Skip to main content
Please see individual pages for upcoming WORKSHOPS & EVENTS for format (in-person or virtual). If it is unsafe and/or unallowable to host in-person trainings, we will transition to virtual workshops. Best browser to register: CHROME.

Cybersecurity Webinars

This series is designed for teachers who are new to Cybersecurity. Increase your knowledge of Cybersecurity while also receiving suggested resources and activities for your classroom. All webinars align with the TEKS and CompTIA Security+ objectives.

Webinar Cybersecurity

CYBERSECURITY WEBINAR:  Navigating the Cybersecurity Career Search (October 16, 2023)

Watch this webinar for an insightful session packed with strategies, tips, and real-world advice on navigating the tech industry like a pro.  Join Kat Rector as she walks down the cybersecurity career path identifying entry level cybersecurity roles, how to find them and the different paths to obtaining a cybersecurity role.

What to expect:

  • Insider Insights:  Discover the secrets to start climbing the cybersecurity career ladder.
  • Resumes and Interviews:  Create a portfolio and learn about the importance of soft skills.
  • Networking Mastery:  Build valuable connections and and expand your professional circle.  
  • Q&A Session:  Get your burning career questions answered by the expert.

About Our Guest Speaker:

Kat Rector is a Business Development Manager with a proven track record in spearheading transformative tech consulting initiatives, strategizing managed services projects, and providing innovative and creative staff solutions. With a passion for community engagement within the tech sector and a reputation as an avid networker, she brings a unique blend of expertise, insight, and personal experience to her role at Akkodis and the Austin community.

RECORDING:  Navigating the Cybersecurity Career Search


CYBERSECURITY WEBINAR: CyberStart America Texas Kickoff (October 5, 2023)

CyberStart America is the most enjoyable way to discover your talent, advance your skills and win scholarships in cybersecurity!  Hear from Texas master teachers and coaches as they demonstrate the ins and outs of Cyberstart America.

  • What is CyberStart America?

  • How to I register my classes?

  • What is the CYBER.org range?

  • How do I use CyberStart America in the classroom or my organization?

Do your students like gaming, puzzles or technology? Your students will jump into learning cybersecurity with fun challenges and start defending the online world with their problem-solving skills.

RECORDING:  2023 CyberStart America Texas Kickoff
Update to CSA Dates:  October 16, 2023 - January 11, 2024

TEKS - CSA CROSSWALK:  Foundations of Cybersecurity

FERPA:  iKeepSafe CyberStart America Certificate

RESOURCES:  CTF Tools

 

CYBERSECURITY WEBINAR: Cyber Career Discovery - Technical Interviews and Bitcoin Financial Services (February 22, 2022)

Katy Theranger, recruiting manager for Unchained Capital, Inc., discussed the importance of cover letters, resumes, and soft skills when applying for jobs in the cybersecurity workforce along with the different interview formats included in technical interviews.

RECORDING: Technical Interviews and Bitcoin Financial Services

 

CYBERSECURITY WEBINAR: Cyber Career Discovery - Goverment and Cyber Policy (January 27, 2022)

Jennie Kam discussed her cybersecurity career path, her work as a security researcher at Cisco, and her role in the United States Government with technology and cyber policy.

RECORDING: Government and Cyber Policy

RESOURCES:  Cyber Career Discovery: Hacker Gone Policy Advisor

 

CYBERSECURITY WEBINAR: Cyber Career Discovery (October 18, 2021)

Sayako Quinlan, CROWDSTRIKE and Lisa Tretrault, ARCTIC WOLF, shared about the pathways they traveled in their Cybersecurity journey, what they have learned along the way and what skills they needed to be successful in their Cybersecurity career.

RECORDING: Cyber Career Discovery

 

Cybersecurity 101

New to teaching Cybersecurity? Watch our Cybersecurity Basics webinar to increase your knowledge of the TEKS and Cybersecurity concepts. Threat actors, CIA Triad, Authentication, Authorization, and Accounting... Are these terms new to you? Learn about the foundational building blocks of Cybersecurity and how to introduce these concepts to your students.

RECORDING: Part 1: Cybersecurity Basics - Part 1; Part 2: Cybersecurity Basics - Part 2

PRESENTATION: Cybersecurity Basics - Presentation

 

Networking Basics

To protect your network, you need to understand how a network operates. An introduction to network devices, IP address, packets and protocols providing prerequisite knowledge about the assets you are trying to protect. In order to follow along with the lab exercise, please download Cisco's Packet Tracer: Introduction to Packet Tracer

RECORDING: Networking Basics

PRESENTATION: Networking Basics - Presentation

To obtain and install your copy of Cisco Packet Tracer follow these simple steps:

  • Log into your Cisco Networking Academy “I’m Learning” page.
  • Select Resources from the menu in the upper right portion of your screen.
  • Select Download Packet Tracer.
  • Select the version of Packet Tracer you require.
  • Save the file to your computer.
  • Launch the Packet Tracer install program.
  • After installation, close and restart your web browser.
  • Launch Cisco Packet Tracer by selecting the appropriate icon.
  • When prompted, use your Netacad login information to authenticate.
  • Packet Tracer will launch and you are ready to explore its features.

 

Malware & Prevention

Logic Bombs, Trojan Houses, Spyware . . . What are they? How do you protect your systems? Explore real life malware cases as we discuss the types of malware, prevention techniques, and removal of this damaging software.

RECORDING: Malware & Prevention

PRESENTATION: Malware & Prevention - Presentation

 

User Security

Phishing, vishing, whaling . . . Users are the weakest link in security where through clicking on a malicious link, opening a suspicious email, or being an insider threat!  Learn how to provide user training and awareness along with hardening your system against accidental and adversarial threats.  User training and awareness is the base for a good defense in depth security program!

RECORDING: User Security

PRESENTATION: User Security - Presentation

 

Wireless LANs

A look at security issue concerns and some best practices in cellular, mobile, and wireless computing.  Learn about the devices and protocols used in wireless computing along with the types of wireless vulnerabilities:  rogue access points, man-in-the-middle attacks, wardriving, evil twins and more!

RECORDING: Wireless LANs

PRESENTATION: Wireless LANs - Presentation

 

Cloud Security 

Learn the core principles of cloud computing and cloud security.   Who is responsible for the protection of an organization's data?  What is virtualization technology?  Watch this webinar to learn about cloud computing characteristics, cloud computing roles, service models, and deployment models.

RECORDING: Cloud Security

PRESENTATION: Cloud Security - Presentation

 

Subnetting

Get your math on for this one!  Learn all about network segmentation and IPv4 addressing.  This video provides an overview of binary to decimal conversion and decimal to binary conversions.  Find out about IPv4 address structure and the IPv4 address classification system.  Start the basics of calculating subnet addresses, identifying the host address, the network address, and the subnet mask!

RECORDING: Subnetting

PRESENTATION: Subnetting - Presentation

 

Digital Forensics

The science of investigating cybercrimes - seeking evidence that reveals the who, what, when, where, and how threats compromise information.

RECORDING: Digital Forensics

PRESENTATION: Digital Forensics - Presentation