Cyber Academy Powerpoint

Download Report

Transcript Cyber Academy Powerpoint

Presented to:
Huntsville City School Board
Huntsville City Cyber
Curriculum
"Approved for public release; distribution unlimited. Reference herein to any
specific commercial, private or public products, process, or service by trade
name, trademark, manufacturer, or otherwise, does not constitute or imply its
endorsement, recommendation, or favoring by the United States Government.
The views and opinions expressed herein are strictly those of the authors and
do not represent or reflect those of the United States Government. The
viewing of the presentation by the Government shall not be used as a basis of
advertising."
Presented by:
Rob Goldsmith
Date 2/6/2014
AMRDEC Cyber Lead
U.S. Army Aviation and Missile Research,
Development, and Engineering Center
Huntsville City Cyber Curriculum
Objective:
Give industry insight into developing
classes that will give students the
skills required for a successful
INFOSEC career.
2
Current Actives:
Planned Actives:
AMREC/SED personnel have been
meeting with Huntsville City School
personnel to develop a groundwork
for an Information Security
curriculum.
Have current Grissom High cyber
team build out final project planned
for next years freshmen class
Prepare curriculum for 1st
Information Security class that
would be offered to Freshmen in
School year 2014/15
UNCLASSIFIED
FileName.pptx
Cyber Curriculum Rollout
2014
2015
Objectives
2016
2017
Activities
Intro To Information security (infosec)
Infosec II
Infosec III
Infosec IV
Extracurricular
Enhanced
Extracurricular
3
•Initial Meeting with Huntsville City
Schools Dec 17th
•Developed skeleton plan for
curriculum Jan 2 – 20th
•Received feedback from facility and
staff Jan 28th
•Submit Course descriptions for
course catalog Feb 5th
UNCLASSIFIED
2018
Professional
Certification
Issues
Overlap or duplication
of effort from other IT
classes
FileName.pptx
INFOSEC I
•
•
4
Will be taken as part of Freshmen Career Development
6b34fe24ac2ff8103f6fce1f0da2ef57
Course Overview
– Introduction to Ethics in the Information Age
– Operating Systems
• Windows OS
• Intro to the Linux OS
– Virtualization
– Secure configurations at the desktop level
– Number systems (e.g. base 10, base 2, base 16)
– IP addressing
– Identifying network hosts and services on a network
– Network Applications using video game client/server setup as an
example
– WIFI security
– Project: Develop a written security plan for a typical home network
– Final Project
• Build and configure network that is capable of hosting a multi
player video game where each student’s machine capable of
being a server or a client
• Provide a scan that identifies all hosts and listening services.
UNCLASSIFIED
FileName.pptx
INFOSEC II
6b34fe24ac2ff8103f6fce1f0da2ef57
•
•
5
Should be taken in conjunction with a Computer Networking elective or
technical writing
Course Overview
– Ethics in the Information Age (refresher)
– Binary number system
– Basic risk analysis
– The Linux Command Line
– OSI Model layers 1,2,3 and 7
– Network Devices (NICs, Switches and Routers)
– Introduction to Microsoft Server OS and Linux Server OS
– Introduction to Databases
– Introduction to Web servers
– Basic programming techniques
– Basic Structured Query Language (SQL)
– Host Based Firewalls (Windows Firewall and Linux IPtables)
– Project: Do a written risk analysis on a Linux Lamp Server
– Final Project: Build and configure a Linux LAMP server and host a dynamic
web site with a database backend.
UNCLASSIFIED
FileName.pptx
INFOSEC III
6b34fe24ac2ff8103f6fce1f0da2ef57
•
•
•
6
Prerequisites: INFOSEC II
Should be taken in conjunction with Computer programming and/or upper level
math course
Course Overview
– Ethics in the Information Age (refresher)
– Law as it’s applied to cyber
– Intro to Cryptography
– Intro to Forensics
– Tools: Network scanners, password crackers, fuzzers
– Intrusion Detection/Prevention IDS
– “Offensive” networking: port redirection, alternate uses of secure shell,
VPNs, backdoors, honeypots
– Social Engineering / Phishing / Browser Based Exploits / File Format
Vulnerabilities
– Project: Develop a white paper
– Alt Project: Develop a forensic and/or crypto tool
– Final Project: Analyze an existing exploit, demonstrate its use. Offer a
possible mitigation.
UNCLASSIFIED
FileName.pptx
INFOSEC IV
6b34fe24ac2ff8103f6fce1f0da2ef57
•
•
•
7
Prerequisites: INFOSEC III
Should be taken in conjunction with Computer programming and/or upper level
math course
Course Overview
– Ethics in the Information Age (refresher)
– The Metasploit Framework
– Python Scripting
– Exploit Development
– Web App Penetration Testing
– Formal Penetration Testing
– Reporting Your Results
– Project: Develop a Virtual “Hacker” Lab
– Final Project: Participate in a live or online Capture the Flag Tournament
UNCLASSIFIED
FileName.pptx
Grissom High Cyber Team
6b34fe24ac2ff8103f6fce1f0da2ef57
6b34fe24ac2ff8103f6fce1f0da2ef57
•
Grissom High Cyber Security Team
Grissom High Cyber Team will be an extracurricular actively whose goal is to
compete and win in cyber tournaments both online and on location. This team’s
purpose would be a safe place for students to collaborate and develop skills used
in the professional workplace.
A team environment allows students to specialize in specific areas of cyber
technologies such as crypto, forensics or programming.
8
UNCLASSIFIED
FileName.pptx
Huntsville City Cyber Curriculum
Questions
Or
Suggestions
9
UNCLASSIFIED
FileName.pptx