Dynamic Cyber Training with Moodle

Slides:



Advertisements
Similar presentations
Carnegie Mellon University Software Engineering Institute CERT® Knowledgebase Copyright © 1997 Carnegie Mellon University VU#14202 UNIX rlogin with stack.
Advertisements

© 2013 Carnegie Mellon University UFO: From Underapproximations to Overapproximations and Back! Arie Gurfinkel (SEI/CMU) with Aws Albarghouthi and Marsha.
Interactive Classroom Goals Overview of the User Experience Demo Applying Lessons from Classroom Presenter Discussion.
© 2014 Microsoft Corporation. All rights reserved.
© 2011 Carnegie Mellon University System of Systems V&V John B. Goodenough October 19, 2011.
© 2013 Carnegie Mellon University Academy for Software Engineering Education and Training, 2013 Session Architect: Tony Cowling Session Chair: Nancy Mead.
© Carnegie Mellon University The CERT Insider Threat Center.
1 Jon Sudduth Project Engineer, Intelligent Grid Deployment SWEDE April 26, 2011.
Almost 4 decades of Advanced Analytics & DM expertise.
Benefits of a SUSE ® Subscription Insert Presenter's Name (16pt) Insert Presenter's Title (14pt) Insert Company/ (14pt)
Conditions and Terms of Use
April 30, 2007 openSUSE.org Build Service a short introduction Moiz Kohari VP Engineering.
Confidential and proprietary materials for authorized Verizon personnel and outside agencies only. Use, disclosure or distribution of this material is.
Author Software Engineering Institute
Oracle Fusion Applications 11gR1 ( ) Functional Overview (L2) Manage Inbound Logistics (L3) Manage and Disposition Inventory Returns.
Introducing Novell ® Identity Manager 4 Insert Presenter's Name (16pt) Insert Presenter's Title (14pt) Insert Company/ (14pt)
1 CERT BFF: From Start To PoC June 09, 2016 © 2016 Carnegie Mellon University This material has been approved for public release and unlimited distribution.
Copyright © 2012, Oracle and/or its affiliates. All rights reserved. Oracle Proprietary and Confidential. 1.
IDC Says, "Don't Move To The Cloud" Richard Whitehead Director, Intelligent Workload Management August, 2010 Ben Goodman Principal.
Use this title slide only with an image SAP LoadRunner by HP Speaker’s Name/Department (delete if not needed) Month 00, 2015 Public.
Novell ® Technical Training Field / Sales Presentation Insert Presenter's Name (16pt) Insert Presenter's Title (14pt) Insert Company/ (14pt)
Forrester and Novell Novell ® Identity Manager 4 Webcast I Insert Presenter's Name (16pt) Insert Presenter's Title (14pt) Insert Company/ (14pt)
DHP-600AV / DHP-601AV Powerline AV2 Gigabit Adapter Powerline AV2 Starter Kit Sales Guide WRPD, Mar 2013 D-Link Confidential.
The value of Cyber Defense Exercises 1. Purpose and objectives The aim is to improve information assurance in critical infrastructure by :  Better understanding.
Secure Software Workforce Development Panel Session
Microsoft Azure Deployment Planning Services
David Svoboda & Aaron Ballman
Deployment Planning Services
Office 365 FastTrack Planning Engagement Kickoff
Microsoft Virtual Academy
Michael Spiegel, Esq Timothy Shimeall, Ph.D.
Deployment Planning Services
Deployment Planning Services
Microsoft Azure Deployment Planning Services
9/6/2018 8:11 PM THR1046 Using Digital Experience Management to Validate the Impact of IT Change Mike Marks Product Evangelist, Riverbed © Microsoft Corporation.
Microsoft Virtual Academy
Metrics-Focused Analysis of Network Flow Data
Microsoft Dynamics Planning Services
Parallelspace PowerPoint Template for ArchiMate® 2.1 version 1.1
Parallelspace PowerPoint Template for ArchiMate® 2.1 version 2.0
Microsoft Azure Deployment Planning Services
Designing the Architecture for Grid File System (GFS)
Build /21/2018 © 2015 Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION.
EXPERIENCE API (XAPI) – PROJECT TIN CAN
Automation in an XML Authoring Environment
Microsoft Virtual Academy
Microsoft Virtual Academy
Microsoft Virtual Academy
Microsoft Virtual Academy
Microsoft Virtual Academy
Microsoft Virtual Academy
Microsoft Virtual Academy
Microsoft Virtual Academy
Smart Learning concepts to enhance SMART Universities in Africa
Microsoft Virtual Academy
TechEd /11/ :25 AM © 2013 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered.
Service Template Creation from the Ground Up
Deploying and Managing Windows To Go
Microsoft Virtual Academy
Microsoft Virtual Academy
Microsoft 365 Business Technical Fundamentals Series
Microsoft Virtual Academy
Microsoft Virtual Academy
How Faculty Can Achieve Learning Objectives With Online Tools
Microsoft Virtual Academy
Microsoft Virtual Academy
Microsoft Virtual Academy
Microsoft Virtual Academy
Microsoft Virtual Academy
Microsoft Virtual Academy
Presentation transcript:

Dynamic Cyber Training with Moodle Adam Welle Dynamic Cyber Training with Moodle Moodle's open source and highly configurable platform has enabled us to create training for cyber operators with high levels of fidelity and realism. In this presentation we'll review the unique requirements for training students in cyber security. Additionally, we'll cover the customizations we've made to Moodle plugins that allow for dynamic hands-on training in virtual environments, and finally our incorporation of automated assessment. Who is the cyber workforce? What are challenges in training cyber? Three types of training: individual, small unit, and multi-team training What tools do we use at each level? What is a cyber exercise?

Copyright 2018 Carnegie Mellon University. All Rights Reserved. This material is based upon work funded and supported by the Department of Defense under Contract No. FA8702-15-D-0002 with Carnegie Mellon University for the operation of the Software Engineering Institute, a federally funded research and development center. The view, opinions, and/or findings contained in this material are those of the author(s) and should not be construed as an official Government position, policy, or decision, unless designated by other documentation. References herein to any specific commercial product, process, or service by trade name, trade mark, manufacturer, or otherwise, does not necessarily constitute or imply its endorsement, recommendation, or favoring by Carnegie Mellon University or its Software Engineering Institute. NO WARRANTY. THIS CARNEGIE MELLON UNIVERSITY AND SOFTWARE ENGINEERING INSTITUTE MATERIAL IS FURNISHED ON AN "AS-IS" BASIS. CARNEGIE MELLON UNIVERSITY MAKES NO WARRANTIES OF ANY KIND, EITHER EXPRESSED OR IMPLIED, AS TO ANY MATTER INCLUDING, BUT NOT LIMITED TO, WARRANTY OF FITNESS FOR PURPOSE OR MERCHANTABILITY, EXCLUSIVITY, OR RESULTS OBTAINED FROM USE OF THE MATERIAL. CARNEGIE MELLON UNIVERSITY DOES NOT MAKE ANY WARRANTY OF ANY KIND WITH RESPECT TO FREEDOM FROM PATENT, TRADEMARK, OR COPYRIGHT INFRINGEMENT. [DISTRIBUTION STATEMENT A] This material has been approved for public release and unlimited distribution. Please see Copyright notice for non-US Government use and distribution. This material was prepared for the exclusive use of MoodleMoot US 2018 Conference and may not be used for any other purpose without the written consent of permission@sei.cmu.edu. Carnegie Mellon® is registered in the U.S. Patent and Trademark Office by Carnegie Mellon University. DM18-1222 This material is based upon work funded and supported by the Department of Defense under Contract with Carnegie Mellon University for the operation of the Software Engineering Institute, a federally funded research and development center. Any opinions, findings and conclusions or recommendations expressed in this material are those of the author(s) and do not necessarily reflect the views of the United States Department of Defense.

Federally Funded Research and Development Center (FFRDC) Who are we? Federally Funded Research and Development Center (FFRDC)

Training the cyber workforce College and university courses Vender training On the job training Self paced online training courses

Individual Training We have our own LMS, STEPfwd provides recorded lectures slide presentations quizzes dynamically deployed virtual machine lab environment

Team Training Large, persistent lab environment Multiple teams work with or against each other to achieve their objectives Can scale to hundreds of participants, dozens of ESXi servers, 1000s of virtual machines

What is a Cyber Exercise? White Cell Blue – friendly forces Red – opposing forces White – runs the exercise Green – runs the range Black – runs the infrastructure Uses cyber ranges – virtualization and hardware in the loop Attack and defend Blue Cell RED Cell Green Cell Black Cell

Cyber Training Challenges Realism Ensuring that virtualized systems are realistic representations of real world systems we try to develop new technologies, like wireless simulation, to bridge those gaps Creating realistic network traffic simulations so that blue team has more difficulty in finding red team our latest user simulation tool is called ghosts

Cyber Training Challenges Assessment Tracking and assessing the performance of the team members command line tools gui tools programming knowledge differentiation of user skill

Why we wanted to Use MOODLE Robust quiz engine Moodle solves many of our challenges by providing a robust quiz engine great metrics – score history for tracking performance over time regex questions are my favorite! feedback mechanisms both to student and to course designer xapi

Why we wanted to Use MOODLE Interactive videos with H5P H5P makes for more training with better user engagement xapi We are transiting some training courses to moodle and are converting old videos to H5P interactive videos

Why we wanted to Use MOODLE Virtual Programming Labs Cyber operators require programming knowledge VPL makes is possible to grade programming assignments

Virtual Programming Labs We modify the VPL activity to execute the student’s scripts and programs on the actual virtual machines inside of their lab rather than in a jail The first image shows the VPL activity where we have students enter their code The second image shows the networking used to execute the VPL grading scripts on VMs inside the student’s lab

Why we wanted to Use MOODLE xAPI and Metrics Great metrics Student history Real time logging of student performance Data collection via an LRS How long did it take a student to accomplish a task? What was the exact command required to accomplish the task?

xApi & the LRS MELLK STACK Actor - verb - object Experience API User – Action – Activity Using xapi from moodle, h5p, and custom command line logging to derive information about student performance MELLK STACK Actor - verb - object

MELLK Stack Conglomeration of technologies Moodle ElasticSearch LogsSash Learning Locker Kibana

Why we wanted to Use MOODLE Plugins OAUTH It is incredibly easy to create plugins to expand its functionality… as we will now show on the next few slides OAUTH allows us to integrate with other solutions we are building for next generation cyber range technologies

Plugins We Have Created Boost theme Course import We created two plugins so far: a boost theme to match our organization new color theme for other applications an import plugin that allows us to transfer content from old custom LMS into moodle

Future Moodle Work Integrate with new technology to: Deploy VMs from Moodle Create a new activity Use OAUTH to communicate with integrated range deployment tool

Future Moodle Work Integrate with new technology to: View VM console inside Moodle Embed the virtual machine HTML5 console in a an iframe in the moodle activity

Future Moodle Work Integrate with new technology to: Receive real-time performance metrics from VMs in a lab Automatically grade and advance student’s task Then, receive metrics like xapi from the virtual machine and have the moodle activity automatically score and advance task

Thank you!