Browse Resources

Information and Security Technologies -- Security, information assurance, and forensics

Resources

Screenshot for 2020 Innovations in Cybersecurity Education Publication
This 59-page publication presents the winner's submissions of the National CyberWatch Center's Innovations in Cybersecurity Education Awards and Recognition Program. This program "... is a vehicle where cybersecurity educators can share their advancements and innovations in their programs,...
Screenshot for 2021 Innovations in Cybersecurity Education Publication
This 17-page publication presents the winner's submissions of the National CyberWatch Center's Innovations in Cybersecurity Education Awards and Recognition Program. This program "... is a vehicle where cybersecurity educators can share their advancements and innovations in their programs,...
Screenshot
This resource guide, from Dr. Fred Klappenberger and the National CyberWatch Center, is intended to assist institutions with the application for the National Security Agency's National Centers of Academic Excellence in Information Assurance/ Cyber Defense (IA/CD) program. To be complete this...
Screenshot
This paper, from Michael Jones of North Carolina Agricultural and Technical State University, covers privacy and security issues at a small university. The paper identifies security and privacy strategies already in place, explores how these are dealt with in different departments procedures,...
Screenshot for Applied Cryptography Module
This webpage, from National Cybersecurity Training and Education (NCYTE) Center, is one of seven learning modules from the Cybersecurity-Infused Computer Science Modules series. This module "focuses on practical aspects of private key and public key cryptography," and the Primary Learning Objectives...
Screenshot
This paper, published in International Federation for Information Processing, Volume 222, discusses whether trace evidence of files is left by Windows-based secure deletion programs. Secure deletion programs purport to permanently erase files from digital media. The authors examine five popular...
Screenshot for ATE Epilogue Case Study: The Cybersecurity Centers
This 8-page case study on the National Cybersecurity Centers, published by SageFox Consulting Group, is part of a series that examines ATE centers after funding from the National Science Foundation (NSF) ceases. The study examines the consortium of three centers from their conception to the present,...
Screenshot
Description: This Automotive Cybersecurity for Automotive Technicians course introduces students to "the potential threats of cyber-attacks on vehicles, especially connected and automated vehicles." Topics covered include: Understanding Threat Models, Bus Protocols & Vehicle Communication,...
Screenshot for Autonomous and Semi-Autonomous Systems
In this video from the National Cybersecurity Training and Education Center (NCyTE), Zackary Nicklin talks about autonomous technologies and cybersecurity. Autonomous and semi-autonomous technologies, the roles they play in society, and the different ways they communicate are covered. Emerging...
Screenshot for Building a Cyber Workforce Through Apprenticeship and Pre-Apprenticeship Webcast
This webinar from the National CyberWatch Center is part of a series of webinars on cybersecurity. In the webinar, Jennifer Oddo from IBM discusses the cybersecurity workforce, Covid-19's effects on the cybersecurity industry, competency-based apprenticeships in cybersecurity, grant funding and wage...
Next →