Browse Resources

Information and Security Technologies -- Security, information assurance, and forensics

Resources

This video, presented by instructor Tony Hills from the Cybersecurity Education for Advanced Manufacturing Organizations project, is the third in a four-part series focused on Intrusion Detection Systems (IDS) and Intrusion Prevention Systems (IPS) in industrial network security. In this video,...
This video, presented by instructor Tony Hills from the Cybersecurity Education for Advanced Manufacturing Organizations project, is the last in a four-part series focused on Intrusion Detection Systems (IDS) and Intrusion Prevention Systems. During the video, Hills explains how a false positive...
During this video, from the National Cybersecurity Training and Education (NCyTE) Center, presenter Dr. John Sands discusses the impact of AI on the current and future cybersecurity workforce. Dr. Sands explores the changing technology environment, evolving workforce needs, and strategies to prepare...
This video, presented by instructor Tony Hills from the Cybersecurity Education for Advanced Manufacturing Organizations project, is the first in a series of six that describe an industrial zoning lab. This lab focuses on zoning and network segmentation in industrial environments. During the video,...
This video, presented by instructor Tony Hills from the Cybersecurity Education for Advanced Manufacturing Organizations project, is the fifth in a series of six that describe an industrial zoning lab. During the video, Hills demonstrates how to move the hacker machine from the Cell Area Zone to the...
This video, presented by instructor Tony Hills from the Cybersecurity Education for Advanced Manufacturing Organizations project, is the first in a series of six that describe an industrial zoning lab. This lab focuses on zoning and network segmentation in industrial environments. During the video,...
This video, presented by instructor Tony Hills from the Cybersecurity Education for Advanced Manufacturing Organizations project, is the third in a series of six that describe an industrial zoning lab. In this video, Hills walks through the process of starting the lab by launching virtual machines...
This video, presented by instructor Tony Hills from the Cybersecurity Education for Advanced Manufacturing Organizations project, is the fourth in a series of six that describe an industrial zoning lab. In this video, Hills demonstrates how to observe changes in the network traffic after modifying a...
This video, presented by instructor Tony Hills from the Cybersecurity Education for Advanced Manufacturing Organizations project, is the last in a series of six videos that describe an industrial zoning lab. In this video, Hills demonstrates how network segmentation enhances security by isolating...
This video from the National Cybersecurity Training and Education (NCyTE) Center features a presentation by Margaret Leary, PhD, cybersecurity consultant with ASRC (Arctic Slope Regional Corporation) Federal. This presentation was given at an NCyTE Monthly Member Meeting. Leary provides an overview...
← PreviousNext →