Information Systems and Internet Security Laboratory Kevin Chung.

Slides:



Advertisements
Similar presentations
Company Profile CDAS Consultancy has been constantly delivering the best value to the IT professionals in terms of IT Training & Certification programs.
Advertisements

Powered by Powered by Connecting Organizations, Building Community Michigan Cyber Range.
Training Practitioner Adjuncts: A Model for Increasing Educator Effectiveness Paul C. Jackson DM, PE Peg Jackson, DPA, CPCU.
Judy Baker, Director Cyber Security Challenge UK The People to Secure Our Future.
Almost 20 years and still hacking DEFCON. WHAT IS DEFCON A “hacker” conference Whitehat and Blackhat represented Sensationalized and misunderstood?
Expert Report By Prof. Rayko Genchev Raykov, Ph.D. On the research of experts’ views on the problems considered in the project “New Approach in Technology.
IEEE Student Branch Activities Activities can be … related ProfessionalTechnical Social & CultureIndustrial.
CSCD 434 Spring 2011 Lecture 1 Course Overview. Contact Information Instructor Carol Taylor 315 CEB Phone: Office.
PicoCTF: Inspiring Tomorrow’s Cyber Security Workforce and Leaders Jonathan Burket
EDUCAUSE/Internet2 Computer and Network Security Task Force Update Jack Suess February 3, 2004.
Distance Learning Opportunities & Challenges Dr. Safia Barikzai Informatics Department, Business School London South Bank University June 2014.
The National Cyber Security Alliance Martha J. Lockwood, CAE, APR Executive Director EDUCAUSE Live! October 6, 2004.
CougarCS. What is CougarCS Official CS Student Organization UH ACM Student Chapter Promotes Computer Science topics and curriculum Social Events Career.
A Liberal Education "Ideally, a liberal education produces persons who are open-minded and free from provincialism, dogma, preconception, and ideology;
Data Privacy Day 2012 on Campus Jolynn Dellinger Program Manager, Data Privacy Day National Cyber Security Alliance.
Technology Awareness & Information Security. Survey Results 50% class has smart phones 64% class has shared personal info over the internet 71% class.
FEC FINANCIAL ENGINEERING CLUB. WHAT IS FINANCIAL ENGINEERING?  Multidisciplinary field applying mathematics, engineering methods, and programming techniques.
Supporting Cyber Defense Training Steve Shillingford, President and CEO Solera Networks.
Technology-Enriched Learning Environments Faculty Development Workshop February 21, 2013 Donna L. Pattison, PhD Instructional Professor Department of Biology.
PicoCTF: Teaching 10,000 High School Students to Hack Peter Chapman 1/15/2014 Carnegie Mellon University This material is based upon work.
The Value of AGA Membership. Are You Connected?  AGA CONNECTS YOU WITH  Networking Opportunities  Education and Training  Professional Certification.
Sponsored by the National Science Foundation Strategies to Encourage Careers in CyberSecurity and Information Technology 1.
Texas Tech University NSF-SFS Workshop on Educational Initiatives in Cybersecurity for Critical Infrastructure Workshop Summary May 3, 2013 Support for.
Laboratories of creativeness and on-line communities created on the social network - KnowInG Project - Eurídice Cristo | Sha.p.e.s. Project | Seville,
ITS Training Services. Services Technology Seminars Training On Demand (TOD) Web-Based Training (WBT) Telecommunications and Networking Services (TNS)
I-Hack’08 International Hacking Competition “Details”
EDUCAUSE LIVE EDUCAUSE/Internet2 Computer and Network Security Task Force Update Jack Suess January 21, 2004.
Welcome!. Announcements Add new members to organization’s ListServ Talk to Nate Lynch Seeking approval from the Dean of IST to be add to the website E-board.
Welcome to…. Introductions President: Peter Marzalik Vice President: Eric D’Angelo Treasurer: Greg Sabol Now it’s your turn! Tell us your… – Name – Year.
Number of IT and CS students Passed out this year:
So you’re considering a career in primary teaching... Richard English Faculty of Education The University of Hull
Interdisciplinary Computing Raising the Bar for Computing Education.
THE LIBRARIAN SAYS… TURN YOUR CELLPHONES ON! Piloting mobile phones and polling in Inquiry-based information literacy instruction Andy Burkhardt & Sarah.
10th WATCH: Barriers to the Science of Security Tom Longstaff National Security Agency John Hopkins University THURSDAY March 15, Noon, Room 110 W ashington.
European Virtual Institute of Thermal Metrology ICTAC, Sardinia, Sept 04 The European Virtual Institute for Thermal Metrology Presented.
So you’re considering a career in primary teaching... Richard English Faculty of Education The University of Hull
CYBER SECURITY: WORKFORCE TRENDS & LABOR MARKET INFORMATION.
Standards Certification Education & Training Publishing Conferences & Exhibits ISA The International Society of Automation 2013 Society Overview.
The Role of Geoscience Departments in Preparing Future Geoscience Professionals Carol J. Ormand*, Science Education Resource Center R. Heather Macdonald,
1 Transforming American Education: Learning Powered by Technology Karen Cator Director, Office of Education Technology U.S. Department of Education 1.
Peer2Peer Mentee orientation. Leeds Mentoring Pipeline Mission: To enhance the Leeds academic experience by providing opportunities to develop academic,
LINUX ADMIN CERTIFICATION PART OF THE CISCO AAT DEGREE DRAFT PROPOSAL.
© 2016 Global Market Insights, Inc. USA. All Rights Reserved Fuel Cell Market size worth $25.5bn by 2024 Advanced Persistent Threats.
IEEE Computer Society Digital Library (CSDL)
Abusing 3rd-Party Services For Command And Control
Department of Computer and Information Sciences
Tools of Engagement: Structuring a Media Rich Online Course
National Cyber Security Alliance and Raytheon Survey Findings 2015
Cyber Space Book Clubs How Web 2.0 takes in Digital
White Hat Eagles Cyber Security Club
EVOLVING THREATS, VULNERABILITIES AND COUNTERMEASURES
Ethical Hacking.
Yahoo Technical Support Number
Cyber Security & Embedded Systems Training Bootcamp VISIT TONEX.COM.
Top Ten Benefits of an Engineering Career NIET Noida.
The Cyber Security Certificate at
North Dakota Cybersecurity Conference Cybersecurity Education
Leadership and Management
Facebook Capture the Flag: NECCDC Game Masters James Bowden & Zachary Ivey Sponsor: Ken Graf Department of Computer Science, University of New Hampshire.
درس تطبيقي مادة التربية الفنية للصف الرابع الابتدائي
Carol J. Ormand*, Science Education Resource Center
So you want more incentives, RIGHT?
Career Development Continuum: Classroom Based Activities
Cloud-based Resources for Cybersecurity Education and Training
Шаттық шеңбері.
Chapter to Provide Title
*Separate register for CTF at:
Hands-on Approach to Teaching Cybersecurity and IT/Networking Hau Nguyen Grossmont College August 2019
Crime Behind The Keyboard(Dark Web)
Presentation transcript:

Information Systems and Internet Security Laboratory Kevin Chung

Cyber Security Big part of NYU-Poly Masters Program ASPIRE program Cyber Security oriented events ISIS Lab represents a student run facet of the education Provides an application focused environment to learn cyber security Run by highly technical students Well connected in the industry

Offense over Defense Primary focus is on offensive techniques Mentality is that offensive techniques impart knowledge about defense Focus on Binary Exploitation Reverse Engineering Web Security Forensics

Hack Night Weekly workshop on teaching practical offensive security Large focus on ethics Open to all students Open source content

Cyber Security Club Weekly lecture by industry professional Wide range of topics Often talks given at industry leading conferences DEFCON Schmoocon Wide range of topics Program Analysis RFID Security Office Hacking at Etsy

Cyber Security Awareness Week Set of competitions and a conference One of the largest Capture the Flag competitions High School Forensics competition Embedded Systems Challenge Industry sponsors DHS, Facebook, Intel, Microsoft, Github, Yahoo, NSA, Raytheon, etc.

Talent Shortage There is a massive shortage of talent Problems: Severe lack of pre-collegiate programming education Rewarding the wrong behaviors and traits College has a “find what to do” mentality instead of “learn how to do” College filled with asinine classes Holds back the talented

Resources online isisblogs.poly.edu github.com/isislab