Browse Resources
Information and Security Technologies -- Security, information assurance, and forensics
Resources | |
---|---|
This 59-page publication presents the winner's submissions of the National CyberWatch Center's Innovations in Cybersecurity Education Awards and Recognition Program. This program "... is a vehicle where cybersecurity educators can share their advancements and innovations in their programs,...
This 17-page publication presents the winner's submissions of the National CyberWatch Center's Innovations in Cybersecurity Education Awards and Recognition Program. This program "... is a vehicle where cybersecurity educators can share their advancements and innovations in their programs,...
This resource guide, from Dr. Fred Klappenberger and the National CyberWatch Center, is intended to assist institutions with the application for the National Security Agency's National Centers of Academic Excellence in Information Assurance/ Cyber Defense (IA/CD) program. To be complete this...
This video from the National Cybersecurity Training and Education (NCyTE) Center features a panel discussion on artificial intelligence (AI) and its impact on cybersecurity instruction and the cybersecurity workforce. After a brief introduction summarizing AI's effect on labor, each cybersecurity...
This paper, from Michael Jones of North Carolina Agricultural and Technical State University, covers privacy and security issues at a small university. The paper identifies security and privacy strategies already in place, explores how these are dealt with in different departments procedures,...
This webpage, from National Cybersecurity Training and Education (NCYTE) Center, is one of seven learning modules from the Cybersecurity-Infused Computer Science Modules series. This module "focuses on practical aspects of private key and public key cryptography," and the Primary Learning Objectives...
This paper, published in International Federation for Information Processing, Volume 222, discusses whether trace evidence of files is left by Windows-based secure deletion programs. Secure deletion programs purport to permanently erase files from digital media. The authors examine five popular...
This 8-page case study on the National Cybersecurity Centers, published by SageFox Consulting Group, is part of a series that examines ATE centers after funding from the National Science Foundation (NSF) ceases. The study examines the consortium of three centers from their conception to the present,...
Description:
This Automotive Cybersecurity for Automotive Technicians course introduces students to "the potential threats of cyber-attacks on vehicles, especially connected and automated vehicles." Topics covered include: Understanding Threat Models, Bus Protocols & Vehicle Communication,...
In this video from the National Cybersecurity Training and Education Center (NCyTE), Zackary Nicklin talks about autonomous technologies and cybersecurity. Autonomous and semi-autonomous technologies, the roles they play in society, and the different ways they communicate are covered. Emerging...
| |
Next → |