Our Cybersecurity Webinar series offers three engaging strands designed to support both educators and students.
Cybersecurity Basics – A foundational series aligned with the Texas Essential Knowledge and Skills (TEKS) and CompTIA Security+ objectives, helping participants build essential cybersecurity knowledge and skills.
Cyber Career Discovery – A career-focused strand that explores pathways in the tech industry. Students and teachers gain insights into career journeys, industry navigation, and the wide range of opportunities within cybersecurity.
Emerging Threats & Technologies - This strand highlights the newest challenges and innovations in cybersecurity, from neurotechnology and AI risks to quantum computing and beyond. Participants gain awareness of the issues that will define the next generation of cyber defense.
Image generated by Google's Gemini. (September 2025)
New to teaching Cybersecurity? Watch our Cybersecurity Basics webinar to increase your knowledge of the TEKS and Cybersecurity concepts. Threat actors, CIA Triad, Authentication, Authorization, and Accounting... Are these terms new to you? Learn about the foundational building blocks of Cybersecurity and how to introduce these concepts to your students.
RECORDING: Cybersecurity Basics (Part 1) | Cybersecurity Basics (Part 2)
PRESENTATION: Cybersecurity Basics - Presentation
To protect your network, you need to understand how a network operates. An introduction to network devices, IP address, packets and protocols providing prerequisite knowledge about the assets you are trying to protect. In order to follow along with the lab exercise, please download Cisco's Packet Tracer: Introduction to Packet Tracer.
RECORDING: Networking Basics
PRESENTATION: Networking Basics - Presentation
To obtain and install your copy of Cisco Packet Tracer follow these simple steps:
Logic Bombs, Trojan Houses, Spyware . . . What are they? How do you protect your systems? Explore real life malware cases as we discuss the types of malware, prevention techniques, and removal of this damaging software.
RECORDING: Malware & Prevention
PRESENTATION: Malware & Prevention - Presentation
Phishing, vishing, whaling . . . Users are the weakest link in security where through clicking on a malicious link, opening a suspicious email, or being an insider threat! Learn how to provide user training and awareness along with hardening your system against accidental and adversarial threats. User training and awareness is the base for a good defense in depth security program!
RECORDING: User Security
PRESENTATION: User Security - Presentation
A look at security issue concerns and some best practices in cellular, mobile, and wireless computing. Learn about the devices and protocols used in wireless computing along with the types of wireless vulnerabilities: rogue access points, man-in-the-middle attacks, wardriving, evil twins and more!
RECORDING: Wireless LANs
PRESENTATION: Wireless LANs - Presentation
Learn the core principles of cloud computing and cloud security. Who is responsible for the protection of an organization's data? What is virtualization technology? Watch this webinar to learn about cloud computing characteristics, cloud computing roles, service models, and deployment models.
RECORDING: Cloud Security
PRESENTATION: Cloud Security - Presentation
Get your math on for this one! Learn all about network segmentation and IPv4 addressing. This video provides an overview of binary to decimal conversion and decimal to binary conversions. Find out about IPv4 address structure and the IPv4 address classification system. Start the basics of calculating subnet addresses, identifying the host address, the network address, and the subnet mask!
RECORDING: Subnetting
PRESENTATION: Subnetting - Presentation
The science of investigating cybercrimes - seeking evidence that reveals the who, what, when, where, and how threats compromise information.
RECORDING: Digital Forensics
PRESENTATION: Digital Forensics - Presentation
Kat Rector, a Business Development Manager, discusses strategies, tips, and real-world advice on navigating the tech industry like a pro. Join her as she walks down the cybersecurity career path identifying entry level cybersecurity roles, how to find them and the different paths to obtaining a cybersecurity role.
What to expect:
RECORDING: Navigating the Cybersecurity Career Search
Katy Theranger, recruiting manager for Unchained Capital, Inc., discussed the importance of cover letters, resumes, and soft skills when applying for jobs in the cybersecurity workforce along with the different interview formats included in technical interviews.
RECORDING: Technical Interviews and Bitcoin Financial Services
Jennie Kam discussed her cybersecurity career path, her work as a security researcher at Cisco, and her role in the United States Government with technology and cyber policy.
RECORDING: Government and Cyber Policy
RESOURCES: Cyber Career Discovery: Hacker Gone Policy Advisor
Sayako Quinlan, CROWDSTRIKE and Lisa Tretrault, ARCTIC WOLF, shared about the pathways they traveled in their Cybersecurity journey, what they have learned along the way and what skills they needed to be successful in their Cybersecurity career.
RECORDING: Cyber Career Discovery
Mariami Kentchadze, Professor of Computer and Cyber Security, explores the evolving risks and security challenges associated with neurotechnology and neural interfaces as cybercriminals increasingly target cognitive systems. As the use of brain-computer interfaces and other neurotechnologies expands across medical, gaming and other industries, so does the potential for malicious actors to exploit vulnerabilities within these systems. The presentation will delve into the critical need to secure neurotechnology against unauthorized access, manipulation and data theft, highlighting the ethical, legal and technical implications of neurocrime. Through case studies and discussion, participants will learn about current risks, engage in group exercises to brainstorm security measures, and leave with actionable insights to proactively address this emerging threat.