BEGIN:VCALENDAR
VERSION:2.0
PRODID:NCyTE Center Calendar Creator
METHOD:PUBLISH
BEGIN:VEVENT
DTSTAMP:20230123T163933
DTSTART:20230221T150000
DTEND:20230221T160000
SUMMARY:Cyber Career Challenge Student Information Session
DESCRIPTION:<p style="text-align: center;"></p><p style="text-align: center;">February 21, 2023</p><p style="text-align: center;">3:00 - 4:00 PM PST</p><p data-wacontent="31" data-wacontenttag="P">NCyTE's virtual Cyber Career Challenge provides students with the opportunity to gain real world cybersecurity workforce experience. Students will work virtually in teams to configure, operate, protect, and defend a small network of machines.&nbsp;<br data-wacontent="32" data-wacontenttag="BR"></p><p data-wacontent="33" data-wacontenttag="P">The information session covers the workshop expectations, assignments, schedule, and details on the virtual environment students will be working in.&nbsp;</p><p data-wacontent="33" data-wacontenttag="P"><hr></p><p data-wacontent="34" data-wacontenttag="P"><strong data-wacontent="35" data-wacontenttag="STRONG">Student eligibility:</strong></p><ul data-wacontent="36" data-wacontenttag="UL">    <li data-wacontent="37" data-wacontenttag="LI">Completed an introduction to networking course and an introduction to cybersecurity course</li>    <li data-wacontent="38" data-wacontenttag="LI">Attended&nbsp;one&nbsp;of the three information sessions being offered on February 21, 22, and 23, 3)</li>    <li data-wacontent="39" data-wacontenttag="LI">Complete a CCC commitment agreement.</li></ul><p data-wacontent="40" data-wacontenttag="P">Students from community colleges, technical colleges, and universities are encouraged to apply. Since the CCC provides a real-world cybersecurity workforce experience, it could meet the requirements for an internship or co-operative education experience. Students will need to inquire at their institution to find out.</p><p style="text-align: left;"><hr></p><p data-wacontent="41" data-wacontenttag="P"><strong data-wacontent="42" data-wacontenttag="STRONG">Schedule:</strong></p><ul data-wacontent="43" data-wacontenttag="UL">    <li data-wacontent="44" data-wacontenttag="LI">March 2 - Commitment Agreement due</li>    <li data-wacontent="45" data-wacontenttag="LI">April 10 - Workshop begins: Introduction to program work roles</li>    <li data-wacontent="46" data-wacontenttag="LI">April 17 - Introduction to the network requirements and team selection</li>    <li data-wacontent="47" data-wacontenttag="LI">April 24 - Network admin basics, Kanban, Gantt charts, Visio diagrams</li>    <li data-wacontent="48" data-wacontenttag="LI">May 1 to June 5 - Teams work independently and receive guidance on network management and pentest prep</li>    <li data-wacontent="49" data-wacontenttag="LI">June 12 - Pentest</li>    <li data-wacontent="50" data-wacontenttag="LI">June 15 - Team presentations</li>    <li data-wacontent="51" data-wacontenttag="LI">September 15 (Optional) Virtual Career Fair</li></ul><p data-wacontent="51" data-wacontenttag="LI"><hr></p><p data-wacontent="52" data-wacontenttag="P"><strong data-wacontent="54" data-wacontenttag="STRONG">Learning objectives:</strong></p><p data-wacontent="55" data-wacontenttag="P">Students will work in teams of three to successfully complete the following:</p><ul data-wacontent="57" data-wacontenttag="UL">    <li data-wacontent="58" data-wacontenttag="LI">Develop a project plan for an Information System that supports a fictitious business.</li>    <li data-wacontent="60" data-wacontenttag="LI">Utilize project management tools for communication and project implementation.</li>    <li data-wacontent="62" data-wacontenttag="LI">Operate a network of nine devices within the technical requirements specified.</li>    <li data-wacontent="64" data-wacontenttag="LI">&nbsp;Defend their network against a penetration test.</li>    <li data-wacontent="66" data-wacontenttag="LI">Analyze the network for any evidence of attacks or compromise resulting from penetration testing.</li>    <li data-wacontent="68" data-wacontenttag="LI">Present their approach to operating the network and findings from the penetration test.</li></ul><p data-wacontent="68" data-wacontenttag="LI"><hr></p><p data-wacontent="68" data-wacontenttag="LI">Facilitator:</p><p data-wacontent="68" data-wacontenttag="LI">Vincent Nestler </p><p data-wacontent="68" data-wacontenttag="LI">Senior Personnel, NCyTE Center</p><p data-wacontent="68" data-wacontenttag="LI">Associate Professor, California State University- San Bernardino</p><p data-wacontent="68" data-wacontenttag="LI" style="text-align: center;"><a href="	https://ncytecenter.wildapricot.org/event-5062956 " target="_blank">&nbsp;REGISTER TO ATTEND</a></p><p data-wacontent="68" data-wacontenttag="LI" style="text-align: left;">&nbsp;</p><p data-wacontent="68" data-wacontenttag="LI" style="text-align: left;">&nbsp;NCyTE is funded by the National Science Foundation Grant #2054724</p><p data-wacontent="68" data-wacontenttag="LI" style="text-align: right;">&nbsp;</p>
X-ALT-DESC;FMTTYPE=text/html:<p style="text-align: center;"></p><p style="text-align: center;">February 21, 2023</p><p style="text-align: center;">3:00 - 4:00 PM PST</p><p data-wacontent="31" data-wacontenttag="P">NCyTE's virtual Cyber Career Challenge provides students with the opportunity to gain real world cybersecurity workforce experience. Students will work virtually in teams to configure, operate, protect, and defend a small network of machines.&nbsp;<br data-wacontent="32" data-wacontenttag="BR"></p><p data-wacontent="33" data-wacontenttag="P">The information session covers the workshop expectations, assignments, schedule, and details on the virtual environment students will be working in.&nbsp;</p><p data-wacontent="33" data-wacontenttag="P"><hr></p><p data-wacontent="34" data-wacontenttag="P"><strong data-wacontent="35" data-wacontenttag="STRONG">Student eligibility:</strong></p><ul data-wacontent="36" data-wacontenttag="UL">    <li data-wacontent="37" data-wacontenttag="LI">Completed an introduction to networking course and an introduction to cybersecurity course</li>    <li data-wacontent="38" data-wacontenttag="LI">Attended&nbsp;one&nbsp;of the three information sessions being offered on February 21, 22, and 23, 3)</li>    <li data-wacontent="39" data-wacontenttag="LI">Complete a CCC commitment agreement.</li></ul><p data-wacontent="40" data-wacontenttag="P">Students from community colleges, technical colleges, and universities are encouraged to apply. Since the CCC provides a real-world cybersecurity workforce experience, it could meet the requirements for an internship or co-operative education experience. Students will need to inquire at their institution to find out.</p><p style="text-align: left;"><hr></p><p data-wacontent="41" data-wacontenttag="P"><strong data-wacontent="42" data-wacontenttag="STRONG">Schedule:</strong></p><ul data-wacontent="43" data-wacontenttag="UL">    <li data-wacontent="44" data-wacontenttag="LI">March 2 - Commitment Agreement due</li>    <li data-wacontent="45" data-wacontenttag="LI">April 10 - Workshop begins: Introduction to program work roles</li>    <li data-wacontent="46" data-wacontenttag="LI">April 17 - Introduction to the network requirements and team selection</li>    <li data-wacontent="47" data-wacontenttag="LI">April 24 - Network admin basics, Kanban, Gantt charts, Visio diagrams</li>    <li data-wacontent="48" data-wacontenttag="LI">May 1 to June 5 - Teams work independently and receive guidance on network management and pentest prep</li>    <li data-wacontent="49" data-wacontenttag="LI">June 12 - Pentest</li>    <li data-wacontent="50" data-wacontenttag="LI">June 15 - Team presentations</li>    <li data-wacontent="51" data-wacontenttag="LI">September 15 (Optional) Virtual Career Fair</li></ul><p data-wacontent="51" data-wacontenttag="LI"><hr></p><p data-wacontent="52" data-wacontenttag="P"><strong data-wacontent="54" data-wacontenttag="STRONG">Learning objectives:</strong></p><p data-wacontent="55" data-wacontenttag="P">Students will work in teams of three to successfully complete the following:</p><ul data-wacontent="57" data-wacontenttag="UL">    <li data-wacontent="58" data-wacontenttag="LI">Develop a project plan for an Information System that supports a fictitious business.</li>    <li data-wacontent="60" data-wacontenttag="LI">Utilize project management tools for communication and project implementation.</li>    <li data-wacontent="62" data-wacontenttag="LI">Operate a network of nine devices within the technical requirements specified.</li>    <li data-wacontent="64" data-wacontenttag="LI">&nbsp;Defend their network against a penetration test.</li>    <li data-wacontent="66" data-wacontenttag="LI">Analyze the network for any evidence of attacks or compromise resulting from penetration testing.</li>    <li data-wacontent="68" data-wacontenttag="LI">Present their approach to operating the network and findings from the penetration test.</li></ul><p data-wacontent="68" data-wacontenttag="LI"><hr></p><p data-wacontent="68" data-wacontenttag="LI">Facilitator:</p><p data-wacontent="68" data-wacontenttag="LI">Vincent Nestler </p><p data-wacontent="68" data-wacontenttag="LI">Senior Personnel, NCyTE Center</p><p data-wacontent="68" data-wacontenttag="LI">Associate Professor, California State University- San Bernardino</p><p data-wacontent="68" data-wacontenttag="LI" style="text-align: center;"><a href="	https://ncytecenter.wildapricot.org/event-5062956 " target="_blank">&nbsp;REGISTER TO ATTEND</a></p><p data-wacontent="68" data-wacontenttag="LI" style="text-align: left;">&nbsp;</p><p data-wacontent="68" data-wacontenttag="LI" style="text-align: left;">&nbsp;NCyTE is funded by the National Science Foundation Grant #2054724</p><p data-wacontent="68" data-wacontenttag="LI" style="text-align: right;">&nbsp;</p>
LOCATION:Virtual\, 
CLASS:PUBLIC
END:VEVENT
END:VCALENDAR
