Browse Resources

Information and Security Technologies -- Security, information assurance, and forensics

Resources

Screenshot for Firewall: Packet Filters
This brief interactive activity, by Electromechanical Digital Library and Wisconsin Technical College System faculty members Joseph Wetzel and Douglas Tabbutt, provides an interactive lesson on packet filters to demonstrate their use. After a brief explanation, there is an activity that allows the...
Screenshot for Firewall: Stateful Packet Inspector
This brief interactive activity, by Electromechanical Digital Library and Wisconsin Technical College System faculty members Joseph Wetzel and Brian Gremore, provides a basic introduction to stateful packet inspectors (SPIs). This online lesson gives a definition, examples, and explanation of SPIs...
Screenshot
This paper, published in Advances in Digital Forensics VII, discusses the unique challenges that plug computers pose to evidence recovery operations during criminal investigations. Plug computers are a cross between an embedded device (such as a smart phone) and a traditional computer. The...
Screenshot
Program Description: River Valley Community College, in association with Program Development in Cybersecurity with Focus on Business and Healthcare Concepts, has developed a 4-semester program to prepare students to working the Information Assurance (IA) field with a focus on Cybersecurity and...
Screenshot for Governance, Risk Management, & Compliance Workshops
This webpage, from National Cybersecurity Training and Education (NCYTE) Center, includes governance, risk management, and compliance workshops that were "designed for college faculty that teach cybersecurity and information assurance programs who recognize that community college cybersecurity...
Screenshot
In Fall of 2012, the Homeland Security Advisory Council created this CyberSkills Task Force Report. The purpose of the 41 page pdf report is to propose improvements to enable the Department of Homeland Security to recruit the cybersecurity talent it needs. The report also proposes "ways to boost the...
Screenshot for How'd You Think of That? with Temple Grandin: Cybersecurity 360, Everywhere and Everything (S2, Ep. 1)
This podcast is hosted by Temple Grandin and is provided by the STEM Action Center. This podcast features STEM professionals discussing their work and the benefits of a multifaceted approach to STEM education. During episode one of season two, Temple Gradin speaks with cybersecurity expert Diego...
Screenshot for ICS Basics Scenario
​​​​​This collection of resources, from the Cybersecurity Education for Advanced Manufacturing Organizations project, is a part of the Industrial Control Systems Basics Scenario. This scenario is a training module that provides background on industrial networking protocols and their security...
Screenshot for ICS Security Basics (Part 2 of 4)
This video, presented by instructor Tony Hills from the Cybersecurity Education for Advanced Manufacturing Organizations project, is the second in a series of lectures on industrial control system (ICS) security. In this lecture, Hills introduces the Modbus Transmission Control Protocol...
Screenshot for ICS Security Basics (Part 3 of 4)
This video, presented by instructor Tony Hills from the Cybersecurity Education for Advanced Manufacturing Organizations project, is the third in a series of lectures on industrial control system (ICS) security. In this lecture, Hills provides an introduction to the Profinet and S7 communications...
← Previous Next →