Browse Resources
Information and Security Technologies -- Security, information assurance, and forensics
Resources | |
---|---|
This video, presented by instructor Tony Hills from the Cybersecurity Education for Advanced Manufacturing Organizations project, is the third in a series of lectures on using Nmap, a free, open-source network scanning software used in network functionality and security. In this lecture, Hills...
This video, presented by instructor Tony Hills from the Cybersecurity Education for Advanced Manufacturing Organizations project, is the last in a series of lectures on using Nmap, a free, open-source network scanning software used in network functionality and security. This lecture covers...
This collection of resources, from the Cybersecurity Education for Advanced Manufacturing Organizations project, is a part of the nmap Scenario. This scenario is a training module that provides an introduction to nmap, a free, open-source software used in network functionality and network...
This Cybersecurity Lab webpage from the PBS NOVA Labs website includes an interactive game and videos about cybersecurity. In this game users defend a company that is the target of cyber attacks. The goal is to strengthen cyber defenses and block attackers by completing a series of challenges. Users...
This video from Northeast Wisconsin Technical College (NWTC) is part of the Innovative Technology Speaker Series. This video focuses on cybersecurity and features four presenters. In the video, Tommy Gardner talks about growing the cybersecurity workforce, advocating for cybersecurity educational...
This 54-page resource was written by Roger Powell and is provided free for download. This paper “explores the issues of balancing career preparation with academic foundations in community college information security programs. The paper examines San Bernardino Valley’s creation of an information...
This 42 page report, published through a collaboration of the National CyberWatch Center, Grimm + Parker Architects, and Steelcase, an innovative furnature design and manufacturing company, is intended to offer "support in the planning and design of advanced, high performing cybersecurity learning...
This page, from the National Center for Women and Information Technology, offers materials to aid information technology professionals in delivering an age-appropriate presentation to interest middle school students in computing. The downloadable .zip file on the page includes sample correspondence...
This resource guide, commissioned by the National CyberWatch Center, is intended to prepare student teams for the Collegiate Cyber Defense Competition (CDCC). The CDCC is designed to provide students with hands-on experience in the application of information assurance skills and to enhance students...
Program Description:
River Valley Community College, in association with Program Development in Cybersecurity with Focus on Business and Healthcare Concepts, has developed a 4-semester program to prepare students to working the Information Assurance (IA) field with a focus on Cybersecurity and...
| |
← Previous | Next → |