Cybersecurity Education Workshop 2018
April 23rd & 24th, 2018
Lake Tahoe – California
www.towson.edu/cyberedworkshop
The CyberSecurity Education Workshop 2018 is being held on April 23 – April 24 in South Lake Tahoe, CA
National Science Foundation
NSA National Cybersecurity Curriculum Program
The goal of the workshop is to bring together experts in cybersecurity with representatives from funding agencies, and focus on high-quality curriculum efforts in Cyber Security Education. Curriculum on display will include projects sponsored by the NSA National Cybersecurity Curriculum Program and NSF.
Monday, April 23rd
8:00 – 8:15 AM |
Opening: |
8:15 – 9:00 | Keynote: Steve Lafountain, Dean, College of Cyber, NSA David Rice, Director, Global Security, Apple Inc. |
9:00 – 9:15 | The National Cybersecurity Curriculum Program (NCCP) Maureen Turney, NSA |
9:15 – 9:45 | Cyber Curriculum and the Cyber Cube Melissa Dark, Purdue University/NSA (CON) Powerpoint Blair Taylor, Towson University/NSA (CON) |
9:45-10:00 | Break |
10:00-11:15 | Curriculum showcase Digital Forensics – Texas A&M University, Trez Jones Visualization to Teach Web Security – NCAT, Li Yang, University of Tennessee Chattanooga, Xiaohong Dorothy Yuan, Visualization Powerpoint Secure Design in IoT, DePaul University, Filipo Sharevski Reverse Engineering and Malware Analysis – Dakota State University, Josh Stroschein Strategic Thinking – Augusta University, John Heslen NSA Grant Powerpoint |
11:15-12:15 | Curriculum Expo A |
12:15-1:45 | Lunch (On your own) |
1:45-2:45 | Curriculum Expo B |
2:45-3:30 | Panel: K-12 and Community Colleges (Moderator: Melissa Dark) K-12 – Ruthe Farmer, Chief Evangelist, CSforAll Cyber Engineering High School: Tommy Morris, University of Alabama in Huntsville Community Colleges: Cara Tang, Portland Community College |
3:30 – 3:45 | Break – Coffee and Cookies |
3:45 – 4:00 | Always Education: Vali Tadayon, University of Cincinnati |
4:00-4:15 | CLARK: Sidd Kaza, Towson University |
4:15-4:50 | Discussion Breakouts: Building, Launching, and Sustaining the Cyber Cube |
4:50 | Closing |
Tuesday, April 24th
8:00 – 8:10 AM | Opening |
8:10 – 8:30 | Outreach: Education and the Cyberworkforce Dr. Leonard T. Reinsfelder, Commandant, National Cryptologic School |
8:30 – 9:15 | Panel: Perspectives Moderator: Blair Taylor Josh Moses, OMB Scott Buck, Intel Victor Piotrowski, NSF Rodney Peterson, NICE |
9:15 – 9:30 | Capture the Flag Management System: Powerpoint Josh Strochein, Dakota State University |
9:30 – 9:45 | Nice Challenge: Powerpoint California State University, San Bernardino |
9:45 – 10:00 | Competency-based Curriculum: Casey O’Brien, Prince George’s Community College |
10:00 – 10:15 | Break |
10:15 – 11:00 | Discussion Breakouts: The Future of the Cyber Ed Workshop |
11:00 – 12:00 | Curriculum Expo C |
12:00 – 1:15 | Lunch on your own |
1:15 – 2:15 | Curriculum Expo D |
2:15 – 2:30 | History of Cybersecurity Education: Matt Bishop, University of California, Davis |
2:30 – 2:45 | ACM/IEEE/AIS/IFIP Cybersecurity Curriculum (CSEC 2017): Powerpoint Matt Bishop, University of California, Davis History Powerpoint Diana Burley, George Washington University |
2:45 – 3:00 | CSEC mapping: Diana Burley, George Washington University |
3:00 – 3:30 | Report back from breakouts |
3:30 – 4:00 | Closing and Future |
Breakfast is included in your room reservations.
Base Camp Pizza Co.
Italian plates, pies & cocktails turned out in an upbeat atmosphere.
1001 Heavenly Village Way #25a
basecamppizzaco.com
California Burger Company
Gourmet burgers & whiskey offered in a hip tavern.
1001 Heavenly Village Way #2b
caburgerco.com
Ace High Saloon and Smokehouse
Relaxed, rustic BBQ restaurant with cocktails and mountain-view patio.
4125 Lake Tahoe Boulevard, # K
acehighsaloon-smokehouse.com
Fire + Ice
Latin, Italian & Asian-inspired all you can eat grill.
4100 Lake Tahoe Blvd
fire-ice.com
McP’s Taphouse Grill
Popular Irish spot features local talent & offers traditional pub fare.
4125 Lake Tahoe Blvd A
mcpspub.com
Stateline Brewery & Restaurant
Pub grub, including burgers & pizza, plus house drafts at this microbrewery.
4118 Lake Tahoe Blvd
statelinebrewery.com
Driftwood Café
Locally roasted coffee & homemade soups.
1001 Heavenly Village Way #1a
driftwoodtahoe.com
The Baked Bear
For dessert, try their homemade cookie ice cream sandwiches!
4118 Lake Tahoe Blvd #5
thebakedbear.com
1 | Air Force Institute of Technology | Seth Hamman | Adversarial Thinking – 1 week module using behavorial game theory |
2 | Alabama Huntsville | Tommy Morris | SCADA – 6 SCADA modules |
3 | Arkansas Little Rock | Mengjun Xie | Networking and network security in the cloud |
4 | Augusta University | John Henslen | Strategic Thinking |
5 | California State, San Bernardino | Vinny Nestler | NICE Challenges |
6 | Colorado School of Mines | Chuan Yue | Authenticating passwords-repository of exercises (teach software developers to do a better job authenticating passwords) |
7 | Dakota State University | Kyle Cronin | Cellular and Mobile, Networking Principles; Hacking and Vulnerabilities – modular based |
8 | DePaul University | Filipo Sharevski | Secure Design with focus on IoT |
9 | George Washington University | Diana Burley | CSEC Essentials roadmap |
10 | Idaho, University of | Jim Alves-Foss | Modules on principles, networks, software vulnerabilities, development and acq. of secure software |
11 | Iowa State University | Julie Rursch | Security networking; Systems and tools in security, and Adv. Security concepts |
12 | Massachusetts Lowell, University | Xinwen Fu | IoT security and privacy |
13 | Michigan Technological University | Yu Cai | Cyber Ethics, Cyber Security I and II, Scripting for automation and security, Wireless system admin., Digital Forensics |
14 | Naval Postgraduate School | Cynthia Irvine | Industrial Control Systems |
15 | New Orleans University SCADA | Irfan Ahmed | SCADA Concept Maps |
16 | New Orleans University | Irfan Ahmed | Concept Maps for 3 courses: Intro to security, Digital forensics, Network pentest |
17 | North Carolina A&T | Mohd Anwar | Cybersecurity Fundamentals, Secure Software Engineering, Cybersecurity Product Development |
18 | North Carolina State University | Douglas Reeves | Cybersecurity 1 & 2, Networks, Software, Privacy, Crypto Poster |
19 | Old Dominion University | Ariel Pinto | Risk – Multidisciplinary Risk 1 Risk 2 posters |
20 | Prairie View A&M University | Na Li | Privacy |
21 | Prince Georges Community College | Casey O’Brien | Competency-based curriculum Powerpoint |
22 | Purdue University Northwest | Michael Tu | Software Security and Secure Programming |
23 | Rochester Institute of Technology | Leon Reznik | Intelligence Security Systems: Machine Learning and Artificial Intelligence |
24 | Texas A&M University | Daniel Ragsdale | Digital Forensics, Secure Coding and Ethical Pen-testing, Cybersecurity and Digital Ethics |
25 | Towson University | Josh Dehlinger | Cybersecurity Principles course and modules on risk, mobile risk, software testing, ICS, LTE, and HCI |
26 | Virginia Tech | Mike Hohnka | Networking specific to SDN, vehicular databases, telecom, and physical layer security |
27 | West Florida, University of | Eman EL-Sheikh | Secure Software Development for ICS |
1 | Cincinnati, University of | Richard Harknett Vali Tadayon | Develop and host a role-based mulit-tiered web application curriculum management platform and pilot. |
2 | Colorado School of Mines | Chuan Yue | Modules for learning side-channel attacks and defenses on smartphones |
3 | Columbus State University | Jianhua Yang | Modules and labs for stepping-stone intrusion detection techniques |
4 | Dakota State University | Josh Stroschein | Content development of Reverse Engineering, Software Exp. & Security, Malware Analysis; K12 Ed Content; CTF, Framework Design |
5 | Florida State University | Xiuwen Liu | Software and firmware reverse engineering |
6 | Fordham University | Thaier Hayajneh | Basic and advanced topics in IoT Forensics |
7 | George Mason University – Auffert | Jean-Pierre (JP) Auffret | Risk Management and Wireless / Mobile security |
8 | Highline University | Amelia Phillips | Digital Forensics and Legal Curricula |
9 | Louisiana State University
Towson University |
Golden Richard, III
Aisha Ali-Gombe |
Introducing Active Learning to Malware Analysis Curriculum |
10 | Maryland, Baltimore, University of | Markus Rauschecker | Education on laws, regulations and policies |
11 | Maryland, University of | Susan Campbell | Multidisciplinary (economics, psychology, and cybersecurity) approach to evaluate human threats and design systems for the desired human-computer interactions |
12 | Maryland, University of | Gang Qu | Hardware reverse engineering course |
13 | Michigan Tech | Yu Cai | Infrastructure Service Admin and Security, Advanced Network Security, Penetration Testing and Audit, Cybersecurity for Industrial Control Systems |
14 | Missouri, St. Louis, University of | Jianli Pan | Wireless/mobile and cyber threats and vulnerabilities |
15 | Nebraska, Omaha, University of | Abhishek Parakh | Quantum Cryptography Laboratories |
16 | New Orleans, University of | Joe Sylve | Reverse engineering of modern malware |
17 | New York University | Nasir Memon | Intro to Cyber Security and Cloud Security |
18 | North Carolina A&T State University | Xiaohong Dorothy Yuan | Android application vulnerabilities and mitigation |
19 | Old Dominion University | Adrian Gheorghe | Blockchain and Cybersecurity Poster |
20 | Penn State, ARL not attending | Debra Del Vecchio, Kevin Kuczynski | Principles of Cyber Operation and Cyber Operations Law and Policy |
21 | Purdue University | Busiime Ida Ngambeki | Secure Programming Concept Inventory |
22 | SOCHE | Seth Hamman | Cybersecurity Legal and Ethical Aspects Poster |
23 | Syracuse University | Yuzhe Tang | Labs for Cryptographic Engineering on Modern Systems |
24 | Tennessee, Chattanooga, University of | Li Yang | Visualization tools and labs, Cross-Site Scripting and Cross-site Request Forgery, DNS cache poisoning and pharming, Logic Flaw, Ad Fraud, IoT Botnet, Browser Extensions |
25 | Texas A&M San Antonio | Akhtar Lodgher | Threats/vuln., risk mgmt, software reverse eng., cryptography |
26 | Texas, Dallas, University of | Latifur Khan | Security threats and vulnerabilities – using big data management and analytics (BDMA). |
27 | Towson University | Siddharth Kaza | Prototype Curriculum Management System (CLARK) |
28 | Virginia Tech – SRE | Kara Nance | Software Reverse Engineering |
