Loading…

Sign up or log in to bookmark your favorites and sync them to your phone or calendar.

Hands-on cybersecurity activities [clear filter]
Wednesday, August 14
 

9:00am EDT

Tux required. Teaching Linux in the Virginia Cyber Range
Learning Linux shouldn't have to include many hours of learning how to troubleshoot virtualization technologies.  At Virginia Western Community College, we lean on the Virginia Cyber Range to provide day one access to a functional Linux environment.  The time we used to spend troubleshooting and supporting every student's independent installation environment is now spent broadening the subject matter we cover in class, including additional security related assignments.   This session will discuss the material covered, lessons learned about teaching Linux in the Range, and solicit ideas for what else we should be thinking about and covering in future classes.

Speakers
avatar for B Bagby

B Bagby

Asst. Professor of Information Technology, Virginia Western Community College
B Bagby is a recovering IT manager.  After nearly fifteen years of supporting faculty, B moved to Assistant Professor of Information Technology at Virginia Western Community College, where he focuses primarily on programming and security.  B has a BS in Business Administration... Read More →


Wednesday August 14, 2019 9:00am - 9:50am EDT
Room C

10:15am EDT

Gamification and Andragogy - A Match Made for Cyber Education
In this talk I discuss the series of trials and tribulations faced when developing a programming competition aimed at energizing a large (approximately 700 individuals) existing employee population within our organization and trying to stoke their excitement about learning how to script and program.

To fully realize this potential within our organization, we used a combination of gamification techniques while remaining cognizant of andragogy or the adult learning model and a unique scoring architecture to engage a broad range of skillsets. In recognizing that a majority of our members are adult learners, we can focus our efforts on engaging adult learners who may exhibit several different combinations of the eight characteristics of adult learners.

Finally, our architecture brings something new to the programming competition arena: we essentially conduct remote code execution with the user submitted code. To do this, we use a combination of front end and back end systems that make use of Dockers to isolate the code. This architecture allows us to develop practical programming problems focused on cyber defense. For instance, we can give the competitor a list of indicators and have them write a script to check the machine for compromise. In addition to this we also provide a wide range of problems aimed at teaching a reinforcing basic scripting/programming concepts to ensure a broad range of appeal across our organization.

Speakers
avatar for Joshua Rykowski

Joshua Rykowski

Cyberspace Operations Officer, United States Army Cyber Protection Brigade
osh Rykowski currently serves as a Cyberspace operations officer for the US Army where he has lead a Cyber Protection Team and worked to develop specialized training for those same teams. On his convoluted path to cybersecurity he obtained a Bachelors of Science in Electrical Engineering... Read More →


Wednesday August 14, 2019 10:15am - 11:05am EDT
Room C

11:15am EDT

How to Start a Security Club and Win NCCDC in 3 months - UVA's Story
Winning the National Collegiate Cyber Defense Competition is not an easy task; it requires a strong and dedicated team. What does this mean and how can a group of students get there? How do you keep students engaged and motivated to continue learning?

We will walk through some of the things that worked and did not work for the Computer and Network Security club at UVA, discuss how strong teamwork, active industry connections, hands-on practices, and student-driven initiatives helped to shape a strong cybersecurity team that was ready for such challenge, and end with some practical ideas that other student groups can implement back home.

Speakers
avatar for Roman Bohuk

Roman Bohuk

Co-founder/Student, MetaCTF
Roman Bohuk has just finished his second year as a CS student and a Rodman Scholar at the University of Virginia. He is a co-founder of MetaCTF, a cybersecurity education and training company that has been running competitions for universities, companies, and security conferences... Read More →


Wednesday August 14, 2019 11:15am - 12:05pm EDT
Room C

1:00pm EDT

Designing CTF Using the Cyberrange to Provide Contestants Individual Environments
This presentation will provide attendees, who have access to the cyberrange, with the tools and knowledge to develop hands on token style, capture the flag (CTF) activities.  Specifically, utilizing the cyberrange registration link as part of the CTF (either directly, or requiring a challenge to uncover), contestants can have access to environments customized for the competition.  This presentation will go over setting up the CTF infrastructure (possibly requiring external hosting - the demo will use managed ctfD setup), configuring the cyberrange environments, and deploying/monitoring as part of the competition.

Speakers
avatar for chris kreider

chris kreider

Instructor, Christopher Newport University
I am full time faculty at Christopher Newport University in the PCSE department. I primarily teach class in information systems, and information security. My research areas primarily include social engineering and password security.


Wednesday August 14, 2019 1:00pm - 1:50pm EDT
Room C