Browse Resources

Information and Security Technologies -- Security, information assurance, and forensics

Resources

Screenshot for Industrial Zoning (Video 3 of 6)
This video, presented by instructor Tony Hills from the Cybersecurity Education for Advanced Manufacturing Organizations project, is the third in a series of six that describe an industrial zoning lab. In this video, Hills walks through the process of starting the lab by launching virtual machines...
Screenshot for Industrial Zoning (Video 4 of 6)
This video, presented by instructor Tony Hills from the Cybersecurity Education for Advanced Manufacturing Organizations project, is the fourth in a series of six that describe an industrial zoning lab. In this video, Hills demonstrates how to observe changes in the network traffic after modifying a...
Screenshot for Industrial Zoning (Video 6 of 6)
This video, presented by instructor Tony Hills from the Cybersecurity Education for Advanced Manufacturing Organizations project, is the last in a series of six videos that describe an industrial zoning lab. In this video, Hills demonstrates how network segmentation enhances security by isolating...
Screenshot for Introduction to Bitcoins, Blockchains, and Smart Contracts
This presentation, made available by the University of Hawaii at Honolulu, provides an introduction to bitcoins, blockchains, and smart contracts. The presentation was created by Dr. Debasis Bhattacharya, Assistant Professor of Applied Business and Information Technology at University of Hawaii Maui...
Screenshot for Introduction to Bitcoins, Blockchains, Ethereum, Smart Contracts, and NFTs
This video, provided by the Convergence Technology Center (CTC) at the HI-TEC 2022 conference, is a presentation that covers the key concepts related to blockchain technologies and services. In the video, Debasis Bhattacharya from the University of Hawaii's Maui College describes bitcoin and...
Screenshot for Introduction to Cyber Supply Chain Attacks and Risk Management (1 of 3)
This video, from the National Cybersecurity Training and Education (NCyTE) Center, is the first in a series of three that discuss cyber supply chain attacks and risk management. This video defines the term supply chain and the supply chain problem, describes the phases of the supply chain, and...
Screenshot for Introduction to Emergency Services Critical Infrastructure Cybersecurity
This video from the National Cybersecurity Training and Education Center (NCyTE) introduces students to the Emergency Services Critical Infrastructure sector. In the video, Philip Craiger discusses the definition of emergency services, what services comprise emergency services, interdependencies...
Screenshot for Intrusion Detection System/Intrusion Prevention System (IDS/IPS) Scenario
​​​​​This collection of resources, from the Cybersecurity Education for Advanced Manufacturing Organizations project, is a part of the Intrusion Detection System/Intrusion Prevention System (IDS/IPS) Scenario. This scenario is a training module that focuses on using IDS/IPS to monitor and protect...
Screenshot
Description: This IPAR (Imaging, Preserving, analyzing, and reporting) game is provided by the project "Gamified" Digital Forensics Course Modules for Undergraduates at the Rochester Institute of Technology and is part of a digital forensics curriculum that teaches students to collect evidence,...
Screenshot for IT Trends 2021-2022
These resources are provided by the National Convergence Technology Center (CTC). Resources include four one-page flyers that were developed at the request of member schools in the National CTC's IT educator community of practice, known as the "CCN" (Convergence College Network), to help support...
← Previous Next →