CHART CP-III CP-IV CP-V CP-VI CP-VII CP-VIII CP-IX Teams registered by season (Each team represents ~5.5 students) 10
11 COMPETITION REGISTRATION MAP 11
12 FEMALE OUTREACH 162 all-girl teams in CP-VIII 192 all-girl teams in CP-IX Initiatives: Full fee waivers for all-girls teams Female only sessions at AFA CyberCamps Female highlights in monthly CyberSentinel and promotional materials Full engagement with Women in Technology and National Center for Women & Information Technology Strong female representation in monthly online CyberPatriot coaches forums 12
13 FEMALE REPRESENTATION GROWTH National STEM Program Average Female Participation 13
14 MINORITY OUTREACH Continued strong recruitment in urban areas Engagement with Boys and Girls Clubs of America, CODE2040, National Society of Black Engineers, Society of Hispanic Professional Engineers Objectives: Improved minority student recruitment Mentoring CP-VII Presence: ~40% CP-VIII Presence: ~42% 14
15 CENTERS OF EXCELLENCE Los Angeles Unified School District - Founded August 2011 City of San Antonio, TX - Founded February 2012 Spokane Public Schools - Founded August 2012 Rose State College - Oklahoma City, OK - Founded January 2013 Fairfax County Public Schools - Founded July 2014 STEMspark East Tennessee Innovation Hub - Founded June 2015 Huntsville City Schools - Founded September 2015 Lee's Summit R-7 School District - Founded March 2016 Southern California Cybersecurity Community College Consortium - Founded August 2016 Elk Grove Unified School District (Sacramento) Found April 2017 Pending: Securing Our ecity Foundation (San Diego) 15
16 ESCEI - Over 4,000 ESCEI kits have been delivered countries - All 50 states - Schools such as Rosalind STEM Elementary in Pasco, WA have integrated ESCEI into their technology curriculum ESCEI: Elementary School Cyber Education Initiative, Ess-key 16
17 ESCEI 2.0 Security Showdown 2 Strangers are asking about you, but is it safe to share with them? Learn the basics of sharing personal information with family, friends, and strangers in this simple point-and-click game. Will you share your information correctly and win the security showdown certificate? Featuring charming voxel graphics, simple game mechanics, and voice-overs in both English and Spanish, this game is highly accessible and great for young players. JeffOS Join Jeff, your helpful sidekick, as he guides you through his operating system and covers everything from basic computer skills to dealing with complex issues like phishing and malware. JeffOS delivers actionable advice for safer computing in the real world and breaks down advanced topics into digestible pieces, all while providing players with fun, interesting interaction. Players will walk away from JeffOS with a more developed set of computer skills and a grasp on the importance of cybersecurity in their everyday lives. Packet Protector Build a computer network to mine for cryptocurrency and use this money to expand and secure your network! Watch how your decisions affect the security and effectiveness of a network in this educational simulation. Along the way, you will learn about some basic networking components, malware, and security software, and discover some of the ways you can protect your network from cyber threats. 17
18 AFA CYBERCAMPS The AFA CyberCamp curriculum was designed to instruct novice students to learn about cyber ethics, online safety, and the fundamental principles of cybersecurity. AFA CyberCamp Curriculum Kit: Five four-hour instruction modules Instructor s guides Student workbooks Demonstration and competition software 20-hour Curriculum Completed over five days (Monday through Friday) Fifth day serving as a mini-cyberpatriot competition day AFA CyberCamp Kit Costs: $1,050 Digital copies of curriculum materials 2 demo images and 2 competition images Hard copy instructor guides and student workbooks as well as other materials available as additional purchase 18
19 AFA CYBERCAMPS 2014 Pilot, three camps 2015 Initial season, 26 camps camps across the United States (2015: 26)) 25 states participating Sponsor Camps: Northrop, Cisco, Facebook, AT&T Over 2,500 students will be served by summer 2016 AFA CyberCamps 2017 Advanced camp pilot program More locations (~100), more students 19
20 AIR FORCE ASSOCIATION S CYBERPATRIOT NATIONAL YOUTH CYBER EDUCATION PROGRAM ALUMNI SURVEY RESULTS July
21 AGE 21
22 GENDER 22
23 POST-HIGH SCHOOL PLANS 23
24 HIGHER ED. ENROLLMENT 24
25 CAREER FIELD 25
26 CYBERPATRIOT IMPACT 26
27 OUR GENEROUS SPONSORS Presenting Sponsor Cyber Diamond Cyber Gold Cyber Silver 27
28 THANK YOU! QUESTIONS? Contact us at:
UNIT ONE. Introduction to CyberPatriot and Cybersecurity. AIR FORCE ASSOCIATION S CYBERPATRIOT
AIR FORCE ASSOCIATION S CYBERPATRIOT NATIONAL YOUTH CYBER EDUCATION PROGRAM UNIT ONE Introduction to CyberPatriot and Cybersecurity www.uscyberpatriot.org Learning Objectives Participants will gain an
More informationHouse Homeland Security Subcommittee on Cybersecurity and Infrastructure Protection Hearing:
House Homeland Security Subcommittee on Cybersecurity and Infrastructure Protection Hearing: Challenges of Recruiting and Retaining a Cybersecurity Workforce 2pm, September 7, 2017 Prepared Statement for
More informationSANS Vendor Events. SANS offers a variety of events which bring you in touch with the highly qualified SANS community.
SANS Vendor Events SANS offers a variety of events which bring you in touch with the highly qualified SANS community. SANS National Events over 1200 profession IT Security attendees and over 45 SANS classes
More informationCyber Security Day 1 Workforce Ready Graduates
Cyber Security Day 1 Workforce Ready Graduates Susan Moon Career Academy Coordinator November 6, 2014 Huntsville City Schools has implemented a that is: networked collaborative interactive personalized
More information2018 IT Academy Program. December 2017
2018 IT Academy Program December 2017 2016 VMware Inc. All rights reserved. Agenda Program Improvements for 2018 Why the change? New learning path and course details Timeline Summary of changes What s
More informationAccess Control and Physical Security Management. Contents are subject to change. For the latest updates visit
Access Control and Physical Security Management Page 1 of 6 Why Attend Today s security landscape requires individuals and businesses to take the threat to safety and security seriously. Safe and secure
More informationLibrary. Summary Report
Library Summary Report 217-218 Prepared by: Library Staff December 218 Table of Contents Introduction..1 New Books.2 Print Circulation.3 Interlibrary Loan 4 Information Literacy 5 Reference Statistics.6
More information2018 CALENDAR OF ACTIVITIES
2018 CALENDAR OF ACTIVITIES WHO WE ARE AND WHAT WE OFFER Ý Public Trainings Technical Sessions Reviews GMM Other Chapter Activities Conferences Professionals Night ISACA was incorporated by individuals
More informationCALENDAR FOR THE YEAR 2018
27 Dubai 08-12 Jan 1 Advance Budgeting Workshop 386 Istanbul 11-1 Mar 396 London 13-17 May 2 Advance Business Writing 296 Abu Dhabi 1-19 Jan 3 Contract Management 396 London 22-26 Jan 27 Dubai 18-22 Mar
More informationCybersecurity is a Team Sport
Cybersecurity is a Team Sport Cyber Security Summit at Loyola Marymount University - October 22 2016 Dr. Robert Pittman, CISM Chief Information Security Officer National Cyber Security Awareness Month
More informationPresented by National CyberWatch Center March 31, April 1 & 2, 2016 Johns Hopkins University Applied Physics Lab Laurel, Maryland
Presented by National CyberWatch Center March 31, April 1 & 2, 2016 Johns Hopkins University Applied Physics Lab Laurel, Maryland 2016 SPONSOR BROCHURE WHAT IS THE NATIONAL CYBERWATCH CENTER MID-ATLANTIC
More informationWhy Should I become a Member?
KC PMI Mid-America Chapter Welcome to the Kansas City PMI Mid-America Chapter Information Session Why Should I become a Member? KC PMI Mid-America Chapter Event Agenda 2:00 pm - 2:15 pm Ice Breaker/Networking
More informationCIMA Certificate BA Interactive Timetable
CIMA Certificate BA Interactive Timetable 2018 Nottingham & Leicester Version 3.2 Information last updated 09/03/18 Please note: Information and dates in this timetable are subject to change. Introduction
More informationCollege Of. Technological Innovation
College Of Technological Innovation Contact Us 00971-2-5993111 (Abu Dhabi) 00971-4-4021111 (Dubai) 00971-4-4021408 (College of Technological Innovation) @Zayed_U zayeduniversity ZayedU www.zu.ac.ae Introduction
More informationITSY Y1 Information Technology Security Course Syllabus _ Page 1 COURSE SYLLABUS. Course Name INFORMATION TECHNOLOGY SECURITY
Course Syllabus _ Page 1 COURSE SYLLABUS Course Name INFORMATION TECHNOLOGY SECURITY Course Number 2-4 - 3 Lecture - Lab - Credit NONE Prerequisite This syllabus has been reviewed and is current on the
More information2011 NetRiders Skills Challenge Post Secondary Frequently Asked Questions (FAQ)
2011 NetRiders Skills Challenge Post Secondary Frequently Asked Questions (FAQ) WHO Q. Who is eligible to participate in NetRiders as a Competitor? A. Any post-secondary (college/university) Cisco Networking
More informationIntroduction to the Oracle Academy. Copyright 2007, Oracle. All rights reserved.
What Will I Learn? In this lesson, you will learn to: Give examples of jobs, salary, and opportunities available that could result from participating in the Academy Understand how participating in the
More informationUndergraduate Admission File
Undergraduate Admission File June 13, 2007 Information Resources and Communications Office of the President University of California Overview Population The Undergraduate Admission File contains data on
More informationBuild Your Cybersecurity Team: Create a Strong Cybersecurity Workforce Using Best Practices in Development
Build Your Cybersecurity Team: Create a Strong Cybersecurity Workforce Using Best Practices in Development Noel Kyle, Program Manager Department of Homeland Security (DHS) National Cybersecurity Education
More informationTracy Hackshaw, Chair, Internet Society Trinidad & Tobago Chapter 2 October 2018 Commonwealth ICT Forum 2018 Port of Spain, Trinidad & Tobago
Tracy Hackshaw, Chair, Internet Society Trinidad & Tobago Chapter 2 October 2018 Commonwealth ICT Forum 2018 Port of Spain, Trinidad & Tobago Spread the Word Resources - https://goo.gl/hchzk3 https://safe.tt
More informationSpreading the ICT Gospel With Cisco Network Academy Program
Spreading the ICT Gospel With Cisco Network Academy Program 1. Introduction By Shahab Meshki Educators and policymakers agree that student learning occurs best when highquality curriculum, instruction,
More informationISACA MANILA CHAPTER CALENDAR OF ACTIVITIES
MANILA CHAPTER 2017 CALENDAR OF ACTIVITIES 2017 MANILA CALENDAR OF ACTIVITIES GMM Professionals Night Public Trainings Reviews Conferences Technical Session & MANILA PROFILE HISTORY AND MISSION Who we
More informationISACA MANILA CHAPTER CALENDAR OF ACTIVITIES
MANILA CHAPTER 2017 CALENDAR OF ACTIVITIES 2017 MANILA CALENDAR OF ACTIVITIES GMM Professionals Night Public Trainings Reviews Conferences Technical Session & MANILA PROFILE HISTORY AND MISSION Who we
More informationJanuary-March 2016 Daytime Schedule
January-March 2016 Daytime Schedule Your high expectations meet our high standards! 130 West Mason Springfield 217.524.6749 www.llcc.edu/cctc Schedules available electronically In accordance with Lincoln
More informationContinuing Education. Connection April June Summer Program for Kids. In This Issue: What are Continuing Education courses?
CONTINUING EDUCATION CONNECTION APRIL JUNE 2014 Volume VI, Issue 3 Continuing Education Connection April June 2014 KNOWLEDGE FOR THE REAL WORLD IN THIS ISSUE Continuing Education Southeastern Technical
More informationCyberSecurity Training and Capacity Building: A Starting Point for Collaboration and Partnerships. from the most trusted name in information security
CyberSecurity Training and Capacity Building: A Starting Point for Collaboration and Partnerships About SANS The SANS (SysAdmin, Audit, Network, Security) Institute Established in 1989 Cooperative research
More informationCIMA Asia. Interactive Timetable Live Online
CIMA Asia Interactive Timetable 2017 2018 Live Online Version 1 Information last updated 09 October 2017 Please note: Information and dates in this timetable are subject to change. CIMA Cert BA Course
More informationCloud. Cloud Innovation World Cup 2013/14 15 OCT - 15 MAR. Special Prize Evolve Insurance Award. Participant Information INDUSTRY 4.
Innovation World Cup 2013/14 15 OCT - 15 MAR Participant Information ICT BUSINESS SERVICES Urban Infrastructures SMART LIVING INDUSTRY 4.0 MOBILITY Evolve Insurance Award THE CATEGORIES CLOUD INNOVATION
More information2017 Sponsorship Opportunities
2017 Sponsorship Opportunities Access Education Networking A Better You. A Best Practice. Sponsorships with MGMA of Greater St. Louis Your sponsorship helps to support education, professional development
More informationK-12 CYBERSECURITY EDUCATION CONFERENCE
NICE K-12 CYBERSECURITY EDUCATION CONFERENCE OMNI NASHVILLE HOTEL - NASHVILLE, TN DECEMBER 4 & 5, 2017 HOSTED BY 2017 SPONSORSHIP PROSPECTUS K-12 CONFERENCE 2017 SPONSORSHIP PROSPECTUS Why be a sponsor
More informationImmersion Academy Annual Report 2017
Immersion Academy Annual Report 2017 Accelerated, intensive training and certification program that develops the real-world knowledge and hands-on skills needed to defend today s information security systems.
More informationThis document/guide contains dated material; always check the ASMC website for the most recent information, policies, and other information.
December 2010 CDFM OVERVIEW The American Society of Military Comptrollers offers the Certified Defense Financial Manager (CDFM) program to those persons desiring to demonstrate proficiency in the core
More informationITU- Arab Regional Cyber Security Center s Activities & Regional Threats landscape
ITU- Arab Regional Cyber Security Center s Activities & Regional Threats landscape ENG. BADAR ALI ALSALEHI HEAD OF ITU-ARAB REGIONALCYBER SECURITY CENTER DG OF OMAN NATIONAL CERT Dar es Salaam November
More informationRecent Developments in Career and Technical Education. New York State Education Department November 2016
Recent Developments in Career and Technical Education New York State Education Department November 2016 Topics Graduation Pathways- CTE and CDOS CTE Teacher Certification CTE and ESSA Graduation Pathways
More informationFAMIS 2014 Reporting Industry Certifications 6/16/2014
Purposes for Reporting Industry Certifications Reporting Industry Certifications Tara Goodman Sean Friend Division of Career and Adult Education CAPE Act Florida Education Finance Program (FEFP) School
More informationMake Your Statement. Master of Management in Library and Information Science online. Graduate Certificate in Library and Information Management online
Make Your Statement Master of Management in Library and Information Science online Graduate Certificate in Library and Information Management online Help shape the future of your field. The Master of Management
More informationThe Quick CASP USER S GUIDE. What is the Quick CASP? Sample Quality Improvement Plan. >>> page 3. >>> page 7
The Quick CASP A Summer Learning Program Quality Assessment Tool USER S GUIDE What is the Quick CASP? >>> page 3. Sample Quality Improvement Plan >>> page 7 CONTENT 3 4 6 7 7 8 OVERVIEW OF THE QUICK CASP
More informationPROFESSIONAL MASTER S IN
I m in a new job I love. ERIC LAFONTAINE Service Operations Manager GE Healthcare Class of 2013 PROFESSIONAL MASTER S IN APPLIED SYSTEMS ENGINEERING GAIN A COMPETITIVE EDGE WITH A GEORGIA TECH DEGREE TODAY
More informationGOVERNMENT IT: FOCUSING ON 5 TECHNOLOGY PRIORITIES
GOVERNMENT IT: FOCUSING ON 5 TECHNOLOGY PRIORITIES INSIGHTS FROM PUBLIC SECTOR IT LEADERS DISCOVER NEW POSSIBILITIES. New network technology is breaking down barriers in government offices, allowing for
More informationSEPTEMBER 24-25, 2017 Lucknow, India SPONSORSHIP KIT SPONSORSHIP KIT.
SEPTEMBER 24-25, 2017 Lucknow, India SPONSORSHIP KIT SPONSORSHIP KIT www.hackersday.org ABOUT NISS National Information Security (NISS) is an initiative of National Information Security Council which is
More informationBOARD OF REGENTS ACADEMIC AFFAIRS COMMITTEE 4 STATE OF IOWA SEPTEMBER 12-13, 2018
STATE OF IOWA SEPTEMBER 12-13, 2018 REQUEST FOR NEW PROGRAM AT IOWA STATE UNIVERSITY: BACHELOR OF SCIENCE IN CYBER SECURITY ENGINEERING Contact: Rachel Boon Action Requested: Consider approval of the request
More informationInterim Report Technical Support for Integrated Library Systems Comparison of Open Source and Proprietary Software
Interim Report Technical Support for Integrated Library Systems Comparison of Open Source and Proprietary Software Vandana Singh Assistant Professor, School of Information Science, University of Tennessee,
More informationStrengthening Capacity in Cyber Talent sans.org/cybertalent
SANS Security Awareness Summit August 4th, 2016 Strengthening Capacity in Cyber Talent sans.org/cybertalent Cybersecurity: The Current State Skills Mismatch Emphasis on theory over practice Education focus
More informationProfessional Education Short Courses and Certificate Programs
Professional Education Short Courses and Certificate Programs January-December 2017 cce.umn.edu/professionaleducation College of Continuing Education 353 Ruttan Hall 1994 Buford Avenue St. Paul, MN 55108-6080
More informationThe fast track to top skills and top jobs in cyber. FREE TO TRANSITIONING VETERANS
The fast track to top skills and top jobs in cyber. FREE TO TRANSITIONING VETERANS FAST TRACK Three steps to a cybersecurity career QUALIFY Take the qualifying exam, complete the application process, and
More informationAtlanta Urban Debate League E-Debate Teaching Project
Atlanta Urban Debate League E-Debate Teaching Project Atlanta Urban Debate League... 1 Invitation to Participate... 2 School and Coach Expectations... 4 Technology Needs... 5 Downloading Skype... 6 Installing
More informationNC Project Learning Tree Guidelines
NC Project Learning Tree Guidelines PREFACE Project Learning Tree (PLT) is an environmental education program for educators and youth leaders working with students from pre-kindergarten through grade 12.
More informationComputing Accreditation Commission Version 2.0 CRITERIA FOR ACCREDITING COMPUTING PROGRAMS
Computing Accreditation Commission Version 2.0 CRITERIA FOR ACCREDITING COMPUTING PROGRAMS Optional for Reviews During the 2018-2019 Accreditation Cycle Mandatory for Reviews During the 2019-2020 Accreditation
More informationComputer Networking Technologies and Information Assurance & Cybersecurity
Computer Networking Technologies and Information Assurance & Cybersecurity Admissions Information Application Materials Students wanting to apply for a degree seeking program at the College of Eastern
More informationThe fast track to top skills and top jobs in cyber. Guaranteed.
The fast track to top skills and top jobs in cyber. Guaranteed. NO COST TO SELECTED PARTICIPANTS WELCOME The SANS Institute is presenting the SANS CyberTalent Immersion Academy for Women to encourage women
More informationPortland Timbers ODP (Pre-Academy) Invite and Information 2001/02 and 2003/04 Age Groups Tryouts: August 12-13/Salem, Oregon
Portland Timbers ODP (Pre-Academy) Invite and Information 2001/02 and 2003/04 Age Groups Tryouts: August 12-13/Salem, Oregon What is Portland Timbers Pre-Academy/Olympic Development Program (ODP)? All
More informationApp Economy Market analysis for Economic Development
App Economy Market analysis for Economic Development Mustapha Hamza, ISET Com Director mustapha.hamza@isetcom.tn ITU Arab Forum on Future Networks: "Broadband Networks in the Era of App Economy", Tunis
More informationDHS Election Task Force Updates. Geoff Hale, Elections Task Force
1 DHS Election Task Force Updates Geoff Hale, Elections Task Force Geoffrey.Hale@hq.dhs.gov ETF Updates Where we ve made progress Services EI-ISAC/ National Cyber Situational Awareness Room What we ve
More informationThe fast track to top skills and top jobs in cyber. Guaranteed. FREE TO TRANSITIONING VETERANS
The fast track to top skills and top jobs in cyber. Guaranteed. FREE TO TRANSITIONING VETERANS WELCOME SANS Institute is presenting the SANS VetSuccess Immersion Academy in San Diego. For transitioning
More informationMissouri State Educator Certification Q & A
PLEASE NOTE: THIS DOCUMENT IS A GENERAL INFORMATION DOCUMENT WITH HELPFUL QUESTION AND ANSWERS ONLY - IT IS YOUR RESPONSIBILITY TO CHECK WITH THE DEPARTMENT OF ELEMENTARY AND SECONDARY EDUCATION (DESE)
More informationA United States Cyber Academy Program
The GIAC certifications I earned in the Academy really helped open doors for me as a cybersecurity professional. Justin Sappington, Information Security Analyst at Umpqua Bank A United States Cyber Academy
More informationThe National Organization of Black Law Enforcement Executives (NOBLE) A NOBLE Focus on Collaboration and Unity. & Tomorrow
The National Organization of Black Law Enforcement Executives (NOBLE) A NOBLE Focus on Collaboration and Unity & Tomorrow Partnership with NOBLE Table of Contents Executive Summary...Page 3 A Brief History
More informationInformation Technology Services. Informational Report for the Board of Trustees October 11, 2017 Prepared effective August 31, 2017
Information Technology Services Informational Report for the Board of Trustees October 11, 2017 Prepared effective August 31, 2017 Information Technology Services TABLE OF CONTENTS UPDATE ON PROJECTS &
More informationNuts and Bolts of the Career and Professional Education Act (CAPE)
Learning Today, Earning Tomorrow Nuts and Bolts of the Career and Professional Education Act (CAPE) Tara Goodman Tara McLarnon Division of Career and Adult Education Florida Department of Education 1 The
More informationSTUDENT LEARNING OUTCOMES Beacom College of Computer and Cyber Sciences
STUDENT LEARNING OUTCOMES Beacom College of Computer and Cyber Sciences Undergraduate Programs - Bachelor B.S. Computer Game Design Upon completion of the B.S. degree in Computer Game Design, students
More informationISO STANDARD IMPLEMENTATION AND TECHNOLOGY CONSOLIDATION
ISO STANDARD IMPLEMENTATION AND TECHNOLOGY CONSOLIDATION Cathy Bates Senior Consultant, Vantage Technology Consulting Group January 30, 2018 Campus Orientation Initiative and Project Orientation Project
More informationCIMA Asia. Interactive Timetable Live Online
CIMA Asia Interactive Timetable 2018 Live Online Information version 8 last updated 04/05/18 Please note information and dates are subject to change. Premium Learning Partner 2018 CIMA Cert BA Course Overview
More informationCyber Security: It s all about TRUST
www.pwc.com/vn Cyber Security: It s all about TRUST 29 th March 2017 Robert Tran Cybersecurity leader, Vietnam Content s Digital IQ Survey 1 Current state of Cybersecurity in Vietnam 2 2 Our global team
More informationInterested in learning more? Global Information Assurance Certification Paper. Copyright SANS Institute Author Retains Full Rights
Global Information Assurance Certification Paper Copyright SANS Institute Author Retains Full Rights This paper is taken from the GIAC directory of certified professionals. Reposting is not permited without
More informationAnnual Meeting PMI Monterey Bay Chapter. March 2014 Mitra Pedersen PhD VP Of Program and Education
Annual Meeting PMI Monterey Bay Chapter March 2014 Mitra Pedersen PhD VP Of Program and Education Members PMI mbay chapter offered 22 Events 2013-2014 Project Management Contract Management Interface PMI-ACP
More informationBETHESDA CHEVY CHASE HIGH SCHOOL Career and Technology Education Department
BETHESDA CHEVY CHASE HIGH SCHOOL Career and Technology Education Department Mr. Jonathan Nateghi-Asli Jonathan_A_Nateghi-Asli@mcpsmd.org Resource Teacher http://bit.ly/bcctechnology Graduation Requirements
More informationThe fast track to top skills and top jobs in cyber. Guaranteed. FREE TO TRANSITIONING VETERANS
The fast track to top skills and top jobs in cyber. Guaranteed. FREE TO TRANSITIONING VETERANS WELCOME SANS Institute is presenting the SANS VetSuccess Immersion Academy in the DC Metro area. For transitioning
More informationEducation and technology are two of our greatest social equalizers.
Corporate Social Responsibility Education and technology are two of our greatest social equalizers. As the worldwide leader in networking, Cisco knows technology can be used to improve access to education.
More informationGlobal Standards Information. Standards Simulation Training for the USG ICES Workshop. July 6, 2010
Global Standards Information Standards Simulation Training for the USG ICES Workshop July 6, 2010 Today s Discussion Why use a Standards Simulation Exercise? Role of the U.S. Government and NIST in standards
More informationALABAMA STATE BOARD OF PUBLIC ACCOUNTANCY ADMINISTRATIVE CODE
ALABAMA STATE BOARD OF PUBLIC ACCOUNTANCY ADMINISTRATIVE CODE CHAPTER 30-X-4 EXAMINATIONS, QUALIFICATIONS OF CANDIDATES, APPLICATIONS, PASSING GRADES, CONDITIONED SUBJECTS, TRANSFER OF CREDITS, ISSUANCE
More informationThe fast track to top skills and top jobs in cyber. Guaranteed. FREE TO TRANSITIONING VETERANS
The fast track to top skills and top jobs in cyber. Guaranteed. FREE TO TRANSITIONING VETERANS WELCOME SANS Institute, in collaboration with Augusta Warrior Project and Augusta University, is presenting
More informationSkills Plan overview and delivery implications. March 2018 Catherine Sezen, Senior Policy Manager, AoC.
Skills Plan overview and delivery implications March 2018 Catherine Sezen, Senior Policy Manager, AoC. Agenda Skills plan rationale and overview Questions and some answers Recent updates Work placements
More informationINTRODUCING CISCO SECURITY FOR AWS
SESSION ID: SPO1-T08 INTRODUCING CISCO SECURITY FOR AWS Patrick Crowley CTO Cisco, Stealthwatch Cloud @p_crowley Three Main Points Use VPC Flow logs to make sure nothing is happening behind your back Use
More informationCareer and Technical Education DARLENE FRAZIER
Career and Technical Education DARLENE FRAZIER College Ready High School Prep Work Ready Where do I begin? Career Ready Empowering students to be successful citizens, employees, and leaders in a global
More informationUndergraduate Program for Specialty of Software Engineering
Undergraduate Program for Specialty of Software Engineering Ⅰ. Length of Schooling Standard: 4 years; Length of Schooling: 3-6 years Ⅱ. Degree Bachelor of Engineering Ⅲ. Specialty Orientation School of
More informationCCNA Cybersecurity Operations. Program Overview
Table of Contents 1. Introduction 2. Target Audience 3. Prerequisites 4. Target Certification 5. Curriculum Description 6. Curriculum Objectives 7. Virtual Machine Requirements 8. Course Outline 9. System
More informationPROFESSIONAL CERTIFICATES AND SHORT COURSES: MICROSOFT OFFICE. PCS.uah.edu/PDSolutions
PROFESSIONAL CERTIFICATES AND SHORT COURSES: MICROSOFT OFFICE PCS.uah.edu/PDSolutions 256.824.4430 THE VALUE OF MICROSOFT TRAINING Today s professional workforce is expected to possess intermediate to
More informationDeveloping Career-Relevant Academic Programs
2016 USENIX Summit for Educators in System Administration Developing Career-Relevant Academic Programs A Case Study: UMUC s B.S. Program in Computer Networks & Cybersecurity S. K. Bhaskar (S.Bhaskar@umuc.edu)
More informationEuropean Cyber Security Challenge
European Cyber Security Challenge Greek National Cyber Security Team Systems Security Laboratory (http://ssl.ds.unipi.gr/) Member of the European Cyber Security Challenge Steering Committee Department
More informationJuly-September 2016 Daytime Schedule
July-September 2016 Daytime Schedule Your high expectations meet our high standards! 130 West Mason Springfield 217.524.6749 www.llcc.edu/cctc Schedules available electronically In accordance with Lincoln
More informationSANS Vendor Offerings Detail
SANS Vendor Offerings Detail» About SANS» Conference Events» Media Products SANS Vendor Programs Conference Events Booths and Tabletops events Speaking Opportunities Sponsorship Programs Media Products
More informationOverview of ABET Kent Hamlin Director Institute of Nuclear Power Operations Commissioner TAC of ABET
Overview of ABET Kent Hamlin Director Institute of Nuclear Power Operations Commissioner TAC of ABET 1 st National Meeting on Improving Education and Training For Chinese Nuclear Power Industry Personnel
More informationPearson: Certified Ethical Hacker Version 9. Course Outline. Pearson: Certified Ethical Hacker Version 9.
Course Outline Pearson: Certified Ethical Hacker Version 9 27 Jun 2018 Contents 1. Course Objective 2. Pre-Assessment 3. Exercises, Quizzes, Flashcards & Glossary Number of Questions 4. Expert Instructor-Led
More informationWorkforce Development Overview CAREER PATHWAY PROGRAMS
Advanced Manufacturing (examples): Welder CNC Machine Programmers and Operators Industrial Electrical Technician Industrial Maintenance Technician Production Technician Manufacturing Engineers Healthcare
More informationDr. Imran Khan University of Nebraska-Lincoln Marketing (402)
Dr. Imran Khan University of Nebraska-Lincoln Marketing (402) 472-4536 Email: ikhan3@unl.edu Education DBA, Kennesaw State University, 2014. Major: Marketing Dissertation Title: Vendor Firm Characteristics
More informationCyber Security School
Cyber Cyber Security School FUTURE PROOF Y SECURITY TALENT "The UK needs to tackle the systemic issues at the heart of the Cyber skills shortage..." National Cyber Security Strategy 2016-2021, HM Government
More informationHigh School Course Guide
8D120 Business Computer Information Management I (R) 1 credit Gr: 9-12 8D125 Business Computer Information Management I (DC) R. Prerequisite: Touch Systems Data Entry Keyboarding Description: In Business
More informationTina Ladabouche. GenCyber Program Manager
Tina Ladabouche GenCyber Program Manager GenCyber Help all students understand correct and safe on-line behavior Increase interest in cybersecurity and diversity in cybersecurity workforce of the Nation
More informationThe New England Approach to HIPAA. John D. Halamka MD Chairman, New England Health EDI Network CIO, CareGroup Healthcare System
The New England Approach to HIPAA John D. Halamka MD Chairman, New England Health EDI Network CIO, CareGroup Healthcare System Three part approach Administrative Simplification Security/Confidentiality
More informationENHANCE YOUR CAREER WITH A BUSINESS DIPLOMA BUSINESS
BUSINESS ENHANCE YOUR CAREER WITH A BUSINESS DIPLOMA NZ DIPLOMA IN BUSINESS (MANAGEMENT & LEADERSHIP) LEVEL 5 NZ CERTIFICATE IN BUSINESS (ADMINISTRATION & TECHNOLOGY) LEVEL 3 NZ CERTIFICATE IN COMPUTING
More informationWINNING THE WAR FOR CYBER TALENT
WINNING THE WAR FOR CYBER TALENT National Initiative for Cyber Education (NICE) Conference Keynote NOVEMBER 2017 AGENDA CYBER TALENT SUPPLY VS. DEMAND MULTIDIMENSIONAL APPROACH TO ADDRESS THE SUPPLY /
More informationMission At Home in the Modern World.
2018 Media Kit Mission At Home in the Modern World. 2018 Media Kit Dwell is the guide for living with good design. Dwell s engaged community of over six million consumers trust Dwell to provide the tools
More informationDrive standards, performance and organizational value
Drive standards, performance and organizational value Facility Management Professional FMP Profile Students entering profession from universities, certificate or technical programs FM practitioners with
More informationCertified Cyber Security Specialist
Certified Cyber Security Specialist Page 1 of 7 Why Attend This course will provide participants with in-depth knowledge and practical skills to plan, deliver and monitor IT/cyber security to internal
More informationCOURSE SYLLABUS. Course Name NETWORK+ Course Number ITNW Y Lecture - Lab - Credit. NONE Prerequisite
Course Syllabus _ Page 1 COURSE SYLLABUS Course Name NETWORK+ Course Number ITNW 1358 46Y1 2-4 - 3 Lecture - Lab - Credit NONE Prerequisite This syllabus has been reviewed and is current on the date indicated.
More informationTroop calendar
Troop 546 2013-2014 calendar For questions and information please visit www.troop546peoriaaz.com or email troop546info@googlegroups.com August Court of honor Tue Aug 27, 2013 6pm - 7:30pm Award scouts
More informationGrade 4 Mathematics Pacing Guide
Jul 2014 ~ August 2014 ~ Sep 2014 1 2 3 4 5 6 7 8 9 10 11 12 14 15 16 17 Routines 19 Routines 20 Routines BOY 22 BOY 23 24 11 12 14 29 15 30 31 Notes: Found Online @ wwweverydaymathonlinecom 1 More Calendars
More informationINFORMATION SESSION. MS Software Engineering, specialization in Cybersecurity
INFORMATION SESSION MS Software Engineering, specialization in Cybersecurity Presenter Afifa Hamad Program Specialist Graduate & Extended Studies Charles W. Davidson College of Engineering San Jose State
More informationHigh School Course Guide Information Technology
8D120 Business Computer Information Management I (R) 1 credit Gr: 9-12 8D125 Business Computer Information Management I (DC) ; Recommended Prerequisite: Touch Systems Data Entry Keyboarding Description:
More informationExcel Professionally.IMPACT Urban Youth
TM Basic Etiquette/Protocol Certification Information Packet Excel Professionally.IMPACT Urban Youth NAUEP * P.O. Box 3641 * Cedar Hill, Texas * 75106 * 800.291.6492 * cert@urbangirlz.org 2010 2014. NAUEP.
More information