Browse Resources
Information and Security Technologies -- Security, information assurance, and forensics
Resources | |
---|---|
Course Description
This sample module from ITSC 1325: PC Hardware, a course that educates learners on how to "install, configure, secure, and troubleshoot operating systems software and hardware to achieve high availability and performance," covers end user system security. Module 5 progresses...
This PDF document, provided by the Ohio Region Cybersecurity Technician Training Pipeline at Columbus State Community College, is a job skills analysis of the cybersecurity workforce. The document lists the various roles that these professionals play and provides the corresponding technology skills...
This 79-page document from the National Cybersecurity Training and Education Center (NCyTE) highlights the work done by two National Centers of Academic Excellence (CAE) in Cyber Defense Education (CD), including Whatcom Community College and Jackson State Community College. The cybersecurity...
This reference curriculum from the CERT Division of the Software Engineering Institute (SEI) at Carnegie Mellon University, includes masters level course outlines covering software assurance. The nine courses range from Assurance Management to Assured Software Development to the Software Assurance...
This video, from the National Cybersecurity Training and Education (NCyTE) Center, provides insights into the MAX Power collection. This collection is a free resource that can help prepare students for cyber competitions. The MAX Power collection includes micromodules of learning objects that guide...
This video, presented by instructor Tony Hills from the Cybersecurity Education for Advanced Manufacturing Organizations project, provides an introduction to using Metasploit, an "open-source framework designed to provide a consistent and easily expandable way to use security tools and exploits." In...
This collection of resources, from the Cybersecurity Education for Advanced Manufacturing Organizations project, is a part of the Metasploit Scenario. This scenario is a training module that provides an introduction to Metasploit, "a powerful, free, and open-source penetration testing tool used...
This video from the National CyberWatch Center highlights Microsoft's cybersecurity scholarship program. This scholarship program supports community college students in a cybersecurity pathway. In the video, Kendra Grady discusses her role in the scholarship program, the Last Mile Education Fund,...
This PowerPoint presentation was created by Deanne Wesley and Francisco Salinas and is provided free for download. Presentation topics include exploring a mock crime scene, gathering evidence, utilizing a chain of custody form, and acquiring evidence. A sample chain of custody form and lists of...
This website provides information about the Collegiate Cyber Defense Competition. The “CCDC is a tiered competition system (state, regional, nationals) that exercises both technical AND business skills. CCDC focuses on the operational aspects of managing and protecting an existing “commercial”...
| |
← Previous | Next → |