The GenCyber Program. By Chris Ralph

Similar documents
STUDENT LEARNING OUTCOMES Beacom College of Computer and Cyber Sciences

ANATOMY OF AN ATTACK!

CIRT: Requirements and implementation

CompTIA Cybersecurity Analyst+

COMPUTER FORENSICS (CFRS)

2017 Annual Meeting of Members and Board of Directors Meeting

An Operational Cyber Security Perspective on Emerging Challenges. Michael Misumi CIO Johns Hopkins University Applied Physics Lab (JHU/APL)

EC-Council Certified Network Defender (CND) Duration: 5 Days Method: Instructor-Led

Cybersecurity Auditing in an Unsecure World

Security Aspects Control Rationale Best Practices Self-Assessment (Click all that applicable) 1. Security Policy and Security Management

Course overview. CompTIA Security+ Certification (Exam SY0-501) Study Guide (G635eng v107)

Defense in Depth Security in the Enterprise

Implementing Cisco Network Security (IINS) 3.0

Security

Vulnerability Management Policy

Oklahoma State University Institute of Technology Face-to-Face Common Syllabus Fall 2017

SINGLE COURSE. NH9000 Certified Ethical Hacker 104 Total Hours. COURSE TITLE: Certified Ethical Hacker

E-guide Getting your CISSP Certification

Security by Default: Enabling Transformation Through Cyber Resilience

Unit 3 Cyber security

May the (IBM) X-Force Be With You

Ransomware A case study of the impact, recovery and remediation events

CYBERSECURITY: Scholarship and Job Opportunities

Introducing Cyber Resiliency Concerns Into Engineering Education

This course incorporates a variety of hands-on lab exercises allowing participants to put the lesson content into action.

CompTIA Security+ Study Guide (SY0-501)

Service Provider View of Cyber Security. July 2017

Certified Cyber Security Analyst VS-1160

Master of Cyber Security, Strategy and Risk Management. CECS PG Information Session April 17, 2018

EU GENERAL DATA PROTECTION: TIME TO ACT. Laurent Vanderschrick Channel Manager Belgium & Luxembourg Stefaan Van Hoornick Technical Manager BeNeLux

Course 832 EC-Council Computer Hacking Forensic Investigator (CHFI)

Cybersecurity for IT Online. kaspersky.com/awareness #truecybersecurity. Kaspersky Enterprise Cybersecurity

Computer Information Systems (CIS) CIS 105 Current Operating Systems/Security CIS 101 Introduction to Computers

Protecting Against Online Fraud. F5 EMEA Webinar August 2014

CyberSecurity Training and Capacity Building: A Starting Point for Collaboration and Partnerships. from the most trusted name in information security

CISSP CEH PKI SECURITY + CEHv9: Certified Ethical Hacker. Upcoming Dates. Course Description. Course Outline

CYBERSECURITY HOW IT IS TRANSFORMING THE IT ASSURANCE FIELD

The New Era of Cognitive Security

CCNA Cybersecurity Operations 1.1 Scope and Sequence

Syllabus: The syllabus is broadly structured as follows:

CCISO Blueprint v1. EC-Council

Seqrite Endpoint Security

CCNA Cybersecurity Operations. Program Overview

Cyber Security Program

Standard Course Outline IS 656 Information Systems Security and Assurance

ACS / Computer Security And Privacy. Fall 2018 Mid-Term Review

PROTECTING INFORMATION ASSETS NETWORK SECURITY

Sage Data Security Services Directory

E-guide CISSP Prep: 4 Steps to Achieve Your Certification

Pearson CISSP Cert Guide with Labs. Course Outline. Pearson CISSP Cert Guide with Labs. 17 Oct

COMESA CYBER SECURITY PROGRAM KHARTOUM, SUDAN

National Cyber Security Operations Center (N-CSOC) Stakeholders' Conference

Cybersecurity Survey Results

Course Outline. CISSP - Certified Information Systems Security Professional

Defining Computer Security Incident Response Teams

Heavy Vehicle Cyber Security Bulletin

Education Network Security

Mission: Continuity BUILDING RESILIENCE AGAINST UNPLANNED SERVICE INTERRUPTIONS

Boston Chapter AGA 2018 Regional Professional Development Conference Cyber Security MAY 2018

Mike Spear, Ops Leader Greg Maciel, Cyber Director INDUSTRIAL CYBER SECURITY PROGRAMS

Cyber Security Roadmap

Computer Information Systems (CIS) CIS 105 Current Operating Systems/Security CIS 101 Introduction to Computers

Are we breached? Deloitte's Cyber Threat Hunting

HOLY ANGEL UNIVERSITY COLLEGE OF INFORMATION AND COMMUNICATIONS TECHNOLOGY CYBER SECURITY COURSE SYLLABUS

CEH: CERTIFIED ETHICAL HACKER v9

Certified Ethical Hacker (CEH)

Cybersecurity in Government

DATA SHEET RISK & CYBERSECURITY PRACTICE EMPOWERING CUSTOMERS TO TAKE COMMAND OF THEIR EVOLVING RISK & CYBERSECURITY POSTURE

Hacker Academy Ltd COURSES CATALOGUE. Hacker Academy Ltd. LONDON UK

Security+ SY0-501 Study Guide Table of Contents

PND at a glance: The World s Premier Online Practical Network Defense course. Self-paced, online, flexible access

Technology Risk Management in Banking Industry. Rocky Cheng General Manager, Information Technology, Bank of China (Hong Kong) Limited

Protecting productivity with Industrial Security Services

Panelists. Moderator: Dr. John H. Saunders, MITRE Corporation

Strategic Infrastructure Security

Ransomware A case study of the impact, recovery and remediation events

6 MILLION AVERAGE PAY. CYBER Security. How many cyber security professionals will be added in 2019? for popular indursty positions are

Trend Micro Deep Discovery Training for Certified Professionals

Researching New Ways to Build a Cybersecurity Workforce

Improving SCADA System Security

Implementing Cisco Cybersecurity Operations

Gujarat Forensic Sciences University

NEW JERSEY INSTITUTE OF TECHNOLOGY. Initiation of Cyber Defense Option. for the Master of Science in

Cyber Security & Ethical Hacking Training. Introduction to Cyber Security Introduction to Cyber Security. Linux Operating System and Networking: LINUX

A senior design project on network security

Build Your Cybersecurity Team: Create a Strong Cybersecurity Workforce Using Best Practices in Development

Course 831 Certified Ethical Hacker v9

ACM Retreat - Today s Topics:

Department of Management Services REQUEST FOR INFORMATION

Understanding Cisco Cybersecurity Fundamentals

Cybersecurity Today Avoid Becoming a News Headline

The fast track to top skills and top jobs in cyber. Guaranteed. FREE TO TRANSITIONING VETERANS

The fast track to top skills and top jobs in cyber. Guaranteed.

NEXT GENERATION SECURITY OPERATIONS CENTER

Course Outline. CISSP - Certified Information Systems Security Professional 2015 (Course & Labs)

Security Audit What Why

A Government Health Agency Trusts Tenable to Protect Patient Data and Manage Expanding Attack Surface

Welcome to the CyberSecure My Business Webinar Series We will begin promptly at 2pm EDT All speakers will be muted until that time

Training for the cyber professionals of tomorrow

MORGAN STATE UNIVERSITY DEPARTMENT OF ELECTRICAL AND COMPUTER ENGINEERING COURSE SYLLABUS FALL, 2015

Transcription:

The GenCyber Program By Chris Ralph

The Mission of GenCyber Provide a cybersecurity camp experience for students and teachers at the K-12 level. The primary goal of the program is to increase interest and educate students and faculty in the field of cybersecurity. The GenCyber Program strives to be part of the solution to the shortfall of skilled cybersecurity professionals by introducing students to the importance and threat of cybersecurity as it pertains to our country s national and economic security. GenCyber camps are open to all student and teacher participants at no cost. Funding is provided jointly by the National Security Agency and the National Science Foundation.

GenCyber Program Sponsors: The National Security Agency & The National Science Foundation

The GenCyber Camp was hosted by the Dartmouth Institute for Security, Technology, and Society

GenCyber Camp Day One Day One focused on motives as well as targets for Cyber-Attacks. Topics Included: Cyber-Threat Overview Cyber-Attacks and Motives Cyber Attack Impact Cyber Attack Targets Basic Cyber-Attack Method Reconnaissance Identify Targets Vulnerabilities & Exploits Some of these attacks include DDoS, Ransomware, and Phishing Cyber-Defense Basics Network Defense- Networks that are used to protect, monitor, detect incoming network attacks, intrusions, and disruptions. System Defense- multiple layer of defense in case a layer fail to keep out the intruder Data protection- is a way of protecting ones personal information Regulations and the Law User Awareness

GenCyber Camp Day Two The second day concentrated on Network Defense Networking Basics Network Addressing Basic Routing Name Resolution Network Services (DHCP, DNS) Networking Defense- a number of protective measures taken to make sure the network is safe. Access Control Firewalls Intrusion Detection & Prevention- a network security program designed to identify any suspicious oncoming sites. Signature-Based Anomaly-based Layer 7 inspection Log Inspection Lab Work: Held group exercises in Network Discovery and Traffic Analysis

GenCyber Camp Day Three On the third day discussion was centered on Server Defense. Cyber-security in Large Organizations A guest speaker addressed the continuous threat of cyber-attacks in large corporations. Vulnerability Management System Vulnerabilities Patch Management Vulnerability Assessment Proactive vulnerability scanning Lab Work: Web Application Security Exercise

GenCyber Camp Day Four The fourth day covered aspects of Data Protection Data Protection Strategies Data Risk Management Basic Cryptography Data classification Protection of data in transit Protection of data at rest Mobile Computing security Symmetric encryption Asymmetric encryption Network encryption Data encryption Digital signatures LAB: Encryption Exercise

GenCyber Camp Day Five The final day focused on Digital Investigations. Incident Response & Investigations Incident Response planning Digital forensics Security regulations Computer crime laws Human Factors in Cyber Security Social Engineering User Awareness Initiatives Ethical computing Anatomy of an Attack A review of the main stages of a cyber-attack and the cyber-defense necessary to counter the attack. The camp experience concluded with all participants being broken down into groups for an interactive exercise that focused on lessons learned during the week.

Conclusion The GenCyber Program successfully accomplishes its goal of introducing the field of Cybersecurity to students from all over the United States. In the future, as cyber-threats continue to evolve, a new generation of cyber-specialists will be needed for both the national and economic security of our country.

Questions?