Browse Resources

Information and Security Technologies -- Security, information assurance, and forensics

Resources

Screenshot for Introduction to Bitcoins, Blockchains, Ethereum, Smart Contracts, and NFTs
This video, provided by the Convergence Technology Center (CTC) at the HI-TEC 2022 conference, is a presentation that covers the key concepts related to blockchain technologies and services. In the video, Debasis Bhattacharya from the University of Hawaii's Maui College describes bitcoin and...
Screenshot for Introduction to Cyber Supply Chain Attacks and Risk Management (1 of 3)
This video, from the National Cybersecurity Training and Education (NCyTE) Center, is the first in a series of three that discuss cyber supply chain attacks and risk management. This video defines the term supply chain and the supply chain problem, describes the phases of the supply chain, and...
Screenshot for Introduction to Emergency Services Critical Infrastructure Cybersecurity
This video from the National Cybersecurity Training and Education Center (NCyTE) introduces students to the Emergency Services Critical Infrastructure sector. In the video, Philip Craiger discusses the definition of emergency services, what services comprise emergency services, interdependencies...
Screenshot for Intrusion Detection System/Intrusion Prevention System (IDS/IPS) Scenario
​​​​​This collection of resources, from the Cybersecurity Education for Advanced Manufacturing Organizations project, is a part of the Intrusion Detection System/Intrusion Prevention System (IDS/IPS) Scenario. This scenario is a training module that focuses on using IDS/IPS to monitor and protect...
Screenshot
Description: This IPAR (Imaging, Preserving, analyzing, and reporting) game is provided by the project "Gamified" Digital Forensics Course Modules for Undergraduates at the Rochester Institute of Technology and is part of a digital forensics curriculum that teaches students to collect evidence,...
Screenshot for IT Trends 2021-2022
These resources are provided by the National Convergence Technology Center (CTC). Resources include four one-page flyers that were developed at the request of member schools in the National CTC's IT educator community of practice, known as the "CCN" (Convergence College Network), to help support...
Screenshot for ITSC 1325 Module 5: End User System Security
Course Description This sample module from ITSC 1325: PC Hardware, a course that educates learners on how to "install, configure, secure, and troubleshoot operating systems software and hardware to achieve high availability and performance," covers end user system security. Module 5 progresses...
Screenshot
This PDF document, provided by the Ohio Region Cybersecurity Technician Training Pipeline at Columbus State Community College, is a job skills analysis of the cybersecurity workforce.  The document lists the various roles that these professionals play and provides the corresponding technology skills...
Screenshot for Lab: Antivirus and Malware Scanning and Compliance (5 of 11)
This document from the Center for Systems Security and Information Assurance (CSSIA) is part of a series of workshop documents that address the knowledge and skills needed for students to be prepared for the Qualified Security Assessor (QSA) exam. "A Qualified Security Assessor is a person who has...
Screenshot for Lab: Build, Maintain, and Test Network and Workstation Firewalls (1 of 11)
This document from the Center for Systems Security and Information Assurance (CSSIA) is part of a series of workshop documents that address the knowledge and skills needed for students to be prepared for the Qualified Security Assessor (QSA) exam. "A Qualified Security Assessor is a person who has...
← Previous Next →