Preview

Cyber Security and Digital Forensics Boot Camp for Educators - Summer 2014

Good Essays
Open Document
Open Document
396 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Cyber Security and Digital Forensics Boot Camp for Educators - Summer 2014
PressReleasePing

Cyber Security and Digital Forensics Boot
Camp for Educators - Summer 2014
August 2014 Boot Camp Will Help Educators Provide Needed Training To Fill The Global
Cyber Security Skills Gap.
Seattle, WA, May 17, 2014 /PressReleasePing/ - CyberSecurity Academy announces open enrollment for a twelve day boot camp designed for educators that will be running August 18 through 29 2014. The twelve days of training will consist of the official Certified Ethical Hacker
(CEH) and Certified Hacking Forensic Investigator (CHFI) curriculum, as well as training in advanced data recovery. Participants will learn how to perform platter and head swaps in a cleanroom environment and will diagnose and image hard drives using a DeepSpar.
The boot camp will be held at Edmonds Community College in Lynnwood, Washington, and the package that educators will receive includes lodging on campus as well as most meals.
“There is a tremendous need for professionals with the ability to proactively safeguard computer systems against increasingly sophisticated attack and infiltration techniques,” said
Steve Hailey, President of CyberSecurity Academy. "Many high school and college faculty are working to provide their students the training necessary to meet the employment demand for the cybersecurity skills gap. CyberSecurity Academy instructors are college faculty as well we are ideally positioned to offer this training to our academic counterparts and help them develop the high-level curriculum necessary to expand their cybersecurity program offerings.“

Educators from the United States and abroad will be in attendance, with professors from academic institutions in Africa and the United Arab Emirates already enrolled.

“This boot camp was designed for specific competencies critical to meeting the demand for cybersecurity and digital forensics skills that educators should master,” said Mike Andrew,
President of Training and Analysis Services for CyberSecurity

You May Also Find These Documents Helpful

  • Satisfactory Essays

    2. Complete training is five groups of 7 individuals over a two month time frame starting on August 15, 2010 and ending October 15, 2010.…

    • 361 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    IS4799

    • 675 Words
    • 8 Pages

    IS4799 Information Systems and Cybersecurity Capstone Project Unit 2 RFP Bidder’s Conference © ITT Educational Services, Inc. All rights reserved. Learning Objective and Key Concepts…

    • 675 Words
    • 8 Pages
    Satisfactory Essays
  • Better Essays

    - During that weekend they get a “meal card” (free) lunch at the dining facility…

    • 2052 Words
    • 9 Pages
    Better Essays
  • Good Essays

    Csia 301 - Syllabus

    • 4678 Words
    • 19 Pages

    Welcome to Foundations of Cybersecurity CSIA 301, a hybrid course. My name is Professor Nancy M. Landreville and I have been teaching here at the University of Maryland, University College since February 2007. My phone number is (301) 401-0144. You may contact me by phone any evening during the week (Monday - Friday) from 7:00pm - 9:00pm. You may email me at any time at nancy.landreville@faculty.umuc.edu . I encourage you to use the private messaging area rather than the faculty email address. This will facilitate faster response to your course questions. I will respond to your email within 24 hours from receipt of your email. Please place the name of the course in the subject line so I know the email is from one of my students. I check email every day from my students. I encourage you to contact me with any questions about the course, require that you contact me for extenuating circumstances for late work, and meet with me online for any required conferences that are held during the course. We will meet in the online chat room at least once this semester to discuss the midterm and once this semester to discuss your final assignment. This is in addition to your required face-to-face attendance each week for eight weeks.…

    • 4678 Words
    • 19 Pages
    Good Essays
  • Satisfactory Essays

    The objective to this training session is to plan and facilitate an off-site two day training session for all trainers to help to train potential new employees for our company.…

    • 524 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    By obtaining a Master degree I wish to obtain a job in the field. I dream to be part of Intel, IBM, Hewlett Packard in which I can demonstrate my knowledge and skills in application of software and business system analysis. Speaking to Ms. Anna Carlin an alumni from Cal Poly Pomona who graduated in 1984 with a Bachelor of Science in Business Administration, Computer Information’s System and a Master’s of Science in Business Administration, Information Systems Audit in 1992. She currently is a professor at California State Polytechnic University, Pomona previously she was a Consultant at Vanguard Enterprise Security, Business Readiness Manager at Digital Graphics Advantage, Consultant at American Savings Bank (now Washington Mutual), Northern Regional Ad Support Manager at Los Angeles Times, and Western Regional IS Audit Manager at Times Mirror. Ms. Anna Carlin teaches CIS 100 Personal Cyber Wellness, CIS 310 Management Information Systems, CIS 433 Information Systems Auditing, CIS 471 Internet Security, CIS 481 Computer Forensics, GBA577 Advanced IS Audit, GBA578 Security and Privacy of Information Systems. Professor Carlin said she decided to take a career path that would lead her to cyber security and forensics. Professor Carlin has research Interests: IT Audit, Cyber Security, Information Assurance. I look up to Ms. Anna Carlin because she is a perfect role model of…

    • 738 Words
    • 3 Pages
    Good Essays
  • Better Essays

    Whitman, M. E., & Mattord, H. J. (2010). Management of information security (3rd ed.). Boston, MA: Course Technology.…

    • 1432 Words
    • 5 Pages
    Better Essays
  • Good Essays

    Milton Hershey

    • 370 Words
    • 2 Pages

    2. Meals, Clothing, Medical Care, Dental Care, and school supplies are provided free of charge to enrolled students.…

    • 370 Words
    • 2 Pages
    Good Essays
  • Better Essays

    Whitman, M. E., & Mattord, H. J. (2010). Management of information security (3rd ed.). Boston, MA: Course Technology/Cengage Learning.…

    • 1167 Words
    • 4 Pages
    Better Essays
  • Good Essays

    A computer security career is a highly diverse and important position, where you could work anywhere from a College Campus to a Hospital Administration building, all the way up to the Government Agencies all over the world. With so many new businesses’ opening daily, worldwide, the job market will be forever expanding. Whenever a business’s computer system acts up it’s the job of their computer security specialist to carefully take all the required steps to identify and resolve the specific issue, combining many people into one, saving the company lots of money. These specialists have and exceptional and advanced overall knowledge of all things computer.…

    • 525 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Kroll Ontrack, which specializes in data recovery, has retrieved evidence from hard drives damaged by floods, fires, and even a melted disk drive from the space shuttle Columbia, which was destroyed in 2003. Whether or not a hard drive can be salvaged depends on the extent of damage to what are called "platters," the small discs where the data is…

    • 596 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Dorm Life Arguments

    • 1140 Words
    • 5 Pages

    Dorm life. Most of us will go through college with the life changing experience of living in the dorms. Although it's mandatory for freshmen to live in the dorm, the social life of it is not too bad. The one major problem most face though is the meal plan. Meal plans are designed to allow students the freedom to eat anywhere on campus and not worry about having cash. There are many options to choose from on campus and the meal plan covers all of our restaurants. Meal plans are based on a weekly cycle and will reset each Sunday at midnight. "Meals" may be used at Couch Restaurants, which is an all-you-care-to-eat facility. When Couch Restaurants are closed you may use a meal for meal exchange at any of our other dining…

    • 1140 Words
    • 5 Pages
    Good Essays
  • Good Essays

    The academy is a 12-week long program which consist of intense classroom and physical training.…

    • 586 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Adult Educator Interview

    • 1090 Words
    • 5 Pages

    Next is the specialized training which is completed after orientation. A moderator will will attend a discussion group with the individual discussing topics on the online teaching environment and how to help learners within the class. This is made up to simulate what the students are currently doing on a daily basis. After successfully passing a criminal background check and completing the training a…

    • 1090 Words
    • 5 Pages
    Powerful Essays
  • Good Essays

    Eng 221 Rfp

    • 552 Words
    • 3 Pages

    The performance period for this project will be February 21 and finish March 4. The training classes will be split into eight groups, 10 employees each. The first four groups will each get trained on one program a day, and cycle through all program Monday through Thursday. The second set of groups will get the same treatment the second week. Friday will be a day for questions and clarification with, at minimum, 2-3 of your employees on site.…

    • 552 Words
    • 3 Pages
    Good Essays