Browse Resources
Information and Security Technologies -- Security, information assurance, and forensics
Resources | |
---|---|
This brief interactive activity, by Electromechanical Digital Library and Wisconsin Technical College System faculty members Joseph Wetzel and Douglas Tabbutt, provides an interactive lesson on packet filters to demonstrate their use. After a brief explanation, there is an activity that allows the...
This brief interactive activity, by Electromechanical Digital Library and Wisconsin Technical College System faculty members Joseph Wetzel and Brian Gremore, provides a basic introduction to stateful packet inspectors (SPIs). This online lesson gives a definition, examples, and explanation of SPIs...
This paper, published in Advances in Digital Forensics VII, discusses the unique challenges that plug computers pose to evidence recovery operations during criminal investigations. Plug computers are a cross between an embedded device (such as a smart phone) and a traditional computer. The...
Program Description:
River Valley Community College, in association with Program Development in Cybersecurity with Focus on Business and Healthcare Concepts, has developed a 4-semester program to prepare students to working the Information Assurance (IA) field with a focus on Cybersecurity and...
This webpage, from National Cybersecurity Training and Education (NCYTE) Center, includes governance, risk management, and compliance workshops that were "designed for college faculty that teach cybersecurity and information assurance programs who recognize that community college cybersecurity...
In Fall of 2012, the Homeland Security Advisory Council created this CyberSkills Task Force Report. The purpose of the 41 page pdf report is to propose improvements to enable the Department of Homeland Security to recruit the cybersecurity talent it needs. The report also proposes "ways to boost the...
This podcast is hosted by Temple Grandin and is provided by the STEM Action Center. This podcast features STEM professionals discussing their work and the benefits of a multifaceted approach to STEM education. During episode one of season two, Temple Gradin speaks with cybersecurity expert Diego...
This collection of resources, from the Cybersecurity Education for Advanced Manufacturing Organizations project, is a part of the Industrial Control Systems Basics Scenario. This scenario is a training module that provides background on industrial networking protocols and their security...
This video, presented by instructor Tony Hills from the Cybersecurity Education for Advanced Manufacturing Organizations project, is the second in a series of lectures on industrial control system (ICS) security. In this lecture, Hills introduces the Modbus Transmission Control Protocol...
This video, presented by instructor Tony Hills from the Cybersecurity Education for Advanced Manufacturing Organizations project, is the third in a series of lectures on industrial control system (ICS) security. In this lecture, Hills provides an introduction to the Profinet and S7 communications...
| |
← Previous | Next → |