This series is designed for teachers who are new to Cybersecurity. All webinars align with the TEKS and CompTIA Security+ objectives.
Watch this webinar for an insightful session packed with strategies, tips, and real-world advice on navigating the tech industry like a pro. Join Kat Rector as she walks down the cybersecurity career path identifying entry level cybersecurity roles, how to find them and the different paths to obtaining a cybersecurity role.
What to expect:
About Our Guest Speaker:
Kat Rector is a Business Development Manager with a proven track record in spearheading transformative tech consulting initiatives, strategizing managed services projects, and providing innovative and creative staff solutions. With a passion for community engagement within the tech sector and a reputation as an avid networker, she brings a unique blend of expertise, insight, and personal experience to her role at Akkodis and the Austin community.
RECORDING: Navigating the Cybersecurity Career Search
Katy Theranger, recruiting manager for Unchained Capital, Inc., discussed the importance of cover letters, resumes, and soft skills when applying for jobs in the cybersecurity workforce along with the different interview formats included in technical interviews.
RECORDING: Technical Interviews and Bitcoin Financial Services
Jennie Kam discussed her cybersecurity career path, her work as a security researcher at Cisco, and her role in the United States Government with technology and cyber policy.
RECORDING: Government and Cyber Policy
RESOURCES: Cyber Career Discovery: Hacker Gone Policy Advisor
Sayako Quinlan, CROWDSTRIKE and Lisa Tretrault, ARCTIC WOLF, shared about the pathways they traveled in their Cybersecurity journey, what they have learned along the way and what skills they needed to be successful in their Cybersecurity career.
RECORDING: Cyber Career Discovery
New to teaching Cybersecurity? Watch our Cybersecurity Basics webinar to increase your knowledge of the TEKS and Cybersecurity concepts. Threat actors, CIA Triad, Authentication, Authorization, and Accounting... Are these terms new to you? Learn about the foundational building blocks of Cybersecurity and how to introduce these concepts to your students.
RECORDING: Cybersecurity Basics (Part 1) | Cybersecurity Basics (Part 2)
PRESENTATION: Cybersecurity Basics - Presentation
To protect your network, you need to understand how a network operates. An introduction to network devices, IP address, packets and protocols providing prerequisite knowledge about the assets you are trying to protect. In order to follow along with the lab exercise, please download Cisco's Packet Tracer: Introduction to Packet Tracer.
RECORDING: Networking Basics
PRESENTATION: Networking Basics - Presentation
To obtain and install your copy of Cisco Packet Tracer follow these simple steps:
Logic Bombs, Trojan Houses, Spyware . . . What are they? How do you protect your systems? Explore real life malware cases as we discuss the types of malware, prevention techniques, and removal of this damaging software.
RECORDING: Malware & Prevention
PRESENTATION: Malware & Prevention - Presentation
Phishing, vishing, whaling . . . Users are the weakest link in security where through clicking on a malicious link, opening a suspicious email, or being an insider threat! Learn how to provide user training and awareness along with hardening your system against accidental and adversarial threats. User training and awareness is the base for a good defense in depth security program!
RECORDING: User Security
PRESENTATION: User Security - Presentation
A look at security issue concerns and some best practices in cellular, mobile, and wireless computing. Learn about the devices and protocols used in wireless computing along with the types of wireless vulnerabilities: rogue access points, man-in-the-middle attacks, wardriving, evil twins and more!
RECORDING: Wireless LANs
PRESENTATION: Wireless LANs - Presentation
Learn the core principles of cloud computing and cloud security. Who is responsible for the protection of an organization's data? What is virtualization technology? Watch this webinar to learn about cloud computing characteristics, cloud computing roles, service models, and deployment models.
RECORDING: Cloud Security
PRESENTATION: Cloud Security - Presentation
Get your math on for this one! Learn all about network segmentation and IPv4 addressing. This video provides an overview of binary to decimal conversion and decimal to binary conversions. Find out about IPv4 address structure and the IPv4 address classification system. Start the basics of calculating subnet addresses, identifying the host address, the network address, and the subnet mask!
RECORDING: Subnetting
PRESENTATION: Subnetting - Presentation
The science of investigating cybercrimes - seeking evidence that reveals the who, what, when, where, and how threats compromise information.
RECORDING: Digital Forensics
PRESENTATION: Digital Forensics - Presentation