Cybersecurity Webinar Series

Empowering educators and students with essential cybersecurity skills and career insights.

Our Cybersecurity Webinar series offers three engaging strands designed to support both educators and students.

  • Cybersecurity Basics – A foundational series aligned with the Texas Essential Knowledge and Skills (TEKS) and CompTIA Security+ objectives, helping participants build essential cybersecurity knowledge and skills.

  • Cyber Career Discovery – A career-focused strand that explores pathways in the tech industry. Students and teachers gain insights into career journeys, industry navigation, and the wide range of opportunities within cybersecurity.

  • Emerging Threats & Technologies - This strand highlights the newest challenges and innovations in cybersecurity, from neurotechnology and AI risks to quantum computing and beyond. Participants gain awareness of the issues that will define the next generation of cyber defense.

Image generated by Google's Gemini. (September 2025)

Cybersecurity Basics

Cybersecurity 101

New to teaching Cybersecurity? Watch our Cybersecurity Basics webinar to increase your knowledge of the TEKS and Cybersecurity concepts. Threat actors, CIA Triad, Authentication, Authorization, and Accounting... Are these terms new to you? Learn about the foundational building blocks of Cybersecurity and how to introduce these concepts to your students.

RECORDING: Cybersecurity Basics (Part 1) | Cybersecurity Basics (Part 2)

PRESENTATIONCybersecurity Basics - Presentation


Networking Basics

To protect your network, you need to understand how a network operates. An introduction to network devices, IP address, packets and protocols providing prerequisite knowledge about the assets you are trying to protect. In order to follow along with the lab exercise, please download Cisco's Packet Tracer: Introduction to Packet Tracer.

RECORDINGNetworking Basics

PRESENTATIONNetworking Basics - Presentation

To obtain and install your copy of Cisco Packet Tracer follow these simple steps:

  • Go to netacad.com.  
  • At the bottom of the home page, select  "Getting Started with Cisco Packet Tracer"
  • Click on "Get Started with Self-Paced 
    If you do not have a Cisco account, you will need to create one.
  • Locate "Download Cisco Packet Tracer" and follow the instructions.  

Malware & Prevention

Logic Bombs, Trojan Houses, Spyware . . . What are they? How do you protect your systems? Explore real life malware cases as we discuss the types of malware, prevention techniques, and removal of this damaging software.

RECORDINGMalware & Prevention

PRESENTATIONMalware & Prevention - Presentation


User Security

Phishing, vishing, whaling . . . Users are the weakest link in security where through clicking on a malicious link, opening a suspicious email, or being an insider threat!  Learn how to provide user training and awareness along with hardening your system against accidental and adversarial threats.  User training and awareness is the base for a good defense in depth security program!

RECORDINGUser Security

PRESENTATIONUser Security - Presentation


Wireless LANs

A look at security issue concerns and some best practices in cellular, mobile, and wireless computing.  Learn about the devices and protocols used in wireless computing along with the types of wireless vulnerabilities:  rogue access points, man-in-the-middle attacks, wardriving, evil twins and more!

RECORDINGWireless LANs

PRESENTATIONWireless LANs - Presentation


Cloud Security 

Learn the core principles of cloud computing and cloud security.   Who is responsible for the protection of an organization's data?  What is virtualization technology?  Watch this webinar to learn about cloud computing characteristics, cloud computing roles, service models, and deployment models.

RECORDINGCloud Security

PRESENTATIONCloud Security - Presentation


Subnetting

Get your math on for this one!  Learn all about network segmentation and IPv4 addressing.  This video provides an overview of binary to decimal conversion and decimal to binary conversions.  Find out about IPv4 address structure and the IPv4 address classification system.  Start the basics of calculating subnet addresses, identifying the host address, the network address, and the subnet mask!

RECORDINGSubnetting

PRESENTATIONSubnetting - Presentation


Digital Forensics

The science of investigating cybercrimes - seeking evidence that reveals the who, what, when, where, and how threats compromise information.

RECORDINGDigital Forensics

PRESENTATIONDigital Forensics - Presentation


Cyber Career Discovery

Navigating the Cybersecurity Career Search (October 16, 2023)

Kat Rector, a Business Development Manager, discusses strategies, tips, and real-world advice on navigating the tech industry like a pro.  Join her as she walks down the cybersecurity career path identifying entry level cybersecurity roles, how to find them and the different paths to obtaining a cybersecurity role.

What to expect:

  • Insider Insights:  Discover the secrets to start climbing the cybersecurity career ladder.
  • Resumes and Interviews:  Create a portfolio and learn about the importance of soft skills.
  • Networking Mastery:  Build valuable connections and and expand your professional circle.  
  • Q&A Session:  Get your burning career questions answered by the expert.

RECORDING:  Navigating the Cybersecurity Career Search


Cyber Career Discovery - Technical Interviews and Bitcoin Financial Services (February 22, 2022)

Katy Theranger, recruiting manager for Unchained Capital, Inc., discussed the importance of cover letters, resumes, and soft skills when applying for jobs in the cybersecurity workforce along with the different interview formats included in technical interviews.

RECORDINGTechnical Interviews and Bitcoin Financial Services


Cyber Career Discovery - Goverment and Cyber Policy (January 27, 2022)

Jennie Kam discussed her cybersecurity career path, her work as a security researcher at Cisco, and her role in the United States Government with technology and cyber policy.

RECORDINGGovernment and Cyber Policy

RESOURCES:  Cyber Career Discovery: Hacker Gone Policy Advisor


Cyber Career Discovery (October 18, 2021)

Sayako Quinlan, CROWDSTRIKE and Lisa Tretrault, ARCTIC WOLF, shared about the pathways they traveled in their Cybersecurity journey, what they have learned along the way and what skills they needed to be successful in their Cybersecurity career.

RECORDINGCyber Career Discovery


Emerging Threats & Technologies

Mind Games: Neurocrime in the Digital Age

October 6, 2025
Virtual
6 pm - 7:30 pm CT

Mariami Kentchadze, Professor of Computer and Cyber Security, explores the evolving risks and security challenges associated with neurotechnology and neural interfaces as cybercriminals increasingly target cognitive systems.
As the use of brain-computer interfaces and other neurotechnologies expands across medical, gaming and other industries, so does the potential for malicious actors to exploit vulnerabilities within these systems.

The presentation will delve into the critical need to secure neurotechnology against unauthorized access, manipulation and data theft, highlighting the ethical, legal and technical implications of neurocrime. Through case studies and discussion, participants will learn about current risks, engage in group exercises to brainstorm security measures, and leave with actionable insights to proactively address this emerging threat.

REGISTER HERE 

Cybersecurity Basics:

  • Cybersecurity 101
  • Networking Basics
  • Malware & Prevention
  • User Security
  • Wireless LANs
  • Cloud Security
  • Subnetting
  • Digital Forensics
     

Cyber Career Discovery:

  • Navigating the Cybersecurity Career Search
  • Cyber Career Discovery - Technical Interviews and Bitcoin Financial Services
  • Cyber Career Discovery - Goverment and Cyber Policy
  • Cyber Career Discovery
     

Emerging Threats & Technologies: