Browse Resources
Information and Security Technologies -- Security, information assurance, and forensics
Resources |
---|
This video, from the National Cybersecurity Training and Education (NCyTE) Center, is the first in a series of three that discuss cyber supply chain attacks and risk management. This video defines the term supply chain and the supply chain problem, describes the phases of the supply chain, and...
This video from the National Cybersecurity Training and Education Center (NCyTE) introduces students to the Emergency Services Critical Infrastructure sector. In the video, Philip Craiger discusses the definition of emergency services, what services comprise emergency services, interdependencies...
This collection of resources, from the Cybersecurity Education for Advanced Manufacturing Organizations project, is a part of the Intrusion Detection System/Intrusion Prevention System (IDS/IPS) Scenario. This scenario is a training module that focuses on using IDS/IPS to monitor and protect...
Description:
This IPAR (Imaging, Preserving, analyzing, and reporting) game is provided by the project "Gamified" Digital Forensics Course Modules for Undergraduates at the Rochester Institute of Technology and is part of a digital forensics curriculum that teaches students to collect evidence,...
These resources are provided by the National Convergence Technology Center (CTC). Resources include four one-page flyers that were developed at the request of member schools in the National CTC's IT educator community of practice, known as the "CCN" (Convergence College Network), to help support...
Course Description
This sample module from ITSC 1325: PC Hardware, a course that educates learners on how to "install, configure, secure, and troubleshoot operating systems software and hardware to achieve high availability and performance," covers end user system security. Module 5 progresses...
This PDF document, provided by the Ohio Region Cybersecurity Technician Training Pipeline at Columbus State Community College, is a job skills analysis of the cybersecurity workforce. The document lists the various roles that these professionals play and provides the corresponding technology skills...
This 79-page document from the National Cybersecurity Training and Education Center (NCyTE) highlights the work done by two National Centers of Academic Excellence (CAE) in Cyber Defense Education (CD), including Whatcom Community College and Jackson State Community College. The cybersecurity...
This reference curriculum from the CERT Division of the Software Engineering Institute (SEI) at Carnegie Mellon University, includes masters level course outlines covering software assurance. The nine courses range from Assurance Management to Assured Software Development to the Software Assurance...
This video, from the National Cybersecurity Training and Education (NCyTE) Center, provides insights into the MAX Power collection. This collection is a free resource that can help prepare students for cyber competitions. The MAX Power collection includes micromodules of learning objects that guide...
|
← PreviousNext → |