- Increase interest in cybersecurity careers and diversity in the cybersecurity workforce of the nation.
- Help all students understand correct and safe on-line behavior.
- Improve teaching methods for delivering cybersecurity content for K-12 curricula.
First Principles of Cybersecurity
The first principles of security are the foundation upon which security mechanisms are reliably built; and security policies can be reliably implemented. A solid understanding of the first principles of security is critical in cyber-security. We have developed a 5-day curriculum that covers the fundamental concepts and key aspects of cybersecurity, with a special emphasis on first principles of security. Education and practicum activities are organized into 9 lectures, 10 labs, and 2 discussion sessions. We will alternate between lecture and lab sessions through the day so that participants will get hands-on experiences right after obtaining theoretical knowledge.
Cyber Defense Competition
We have observed rapid growth of the Cyber Patriot National Youth Cyber Security Competition in the region. We will include cyber defense training, which is intended to give the attendees information that can be taken back to their respective schools to implement a cyber security organization, and help train students how to compete in Cyber Patriot Competitions.
Eligibility and Logistics
All program participants must reside in the United States and be a K-12 teacher at a school in the United States. Registrations are first come first serve and registration will be closed once camp meets capacity.
With a grant from the National Science Foundation, participants' travel expenses, including transportation, lodging, meals, etc will be covered, plus each participate will receive a $500 stipend. Details of logistics and reimbursement procedure will be sent to registered participants.
Day 1: Introduction to information security and cryptography
Day 2: Data security and privacy, Software and OS security
Day 3: Network security
Day 4: OS and network hardening
Day 5: Cyber Defense
Cyber Defense Competition
Teams will be divided into equal number groups. One student assistant will be provided to each group. The teams will be given time to secure their machines and networks. A red team will then be allowed to access the network and perform a small scale penetration test on each of the networks. During the penetration test, attendees will work alongside their student instructors to work on actively defending their network. All red team members will be required to document what they do and a very short summary of how they did it.