Cybersecurity Webinars
This series is designed for teachers who are new to Cybersecurity. Increase your knowledge of Cybersecurity while also receiving suggested resources and activities for your classroom. All webinars align with the TEKS and CompTIA Security+ objectives.
Webinar CybersecurityCYBERSECURITY WEBINAR: Navigating the Cybersecurity Career Search (October 16, 2023)
Watch this webinar for an insightful session packed with strategies, tips, and real-world advice on navigating the tech industry like a pro. Join Kat Rector as she walks down the cybersecurity career path identifying entry level cybersecurity roles, how to find them and the different paths to obtaining a cybersecurity role.
What to expect:
- Insider Insights: Discover the secrets to start climbing the cybersecurity career ladder.
- Resumes and Interviews: Create a portfolio and learn about the importance of soft skills.
- Networking Mastery: Build valuable connections and and expand your professional circle.
- Q&A Session: Get your burning career questions answered by the expert.
About Our Guest Speaker:
Kat Rector is a Business Development Manager with a proven track record in spearheading transformative tech consulting initiatives, strategizing managed services projects, and providing innovative and creative staff solutions. With a passion for community engagement within the tech sector and a reputation as an avid networker, she brings a unique blend of expertise, insight, and personal experience to her role at Akkodis and the Austin community.
RECORDING: Navigating the Cybersecurity Career Search
CYBERSECURITY WEBINAR: CyberStart America Texas Kickoff (October 5, 2023)
CyberStart America is the most enjoyable way to discover your talent, advance your skills and win scholarships in cybersecurity! Hear from Texas master teachers and coaches as they demonstrate the ins and outs of Cyberstart America.
-
What is CyberStart America?
-
How to I register my classes?
-
What is the CYBER.org range?
-
How do I use CyberStart America in the classroom or my organization?
Do your students like gaming, puzzles or technology? Your students will jump into learning cybersecurity with fun challenges and start defending the online world with their problem-solving skills.
RECORDING: 2023 CyberStart America Texas Kickoff
Update to CSA Dates: October 16, 2023 - January 11, 2024
TEKS - CSA CROSSWALK: Foundations of Cybersecurity
FERPA: iKeepSafe CyberStart America Certificate
RESOURCES: CTF Tools
CYBERSECURITY WEBINAR: Cyber Career Discovery - Technical Interviews and Bitcoin Financial Services (February 22, 2022)
Katy Theranger, recruiting manager for Unchained Capital, Inc., discussed the importance of cover letters, resumes, and soft skills when applying for jobs in the cybersecurity workforce along with the different interview formats included in technical interviews.
RECORDING: Technical Interviews and Bitcoin Financial Services
CYBERSECURITY WEBINAR: Cyber Career Discovery - Goverment and Cyber Policy (January 27, 2022)
Jennie Kam discussed her cybersecurity career path, her work as a security researcher at Cisco, and her role in the United States Government with technology and cyber policy.
RECORDING: Government and Cyber Policy
RESOURCES: Cyber Career Discovery: Hacker Gone Policy Advisor
CYBERSECURITY WEBINAR: Cyber Career Discovery (October 18, 2021)
Sayako Quinlan, CROWDSTRIKE and Lisa Tretrault, ARCTIC WOLF, shared about the pathways they traveled in their Cybersecurity journey, what they have learned along the way and what skills they needed to be successful in their Cybersecurity career.
RECORDING: Cyber Career Discovery
Cybersecurity 101
New to teaching Cybersecurity? Watch our Cybersecurity Basics webinar to increase your knowledge of the TEKS and Cybersecurity concepts. Threat actors, CIA Triad, Authentication, Authorization, and Accounting... Are these terms new to you? Learn about the foundational building blocks of Cybersecurity and how to introduce these concepts to your students.
RECORDING: Part 1: Cybersecurity Basics - Part 1; Part 2: Cybersecurity Basics - Part 2
PRESENTATION: Cybersecurity Basics - Presentation
Networking Basics
To protect your network, you need to understand how a network operates. An introduction to network devices, IP address, packets and protocols providing prerequisite knowledge about the assets you are trying to protect. In order to follow along with the lab exercise, please download Cisco's Packet Tracer: Introduction to Packet Tracer
RECORDING: Networking Basics
PRESENTATION: Networking Basics - Presentation
To obtain and install your copy of Cisco Packet Tracer follow these simple steps:
- Log into your Cisco Networking Academy “I’m Learning” page.
- Select Resources from the menu in the upper right portion of your screen.
- Select Download Packet Tracer.
- Select the version of Packet Tracer you require.
- Save the file to your computer.
- Launch the Packet Tracer install program.
- After installation, close and restart your web browser.
- Launch Cisco Packet Tracer by selecting the appropriate icon.
- When prompted, use your Netacad login information to authenticate.
- Packet Tracer will launch and you are ready to explore its features.
Malware & Prevention
Logic Bombs, Trojan Houses, Spyware . . . What are they? How do you protect your systems? Explore real life malware cases as we discuss the types of malware, prevention techniques, and removal of this damaging software.
RECORDING: Malware & Prevention
PRESENTATION: Malware & Prevention - Presentation
User Security
Phishing, vishing, whaling . . . Users are the weakest link in security where through clicking on a malicious link, opening a suspicious email, or being an insider threat! Learn how to provide user training and awareness along with hardening your system against accidental and adversarial threats. User training and awareness is the base for a good defense in depth security program!
RECORDING: User Security
PRESENTATION: User Security - Presentation
Wireless LANs
A look at security issue concerns and some best practices in cellular, mobile, and wireless computing. Learn about the devices and protocols used in wireless computing along with the types of wireless vulnerabilities: rogue access points, man-in-the-middle attacks, wardriving, evil twins and more!
RECORDING: Wireless LANs
PRESENTATION: Wireless LANs - Presentation
Cloud Security
Learn the core principles of cloud computing and cloud security. Who is responsible for the protection of an organization's data? What is virtualization technology? Watch this webinar to learn about cloud computing characteristics, cloud computing roles, service models, and deployment models.
RECORDING: Cloud Security
PRESENTATION: Cloud Security - Presentation
Subnetting
Get your math on for this one! Learn all about network segmentation and IPv4 addressing. This video provides an overview of binary to decimal conversion and decimal to binary conversions. Find out about IPv4 address structure and the IPv4 address classification system. Start the basics of calculating subnet addresses, identifying the host address, the network address, and the subnet mask!
RECORDING: Subnetting
PRESENTATION: Subnetting - Presentation
Digital Forensics
The science of investigating cybercrimes - seeking evidence that reveals the who, what, when, where, and how threats compromise information.
RECORDING: Digital Forensics
PRESENTATION: Digital Forensics - Presentation