Browse Resources
Information and Security Technologies -- Security, information assurance, and forensics
Resources | |
---|---|
This video, presented by instructor Tony Hills from the Cybersecurity Education for Advanced Manufacturing Organizations project, is the third in a series of six that describe an industrial zoning lab. In this video, Hills walks through the process of starting the lab by launching virtual machines...
This video, presented by instructor Tony Hills from the Cybersecurity Education for Advanced Manufacturing Organizations project, is the fourth in a series of six that describe an industrial zoning lab. In this video, Hills demonstrates how to observe changes in the network traffic after modifying a...
This video, presented by instructor Tony Hills from the Cybersecurity Education for Advanced Manufacturing Organizations project, is the last in a series of six videos that describe an industrial zoning lab. In this video, Hills demonstrates how network segmentation enhances security by isolating...
This presentation, made available by the University of Hawaii at Honolulu, provides an introduction to bitcoins, blockchains, and smart contracts. The presentation was created by Dr. Debasis Bhattacharya, Assistant Professor of Applied Business and Information Technology at University of Hawaii Maui...
This video, provided by the Convergence Technology Center (CTC) at the HI-TEC 2022 conference, is a presentation that covers the key concepts related to blockchain technologies and services. In the video, Debasis Bhattacharya from the University of Hawaii's Maui College describes bitcoin and...
This video, from the National Cybersecurity Training and Education (NCyTE) Center, is the first in a series of three that discuss cyber supply chain attacks and risk management. This video defines the term supply chain and the supply chain problem, describes the phases of the supply chain, and...
This video from the National Cybersecurity Training and Education Center (NCyTE) introduces students to the Emergency Services Critical Infrastructure sector. In the video, Philip Craiger discusses the definition of emergency services, what services comprise emergency services, interdependencies...
This collection of resources, from the Cybersecurity Education for Advanced Manufacturing Organizations project, is a part of the Intrusion Detection System/Intrusion Prevention System (IDS/IPS) Scenario. This scenario is a training module that focuses on using IDS/IPS to monitor and protect...
Description:
This IPAR (Imaging, Preserving, analyzing, and reporting) game is provided by the project "Gamified" Digital Forensics Course Modules for Undergraduates at the Rochester Institute of Technology and is part of a digital forensics curriculum that teaches students to collect evidence,...
These resources are provided by the National Convergence Technology Center (CTC). Resources include four one-page flyers that were developed at the request of member schools in the National CTC's IT educator community of practice, known as the "CCN" (Convergence College Network), to help support...
| |
← Previous | Next → |