Presented to Huntsville City School Board Huntsville City
Presented to: Huntsville City School Board Huntsville City Cyber Curriculum "Approved for public release; distribution unlimited. Reference herein to any specific commercial, private or public products, process, or service by trade name, trademark, manufacturer, or otherwise, does not constitute or imply its endorsement, recommendation, or favoring by the United States Government. The views and opinions expressed herein are strictly those of the authors and do not represent or reflect those of the United States Government. The viewing of the presentation by the Government shall not be used as a basis of advertising. " Presented by: Rob Goldsmith Date 2/6/2014 AMRDEC Cyber Lead U. S. Army Aviation and Missile Research, Development, and Engineering Center
Huntsville City Cyber Curriculum Objective: Give industry insight into developing classes that will give students the skills required for a successful INFOSEC career. 2 Current Actives: Planned Actives: AMREC/SED personnel have been meeting with Huntsville City School personnel to develop a groundwork for an Information Security curriculum. Have current Grissom High cyber team build out final project planned for next years freshmen class Prepare curriculum for 1 st Information Security class that would be offered to Freshmen in School year 2014/15 UNCLASSIFIED File. Name. pptx
Cyber Curriculum Rollout 2014 2015 Objectives 2016 2017 Activities Intro To Information security (infosec) Infosec III Infosec IV Extracurricular Enhanced Extracurricular 3 • Initial Meeting with Huntsville City Schools Dec 17 th • Developed skeleton plan for curriculum Jan 2 – 20 th • Received feedback from facility and staff Jan 28 th • Submit Course descriptions for course catalog Feb 5 th UNCLASSIFIED 2018 Professional Certification Issues Overlap or duplication of effort from other IT classes File. Name. pptx
INFOSEC I • • 4 Will be taken as part of Freshmen Career Development 6 b 34 fe 24 ac 2 ff 8103 f 6 fce 1 f 0 da 2 ef 57 Course Overview – Introduction to Ethics in the Information Age – Operating Systems • Windows OS • Intro to the Linux OS – Virtualization – Secure configurations at the desktop level – Number systems (e. g. base 10, base 2, base 16) – IP addressing – Identifying network hosts and services on a network – Network Applications using video game client/server setup as an example – WIFI security – Project: Develop a written security plan for a typical home network – Final Project • Build and configure network that is capable of hosting a multi player video game where each student’s machine capable of being a server or a client • Provide a scan that identifies all hosts and listening services. UNCLASSIFIED File. Name. pptx
INFOSEC II 6 b 34 fe 24 ac 2 ff 8103 f 6 fce 1 f 0 da 2 ef 57 • • 5 Should be taken in conjunction with a Computer Networking elective or technical writing Course Overview – Ethics in the Information Age (refresher) – Binary number system – Basic risk analysis – The Linux Command Line – OSI Model layers 1, 2, 3 and 7 – Network Devices (NICs, Switches and Routers) – Introduction to Microsoft Server OS and Linux Server OS – Introduction to Databases – Introduction to Web servers – Basic programming techniques – Basic Structured Query Language (SQL) – Host Based Firewalls (Windows Firewall and Linux IPtables) – Project: Do a written risk analysis on a Linux Lamp Server – Final Project: Build and configure a Linux LAMP server and host a dynamic web site with a database backend. UNCLASSIFIED File. Name. pptx
INFOSEC III 6 b 34 fe 24 ac 2 ff 8103 f 6 fce 1 f 0 da 2 ef 57 • • • 6 Prerequisites: INFOSEC II Should be taken in conjunction with Computer programming and/or upper level math course Course Overview – Ethics in the Information Age (refresher) – Law as it’s applied to cyber – Intro to Cryptography – Intro to Forensics – Tools: Network scanners, password crackers, fuzzers – Intrusion Detection/Prevention IDS – “Offensive” networking: port redirection, alternate uses of secure shell, VPNs, backdoors, honeypots – Social Engineering / Phishing / Browser Based Exploits / File Format Vulnerabilities – Project: Develop a white paper – Alt Project: Develop a forensic and/or crypto tool – Final Project: Analyze an existing exploit, demonstrate its use. Offer a possible mitigation. UNCLASSIFIED File. Name. pptx
INFOSEC IV 6 b 34 fe 24 ac 2 ff 8103 f 6 fce 1 f 0 da 2 ef 57 • • • 7 Prerequisites: INFOSEC III Should be taken in conjunction with Computer programming and/or upper level math course Course Overview – Ethics in the Information Age (refresher) – The Metasploit Framework – Python Scripting – Exploit Development – Web App Penetration Testing – Formal Penetration Testing – Reporting Your Results – Project: Develop a Virtual “Hacker” Lab – Final Project: Participate in a live or online Capture the Flag Tournament UNCLASSIFIED File. Name. pptx
Grissom High Cyber Team 6 b 34 fe 24 ac 2 ff 8103 f 6 fce 1 f 0 da 2 ef 57 • Grissom High Cyber Security Team Grissom High Cyber Team will be an extracurricular actively whose goal is to compete and win in cyber tournaments both online and on location. This team’s purpose would be a safe place for students to collaborate and develop skills used in the professional workplace. A team environment allows students to specialize in specific areas of cyber technologies such as crypto, forensics or programming. 8 UNCLASSIFIED File. Name. pptx
Huntsville City Cyber Curriculum Questions Or Suggestions 9 UNCLASSIFIED File. Name. pptx
- Slides: 9