top of page
luis.png

 

Cybersecurity Skills Development Workshops

​

Hands-On Cryptography

$125 

(80% academic discount for registrants whose email address ends with .edu)

 

This 1-day course will provide a high-level look at both classical and modern cryptographic techniques. The goal of this Workshop is to provide the participant with an IT/operations-based approach to securing information both at rest and in-transit. It is NOT designed to explore the mathematics of cryptographic primitives.

 

This Workshop is taught in both lecture and hands-on formats. Upon completion of the Workshop, learners will receive all instructional materials (lecture slides, hands-on lab exercises) and guidance on how to incorporate them into their classes.

 

Topics:

  • Working with classical cryptographic techniques

  • Fundamentals of modern cryptographic algorithms

  • Common implementations

  • Common attacks against encrypted data

  • Cryptocurrencies

  • Plenty of hands-on exercises (e.g., Verifying the integrity of downloaded files; Creating public/private key pairs; Working with encrypted messages; etc.)

 

Who Should Attend: This course is intended for anyone wishing to understand the fundamentals of cryptography, but not the inner workings of the cryptographic primitives themselves. This course uses a hands-on approach to deliver the material. 

This course will also benefit those teaching the following courses:

  • Cisco Networking Academy

  • CompTIA Security+

  • Information Systems Security

  • Network Security

  • Systems Administration

  • VPN technologies

 Prerequisites:

  • IT Literacy, Concepts, and Terminology:

    • Compare and contrast notational systems:

      • Binary

      • Hexadecimal

      • Decimal

    • Discuss what prime numbers are

    • Compare and contrast common units of measure:

      • Storage unit: bit, byte, KB, MB, GB, TB, PB

      • Throughout unit: bps, Kbps, Mbps, Gbps

      • Processing speed: MHz, GHz

    • Configure and use web browsers:

      • Caching/clearing cache:

      • Deactivate client-side scripting

      • Browser add-ons/extensions

      • Private browsing

      • Proxy settings

      • Certificates

      • Popup blockers

      • Script blockers

      • Compatible browser for application(s)

  • Software:

    • Compare and contrast common operating systems and their functions and features

    • Identify common programs, applications and their purpose

  • Scripting:

    • Demonstrate how to open a bash shell on a Linux system

    • Demonstrate how to tab complete a command

    • Demonstrate in (bash, Python) how to:

      • Create a variable

      • Assign a value to it

      • Print to screen/file values of variables

      • Add/substract/multiply/divide variable values

      • Use Python modular arithmetic and Exponent operators

  • Virtualization:

    • Physical machine vs. virtual machine

    • Download and install hypervisor of your choosing (e.g., VMware Fusion)

  • Information Security:

    • Differentiate between main tenets of information security: CIA (confidentiality, integrity, availability), authentication, non-repudiation 

  • Willingness to learn

 

Presenter: 

Casey W. O'Brien is the Executive Director and Principal Investigator of the National CyberWatch Center, a cybersecurity education and research consortium focused on advancing cybersecurity education and strengthening the national cybersecurity workforce. Casey has more than 20 years of industry experience in information security and large-scale IT implementation and project management in challenging and cutting-edge environments.

​

​

 

Secure Scripting

$125 

(80% academic discount for registrants with .edu)

 

Secure scripting is essential to cybersecurity, information technology, and computer science education. This workshop will provide professional development to attendees on basic concepts and advanced techniques in secure scripting using a set of curriculum materials developed by the NSF-funded C5 project. The materials align with learning outcomes in the NSA CAE "Basic Scripting or Introductory Programming" knowledge unit. Designed to be flexible and adaptable, faculty can select some or all of the module’s units.  In addition, the materials carry a creative commons license providing faculty with the ability to make derivatives as they see fit. Hands-on learning activities include secure scripting in BASH and Python languages, as well as Linux basics.

​

​

 

Intro to IBM's QRadar

Free of charge for participants

(Sponsored by IBM as part of the IBM Sponsored Track at 3CS)

 

Date: July 30, 2019

Time: 9am-5pm

Location: BPCC

 

Course Description: This 1-day workshop will provide a high-level look at IBM QRadar. The IBM QRadar Security Intelligence Platform provides a unified architecture for integrating core functionality to prevent, detect and respond to attacks, including security analytics, threat hunting, incident response, and threat intelligence with network and endpoint protection, into one centralized Security Operations Center user interface.

 

This workshop combines both lecture and hands-on content designed to provide participants with the inspiration and resources to explore incorporating IBM QRadar into their classes. Attendees will leave this workshop with a clear understanding of how and where to access IBM resources that may be used at no charge for learning and/or teaching, as well as for conducting non-commercial research.

 

Topics include:

  • Understanding the function of a SIEM in an enterprise network

  • Fundamental differentiating features of IBM QRadar

  • Understanding the architecture of a SIEM

  • Hands-on experience with the interface of a SIEM

  • Using dashboards in a SIEM

  • Creating reports in a SIEM

  • Using filters in a SIEM

  • User Behavior Analytics

  • QRadar Advisor with Watson

 

Who Should Attend: This course is intended for anyone wishing to understand fundamentals of security intelligence and event management and the value of teaching hands-on SIEM skills to their students.

 

This course will also benefit those teaching the following courses:

§ Digital Forensics

§ Information Security

§ Network Security

 

Prerequisites:

An understanding of, or experience in, the following topics:

§ IT Infrastructure and IT Security Fundamentals

§ TCP/IP Networking

§ Log Management

§ Linux/Windows

 

Prior to attending the workshop, attendees should access the following site in order to create an IBM account.  This account will be used on the day of the workshop to complete hands-on lab exercises.

https://www.ibm.com/account/reg/us-en/signup?formid=urx-19776

 

Note that this workshop will be conducted in a computer lab.

 

Presenter: Luis Latas

​

​

​

​

​

​

​

​

​

 

 

 

  • 20 years in the Information Technology, 14 years in security

  • Based in Tampa, Florida, USA

  • Contact: lmlatas@us.ibm.com, +1.813-957-3597

  • Relevant background

  • 12 Years: Security Monitoring, Operations, Engineering

  • 3 ½  years: Professional Services, QRadar SIEM, Risk Manager, Vulnerability Manager, QRIF

  • 2 ½ years Security Intelligence Technical Sales Enablement

​

​

 

Cybersecurity Skills Journal (CSJ): Paper Development Workshop

No charge

 

The Cybersecurity Skills Journal (CSJ) will hold a Paper Development Workshop (PDW) at BPCC from 9am to 5pm on July 30, 2019, as part of the Cybersecurity Skills Development Workshops at the Community College Cyber Summit (3CS). The PDW provides participants an excellent opportunity to interact and receive constructive feedback from the journal’s editorial board members and peer reviewers.

The Cybersecurity Skills Journal (CSJ) is a peer-reviewed journal published by the National CyberWatch Center. The goal of CSJ is to stimulate professional discussion and advance the interdisciplinary field of cybersecurity through the publication of scholarly works of value and interest to the profession. CSJ emphasizes original work from the following communities of research and practice: process improvement; organizational design and alignment; analysis, evaluation, and measurement; performance management; instructional systems; and management of organizational performance. CSJ will consider literature reviews, experimental studies, survey research, and case studies with a scholarly base.

The purpose of the PDW is two-fold. First, we aim to provide participants insights into the actionable steps they should take to make their research more relevant for cybersecurity practitioners, instructors, and/or researchers. Second, we provide practitioner and scholar authors with developmental feedback on their current projects related to advancing the assessment, development or implementation of cybersecurity skills. While we hope that the papers will eventually be submitted to CSJ, the purpose of the PDW is broader, namely to improve the quality of cybersecurity research, to help develop and disseminate effective practices, and to bring practitioners and scholars into the conversation around skilled performance in cybersecurity.

The PDW will consist of two parts. First, a 90-minute introductory session led by David Tobey (managing editor) and members of the editorial board to discuss the manuscript review process, provide pointers on how to translate practice experiences into a scholarly article, and touch on various other topics relevant to authors seeking to publish in CSJ. Second, during a 120-minute main session, groups of authors (with substantially related papers) will be paired with two CSJ Editors/peer reviewers for constructive feedback. The lunch break provides an excellent opportunity for scholars to have individual discussions with the CSJ editorial team.

To participate in the CSJ PDW, we invite scholars to upload (1) concept abstract (max. 500 words); (2) paper proposal (max. 4000 words); or (3) full papers (max. 15,000 words) through the Cybersecurity Skills Journal Manuscript Submission System located at https://easychair.org/conferences/?conf=csj2019.

It is important to highlight at the top of the title page to which content domain you are submitting. Authors of accepted full papers will have the occasion to receive detailed comments on their manuscript from two members of our editorial team. Authors of accepted abstracts and paper proposals will have the chance to discuss their research ideas with peer reviewers.

​

​

INTRO TO IBM'S QRADAR
SECURE SCRIPTING
HANDS ON CRYPTOGRAPHY
CYBERSECURITY SKILLS JOURNAL PAPER DEVELOPMENT WORKSHOP
bottom of page