Koji OKAMURA Cybersecurity Center, Kyushu University Advanced Cybersecurity Education Course Program using Cyber Range.

Slides:



Advertisements
Similar presentations
Ethical Hacking Introduction. EC-Council Introductions Name Company Affiliation Title / Function Job Responsibility System security related experience.
Advertisements

Webgoat.
Creating Stronger, Safer, Web Facing Code JPL IT Security Mary Rivera June 17, 2011.
Slide 01-1COMP 7370, Auburn University COMP 7370 Advanced Computer and Network Security Dr. Xiao Qin Auburn University
Introduction and Logistics Amir Houmansadr CS660: Advanced Information Assurance Spring 2015.
Information Networking Security and Assurance Lab National Chung Cheng University 1 Top Vulnerabilities in Web Applications (I) Unvalidated Input:  Information.
SWE 444: Internet & Web Application Development0.1 SWE 444 Internet and Web Application Development Dr. Abdallah Al-Sukairi and Dr. Sahalu Junaidu
An Undergraduate Research Course Aimed at Furthering the Web Michael Wollowski Computer Science Department Rose-Hulman Institute of Technology.
CIS700: Hardware Support for Security Professor Milo Martin
CSCD 434 Spring 2011 Lecture 1 Course Overview. Contact Information Instructor Carol Taylor 315 CEB Phone: Office.
Masters in Information Science and Technology (IST) Thesis and Non-Thesis Option (30 Credits)
SiteLock Internet Security: Big Threats for Small Business.
ICT Driving Licence at the University of Helsinki: Meeting the Needs of Diverse Study Fields Tiina Heino Päivi Helminen 31 March, 2009 Helsinki University.
Securing Information Systems
A First Course in Information Security
BACK TO THE BASICS: Library Instruction Redux. BRENT HUSHER MELISSA MUTH FU ZHU0 University of Missouri–Kansas.
ICT Driving Licence at the University of Helsinki EAHIL Conference, Cluj-Napoca, Romania Theme: ”Education and Learning” Tiina Heino Medical.
ICT in Education Global IT Forum Coordinated Science Laboratory, UIUC 6 th September, 2007 Rajeeva Ratna Shah Member Secretary Planning Commission
Computer Science and Engineering 1 Csilla Farkas Associate Professor Center for Information Assurance Engineering Dept. of Computer Science and Engineering.
Ladd Van Tol Senior Software Engineer Security on the Web Part One - Vulnerabilities.
Information Security in an Introductory Course. Introduction Kathy Winters University of Tennessee at Chattanooga Department of Computer Science and Engineering.
Security Awareness: Applying Practical Security in Your World Chapter 1: Introduction to Security.
CSCE 727 Information Warfare
Software Security Testing Vinay Srinivasan cell:
Internet of Things Top Ten. Agenda -Introduction -Misconception -Considerations -The OWASP Internet of Things Top 10 Project -The Top 10 Walkthrough.
Steve Wicker Cornell University 1 TRUST Autumn 2011 Conference.
CSCD 434 Network Security Spring 2014 Lecture 1 Course Overview.
1 Chapter Nine Engineering Your Career. 2 Engineering Careers  Electrical and computer engineers find employment in: 1.Private industry. 2.Government.
Engineering H191 - Drafting / CAD Gateway Engineering Education Coalition Lect 25P. 1Autumn Quarter Reading Working Drawings Lecture 25.
1/19/2010Cyber Security Spring 2010 Introduction to Cyber Security Lab CS460 Susan Hinrichs Spring 2010.
Page 1 8 Oct 2004 IT Security Awareness Dangers in the Networked World Lai Zit Seng NUS School of Computing.
Information Technology at Emory Information Technology Division Technical Services IT Briefing Agenda 7/17/05 New scanning tools EOL/eVax & BTS Oracle.
Ethical Hacking: Hacking GMail. Teaching Hacking.
AUB Department of Electrical and Computer Engineering Imad H. Elhajj American University of Beirut Electrical and Computer Engineering
CURRICULA HARMONISATION AT UNIVERSITY OF BANJA LUKA TEPMUS PROJECT “Introduction of the ECTS at B&H Universities” UM_JEP Tuzla, 16/
Why does my Elementary Student Need to Know about Maryland's New CyberSecurity CTE Track? Friday 11: :30 Davina Pruitt Mentle, Ph.D. Educational.
TopicColumbiaUC Davis CollegesArchitecture » Arts & Sciences, Graduate School of » Barnard College »Business Dental Medicine » Engineering »
The Internet of Things, WTF? Rik Ferguson Vice President, Security Research Trend #CLOUDSEC.
MIDN Zac Dannelly. May 2009: President's 60-day Cyberspace Policy Review – "expand and train the workforce” May 2010: The Ad Hoc Committee on Cyber Security.
BS in Computer and Information Systems Security A 2+2 degree program between Peninsula College and Western Washington University David Bover Professor,
MIS Week 5 Site:
1 Open Discussion PSOSM 2012 Prof. Ravi Sandhu Executive Director and Endowed Chair © Ravi Sandhu.
Koji OKAMURA Cybersecurity Center, Kyushu University Cybersecurity Education.
Cyber Security – The Changing Landscape Erick Weber Department of Public Works Khaled Tawfik Cyber Security.
SLC – You tell me Web design – Using software design a website.
Ethical #Hacking. Ethical Hacking !! Content !! * Overview of Ethical Hacking * Prospectus of Ethical Hacking * Evaluation of Ethical Hacking * Training.
Examination of the Current Educational Contents in Information Assurance Bill Oblitey Indiana University of Pennsylvania Computer Science Department EPASEC.
Carrie Estes Collin Donaldson.  Zero day attacks  “zero day”  Web application attacks  Signing up for a class  Hardening the web server  Enhancing.
General Information: This document was created for use in the "Bridges to Computing" project of Brooklyn College. You are invited and encouraged to use.
Team Electronics Automation & Machinery S-17, DLF Ind. Area, Phase-1, Sec-32, Faridabad ,
Cyber Security Zafar Sadik
ETHICAL HACKING WHAT EXACTLY IS ETHICAL HACKING ? By : Bijay Acharya
Chapter 7: Identifying Advanced Attacks
GENI, Cybersecurity, and Liberal Arts
ADOPTING MASSIVE OPEN ONLINE COURSES (MOOCs)
Complete Exam Dumps - Pass In 24 Hours - Dumps4Download
practice-questions.html If you Are Thinking about your dumps? Introduction:
Advanced Security Architecture for System Engineers Cisco Dumps Get Full Exam Info From: /cisco-question-answers.html.
PT0-001 Dumps PDF CompTIA PenTest+ Exam Exam Code Exam Name.
CyberPaths Interdisciplinary Modules
Cambridge National Certificate in Information Technologies
ACM/IEEE-CS Computer Science Curriculum
CSCD 434 Network Security Spring 2012 Lecture 1 Course Overview.
Unit 1.6 Systems security Lesson 2
University of Nice Sophia Antipolis
CSCD 434 Network Security Spring 2019 Lecture 1 Course Overview.
Understanding Standards Religious, Moral and Philosophical Studies
Key Stage 5: Year 12 Computer Science
CyberPaths Interdisciplinary Modules
Information Technology Offerings: Presented at Security.ac.nz
Presentation transcript:

Koji OKAMURA Cybersecurity Center, Kyushu University Advanced Cybersecurity Education Course Program using Cyber Range

Today’s Talk Report of Cybersecurity Primary Course to Fresh Students Introduction Cybersecurity Course with Cyber Range

Cybersecurity Primary Course 2014 Autumn, 2015 Spring and Autumn Fresh Students for every undergraduate school –Optional Course (not “All” now) 100 Students (from 2,600) –Art Engineering, Economics, Law, Letters, Medical, Medicine, Science, Engineering, Education, Agriculture –Dental Science Contents (14+1) –Introduction (1) –Case Studies (3) –Technical Issues (3) –Laws (3) –Privacy and Morals (1) –Social Science (1) –Copyright (2) –Examination (1)

Further Issues for Mandatory Course Big students 2,600 = 200 x 13 –2017 Spring Evaluation (GPA) –Paper based Examination Difficult for unified evaluation and it takes much time! –E-Learning based Examination Choice one correct answer from 3 or 4 candidates Selection of Contents –National Cybersecurity Workforce Framework from NICE (National Initiative for Cybersecurity Education) –Too much … Semester(15) -> Quarter(8)

Cyber Range Campus Network Internet Each student study by him/her self. Paired students study together. Beginner Course Advanced Course

Beginner Course Application base –Buffer Overflow –Weak Password –Weak Authentication –… Cryptography Forensics Network –Port Scan –DOS Attacks Web base –Cross-Site Scripting –Cookie Manipulation

Advances Course Application base Cryptography Forensics –Wireless Traffic Dump – Malware Analysis Network –Cookie Hijacking Web base –SQL Injection

Issues and Future Plan for Cyber Range Course Actual Course may start 2016 Autumn Issues –When and How knowledge base education will be done. –Difference to the real-world –To whom? Plan –Original Scenario using latest incidents APT –Co-use the machine