Browse Resources

Information and Security Technologies -- Security, information assurance, and forensics

Resources

Screenshot for Neurodiversity: Untapped Talent That Can Help Meet the Cyber Skills Shortage
This webinar from the National CyberWatch Center is part of a series of webinars on cybersecurity. In the webinar, Diane Delaney and Megan Roddie discuss "neurodiversity and cybersecurity at IBM and the importance of having neurodivergent teams." IBM's neurodiversity initiatives, recruitment...
Screenshot for NICE Framework's Special Issue: Investigating Framework Adoption, Adaptation, or Extension
This 88-page journal, provided by the National CyberWatch Center, includes information about expanding the National Initiative for Cybersecurity Education (NICE) Framework. This Framework focuses on "... the education and training needs of the cybersecurity workforce by providing a common vocabulary...
Screenshot for Nmap Scenario
​​​​​This collection of resources, from the Cybersecurity Education for Advanced Manufacturing Organizations project, is a part of the nmap Scenario. This scenario is a training module that provides an introduction to nmap, a free, open-source software used in network functionality and network...
Screenshot
This Cybersecurity Lab webpage from the PBS NOVA Labs website includes an interactive game and videos about cybersecurity. In this game users defend a company that is the target of cyber attacks. The goal is to strengthen cyber defenses and block attackers by completing a series of challenges. Users...
Screenshot for NWTC Cybersecurity Conference: Latest Schemes in Cybersecurity
This video from Northeast Wisconsin Technical College (NWTC) is part of the Innovative Technology Speaker Series. This video focuses on cybersecurity and features four presenters. In the video, Tommy Gardner talks about growing the cybersecurity workforce, advocating for cybersecurity educational...
Screenshot
This 54-page resource was written by Roger Powell and is provided free for download. This paper “explores the issues of balancing career preparation with academic foundations in community college information security programs. The paper examines San Bernardino Valley’s creation of an information...
Screenshot
This 42 page report, published through a collaboration of the National CyberWatch Center, Grimm + Parker Architects, and Steelcase, an innovative furnature design and manufacturing company, is intended to offer "support in the planning and design of advanced, high performing cybersecurity learning...
Screenshot for Outreach-in-a-Box: Discovering IT
This page, from the National Center for Women and Information Technology, offers materials to aid information technology professionals in delivering an age-appropriate presentation to interest middle school students in computing. The downloadable .zip file on the page includes sample correspondence...
Screenshot for PCI DSS Quick Reference Guide
This 33-page reference guide from the Payment Card Industry Security Standards Council (PCI SSC) provides merchants and entities that store, process, or transmit cardholder data with supplemental information about protecting cardholder data with security standards. In the guide, an overview of PCI...
Screenshot for PCI-DSS Controls
This document provides an overview of payment card industry (PCI) data security standard (DSS) controls. PCI security standards are technical and operational requirements set by the PCI Security Standards Council (SSC) to protect cardholder data. "The PCI DSS applies to all entities that store,...
← Previous Next →