Browse Resources
Information and Security Technologies -- Security, information assurance, and forensics
Resources |
|---|
In this video, from the National Cybersecurity Training and Education (NCyTE) Center, Eleanor Taylor from the National Idaho Laboratory (NIL) discusses the Cybercore Lab and NIL's efforts to create a workforce that educated on cybersecurity issues in critical infrastructure. The NIL Cybercore...
This webpage, from National Cybersecurity Training and Education (NCYTE) Center, includes Critical Infrastructure Security and Resilience curriculum. Each course includes a syllabus with a course outline. Syllabi include course descriptions, learning outcomes, course requirements, prerequisites, and...
This video, from the National Cybersecurity Training and Education (NCyTE) Center, is the third and final video in a series that discuses cyber supply chain attacks and risk management. This video provides a review of the first video in the series and then discusses "... the U.S. government...
During this webinar, from the National Cybersecurity Training and Education (NCyTE) Center, Professors Mike Libassi, Kevin O'Leary, and Erik Renegar provide information about Sticker Heist, a hands-on cybersecurity educational game. In Sticker Heist, "...each team of students must solve multiple...
This webpage, from National Cybersecurity Training and Education (NCYTE) Center, includes information related to the development of cyber intelligence curriculum. Resources include seven videos created by California State University San Bernardino (CSUSB) as well as "documents related to the...
Project Description:
This collection of course content was created by the DREAMS (Developing Rigorous and Enhanced Academic Modules) project. This project had the following three main goals:
Develop cybersecurity lab activities that are functional for high school schedules, and can also be used...
This video, from the National Cybersecurity Training and Education (NCyTE) Center, is the second in a series of three that discuss cyber supply chain attacks and risk management. This video provides a review of the first video and discusses "... the stages of the supply chain and possible risks...
This video, from the National Cybersecurity Training and Education (NCyTE) Center, provides an overview and demonstration of the Cyber Security Evaluation Tool (CSET), a stand-alone desktop application that guides users through a "step-by-step process to evaluate industrial control system (ICS) and...
This video, from the National Cybersecurity Training and Education (NCyTE) Center, provides an overview and demonstration of the Cyber Security Evaluation Tool (CSET), a stand-alone desktop application that guides users through a "step-by-step process to evaluate industrial control system (ICS) and...
This webpage, from National Cybersecurity Training and Education (NCYTE) Center, is one of seven learning modules from the Cybersecurity-Infused Computer Science Modules series. Primary Learning Objectives include:
Identify basic security concepts and concerns, including risks, threats, and...
|
| ← PreviousNext → |









