Auburn University WOUNDED WARRIOR PROGRAM.

Slides:



Advertisements
Similar presentations
Used to Procure Goods & Supplies. Office supplies Operating supplies Computer hardware and software (non- capitalized
Advertisements

Operation Community Flu Clinic II CLINIC SUPERVISOR TRAINING Thursday 25 October 2012.
Ed 105A – Educational Technology 1 (2 hours lecture /week, 3 hours lab/week) Course Overview This course introduces the student to educational technology,
Director: Dr. Vishwani D. Agrawal GTA: Jia Yao Computer Architecture and Design ELEC 5200/6200 Class Project Overview Fall
Creating a Map for Success Online Learning Essentials Activity 3 Click here to start!
FRESNO CITY COLLEGE PARALEGAL STUDIES PROGRAM Campus Views.
 1 – Course Plan – all 7 modules  2 – Module Plan for each module  3 – Session Plan for each session.
RDIT READINESS METRICS FOR FORCE XXI SOFTWARE ENGINEERING DIRECTORATE - CECOM RD&E CENTER US ARMY COMMUNICATIONS ELECTRONICS COMMAND MR. JOSEPH J. POTOCZNIAK.
©2011 Check Point Software Technologies Ltd. | [Restricted] ONLY for designated groups and individuals R75 Training Overview for ATC Partners Check Point.
Workshop #1 – Introduction Dr. Carmen Cavezza Cunningham Center July 16, 2008.
Gerald M. Santoro, Ph.D. College of Information Sciences and Technology The Pennsylvania State University University Park, PA (slides.
Information Assurance & Network Security Certificate Prof. Rafael M. Rivera Universidad del Turabo School of Engineering Institute of Telecommunications.
Security Controls – What Works
Student Hands On Training I (2009) Mobile Tracking Stations Mobile Tracking Stations.
Technology Lab Management Strategies Who do I see? Staff Members – Sign up with the Media Specialist to use room. Community Members – Sign up the.
By Drudeisha Madhub Data Protection Commissioner Date:
WIN at the Library Insert your logo. WIN at the Library Your W ORKFORCE I NDIVIDUAL N EEDS Our Mission Insert your logo.
Course Overview Course Requirements Knowledge and Skills Student Expectations.
5/22/2001 NIST Accessibility /22-2/23/01 1 Information Technology Technical Assistance and Training Center Center for Rehabilitation Technology Georgia.
© 2008 Autodesk Invest in Yourself Autodesk Assistance Program.
Cybersecurity nexus (CSX)
Computer Services Overview. Computer Services Offices Main Office: D ‐ 127 Phone: 652 ‐ 4335 Hours: 8:30 am to 5:00 pm Monday ‐ Friday Academic Computer.
Digital Crime Scene Investigative Process
Introduction to Emergency Communication Working Directly With the Public Community Emergency Response Teams (CERT)  The Community Emergency Response Team.
Instructional Technology Center – (ITC) Buzzard Hall, Rooms 1430/ Tom Grissom,
Training and Certification. Who needs digital forensic training and professional certification? Forensic examiners Investigators Crime scene specialists.
Overview of Networking AS Program Networking Services Technology (Network Support) (2156) (A.S.) Common Core of 5 courses- A+(hardware/software), Security+,
Introduction to Computing Muhammad Saeed. Topics Course Description Overview of Areas Contact Information.
Center for Cybersecurity Research and Education (CCRE)
MOBILE INFORMATION LITERACY CURRICULUM Module 5 Slides: Putting It All Together.
Training Module: APD Template County APD Process Training November 16, 2007 California Health and Human Services Agency - Office of Systems Integration.
Course Aims This course will help you understand the latest technologies & how they work. You will lean how to develop computer programs to solve problems.
UNIT III MULTIMEDIA SYSTEMS DESIGN
Who am I? Mikhail I. Gofman Assistant Professor of Computer Science at CSUF since Fall Education: Ph.D. in Computer Science at State University of.
MASTER TECHNOLOGY INNOVATOR PROGRAM [INSERT NAME] [LOCATION & DATE]
Welcome to Trainings for No Senior Left Behind by Leann Weaver Picture retrieved from
Office of Information and Instructional Technology (OIIT) Part 2 August 2012 Dr. Dina Vyortkina, OIIT Director 1.
LESSONS LEARNED FROM EVALUATING A COMPLEX, MULTI- PARTNER, MULTI-YEAR, MULTI-SITE K- 12 EDUCATION INTERVENTION EDC’s Center for Children & Technology Elizabeth.
Diana Marrs, Ph.D. CTE Director
Department of Computer and Information Sciences
Planning a Quality Roadmap to Reinvent and Improve Services
Prepare Correspondence
Sap GRC 10.0 Online Training In OnlineItGuru
Certificate INSTITUTE FOR SYSTEM PROGRAMMING RAS
Introduction The Regional Computer Forensics Laboratory (RCFL) National Program Office created this toolkit to help law enforcement executives assess.
Hi Tech Laxmi Nagar Excel, PPT Etc. Basic Computer Course Short Term Computer Hardware Repairing Course 10 Tips Methods Laptop Repairing Course 3 Months.
Doctor of Professional Studies Orientation
J. A. “Drew” Hamilton, Jr., Ph.D.
Digital Battlefield Forensics
Prepare Correspondence
Information Security at Florida State University
Computer courses in Chandigarh. What is Computer Forensics.
Prepare Correspondence
ETEC 562 Dr. Jason Davis November 18, 2002
Information Security at Florida State University
Information Security at Florida State University
CS691-CS692-IT691 Capstone Projects Course
Modern Digital System Design Using VHDL: A Practical Introduction
Introduction to Information Assurance
Information Assurance & Network Security Certificate
CompTIA A+ Essentials (2015 Edition) Objectives Exam Number:
CS691-CS692-IT691 Capstone Projects Course
Contract Education Presentation
CompTIA A+ Objectives Edition.
Doctor of Professional Studies Orientation Revisited
Prepare Correspondence
CS691-CS692-IT691 Capstone Projects Course
National Industries for the Blind
Information Technology Organization Overview RFP #220-05
Presentation transcript:

Auburn University WOUNDED WARRIOR PROGRAM

Introduction Auburn University and Mississippi State University are Information Assurance Centers of Excellence certified by the National Security Agency and we have partnered together to provide wounded service members with 40 hours of high quality Hands on Computer Forensics instruction and training.  

Course Topics The instruction and hands on training includes but is not limited to: Computer Hardware Overview Computer Imaging and Hashing Computer Media structure, physical and logical Digital Evidence Acquisition, Preservation and presentation Computer Incident Handling, Detection and eradication  

Required Resources All that is necessary for Auburn University and Mississippi State University to provide the Computer Forensics course to our wounded Service members is a suitable classroom and a group of motivated students. 20 person classroom with tables and chairs Whiteboard if available Power supply for 20+ laptops We provide a mobile classroom that includes: Laptop computers for 20 students at a time All printed instructional material All required software and hardware Overhead projector  

Soldier Benefits 40 Hours of highly desired computer forensic training Resume fast tracking through Northrop Grumman’s Operation impact (http://operationimpact.ms.northropgrumman.com) Certificate of Training from NSA certified Center of Excellence in Information Assurance  

Points of Contact LTC George Trawick, U.S. Army. Auburn University PhD candidate george.trawick@us.army.mil 706-593-0692 Dr. Eric Imsand, Assistant Director, Auburn University Information Assurance Center eimsand@auburn.edu 901- 338-9323 Dr. Drew Hamilton, Director Auburn University Information Assurance Center hamilton@auburn.edu Dr. Dave Dampier, Director National Forensics Training Center Mississippi State University