The GenCyber program (supported by National Security Agency and National Science Foundation) was developed with the goal of facilitating cyber security education growth and attracting and recruiting college bound students to the field of cyber security. The program provides cyber security awareness and education to students K-12, cyber security teaching methodologies for computer science teachers, and establishes resources for both the cyber security teaching and learning curricula.
With a grant from the GenCyber program, the Department of Computer Science at James Madison University is offering a five-day boot camp that covers the basics of Cyber Defense for high school technology teachers. The boot camp provides interested teachers with the opportunity to learn the fundamentals of Cyber Defense and provide them with a complete set of course material (lecture slides, lab projects, and tools) to take to their home institutions.
Participants will learn:
It is important to note that we will not be trying to teach the participants how to be attackers (we will be sure to point out the legal and ethical issues of all techniques that we will cover), rather we will focus on helping them to understand the types of things that attackers typically do, how the attackers intend to use that information, and what defenders can do to protect themselves and their systems.
After completing the boot camp, we hope that participants will be inspired to continue their own exploration of information security and cyber defense and also involve interested students at their school in these activities through some sort of group or club. We will also provide information about the CyberPatriot program and how your school can compete.
|
Monday (6/25) |
Tuesday (6/26) |
Wednesday (6/27) |
Thursday (6/28) |
Friday (6/29) |
9:00-10:15 |
Welcome and Introduction |
Process Isolation Hands-on Exercise |
Least Privilege Hands-on Exercise |
Abstraction Hands-on Exercise |
Modularity and Minimization Hands-on Exercise |
10:15-10:30 |
Break |
Break |
Break |
Break |
Break |
10:30-11:45 |
Domain Separation |
Resource Encapsulation |
Layering |
Information Hiding |
Simplicity of Design |
1:45-1:00 |
Lunch |
Lunch |
Lunch |
Lunch |
Lunch |
1:00-2:15 |
Domain Separation Hands-on Exercise |
Resource Encapsulation Hands-on Exercise |
Layering Hands-on Exercise |
Information Hiding Hands-on Exercise |
Simplicity of Design Hands-on Exercise |
2:15-2:30 |
Break |
Break |
Break |
Break |
Break |
2:30-4:00 |
Process Isolation |
Least Privilege |
Abstraction |
Modularity and Minimization |
Wrap-up |
4:00-4:45 |
Curriculum Development |
Curriculum Development |
Curriculum Development |
Curriculum Development |
Curriculum Development |
4:45-5:00 |
Reflection/Daily Quiz |
Reflection/Daily Quiz |
Reflection/Daily Quiz |
Reflection/Daily Quiz |
Reflection/Daily Quiz |
Please fill out the form located at the following link: