Browse Resources

Information and Security Technologies -- Security, information assurance, and forensics

Resources

Screenshot for Firewall: Stateful Packet Inspector
This brief interactive activity, by Electromechanical Digital Library and Wisconsin Technical College System faculty members Joseph Wetzel and Brian Gremore, provides a basic introduction to stateful packet inspectors (SPIs). This online lesson gives a definition, examples, and explanation of SPIs...
Screenshot
This paper, published in Advances in Digital Forensics VII, discusses the unique challenges that plug computers pose to evidence recovery operations during criminal investigations. Plug computers are a cross between an embedded device (such as a smart phone) and a traditional computer. The...
Screenshot
Program Description: River Valley Community College, in association with Program Development in Cybersecurity with Focus on Business and Healthcare Concepts, has developed a 4-semester program to prepare students to working the Information Assurance (IA) field with a focus on Cybersecurity and...
Screenshot for Governance, Risk Management, & Compliance Workshops
This webpage, from National Cybersecurity Training and Education (NCYTE) Center, includes governance, risk management, and compliance workshops that were "designed for college faculty that teach cybersecurity and information assurance programs who recognize that community college cybersecurity...
Screenshot
In Fall of 2012, the Homeland Security Advisory Council created this CyberSkills Task Force Report. The purpose of the 41 page pdf report is to propose improvements to enable the Department of Homeland Security to recruit the cybersecurity talent it needs. The report also proposes "ways to boost the...
Screenshot for How'd You Think of That? with Temple Grandin: Cybersecurity 360, Everywhere and Everything (S2, Ep. 1)
This podcast is hosted by Temple Grandin and is provided by the STEM Action Center. This podcast features STEM professionals discussing their work and the benefits of a multifaceted approach to STEM education. During episode one of season two, Temple Gradin speaks with cybersecurity expert Diego...
Screenshot for ICS Basics Scenario
​​​​​This collection of resources, from the Cybersecurity Education for Advanced Manufacturing Organizations project, is a part of the Industrial Control Systems Basics Scenario. This scenario is a training module that provides background on industrial networking protocols and their security...
Screenshot for ICS Zoning Scenario
This collection of resources, from the Cybersecurity Education for Advanced Manufacturing Organizations project, is part of the Industrial Control System Zoning Scenario. This scenario is a cybersecurity training module designed to educate students on the importance and implementation of network...
Screenshot
This page, from the Intel Corporation, introduces the company's program to help the academic community develop security curriculum and better educate "a pipeline of capable students who can tackle real-world security related challenges." Directed at university faculty and administration in the...
Screenshot for Introduction to Bitcoins, Blockchains, and Smart Contracts
This presentation, made available by the University of Hawaii at Honolulu, provides an introduction to bitcoins, blockchains, and smart contracts. The presentation was created by Dr. Debasis Bhattacharya, Assistant Professor of Applied Business and Information Technology at University of Hawaii Maui...
← Previous Next →