Interested in attending? Have a suggestion about running this course near you?
Register your interest now
Want to run this event on-site? Enquire about running this event in-house
This three-day course provides an overview of cybersecurity principles and mechanisms and highlights the challenges of protecting computing systems from determined adversaries. The course provides an understanding of the foundational elements of information security. It also gives the student an awareness of the current threat environment and architectures, mechanisms and technologies used to contain constrain, and control adversarial actions.
Real world examples are provided to help understand the capabilities of cyber adversaries and the impact of their activities.
The course is valuable to scientists, engineers and operators who are entering the field or as a review for employees who want a comprehensive overview. A complete set of notes and references will be provided to all attendees.
What You Will Learn:
- Objectives and concepts of cybersecurity
- Techniques and tactics of cyber attackers
- Foundational elements needed to secure a system
- Tradeoffs between cryptographic techniques and applications
- Value and limitations of firewalls, intrusion detection and prevention systems
- Architectures to control and constrain adversary behavior
- Current capabilities for trustworthy computing and their applications
- Cloud and database security challenges
- Current standards and protocols for secure communication and authentication
- Current Threat Environment. Characteristics and motivation of cyber attackers. Recent cyber incidents discussed.
- Objectives and Concepts. Confidentiality, Integrity and Availability. Identity, Authentication, Authorization and Accountability. Identify, Protect, Detect, Respond, Recover. Design principles.
- Cryptographic Tools. Cryptographic algorithms and applications. Symmetric encryption, asymmetric encryption, and hash functions.
- Identification and Authentication. Validation of the identity of an entity. Multi-factor authentication. Biometric measures.
- Access Control. Control of access to computing resources and data. Access control models including DAC, MAC, RBAC, and ABAC.
- Malicious Behavior. Malious software behavior and characteristics. Injection attacks. Denial of service attacks. Phishing attacks. Attack stages and activities.
- Monitoring and Detection. Network and host activity monitoring. Anomaly and signature detection models. Integrity measurement. Sandboxing and execution monitoring. Auditing.
- Flow and Activity Control. Firewalls and intrusion prevention systems. Software execution control. Architectures to control and constrain.
- OS and Software Security. Software security design principles. Common software flaws. OS security challenges and capabilities.
- Trustworthy Computing. Motivation and security models for high assurance computing. Methodologies to assess level of assurance. Capabilities available in computing systems today.
- Cloud and Database Security. Cloud and database security challenges including access control, management, and data inference.
- Wireless Security. Capabilities of current standard, WPA2 and planned standard, WPA3. WiFi control and management vulnerabilities.
Julie Tarr has over 30 years of experience developing, analyzing, testing, and deploying cybersecurity solutions for government computing environments. Ms. Tarr’s experience includes cryptographic systems, cross domain solutions, intrusion detection, security protocols, cyber deception, and security architectures. Ms. Tarr is currently the Program Manager for Cyber Defensive Systems at the Johns Hopkins University Applied Physics Lab. Before joining JHU/APL, she was the head of the Network Security Section of the Center for High Assurance Computing Systems at the Naval Research Lab. Ms. Tarr teaches cybersecurity at the graduate level for the JHU Whiting School of Engineering.
REGISTRATION: There is no obligation or payment required to enter the Registration for an actively scheduled course. We understand that you may need approvals but please register as early as possible or contact us so we know of your interest in this course offering.
SCHEDULING: If this course is not on the current schedule of open enrollment courses and you are interested in attending this or another course as an open enrollment, please contact us at (410)956-8805 or firstname.lastname@example.org. Please indicate the course name, number of students who wish to participate. and a preferred time frame. ATI typically schedules open enrollment courses with a 3-5 month lead-time. To express your interest in an open enrollment course not on our current schedule, please email us at email@example.com.
|Deep Learning Architectures for Defense and Security||05 Oct|
|Examining Network Centric Warfare (NCW)||Register interest|
|Kalman, H-Infinity, and Nonlinear Estimation Approaches||Register interest|
|Radar 201||Register interest|