Cybersecurity Education Workshop 2018
Lake Tahoe – California
www.towson.edu/cyberedworkshop
The CyberSecurity Education Workshop 2018 is being held on April 23 – April 24 in South Lake Tahoe, CA
National Science Foundation
NSA National Cybersecurity Curriculum Program
8:00 – 8:15 AM |
Opening: |
8:15 – 9:00 | Keynote: Steve Lafountain, Dean, College of Cyber, NSA David Rice, Director, Global Security, Apple Inc. |
9:00 – 9:15 | The National Cybersecurity Curriculum Program (NCCP) Maureen Turney, NSA |
9:15 – 9:45 | Cyber Curriculum and the Cyber Cube Melissa Dark, Purdue University/NSA (CON) Powerpoint Blair Taylor, Towson University/NSA (CON) |
9:45-10:00 | Break |
10:00-11:15 | Curriculum showcase Digital Forensics – Texas A&M University, Trez Jones Visualization to Teach Web Security – NCAT, Li Yang, University of Tennessee Chattanooga, Xiaohong Dorothy Yuan, Visualization Powerpoint Secure Design in IoT, DePaul University, Filipo Sharevski Reverse Engineering and Malware Analysis – Dakota State University, Josh Stroschein Strategic Thinking – Augusta University, John Heslen NSA Grant Powerpoint |
11:15-12:15 | Curriculum Expo A |
12:15-1:45 | Lunch (On your own) |
1:45-2:45 | Curriculum Expo B |
2:45-3:30 | Panel: K-12 and Community Colleges (Moderator: Melissa Dark) K-12 – Ruthe Farmer, Chief Evangelist, CSforAll Cyber Engineering High School: Tommy Morris, University of Alabama in Huntsville Community Colleges: Cara Tang, Portland Community College |
3:30 – 3:45 | Break – Coffee and Cookies |
3:45 – 4:00 | Always Education: Vali Tadayon, University of Cincinnati |
4:00-4:15 | CLARK: Sidd Kaza, Towson University |
4:15-4:50 | Discussion Breakouts: Building, Launching, and Sustaining the Cyber Cube |
4:50 | Closing |
Tuesday, April 24th
8:00 – 8:10 AM | Opening |
8:10 – 8:30 | Outreach: Education and the Cyberworkforce Dr. Leonard T. Reinsfelder, Commandant, National Cryptologic School |
8:30 – 9:15 | Panel: Perspectives Moderator: Blair Taylor Josh Moses, OMB Scott Buck, Intel Victor Piotrowski, NSF Rodney Peterson, NICE |
9:15 – 9:30 | Capture the Flag Management System: Powerpoint Josh Strochein, Dakota State University |
9:30 – 9:45 | Nice Challenge: Powerpoint California State University, San Bernardino |
9:45 – 10:00 | Competency-based Curriculum: Casey O’Brien, Prince George’s Community College |
10:00 – 10:15 | Break |
10:15 – 11:00 | Discussion Breakouts: The Future of the Cyber Ed Workshop |
11:00 – 12:00 | Curriculum Expo C |
12:00 – 1:15 | Lunch on your own |
1:15 – 2:15 | Curriculum Expo D |
2:15 – 2:30 | History of Cybersecurity Education: Matt Bishop, University of California, Davis |
2:30 – 2:45 | ACM/IEEE/AIS/IFIP Cybersecurity Curriculum (CSEC 2017): Powerpoint Matt Bishop, University of California, Davis History Powerpoint Diana Burley, George Washington University |
2:45 – 3:00 | CSEC mapping: Diana Burley, George Washington University |
3:00 – 3:30 | Report back from breakouts |
3:30 – 4:00 | Closing and Future |
Breakfast is included in your room reservations.
Base Camp Pizza Co.
Italian plates, pies & cocktails turned out in an upbeat atmosphere.
1001 Heavenly Village Way #25a
basecamppizzaco.com
California Burger Company
Gourmet burgers & whiskey offered in a hip tavern.
1001 Heavenly Village Way #2b
caburgerco.com
Ace High Saloon and Smokehouse
Relaxed, rustic BBQ restaurant with cocktails and mountain-view patio.
4125 Lake Tahoe Boulevard, # K
acehighsaloon-smokehouse.com
Fire + Ice
Latin, Italian & Asian-inspired all you can eat grill.
4100 Lake Tahoe Blvd
fire-ice.com
McP’s Taphouse Grill
Popular Irish spot features local talent & offers traditional pub fare.
4125 Lake Tahoe Blvd A
mcpspub.com
Stateline Brewery & Restaurant
Pub grub, including burgers & pizza, plus house drafts at this microbrewery.
4118 Lake Tahoe Blvd
statelinebrewery.com
Driftwood Café
Locally roasted coffee & homemade soups.
1001 Heavenly Village Way #1a
driftwoodtahoe.com
The Baked Bear
For dessert, try their homemade cookie ice cream sandwiches!
4118 Lake Tahoe Blvd #5
thebakedbear.com
1 | Air Force Institute of Technology | Seth Hamman | Adversarial Thinking – 1 week module using behavorial game theory Poster |
2 | Alabama Huntsville | Tommy Morris | SCADA – 6 SCADA modules |
3 | Arkansas Little Rock | Mengjun Xie | Networking and network security in the cloud |
4 | Augusta University | John Henslen | Strategic Thinking |
5 | California State, San Bernardino | Vinny Nestler | NICE Challenges |
6 | Colorado School of Mines | Chuan Yue | Authenticating passwords-repository of exercises (teach software developers to do a better job authenticating passwords) |
7 | Dakota State University | Kyle Cronin | Cellular and Mobile, Networking Principles; Hacking and Vulnerabilities – modular based |
8 | DePaul University | Filipo Sharevski | Secure Design with focus on IoT |
9 | George Washington University | Diana Burley | CSEC Essentials roadmap |
10 | Idaho, University of | Jim Alves-Foss | Modules on principles, networks, software vulnerabilities, development and acq. of secure software |
11 | Iowa State University | Julie Rursch | Security networking; Systems and tools in security, and Adv. Security concepts |
12 | Massachusetts Lowell, University | Xinwen Fu | IoT security and privacy |
13 | Michigan Technological University | Yu Cai | Cyber Ethics, Cyber Security I and II, Scripting for automation and security, Wireless system admin., Digital Forensics |
14 | Naval Postgraduate School | Cynthia Irvine | Industrial Control Systems |
15 | New Orleans University SCADA | Irfan Ahmed | SCADA Concept Maps |
16 | New Orleans University | Irfan Ahmed | Concept Maps for 3 courses: Intro to security, Digital forensics, Network pentest |
17 | North Carolina A&T | Mohd Anwar | Cybersecurity Fundamentals, Secure Software Engineering, Cybersecurity Product Development |
18 | North Carolina State University | Douglas Reeves | Cybersecurity 1 & 2, Networks, Software, Privacy, Crypto Poster |
19 | Old Dominion University | Ariel Pinto | Risk – Multidisciplinary Risk 1 Risk 2 posters |
20 | Prairie View A&M University | Na Li | Privacy |
21 | Prince Georges Community College | Casey O’Brien | Competency-based curriculum Powerpoint |
22 | Purdue University Northwest | Michael Tu | Software Security and Secure Programming |
23 | Rochester Institute of Technology | Leon Reznik | Intelligence Security Systems: Machine Learning and Artificial Intelligence |
24 | Texas A&M University | Daniel Ragsdale | Digital Forensics, Secure Coding and Ethical Pen-testing, Cybersecurity and Digital Ethics |
25 | Towson University | Josh Dehlinger | Cybersecurity Principles course and modules on risk, mobile risk, software testing, ICS, LTE, and HCI |
26 | Virginia Tech | Mike Hohnka | Networking specific to SDN, vehicular databases, telecom, and physical layer security Poster |
27 | West Florida, University of | Eman EL-Sheikh | Secure Software Development for ICS |
1 | Cincinnati, University of | Richard Harknett Vali Tadayon | Develop and host a role-based mulit-tiered web application curriculum management platform and pilot. |
2 | Colorado School of Mines | Chuan Yue | Modules for learning side-channel attacks and defenses on smartphones |
3 | Columbus State University | Jianhua Yang | Modules and labs for stepping-stone intrusion detection techniques |
4 | Dakota State University | Josh Stroschein | Content development of Reverse Engineering, Software Exp. & Security, Malware Analysis; K12 Ed Content; CTF, Framework Design |
5 | Florida State University | Xiuwen Liu | Software and firmware reverse engineering |
6 | Fordham University | Thaier Hayajneh | Basic and advanced topics in IoT Forensics |
7 | George Mason University – Auffert | Jean-Pierre (JP) Auffret | Risk Management and Wireless / Mobile security |
8 | Highline University | Amelia Phillips | Digital Forensics and Legal Curricula |
9 | Louisiana State University Towson University |
Golden Richard, III Aisha Ali-Gombe |
Introducing Active Learning to Malware Analysis Curriculum |
10 | Maryland, Baltimore, University of | Markus Rauschecker | Education on laws, regulations and policies |
11 | Maryland, University of | Susan Campbell | Multidisciplinary (economics, psychology, and cybersecurity) approach to evaluate human threats and design systems for the desired human-computer interactions |
12 | Maryland, University of | Gang Qu | Hardware reverse engineering course |
13 | Michigan Tech | Yu Cai | Infrastructure Service Admin and Security, Advanced Network Security, Penetration Testing and Audit, Cybersecurity for Industrial Control Systems |
14 | Missouri, St. Louis, University of | Jianli Pan | Wireless/mobile and cyber threats and vulnerabilities |
15 | Nebraska, Omaha, University of | Abhishek Parakh | Quantum Cryptography Laboratories |
16 | New Orleans, University of | Joe Sylve | Reverse engineering of modern malware |
17 | New York University | Nasir Memon | Intro to Cyber Security and Cloud Security |
18 | North Carolina A&T State University | Xiaohong Dorothy Yuan | Android application vulnerabilities and mitigation |
19 | Old Dominion University | Adrian Gheorghe | Blockchain and Cybersecurity Poster |
20 | Penn State, ARL not attending | Debra Del Vecchio, Kevin Kuczynski | Principles of Cyber Operation and Cyber Operations Law and Policy |
21 | Purdue University | Busiime Ida Ngambeki | Secure Programming Concept Inventory |
22 | SOCHE | Seth Hamman | Cybersecurity Legal and Ethical Aspects Poster |
23 | Syracuse University | Yuzhe Tang | Labs for Cryptographic Engineering on Modern Systems |
24 | Tennessee, Chattanooga, University of | Li Yang | Visualization tools and labs, Cross-Site Scripting and Cross-site Request Forgery, DNS cache poisoning and pharming, Logic Flaw, Ad Fraud, IoT Botnet, Browser Extensions |
25 | Texas A&M San Antonio | Akhtar Lodgher | Threats/vuln., risk mgmt, software reverse eng., cryptography |
26 | Texas, Dallas, University of | Latifur Khan | Security threats and vulnerabilities – using big data management and analytics (BDMA). Poster |
27 | Towson University | Siddharth Kaza | Prototype Curriculum Management System (CLARK) |
28 | Virginia Tech – SRE | Kara Nance | Software Reverse Engineering |