|
|
|
The Teach Cyber Megabyte
Thank you for joining the Teach Cyber mailing list! We're excited to share relevant and useful information about Teach Cyber and other resources, events, and news in cybersecurity education. Feel free to forward and share! (Please note: if you forward this to someone else and they click "unsubscribe", you may be unsubscribed from the mailing list.)
|
In this month's Megabyte: Teach Cyber Updates, About Teach Cyber, Cybersecurity Career Spotlight, Upcoming Events, Happy Thanksgiving!
|
|
|
|
|
|
Unit 4 of the Teach Cyber course is posted! This 25-day unit is rich in technical, hands-on labs (U.S. Cyber Range accounts are required). Unit 4 centers on the theme of data, including data states and data controls, as well as vulnerabilities and exploits in software, hardware, networks, cyber-physical systems, and human use of data.
|
We look forward to presenting at NICE K12 on December 8th. Find us here.
|
|
|
|
One round of pilot testing is wrapping up. In Fall 2020, teachers from Maryland, Vermont, and Texas participated in pilot testing the Teach Cyber course. Some of these teachers will continue to round 2 of pilot testing. We look forward to beginning a second round of pilot testing in 2021 with additional teachers from Virginia. We're excited to continue making inroads and forging partnerships across the country. In summer of 2021, we will partner with the Hawaii Department of Education to deliver teacher PD in Hawaii!
|
|
|
|
|
The Teach Cyber mission is to develop, support, and steward excellent cybersecurity education at the secondary level.
|
|
|
|
|
|
Sensing a need for a comprehensive cybersecurity knowledge framework at the high school level, the Teach Cyber team partnered with the National Cryptologic Museum Foundation to develop the "High School Cybersecurity Curriculum Guidelines" (HSCCGs). The HSCCGs center on 8 "Big Ideas" that students should understand about the field of cybersecurity. Each of the Big Ideas is broken down into "Enduring Understandings", measurable "Learning Objectives", and "Essential Knowledge Statements".
|
While other curriculum providers specialize in preparing students for certifications, Teach Cyber is focused on building more cybersecurity pathways from high school to higher education. For this reason, the HSCCGs were designed to align closely with ABET standards.
|
Using the HSCCGs, the Teach Cyber team built a year-long high school cybersecurity course ("Intro to the Challenge of Cybersecurity"). The course is adoptable and adaptable, and it can be modularized to fit different teachers' needs. The course materials are FREE (with the exception of labs using the U.S. Cyber Range). To access the course, visit us at TeachCyber.org.
|
|
|
|
|
Happy (belated) cybersecurity career awareness week! In honor of cybersecurity career awareness week, we spoke with an expert in the field about their job. Lauren, who has both a BS and an MS in Computer Criminology, is a great example of the value of cybersecurity pathways to higher education.
|
Lauren, CSIRT Analyst, Los Alamos National Lab
TC: What do you do? Can you give an overview of your job and specify what area(s) of cybersecurity you work in?
|
L: I work in cybersecurity operations on an incident response team. I'm a competent generalist - able to independently handle tickets in the fields of network forensics, host forensics, and malware analysis, but what I really like/am best at is malware analysis.
|
TC: Can you share an example of something you did on the job?
|
L: In general terms, sure. The most common source of work for me is a user clicking something they shouldn't, resulting in something executing on a host that we really don't want on our network. At that point, it becomes a game of determining how far down the "kill chain" the malware got, stopping its progress, and cleaning the host/network back up. Generally, this requires knowledge in multiple disciplines, including host and network forensics and malware analysis.
|
TC: What would happen if someone didn't do your job?
|
L: The users would rejoice, then the network would become a party zone for various different entities. There would be no security on the network for something as simple as banking, not to mention the sensitive stuff that happens as a national lab.
|
TC: How did you get involved in cybersecurity?
|
L: FSU's Computer Criminology degree program got me started down the road. Cybercorps Scholarship for Service encouraged the interest. Cybersecurity club and CTFs exposed me to a wide variety of topics.
|
TC: What training/certifications do you have?
|
- BA International Affairs, BS Computer Criminology, MS Computer Criminology
- SANS FOR572: Advanced Network Forensics: Threat Hunting, Analysis, and Incident Response
- SANS FOR526: Advanced Memory Forensics & Threat Detection
- SANS SEC560: Network Penetration Testing and Ethical Hacking
- DF120: Foundations in Digital Forensics with EnCase
- DF210: Building an Investigation with EnCase
- Fireeye's Malware Analysis Master Course
TC: What is your favorite hobby/what do you like to do for fun?
|
L: I hike and backpack. It's getting a little snowy, but I still managed to sneak in a 12k foot peak last weekend.
|
TC: Thank you, Lauren, for sharing your job and your background!
|
|
|
|
|
12/02/2020, 1:00PM – 1:45PM EST, FREE
|
"It’s nearly impossible to do business of any kind without your personal data ending up in an organization’s networked computer system. An early tool used to protect our data was via the Data Encryption Standard. Join our #CyberChat conversation with Dr. Whitfield Diffie to learn how the Data Encryption Standard (DES) was established. Dr. Diffie serves on the NCMF Board of Directors and is a 2020 NSA/CSS Cryptologic Hall of Honor inductee. His research at university facilities and private laboratories led the way in computer security theory and in practical applications. Register on Nepris to attend the live session. A recording will become available at a later date."
|
12/07/2020 – 12/08 2020, $150+ (Registration closes December 4th)
|
"NICE K12 Cybersecurity Education Conference attendees will experience cutting-edge presentations, networking, and resources—all from the safety and comfort of home or office. The event will provide education and learning tools that educators and schools can use immediately."
|
|
|
Below are two Thanksgiving-themed "Cryptoquotes". The quotes are encrypted – each number corresponds to a letter. Can you decrypt them?
|
|
|
|
|
|
|
|
|
|
|
|