Challenges and games to inspire the next generation of cyber security professionals

Similar documents
Challenges and games to inspire the next generation of cyber security professionals

Rhode Island: Inspiring the next generation of cybersecurity experts

Cyber Security School

The People to Secure Our Future. Judy Baker, Director Cyber Security Challenge UK

DIGITAL TRUST Making digital work by making digital secure

The UK s National Cyber Security Strategy

The State of Cybersecurity and Digital Trust 2016

NZTECH ADVANCE SECURITY SUMMIT: ADDRESSING A CRITICAL

PERSON SPECIFICATION. Cyber PROTECT Officer. Job Title: Status: Established

CYBER SECURITY TRAINING

Micro Focus Partner Program. For Resellers

Canada Highlights. Cybersecurity: Do you know which protective measures will make your company cyber resilient?

Commonwealth Cyber Declaration

You will choose to study units from one of four specialist pathways depending on the career you wish to pursue. The four pathways are:

New CEPIS Mission

ABC Awards is working with Open Awards to deliver Functional Skills qualifications as part of the Awarding Consortium.

TO INSPIRE, CONNECT AND EMPOWER TO TURN BACK CRIME

CYBER RESILIENCE & INCIDENT RESPONSE

INFORMATION. October Radisson Blu Hotel Abidjan PRESS RELEASE.

Position Description. Computer Network Defence (CND) Analyst. GCSB mission and values. Our mission. Our values UNCLASSIFIED

MSc Computing and Technology (Part-Time)

U.S. Department of Homeland Security Office of Cybersecurity & Communications

Awareness and training programs OPTUS MACQUARIE UNIVERSITY CYBER SECURITY HUB

The fast track to top skills and top jobs in cyber. Guaranteed.

Transform your skills. Change your future.

CYBER SECURITY SKILLS AND TALENT SOLUTIONS

Security in Today s Insecure World for SecureTokyo

RITTECH PROVIDES A RECOGNISED BENCHMARK OF STANDING ACROSS DIGITAL AND TECH INDUSTRIES

Forensic analysis with leading technology: the intelligent connection Fraud Investigation & Dispute Services

Iowa Cyber Alliance Protecting the nation through cyber education Doug Jacobson Information Assurance Center Iowa State University

Cyber Security Congress 2017

SECURING THE UK S DIGITAL PROSPERITY. Enabling the joint delivery of the National Cyber Security Strategy's objectives

Business Crime Strategy

CCNA Cybersecurity Operations 1.1 Scope and Sequence

CCNA Cybersecurity Operations. Program Overview

13967/16 MK/mj 1 DG D 2B

Mapping Your Requirements to the NIST Cybersecurity Framework. Industry Perspective

2015 VORMETRIC INSIDER THREAT REPORT

Qualification Specification

Computing at STA. GCSE Exam Results : 100% A C

Immersion Academy Annual Report 2017

EC-Council Certified Incident Handler v2. Prepare to Handle and Respond to Security Incidents EC-COUNCIL CERTIFIED INCIDENT HANDLER 1

CYBER CAMPUS KPMG BUSINESS SCHOOL THE CYBER SCHOOL FOR THE REAL WORLD. The Business School for the Real World

School of Engineering & Built Environment

Cyber Range Buyers Guide for Fortune 1000 Security Operations

Position Description. Engagement Manager UNCLASSIFIED. Outreach & Engagement Information Assurance and Cyber Security Directorate.

CACHE Level 4. Internal Quality Assurance Qualifications. Qualification facts

2017 Company Profile

An Internationally Recognized Job Oriented Certification Program

BRING EXPERT TRAINING TO YOUR WORKPLACE.

Security Awareness Training Courses

The Windstream Enterprise Advantage for Banking

Securing Digital Transformation

Does someone else own your company s reputation? EY Global Information Security Survey 2018

If you were under cyber attack would you ever know?

European Cyber Security Challenge

ACCA Certificate in Audit (RQF Level 4) Qualification specification

ITU-ACMA Asia Pacific Regulators Roundtable July 2014

CATALOG 2017/2018 BINUS UNIVERSITY. Cyber Security. Introduction. Vision. Mission

Your curriculum planning tool 2018/19

ITU CBS. Digital Security Capacity Building: Role of the University GLOBAL ICT CAPACITY BUILDING SYMPOSIUM SANTO DOMINGO 2018

Build Your Cybersecurity Team: Create a Strong Cybersecurity Workforce Using Best Practices in Development

CYBERCRIME AS A NEW FORM OF CONTEMPORARY CRIME

Cyber Security and Cyber Fraud

PAGE - 16 PAGE - 1. Sometimes, the solution is just a benchmark away..

Our Data Protection Officer is Andrew Garrett, Operations Manager

Make your people your most effective defence against cyber-attacks. Brought to you in partnership with

Six Weeks to Security Operations The AMP Story. Mike Byrne Cyber Security AMP

T-SURE VIGILANCE CYBER SECURITY OPERATIONS CENTRE

SOLUTION BRIEF Virtual CISO

Strengthening Capacity in Cyber Talent sans.org/cybertalent

Think Vulnerability Management Has Been Commoditized? You're using the wrong vendor.

COLUMN. What attractive intranets look like. Intranets can t afford to be useful but ugly JULY Attractive and useful.

Policy recommendations. Technology fraud and online exploitation

Current skills gap for capable CTI analysts: Training for forensics & analysis

Between 1981 and 1983, I worked as a research assistant and for the following two years, I ran a Software Development Department.

Computer Information Science xxx

COMESA CYBER SECURITY PROGRAM KHARTOUM, SUDAN

SCHEDULE OF COURSES FOR THE YEAR 2018

Opening Doors to Cyber and Homeland Security Careers

Optus Macquarie University Cyber Security Hub A/Prof Christophe Doche Executive Director

Today s cyber threat landscape is evolving at a rate that is extremely aggressive,

A new approach to Cyber Security

Apprenticeships CYBER SECURITY HIGHER APPRENTICESHIP FROM IT TECHNICIAN TO SKILLED INFORMATION SECURITY PROFESSIONAL

Transforming Lives. Global UST

Immersion Academy Annual Report 2018

Cloud First: Policy Not Aspiration. A techuk Paper April 2017

Security in India: Enabling a New Connected Era

RastaLabs Red Team Simulation Lab

College Of. Technological Innovation

Competency Definition

SANS/REN-ISAC Partnership

160 DEPARTMENT OF COMPUTING

Introduction. ISNR Abu Dhabi 2020 Program. Participation & Partnership Opportunities

MIND THE GAP. An industry report on open source technology skills in the UK

Apprenticeships CYBER SECURITY ADVANCED TO TECHNICAL MODERN APPRENTICESHIP FROM NQ-LEVEL TO SKILLED SECURITY ENGINEER

Cyber Resilience: Developing a Shared Culture. Sponsor Guide

21 st Century Skills. distinguish between different types of cyber security approaches.

Executive Summary CYBER SECURITY COMPETITION SECONDARY SCHOOLS CZECH REPUBLIC The school year 2016 / 2017

With certain types of prepaid account, you can do just about everything a traditional bank account allows you to do, including using your prepaid

Transcription:

Challenges and games to inspire the next generation of cyber security professionals

What is CyberStart? CyberStart: a suite of challenges, tools and games designed to introduce children and young adults to the field of cyber security. In the UK and abroad we are facing a significant shortage of trained, skilled cyber security professionals. This is due, in part, to the lack of young people taking an interest in IT and computer security, both as a hobby and as a potential career path. In response to this challenge, SANS Institute has created CyberStart. This exciting and innovative project offers a suite of challenges, tools and games aimed at introducing children and young adults to the field of cyber security, developing their interest and helping them to pursue careers in the sector. SANS is the world's most trusted cyber security training provider. Through CyberStart, SANS is looking to change the face of cyber security for today s young people, presenting it as an exciting, engaging and accessible employment option, whilst also helping government organisations to develop their national cyber security capabilities. As online technologies continue to evolve and cyber criminals become more sophisticated in their methods and approaches, cyber security is rapidly becoming a top global priority. It is crucial that governments and businesses have access to a pool of skilled cyber security professionals in order to keep themselves, their employees and their clients safe. SANS CyberStart introduces children and young adults to: Linux Programming Web Attacks Binary Attacks Cryptography Forensics TOP SECRET SANS is looking to change the face of cyber security for today s young people

How is CyberStart different? In order to captivate and inspire young people, you need to think differently. SANS has therefore applied gamification principles and game-design techniques in developing CyberStart. The challenges are accessible to those without any pre-existing cyber security knowledge and can span various age, difficulty and skill levels, depending on requirements. As the candidates move through the challenge levels, they are driven forward by engaging narratives, focused on encouragement and praise. The challenges provide context of the day-to-day activities of the modern cyber security professional, tackling everything from Linux to cryptography and programming to forensics. Attempts to simply repackage adult learning techniques for young people can cause alienation and loss of interest. CyberStart uses language and ideas that children and young adults identify with; challenging concepts requiring common sense and analytical skills, but that also promote enjoyment and genuine interest in the subject matter. Everything from Linux to cryptography and programming to forensics

What CyberStart offers The CyberStart package is flexible, adaptable and able to be tailored to an organisation's individual needs and requirements. Among the elements that SANS offers are: PRE-SELECTION GAMES So far sent out to thousands of children and teenagers, CyberStart pre-selection consists of mini games, questions and aptitude tests. Results can be used to streamline those invited to subsequent phases. CYBERSTART CAMPS Candidates play a locally deployed version of the CyberStart game at chosen sites. ONLINE GAME CAPABILITIES With over 90 hours of online content, candidates are able to log in from remote locations and play the CyberStart game. CAPTURE THE FLAG COMPETITIONS Whole day events at which candidates take part in competitive challenges. Previous winners have been offered career-enabling prizes such as scholarships and funding for further training.

How to get involved The CyberStart game and its components are flexible to fit the needs of individual organisations. SANS' dedicated team will work with you to meet your requirements and ensure that you get the most out of the CyberStart programme, whether you are simply looking to raise awareness of cyber security or inspire the next generation of cyber security experts. If you have any questions about SANS CyberStart, would like to receive further information or register your interest, please email: emea@sans.org Praise for other SANS programmes: Exceptional. There s no other word for it. We were able to completely immerse ourselves in the learning and I think that s one of the strongest points. The industry is looking at response as much as prevention... we all now feel confident contributing to organisations looking to fill their cyber skills gap. The greatest opportunity I've ever had in my life.

Contact Information: T: +44 203 384 3470 E: emea@sans.org W: www.sans.org/cyberstart @SANSEMEA