1 / 38

Education, Training & Awareness Products & Resources

Education, Training & Awareness Products & Resources. George Bieber Defense-wide IA Program (DIAP) (703) 602-9980 george.bieber@osd.mil. Audiences. One size DOES NOT fit all Diverse functions, experience and backgrounds Tailor message to audience for effectiveness

enya
Download Presentation

Education, Training & Awareness Products & Resources

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Education, Training & AwarenessProducts & Resources George Bieber Defense-wide IA Program (DIAP) (703) 602-9980 george.bieber@osd.mil

  2. Audiences • One size DOES NOT fit all • Diverse functions, experience and backgrounds • Tailor message to audience for effectiveness • Executives/Senior managers • IT/IA workforce • Traditional security personnel • General workforce • Admin staff • Mission staff • Other • Scientists & technicians • Other specialty • International • Multi-lingual Diverse Experience • Advanced • Intermediate • Entry Diverse Backgrounds • Managers to clerks • Scientists to truck drivers • Specialists to generalists • Technicians to humanists

  3. Evaluation • Identify what you want to know • Are training & awareness products being used; and by whom • Is the focus of products correct • What additional topics need to be addressed • Is on the job behavior being changed as intended • Is content of training relevant to the job (level 1 evaluation) • Is content of training being learned (level 2 evaluation) • Is content of training being used on the job (level 3 evaluation) • Is delivery media appropriate • Identify measures & metrics to answer the questions • Evaluation forms (for level 1 evaluation) • Tests (for level 2 evaluation) • Data collection surveys(for level 3 evaluation) • Develop appropriate instruments to collect measurement data • Test them to ensure they perform as intended • Collect, organize and analyze data • Generate findings • Act on findings

  4. Training & Awareness Products • Education Opportunities • Other Resources

  5. Army Reserve Readiness Training Center (ARRTC) - 1 Ft McCoy, Wisconsin: http://arrtc.mccoy.army.mil Open to federal employees, contact RIM@arrtc-exch.mccoy.army.mil or call 608-388-7307 or 1-800-982-3585, x 7307 • Security Manager Course • DITSCAP (DOD Information Technology Security Certification and Accreditation Process) • Systems Administrator/Network Manager Security Course (2 weeks) • Computer Network Defense Course (2 weeks)

  6. Army Reserve Readiness Training Center (ARRTC) - 2 • Systems Administrator/Network Manager Security Course (2 weeks) • Policies, Laws and Ethics • JAG/MI Briefing (Current Threats) • Windows NT 4.0/2000 Security • Solaris, Unix Security • Computer Network Defense Course (2 weeks) • Understanding C2 Attack Technologies • Web Security & Encryption • Communications Security • Cisco Router Security • Intrusion Detection Systems • Deploying Firewalls • C2 Attack Technologies • Intranet / Extranet / Web • Footprinting & Enumeration • Forensic Examination & Preserving Evidence • Countermeasures • Advanced Communication Security • Advanced Cisco Router Security • Intrusion Detection Systems • Sidewinder Firewalls • “Latest & Greatest”

  7. Instructor-Led Training Mobil Training Teams Computer- Based Training INFOSEC CD Library Blended Delivery Solution Web-Based Training Awareness Webinar & Assessment Navy SPAWAR: InTec Training www.intecph.navy.mil • Microsoft Certified Technical Education Center • Training to obtain leading IT Industry Certifications Kevin Williams Commercial (808) 474-0712 DSN (315) 474-4479 kwilliams@intecph.navy.mil

  8. IATAC Courses -1 • Introduction to Information Assurance (IA) (0.5 day) • IA terminology, concepts, and technologies • Introduction to Risk Management (0.5 day) • Role of risk assessment in the risk management process • Introduction to Computer Forensics (1 day) • Defines forensic sciences and computer forensics • Reviews state of computer forensic science w/in law enforcement • Addresses international implications • Offers techniques for performing forensic examination of computer media • Introduction to Penetration Testing (1.5 days) • Role penetration testing in analyzing overall security posture. • Addresses what penetration testing is and is not, • Identifies its benefits and limitations

  9. IATAC Courses - 2 • Introduction to the Law of Cyberspace (1 day) • Substantive law (what is prohibited) • Procedural law (what legal processes must be complied with in investigating and prosecuting cybercrime, cyber espionage, or information war) • International and domestic law (legal complexities involved in trans-border investigations) • Intro to Public Key Infrastructure (0.5 day) • Cryptography & security • Policy • Applications • Trends • IATAC brings the course w/ SME instructor to your location. • Conducts training for groups rather than for individuals. • Contact information: • email at iatac@dtic.mil. • 703/289-5454/5467

  10. Biometrics Short Course Taught by West Virginia University faculty • Audience: OSD, Service personnel, contractors implementing DoD biometrics • POC: Cinnamon El-Mulla (703) 418-6360 • Registration: Go to www.Icsee.cemr.wvu.edu/biometrics for instructions • Provides basic understanding that supports technical decision-making • Operation and system-level design of biometric systems • Test results and protocols • Standards • Interoperability • Related socio-legal issues • Three (3) WVU credits for successful completion (passing grade on 3 exams) ($109 fee) • Equivalent to one of the required courses for WVU’s IA/Biometrics Graduate Certificate program. The Certificate program is the core of a Masters program

  11. Biometrics Overview Course Biometrics Overview for Mission-oriented Decision Makers • 1 day symposium, $15 • 18 March 2004 • National Defense University, Marshall Hall, Washington, DC • www.biometrics.dod.mil/Education • Audience: • Senior military and civilian personnel involved in biometrics and Information Assurance activities. • Contractors, academics, and students are welcome. • Presentations by the • Department of the Navy, Chief Information Officer; • the Director, Defense Manpower Data Center; • West Virginia University Biometric Knowledge Center; and the • Federal Bureau of Investigation. • Exhibits will include biometrics technologies and initiatives currently in use within the Department of Defense. • Points of contact: • Ms. Sara Sussan, 703.418.6346, E-mail: ssussan@iss-md.com; • Ms. Cinnamon El-Mulla, 703.418.6360, E-mail: celmulla@iss-md.com

  12. Training & Awareness Products • Education Opportunities • Other Resources

  13. DoD IA Scholarship Program (IASP): Overview http://www.defenselink.mil/nii/iasp • Award scholarships to individuals (through institutions) • Recruitment: Targets students who currently are not DoD or government employees and who are enrolled in/applying to NSA designated IA Centers of Academic Excellence (CAEs) • Scholarships are for Bachelor (Jr., Sr. years), Masters, Ph.D. degrees • Retention: Targets DoD personnel • Scholarships for MS and Ph.D programs • NDU/IRMC and a designated IA CAE for a graduate degree (GS-13 and above, military 0-5 and above) • NPS for MS/Ph.D. (civilian GS 9 to 13 or higher; Mil 01-06, usually 03) • AFIT for MS (civilian and military applicants, any grade) • Award grants to institutions Program Manager: Christine Nickell: 410-854-6206; c.nicke2@radium.ncsc.mil

  14. Computer Systems Analysis Information Security Electrical Engineering Electronic Engineering Mathematics Biometrics And more… Computer Science Computer Engineering Software Engineering Computer Programming Computer Support Data Base Administration Disciplines & Benefits Retention Scholarships • Full Tuition and fees • Required Books Components responsible for TDY/PCS cost, salary & backfills Recruitment Scholarships • Full Tuition and fees • Books • Stipends: • Undergraduates ($10K) • Graduates ($15K) • Internships (during breaks)

  15. Auburn U Carnegie Mellon Capital College East Stroudsburg U Florida State George Mason U Idaho State Iowa State James Madison U Drexel University University of Maryland (Baltimore County) University of NorthCarolina, Charlotte U of Mass at Amherst U of Virginia IA Centers of Academic Excellence 46 Public / Private Non-DoD Institutions • George Washington U (DC) • Walsh College • Indiana University of Pennsylvania • New Mexico Tech (NM) • New Jersey Institute of Tech • North Carolina State U (NC) • Northeastern University (MA) • Polytechnic University (NY) • Pennsylvania State U • U of Pennsylvania • State University of New York at Buffalo (NY) • State University of New York at Stoneybrook (NY) • Stevens Institute of Tech • Towson University (MD) • University of Maryland, University College (MD) • University of Nebraska at Omaha (NE) • University of Texas at San Antonio (TX) • West Virginia U • Georgia Tech • Syracuse U • Purdue U • Portland State • Stanford • UC Davis • University of Illinois • University of Idaho • University of Tulsa • Mississippi State U • Norwich U • Texas A&M • Johns Hopkins • U of Dallas 4 DoD Institutions • Naval Postgraduate School • United States Military Academy, West Point • Information Resources Management College (IRMC)/National Defense University (NDU) • Air Force Institute of Technology

  16. NDU/IRMC: Certificate Courses for Information System Security Professionals http://www.ndu.edu/irmc 202-685-6300 DSN 325 • Four courses • Assuring the Information Infrastructure • Managing Information Security in a Networked Environment • Global Enterprise Networking and Telecommunications • Developing Enterprise Security Strategies, Guidelines & Policies • GS/GM 13-15/Military 05-06 (may waiver one grade) • Allows for 9 hours (up to 15 w/CIO certificate) for cooperative master’s and doctorates • Multiple formats, each course: • 1 week resident • 12 week web-based distributed learning • No cost to DOD employees; Federal civilian/industry: $950/class; • Based on NSTISSI (now CNSS) 4011 standard for information system security professionals Information Resources Management College

  17. NDU/IRMC: Certification Courses for Information System Security Professionals http://www.ndu.edu/irmc 202-685-6300 DSN 325 • Four courses • Assuring the Information Infrastructure • Managing Information Security in a Networked Environment • Global Enterprise Networking and Telecommunications • Developing Enterprise Security Strategies, Guidelines & Policies • GS/GM 13-15/Military 05-06 (may waiver one grade) • Allows for 9 hours (up to 15 w/CIO certificate) for cooperative master’s and doctorates • Multiple formats, each course: • 1 week resident • 12 week web-based distributed learning • No cost to DOD employees; Federal civilian/industry: $950/class; • Based on NSTISSI (now CNSS) 4011 standard for information system security professionals

  18. NDU/IRMC: CIO Certificate Program http://www.ndu.edu/irmc 202-685-6300 DSN 325 • Addresses Federal CIO competencies • Acquisition • Policy • Information Management Strategic Planning • Performance & Results Based Mgmt • Process Improvement • Capital Planning & Investment • Leadership • Technology Assessment • E-Government and E-Business • Security & Assurance • Architectures & Infrastructures • GS/GM 13-15/Military 05-06 (may waiver one grade) • Alternatives: • Eight one week resident courses or • Eight 12-week web-based distributed learning courses, or combination OR • Fourteen week Advanced Management Program (offered 2x/year) Open to DOD military & civilians Federal civilians and industry

  19. Norwich University On Line Graduate Education NSA designated Center of Academic Excellence in IA Education http://www3.norwich.edu/msia • Masters of Science in Information Assurance (MSIA) • $624/credit hour; $25,000 for 36 hour MSIA • <2 years • Focus on policies, procedures, and structure of an enterprise-wide information assurance program • Case studies approach http://www.infosec.jmu.edu James Madison University (JMU) • Masters of Science in INFOSEC Computer Science • $612/credit hour • Asynchronous: anytime, any location

  20. Training & Awareness Products • Education Opportunities • Other Resources

  21. Products Under Development/Planned • IA for Program Managers (DAU) • SCADA Security • IA for IGs

  22. OASD CIP and DISA Available at http://iase.disa.mil Provides basic awareness level information - CIP 101 Contents CIP Overview What is CIP Why is it important Critical infrastructures CIP Organization National DOD Relationships DOD responsibility for CIP DOD Infrastructure Sectors DOD CIP Life-Cycle Critical Infrastructure Protection (CIP-101) WBT

  23. Privacy Protection in the Information Age http://www.don.cio.navy.mil • Department of the Navy CIO CD-ROM • Federal Reserve Bank video: Its Your Identity: Protect It • Resources • Public Privacy Laws and Legal Guidance • Public Laws • Executive Guidance • Federal Reports • Reading List • Web-sites • Brochures • Templates

  24. Resource to help inform the DoD and other members of the Government about Critical Infrastructure Protection, CIP-related documents, and educational programs Topics OSD CIP (Mission, Contacts, Strategy, Terrorism Timeline 88-01) Training CIP Team Studies (Federal, Training Gap Analysis, Other) Practices References (Executive Orders/Directives, Federal Regulations, Publications, Slide Shows, Glossary) Critical Infrastructure Protection Training Resources

  25. Hackers - PBS http://www.pbs.org • Public Broadcasting Service (PBS); FRONTLINE series $20.00 (60 min) • http://www.pbs.org • Search on “Science and Technology” • Who are hackers • Risks of the Internet’s vulnerabilities • Who’s responsible for security • How to be vigilant • Interviews with hackers and security experts • Also at the site: • Video transcript • Transcript of live chat that followed original broadcast • Clips from the video

  26. Cyber War! - PBS http://www.pbs.org • Public Broadcasting Service (PBS); FRONTLINE series $30.00 (60 min) • Search on “cyber war!” • Also at the site: • Interviews • Frequently asked questions • Vulnerabilities • power grid • SCADA systems • software • Video transcript • Video clips

  27. Bad Characters - NRO Will be disseminated in DoD by DISA • Internet works both ways; illustrated by 3 vignettes • Web sites can be set up to: • Collect information • Track activities • Take over your computer • Web sites can be customized, altered/mirrored to: • Send/release malicious code • Messages to misinform/deceive • Types of information that can be collected • Cache • Names, addresses, phone numbers • Credit card numbers • Bank account numbers • Steps you can take to increase your security

  28. Awareness 2001 - IOSS Interagency OPSEC Support Staff (IOSS) • http://www.ioss.gov • Awareness 2001: A Security, Counterintelligence and OPSEC Update • Burning Issues(USGov)(14 min) • Intersection of classified and unclassified environments • Web Content Vulnerabilities (25 min) • Briefing by Joint Web Risk Assessment Cell (JWRAC) • Advice on how to protect information posted to the internet • Applicable to all organizations • D*I*C*E 2001 (38 min) • In the Public Domain (10 min)

  29. Betrayal - NCIX The National Counterintelligence Executive (NCIX) • http://www.ncix.gov • Betrayal: Protecting Industry Trade Secrets(17 min) • Insider threat • Highlights the Avery Dennison/Four Pillars case, a joint effort by US Industry and the US Government to successfully combat economic espionage. • Distributed by Filmcomm Inc., 641 North Avenue, Glendale Heights, IL 60139, phone 800-944-9134. • $13.85 per copy, (includes shipping and handling)

  30. Resources: IA Publications http://iac.dtic.mil/iatac • Information Assurance Technology Center (IATAC) • IA tools reports • Critical reviews and technology assessment reports • State-of-the-art reports • IA Newsletter • Published by DTIC/IA Technical Analysis Center (IATAC) • 703-289-5454 or iatac@dtic.mil or http://iac.dtic.mil/iatac • Information Assurance Digest (distribution limited to DoD) • Published by DTIC/IATAC for the Joint Staff • Request • Fax to Joint Staff (J6) @ 703-614-7814 • E-mail to iatac@dtic.mil • Articles extracted from magazines & newsletters (IA “early bird”) • Integrated Conference/Meeting Event Calendar • To add event E-mail iatac@dtic.mil

  31. Resources: IA Publications • Tech Trend Notes (Preview of Tomorrow’s InformationTechnologies) • Published by NSA: 301-688-0842, or ttnotes@tycho.ncsc.mil • Computer Forensics Communication • Published quarterly by Defense Computer Forensics Lab • http://www.dcfl.gov (look under “quarterly bulletins) • The Internet as an Investigative Tool • National White Collar Crime Center (NW3C) www.nw3c.org • Basic Internet Tools • News and Views • Published by Federal Information System Security Educators’ Association (FISSEA) • E-mail fisseamembership@nist.gov for membership and newsletter • IA awareness, training and education • Upcoming conferences, seminars

  32. Commercial CBTs • SkillSoft (formerly SmartForce):http://www.skillsoft.com • NETg: http://www.netg.com • Netg is partner of new government golearn.gov training site

  33. Government Online Learning Center http://www.golearn.gov

  34. Resources: Information Assurance Support Environment (IASE) http://iase.disa.mil • Information Desk: Operational 7:30 a.m. - 4:30 p.m. M-F, EST • E-mail: iase@ncr.disa.mil • Phone: (703) 681-IASE DSN 761 • Notices on What’s New Area • IA Daily News • Question of the Week • Chat Room • Bulletin Board System • Mail List Subscriptions

  35. Resources: Security Guides - DISA • DISA: Security Technical Implementation Guides (STIGS) (http://iase.disa.mil/techguid/stigs.html) • Database STIG • Logical Partition STIG • MVS STIG • Network Infrastructure STIG • Novell Netware STIG • Windows 2000 • NSA: Guidelines (http://www.nsa.gov) • Guide to Securing Microsoft Windows NT Networks & Application • Windows 2000 Security Recommendation Guides (SRG • Cisco Router Guides • E-mail and Executable Content Guides • CIS -- Center for Internet Security (http://www.cisecurity.org) • Security Benchmarks; Best Global Practices • Windows NT STIG • Tandem STIG • Unisys STIG • UNIX STIG • Web Application STIG Best Practices

  36. Resources • National Cyber Security Alliance: Stay Safe Online • http://www.staysafeonline.info/ • Corporate and government members, sponsors • Educate home/small business computer users in basic computer security practices, • Personal computer security self-test • Beginner's guides on various security topics • One-hour online course on security fundamentals • CyberCrime • http://www.cybercrime.gov • Maintained by DOJ, Computer Crime and Intellectual Property Section (CCIPS), Criminal Division • Ways computers can be used to commit crimes • How and to whom to report computer crimes • What to do if you are the victim of computer crime. • Links to cases, laws, legal issues, and policy issues surrounding hacking, intellectual property infringements, and other online offenses

  37. Resources • Hoax Busters • http://hoaxbusters.ciac.org • DOE Computer Incident Advisory Capability (CIAC) • Clearinghouse of information about various types of Internet hoaxes • Fake viruses and other malicious code • Chain letters • Urban myths • Sympathy letters and other cons • How to recognize hoaxes and what to do about them. • Center for Education and Research in Information Assurance and Security (CERIAS) • http://www.cerias.purdue.edu/ • Free security seminar on diverse security topics (Weds afternoons) • Access via live internet stream. • Computer security resources for K-12 teachers • background information • lesson plans • links to other web resources

  38. Resources • Computer and Information Ethics on WWW • http://www.ethics.ubc.ca/resources/computer/ • University of British Columbia's Centre for Applied Ethics • Lists web sites, electronic & print publications on ethical issues in computing. • Courses in computer ethics • Provides links to online syllabi to classes • Links to relevant organizations. • Security Statistics • http://www.securitystats.com/ • Statistics on computer security incidents • Information on • Security spending, • Known vulnerabilities, • Numbers of reported security breaches • Economic impact of incidents • Arrests and convictions, • Accuracy of reported statistics not guaranteed; but sources are provided

More Related