SlideShare a Scribd company logo
1 of 42
Download to read offline
July 10-11, 2019
James Robertson, Program Chair and Collegiate Professor Computer Science, University of Maryland
University College
David Greer, Senior Vice President and Chief Programs Officer, Project Lead the Way
Accelerating Cybersecurity and
Cloud Workforce Preparation with
AWS
Jim Robertson, EdD
Program Chair and Collegiate Professor:
Computer Science, Software Developer and Security
University of Maryland Global Campus
Agenda
• Introduction
• AWS Educate
• Implementation
• Challenges and Mitigations
• Student and Faculty Feedback
• Next Steps
• Summary
• Q&A
Introduction
• “Urgent Need for Cybersecurity Professionals
Grows”
• “Cybersecurity’s 3-Million-Person Workforce
Shortage is Now a Risk Management
Problem”
• “(ISC)² Report Finds Cybersecurity
Workforce Gap Has Increased to More Than
2.9 Million Globally”
Introduction
• Cyberseek.org shows heat map of cyber
jobs
• BLS - 28% growth (much faster than
average)
AWS Educate
• Security is part of the AWS Well-Architected
Framework
• Resources within AWS Educate help
students/educators learn skills and tools to
support cybersecurity workforce needs
The ability to protect information, systems, and assets while delivering business
value through risk assessments and mitigation strategies.
AWS Educate
• Access to AWS technology
• Open-source content, training resources
• Community collaboration
• AWS credits, demos, and special on-campus
program
• Career pathways
AWS Educate
Implementation – Learning Outcomes
• Conduct automated and manual analysis on
two different Linux, Apache, MySQL, PHP
(LAMP) applications
• Identify, prioritize, and repair software
vulnerabilities found in the LAMP
applications
• Document the process and findings of your
web application security analysis
Implementation – Learning Outcomes
• Demonstrate and fix CWE/SANS Top 25
vulnerabilities under the category of “Porous
Defenses”
• Use of a broken or risky cryptographic
algorithm
• Improper restriction of excessive
authentication attempts
• Use of a one-way hash without a salt
Implementation – Learning Outcomes
• Use auditing features with Oracle to monitor,
track, and identify any user who reads,
inserts, updates, or deletes data from
specific tables
• Analyze large Apache http server files for
possible botnet attacks
Implementation
• Before AWS
• After AWS
• After AWS Educate
Important Considerations
• AWS Free Tier
• AWS approval
• AWS versus University Help Desk
• AWS Educate requirements
• Demo
Student and Faculty Feedback
• “The labs were excellent!”
• “Content is relevant and up to date to the
professional world.”
• “Good teaching and interesting and useful
assignments.”
• “Instructions were easy to follow.”
Next Steps
• Automated process for class creation
• Adoption by other programs
• Dedicated support at the university
Summary
• AWS Educate accelerates learning at
University of Maryland Global Campus
• Prepares students for real-world jobs to fill
cybersecurity workforce gaps
• Anticipate continued improvement in
teaching tools and learning materials from
AWS Educate
July 10-11, 2019
The Conference Center,
James Robertson, Program Chair and Collegiate Professor Computer Science, University of Maryland
University College
David Greer, Senior Vice President and Chief Programs Officer, Project Lead the Way
• Activity, Project and Problem-Based (APB) Curriculum
• Relevant Content, In-demand Knowledge and Skills
• Unmatched Professional Development
K-12 Cybersecurity Workforce Development
David Greer
Agenda
• Project Lead the Way (PLTW) overview
• Workforce needs
• The PLTW cybersecurity experience
• Preparing and supporting teachers
• Questions
Project Lead The Way (PLTW)
Project Lead The Way is a nonprofit organization that provides a
transformative learning experience for PreK-12 students and teachers across
the U.S. Through our PreK-12 pathways in computer science, engineering,
and biomedical science, we empower students to develop the in-demand
knowledge and transportable skills to thrive in an evolving world.
• PreK-12 pathways in computer science, engineering and biomedical science
• Over 11,500 schools
• Millions of students in all 50 states
• Trained over 65,000 teachers
Our PreK-12 Pathway
PLTW Launch (PreK-5)
PLTW Gateway (6-8)
PLTW Engineering (9-12)
PLTW Biomedical Science (9-12)
PLTW Computer Science (9-12)
• Computer Science Essentials
• Cybersecurity (10th Grade or above)
• Computer Science Principles (AP)
• Computer Science A (AP)
PLTW’s Commitment to CS education
We believe all students –
beginning at a young age
– need access to quality
computer science
education.
Providing a PreK-12 CS experience that
inspires student interest, is inclusive, and
prepares students to thrive in an evolving
world.
Offering a comprehensive PreK-12 solution,
including a wide range of CS modules,
units, and courses that build on each other
and flow naturally together.
Being actively engaged with the CS
community, our network of educators, and
partners to inform PLTW students’ and
teachers’ experience.
Helping districts and schools provide
smoother transitions between elementary,
middle, and high school computer science
coursework.
The PLTW Cybersecurity Experience
Turning a National Problem into Student Opportunities
“Organizations continue to struggle
with finding security talent – from
leadership to entry-level members –
to combat increasingly sophisticated
cyber threats and manage complex
infrastructures.”
James Robinson - PLTW Cybersecurity advisory board member and TPRM product
management/information security officer at Optiv
Sparks Student Interest and
Fosters In-Demand Skills
Connected to Industry and
Aligned to Standards
Engaging, Secure,
and Responsible
PLTW is committed to providing students
with inspiring and relevant learning experiences.
The Cybersecurity course accomplishes this through three key benefits:
By the end of the course, students will be able to:
• Identify cybersecurity threats and protect against them.
• Detect intrusions and respond to attacks.
• Begin to examine their own digital footprint and better
defend their own personal data.
• Learn how organizations protect themselves in today’s
world.
• Establish an ethical code of conduct while learning to
defend data in today’s complex cyberworld.
Course Units
Benefit #1: Student Interest and In-Demand Skills
Students train to solve real-world problems as cybersecurity experts do.
Personal Cybersecurity
System Security
Network Security
Applied Cybersecurity
1
2
3
4
• Follows National Cybersecurity
Workforce Framework (NICE
Framework or NCWF)
• Aligns to Computer Science
Teachers Association (CSTA)
K-12 standards and Common
Core Standards
• Ensures access to the most in-
demand and relevant experiences
(Cybersecurity course's advisory
board)
Benefit #2: Connected and Aligned
Industry connection and standards alignment informed course development.
Main Components
Benefit #3: Engaging, Secure, and Responsible
Students explore operating systems in isolation and learn an ethical approach.
Ethical Approach
Well-Known Exploits
Network Security Labs
1
2
3
PLTW Network Security Labs Powered by AWS
Security Labs
Virtual Desktops
In browser, no additional
software or configuration
Within Courses
Custom environment,
custom activities
Safe, Secure, Isolated
All tasks embedded within
security labs
1
2
3
“PLTW Network Security Labs
provide a safe space to
explore exploits that would
not be accessible in a school’s
network environment.”
Network Security Lab Example
In this activity students
work through a scenario:
The “Bank of Virgil” is a
testing and training site
for employees. It allows
them to witness and
explore exploits such as
XXS and SQL injection.
Launching the Lab: Server Exploits
Network Security Lab Example
In this activity students
work through a scenario:
The “Bank of Virgil” is a
testing and training site
for employees. It allows
them to witness and
explore exploits such as
XXS and SQL injection.
Activity 2.3.1 Securing Ecommerce Data
Network Security Lab Example
Activity 2.3.1 Securing Ecommerce Data
In this activity students
work through a scenario:
The “Bank of Virgil” is a
testing and training site
for employees. It allows
them to witness and
explore exploits such as
XXS and SQL injection.
Network Security Lab Example
Activity 2.3.1 Securing Ecommerce Data
In this activity students
work through a scenario:
The “Bank of Virgil” is a
testing and training site
for employees. It allows
them to witness and
explore exploits such as
XXS and SQL injection.
Network Security Lab Example
Activity 2.3.1 Securing Ecommerce Data
How to mitigate?
• Students explore software
• Compare algorithms
• View low vs. high security
• Recognize security
measures
• Prohibit exploits
Preparing Teachers to Facilitate the
Cybersecurity Course
A Blended Approach
• Eager to learn as they teach
• Embraces the world of cybersecurity
• Tech-enthusiastic
• Exhibits excitement and curiosity
• Demonstrates a willingness to learn new
things, engage students, and lead
unmatched learning experiences
Characteristics of a Cybersecurity Teacher
Teachers do not need to have computer science or prior programing experience.
What Does Training Look Like?
PLTW cybersecurity professional development components include:
(30 Hours)
Prerequisite
Training
(14-24 Hours) Onsite Core
Training
(5 Days)
Job-Embedded Training
(30 Hours)
During each training component, teachers will experience the curriculum from the student perspective
as well as work to prepare themselves to effectively facilitate the course. Because of this, it is
imperative that teachers complete training as they implement the curriculum.
Conclusion
• Workforce needs
• Start early
• Provide relevance
• Support teachers
• Connect to college and career
For more information, contact:
David Greer – dgreer@pltw.org

More Related Content

What's hot

Transforming Education and Research Through the AWS Cloud - AWS Public Sector...
Transforming Education and Research Through the AWS Cloud - AWS Public Sector...Transforming Education and Research Through the AWS Cloud - AWS Public Sector...
Transforming Education and Research Through the AWS Cloud - AWS Public Sector...Amazon Web Services
 
An introduction to Learning Management Systems
An introduction to Learning Management SystemsAn introduction to Learning Management Systems
An introduction to Learning Management SystemsStefaan Vande Walle
 
Cloud computing for education: A new dawn?
Cloud computing for education: A new dawn?Cloud computing for education: A new dawn?
Cloud computing for education: A new dawn?Sikder Tahsin Al-Amin
 
Implementation of Cloud Computing in Saudi High Schools - Student Presentation
Implementation of Cloud Computing in Saudi High Schools - Student PresentationImplementation of Cloud Computing in Saudi High Schools - Student Presentation
Implementation of Cloud Computing in Saudi High Schools - Student PresentationMithileysh Sathiyanarayanan
 
Cloud computing and education
Cloud computing and educationCloud computing and education
Cloud computing and educationmaster student
 
Cloud Computing for Education Sector
Cloud Computing for Education SectorCloud Computing for Education Sector
Cloud Computing for Education SectorWinastwan Gora
 
Cloud Computing for Elearning
Cloud Computing for ElearningCloud Computing for Elearning
Cloud Computing for ElearningRoryMcGreal
 
University of South Florida Case Study
University of South Florida Case StudyUniversity of South Florida Case Study
University of South Florida Case StudyCitrix
 
Collaboration through technology: moving from possibility to practice - Marti...
Collaboration through technology: moving from possibility to practice - Marti...Collaboration through technology: moving from possibility to practice - Marti...
Collaboration through technology: moving from possibility to practice - Marti...Jisc
 
University of La Verne: Unbounded University Event Presentation
University of La Verne:  Unbounded University Event PresentationUniversity of La Verne:  Unbounded University Event Presentation
University of La Verne: Unbounded University Event PresentationKristin Lewis
 
Elucidating the impact of cloud computing in education sector Benefits and Ch...
Elucidating the impact of cloud computing in education sector Benefits and Ch...Elucidating the impact of cloud computing in education sector Benefits and Ch...
Elucidating the impact of cloud computing in education sector Benefits and Ch...Dr. Trilok Kumar Jain
 
Skilling up for mega trends in it
Skilling up for mega trends in itSkilling up for mega trends in it
Skilling up for mega trends in itSeema Shah
 
A communication platform as digital learning infrastructure: lessons from rep...
A communication platform as digital learning infrastructure: lessons from rep...A communication platform as digital learning infrastructure: lessons from rep...
A communication platform as digital learning infrastructure: lessons from rep...Mikkel H. Lauritzen
 
Touch Technologies for the flipped classroom
Touch Technologies for the flipped classroomTouch Technologies for the flipped classroom
Touch Technologies for the flipped classroomjsaldana2
 

What's hot (20)

Transforming Education and Research Through the AWS Cloud - AWS Public Sector...
Transforming Education and Research Through the AWS Cloud - AWS Public Sector...Transforming Education and Research Through the AWS Cloud - AWS Public Sector...
Transforming Education and Research Through the AWS Cloud - AWS Public Sector...
 
An introduction to Learning Management Systems
An introduction to Learning Management SystemsAn introduction to Learning Management Systems
An introduction to Learning Management Systems
 
Cloud computing for education: A new dawn?
Cloud computing for education: A new dawn?Cloud computing for education: A new dawn?
Cloud computing for education: A new dawn?
 
Implementation of Cloud Computing in Saudi High Schools - Student Presentation
Implementation of Cloud Computing in Saudi High Schools - Student PresentationImplementation of Cloud Computing in Saudi High Schools - Student Presentation
Implementation of Cloud Computing in Saudi High Schools - Student Presentation
 
Cloud computing and education
Cloud computing and educationCloud computing and education
Cloud computing and education
 
Cloud Computing for Education Sector
Cloud Computing for Education SectorCloud Computing for Education Sector
Cloud Computing for Education Sector
 
AWS Educate
AWS Educate   AWS Educate
AWS Educate
 
Qatar University
Qatar UniversityQatar University
Qatar University
 
Cloud Computing for Elearning
Cloud Computing for ElearningCloud Computing for Elearning
Cloud Computing for Elearning
 
Sgci nasa-esds-10-29-18
Sgci nasa-esds-10-29-18Sgci nasa-esds-10-29-18
Sgci nasa-esds-10-29-18
 
University of South Florida Case Study
University of South Florida Case StudyUniversity of South Florida Case Study
University of South Florida Case Study
 
Collaboration through technology: moving from possibility to practice - Marti...
Collaboration through technology: moving from possibility to practice - Marti...Collaboration through technology: moving from possibility to practice - Marti...
Collaboration through technology: moving from possibility to practice - Marti...
 
University of La Verne: Unbounded University Event Presentation
University of La Verne:  Unbounded University Event PresentationUniversity of La Verne:  Unbounded University Event Presentation
University of La Verne: Unbounded University Event Presentation
 
Elucidating the impact of cloud computing in education sector Benefits and Ch...
Elucidating the impact of cloud computing in education sector Benefits and Ch...Elucidating the impact of cloud computing in education sector Benefits and Ch...
Elucidating the impact of cloud computing in education sector Benefits and Ch...
 
Skilling up for mega trends in it
Skilling up for mega trends in itSkilling up for mega trends in it
Skilling up for mega trends in it
 
Learner focused app cloud final version
Learner focused app cloud final versionLearner focused app cloud final version
Learner focused app cloud final version
 
Brief Cloud Computing
Brief Cloud ComputingBrief Cloud Computing
Brief Cloud Computing
 
Cloud computing
Cloud computing Cloud computing
Cloud computing
 
A communication platform as digital learning infrastructure: lessons from rep...
A communication platform as digital learning infrastructure: lessons from rep...A communication platform as digital learning infrastructure: lessons from rep...
A communication platform as digital learning infrastructure: lessons from rep...
 
Touch Technologies for the flipped classroom
Touch Technologies for the flipped classroomTouch Technologies for the flipped classroom
Touch Technologies for the flipped classroom
 

Similar to AWS Educate: Accelerating Cybersecurity and Cloud Workforce Preparation with AWS

(ISM203) Enterprise Cloud Adoption Strategies in Higher Education
(ISM203) Enterprise Cloud Adoption Strategies in Higher Education(ISM203) Enterprise Cloud Adoption Strategies in Higher Education
(ISM203) Enterprise Cloud Adoption Strategies in Higher EducationAmazon Web Services
 
Erau webinar-applied information technologies
Erau webinar-applied information technologiesErau webinar-applied information technologies
Erau webinar-applied information technologiesERAUWebinars
 
Erau cybersecurity and security degrees
Erau cybersecurity and security degreesErau cybersecurity and security degrees
Erau cybersecurity and security degreesERAUWebinars
 
Cyber Security_Presentation_KTH
Cyber Security_Presentation_KTHCyber Security_Presentation_KTH
Cyber Security_Presentation_KTHAwais Shibli
 
Student Success Plan Learner Relationship Management Tech Review
Student Success Plan Learner Relationship Management Tech ReviewStudent Success Plan Learner Relationship Management Tech Review
Student Success Plan Learner Relationship Management Tech Reviewshawngormley
 
Ppt tale kn_intro_final
Ppt tale kn_intro_finalPpt tale kn_intro_final
Ppt tale kn_intro_finalManuel Castro
 
Pmd prospective students 2.22.2222
Pmd prospective students 2.22.2222Pmd prospective students 2.22.2222
Pmd prospective students 2.22.2222KevinAlt1
 
July 20, 2016 Webcast for the Cybersecurity MS at NYU Tandon Online
July 20, 2016 Webcast for the Cybersecurity MS at NYU Tandon OnlineJuly 20, 2016 Webcast for the Cybersecurity MS at NYU Tandon Online
July 20, 2016 Webcast for the Cybersecurity MS at NYU Tandon OnlineNYU Tandon Online
 
Creating a developer pipeline by teaching gateway technologies
Creating a developer pipeline by teaching gateway technologiesCreating a developer pipeline by teaching gateway technologies
Creating a developer pipeline by teaching gateway technologiesMarlon Pierce
 
TALK Cybersecurity Summit 2017: Panel on Ky Cyber Ed Pathway
TALK Cybersecurity Summit 2017:  Panel on Ky Cyber Ed PathwayTALK Cybersecurity Summit 2017:  Panel on Ky Cyber Ed Pathway
TALK Cybersecurity Summit 2017: Panel on Ky Cyber Ed PathwayDawn Yankeelov
 
Online MS in Cybersecurity at NYU
Online MS in Cybersecurity at NYUOnline MS in Cybersecurity at NYU
Online MS in Cybersecurity at NYUNYU Tandon Online
 
Blackboard Learn Deployment: A Detailed Update of Managed Hosting and SaaS De...
Blackboard Learn Deployment: A Detailed Update of Managed Hosting and SaaS De...Blackboard Learn Deployment: A Detailed Update of Managed Hosting and SaaS De...
Blackboard Learn Deployment: A Detailed Update of Managed Hosting and SaaS De...Blackboard APAC
 
Cybersecurity strategy-brief-to-itc final-17_apr2015
Cybersecurity strategy-brief-to-itc final-17_apr2015Cybersecurity strategy-brief-to-itc final-17_apr2015
Cybersecurity strategy-brief-to-itc final-17_apr2015IT Strategy Group
 
Updating Teaching Techonologies - Real World Impact!
Updating Teaching Techonologies - Real World Impact!Updating Teaching Techonologies - Real World Impact!
Updating Teaching Techonologies - Real World Impact!afacct
 
Slides | Research data literacy and the library
Slides | Research data literacy and the librarySlides | Research data literacy and the library
Slides | Research data literacy and the libraryColleen DeLory
 
Slides | Research data literacy and the library
Slides | Research data literacy and the librarySlides | Research data literacy and the library
Slides | Research data literacy and the libraryLibrary_Connect
 
Disruption in TEL the way of the future and the way to go
Disruption in TEL the way of the future and the way to goDisruption in TEL the way of the future and the way to go
Disruption in TEL the way of the future and the way to goCharles Darwin University
 

Similar to AWS Educate: Accelerating Cybersecurity and Cloud Workforce Preparation with AWS (20)

(ISM203) Enterprise Cloud Adoption Strategies in Higher Education
(ISM203) Enterprise Cloud Adoption Strategies in Higher Education(ISM203) Enterprise Cloud Adoption Strategies in Higher Education
(ISM203) Enterprise Cloud Adoption Strategies in Higher Education
 
Ravi Chandran - WESST - NUS’ Technology Enhanced Learning Environment
Ravi Chandran - WESST - NUS’ Technology Enhanced Learning EnvironmentRavi Chandran - WESST - NUS’ Technology Enhanced Learning Environment
Ravi Chandran - WESST - NUS’ Technology Enhanced Learning Environment
 
Erau webinar-applied information technologies
Erau webinar-applied information technologiesErau webinar-applied information technologies
Erau webinar-applied information technologies
 
Erau cybersecurity and security degrees
Erau cybersecurity and security degreesErau cybersecurity and security degrees
Erau cybersecurity and security degrees
 
Cyber Security_Presentation_KTH
Cyber Security_Presentation_KTHCyber Security_Presentation_KTH
Cyber Security_Presentation_KTH
 
NWCSC March 2022 event.pptx
NWCSC March 2022 event.pptxNWCSC March 2022 event.pptx
NWCSC March 2022 event.pptx
 
Student Success Plan Learner Relationship Management Tech Review
Student Success Plan Learner Relationship Management Tech ReviewStudent Success Plan Learner Relationship Management Tech Review
Student Success Plan Learner Relationship Management Tech Review
 
Ppt tale kn_intro_final
Ppt tale kn_intro_finalPpt tale kn_intro_final
Ppt tale kn_intro_final
 
Pmd prospective students 2.22.2222
Pmd prospective students 2.22.2222Pmd prospective students 2.22.2222
Pmd prospective students 2.22.2222
 
July 20, 2016 Webcast for the Cybersecurity MS at NYU Tandon Online
July 20, 2016 Webcast for the Cybersecurity MS at NYU Tandon OnlineJuly 20, 2016 Webcast for the Cybersecurity MS at NYU Tandon Online
July 20, 2016 Webcast for the Cybersecurity MS at NYU Tandon Online
 
Creating a developer pipeline by teaching gateway technologies
Creating a developer pipeline by teaching gateway technologiesCreating a developer pipeline by teaching gateway technologies
Creating a developer pipeline by teaching gateway technologies
 
TALK Cybersecurity Summit 2017: Panel on Ky Cyber Ed Pathway
TALK Cybersecurity Summit 2017:  Panel on Ky Cyber Ed PathwayTALK Cybersecurity Summit 2017:  Panel on Ky Cyber Ed Pathway
TALK Cybersecurity Summit 2017: Panel on Ky Cyber Ed Pathway
 
Online MS in Cybersecurity at NYU
Online MS in Cybersecurity at NYUOnline MS in Cybersecurity at NYU
Online MS in Cybersecurity at NYU
 
Blackboard Learn Deployment: A Detailed Update of Managed Hosting and SaaS De...
Blackboard Learn Deployment: A Detailed Update of Managed Hosting and SaaS De...Blackboard Learn Deployment: A Detailed Update of Managed Hosting and SaaS De...
Blackboard Learn Deployment: A Detailed Update of Managed Hosting and SaaS De...
 
Cybersecurity strategy-brief-to-itc final-17_apr2015
Cybersecurity strategy-brief-to-itc final-17_apr2015Cybersecurity strategy-brief-to-itc final-17_apr2015
Cybersecurity strategy-brief-to-itc final-17_apr2015
 
Updating Teaching Techonologies - Real World Impact!
Updating Teaching Techonologies - Real World Impact!Updating Teaching Techonologies - Real World Impact!
Updating Teaching Techonologies - Real World Impact!
 
Slides | Research data literacy and the library
Slides | Research data literacy and the librarySlides | Research data literacy and the library
Slides | Research data literacy and the library
 
Slides | Research data literacy and the library
Slides | Research data literacy and the librarySlides | Research data literacy and the library
Slides | Research data literacy and the library
 
Data-X-Sparse-v2
Data-X-Sparse-v2Data-X-Sparse-v2
Data-X-Sparse-v2
 
Disruption in TEL the way of the future and the way to go
Disruption in TEL the way of the future and the way to goDisruption in TEL the way of the future and the way to go
Disruption in TEL the way of the future and the way to go
 

More from Amazon Web Services

Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...Amazon Web Services
 
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...Amazon Web Services
 
Esegui pod serverless con Amazon EKS e AWS Fargate
Esegui pod serverless con Amazon EKS e AWS FargateEsegui pod serverless con Amazon EKS e AWS Fargate
Esegui pod serverless con Amazon EKS e AWS FargateAmazon Web Services
 
Costruire Applicazioni Moderne con AWS
Costruire Applicazioni Moderne con AWSCostruire Applicazioni Moderne con AWS
Costruire Applicazioni Moderne con AWSAmazon Web Services
 
Come spendere fino al 90% in meno con i container e le istanze spot
Come spendere fino al 90% in meno con i container e le istanze spot Come spendere fino al 90% in meno con i container e le istanze spot
Come spendere fino al 90% in meno con i container e le istanze spot Amazon Web Services
 
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...Amazon Web Services
 
OpsWorks Configuration Management: automatizza la gestione e i deployment del...
OpsWorks Configuration Management: automatizza la gestione e i deployment del...OpsWorks Configuration Management: automatizza la gestione e i deployment del...
OpsWorks Configuration Management: automatizza la gestione e i deployment del...Amazon Web Services
 
Microsoft Active Directory su AWS per supportare i tuoi Windows Workloads
Microsoft Active Directory su AWS per supportare i tuoi Windows WorkloadsMicrosoft Active Directory su AWS per supportare i tuoi Windows Workloads
Microsoft Active Directory su AWS per supportare i tuoi Windows WorkloadsAmazon Web Services
 
Database Oracle e VMware Cloud on AWS i miti da sfatare
Database Oracle e VMware Cloud on AWS i miti da sfatareDatabase Oracle e VMware Cloud on AWS i miti da sfatare
Database Oracle e VMware Cloud on AWS i miti da sfatareAmazon Web Services
 
Crea la tua prima serverless ledger-based app con QLDB e NodeJS
Crea la tua prima serverless ledger-based app con QLDB e NodeJSCrea la tua prima serverless ledger-based app con QLDB e NodeJS
Crea la tua prima serverless ledger-based app con QLDB e NodeJSAmazon Web Services
 
API moderne real-time per applicazioni mobili e web
API moderne real-time per applicazioni mobili e webAPI moderne real-time per applicazioni mobili e web
API moderne real-time per applicazioni mobili e webAmazon Web Services
 
Database Oracle e VMware Cloud™ on AWS: i miti da sfatare
Database Oracle e VMware Cloud™ on AWS: i miti da sfatareDatabase Oracle e VMware Cloud™ on AWS: i miti da sfatare
Database Oracle e VMware Cloud™ on AWS: i miti da sfatareAmazon Web Services
 
Tools for building your MVP on AWS
Tools for building your MVP on AWSTools for building your MVP on AWS
Tools for building your MVP on AWSAmazon Web Services
 
How to Build a Winning Pitch Deck
How to Build a Winning Pitch DeckHow to Build a Winning Pitch Deck
How to Build a Winning Pitch DeckAmazon Web Services
 
Building a web application without servers
Building a web application without serversBuilding a web application without servers
Building a web application without serversAmazon Web Services
 
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...Amazon Web Services
 
Introduzione a Amazon Elastic Container Service
Introduzione a Amazon Elastic Container ServiceIntroduzione a Amazon Elastic Container Service
Introduzione a Amazon Elastic Container ServiceAmazon Web Services
 

More from Amazon Web Services (20)

Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
 
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
 
Esegui pod serverless con Amazon EKS e AWS Fargate
Esegui pod serverless con Amazon EKS e AWS FargateEsegui pod serverless con Amazon EKS e AWS Fargate
Esegui pod serverless con Amazon EKS e AWS Fargate
 
Costruire Applicazioni Moderne con AWS
Costruire Applicazioni Moderne con AWSCostruire Applicazioni Moderne con AWS
Costruire Applicazioni Moderne con AWS
 
Come spendere fino al 90% in meno con i container e le istanze spot
Come spendere fino al 90% in meno con i container e le istanze spot Come spendere fino al 90% in meno con i container e le istanze spot
Come spendere fino al 90% in meno con i container e le istanze spot
 
Open banking as a service
Open banking as a serviceOpen banking as a service
Open banking as a service
 
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
 
OpsWorks Configuration Management: automatizza la gestione e i deployment del...
OpsWorks Configuration Management: automatizza la gestione e i deployment del...OpsWorks Configuration Management: automatizza la gestione e i deployment del...
OpsWorks Configuration Management: automatizza la gestione e i deployment del...
 
Microsoft Active Directory su AWS per supportare i tuoi Windows Workloads
Microsoft Active Directory su AWS per supportare i tuoi Windows WorkloadsMicrosoft Active Directory su AWS per supportare i tuoi Windows Workloads
Microsoft Active Directory su AWS per supportare i tuoi Windows Workloads
 
Computer Vision con AWS
Computer Vision con AWSComputer Vision con AWS
Computer Vision con AWS
 
Database Oracle e VMware Cloud on AWS i miti da sfatare
Database Oracle e VMware Cloud on AWS i miti da sfatareDatabase Oracle e VMware Cloud on AWS i miti da sfatare
Database Oracle e VMware Cloud on AWS i miti da sfatare
 
Crea la tua prima serverless ledger-based app con QLDB e NodeJS
Crea la tua prima serverless ledger-based app con QLDB e NodeJSCrea la tua prima serverless ledger-based app con QLDB e NodeJS
Crea la tua prima serverless ledger-based app con QLDB e NodeJS
 
API moderne real-time per applicazioni mobili e web
API moderne real-time per applicazioni mobili e webAPI moderne real-time per applicazioni mobili e web
API moderne real-time per applicazioni mobili e web
 
Database Oracle e VMware Cloud™ on AWS: i miti da sfatare
Database Oracle e VMware Cloud™ on AWS: i miti da sfatareDatabase Oracle e VMware Cloud™ on AWS: i miti da sfatare
Database Oracle e VMware Cloud™ on AWS: i miti da sfatare
 
Tools for building your MVP on AWS
Tools for building your MVP on AWSTools for building your MVP on AWS
Tools for building your MVP on AWS
 
How to Build a Winning Pitch Deck
How to Build a Winning Pitch DeckHow to Build a Winning Pitch Deck
How to Build a Winning Pitch Deck
 
Building a web application without servers
Building a web application without serversBuilding a web application without servers
Building a web application without servers
 
Fundraising Essentials
Fundraising EssentialsFundraising Essentials
Fundraising Essentials
 
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
 
Introduzione a Amazon Elastic Container Service
Introduzione a Amazon Elastic Container ServiceIntroduzione a Amazon Elastic Container Service
Introduzione a Amazon Elastic Container Service
 

AWS Educate: Accelerating Cybersecurity and Cloud Workforce Preparation with AWS

  • 2. James Robertson, Program Chair and Collegiate Professor Computer Science, University of Maryland University College David Greer, Senior Vice President and Chief Programs Officer, Project Lead the Way
  • 3. Accelerating Cybersecurity and Cloud Workforce Preparation with AWS Jim Robertson, EdD Program Chair and Collegiate Professor: Computer Science, Software Developer and Security University of Maryland Global Campus
  • 4. Agenda • Introduction • AWS Educate • Implementation • Challenges and Mitigations • Student and Faculty Feedback • Next Steps • Summary • Q&A
  • 5. Introduction • “Urgent Need for Cybersecurity Professionals Grows” • “Cybersecurity’s 3-Million-Person Workforce Shortage is Now a Risk Management Problem” • “(ISC)² Report Finds Cybersecurity Workforce Gap Has Increased to More Than 2.9 Million Globally”
  • 6. Introduction • Cyberseek.org shows heat map of cyber jobs • BLS - 28% growth (much faster than average)
  • 7. AWS Educate • Security is part of the AWS Well-Architected Framework • Resources within AWS Educate help students/educators learn skills and tools to support cybersecurity workforce needs The ability to protect information, systems, and assets while delivering business value through risk assessments and mitigation strategies.
  • 8. AWS Educate • Access to AWS technology • Open-source content, training resources • Community collaboration • AWS credits, demos, and special on-campus program • Career pathways
  • 10. Implementation – Learning Outcomes • Conduct automated and manual analysis on two different Linux, Apache, MySQL, PHP (LAMP) applications • Identify, prioritize, and repair software vulnerabilities found in the LAMP applications • Document the process and findings of your web application security analysis
  • 11. Implementation – Learning Outcomes • Demonstrate and fix CWE/SANS Top 25 vulnerabilities under the category of “Porous Defenses” • Use of a broken or risky cryptographic algorithm • Improper restriction of excessive authentication attempts • Use of a one-way hash without a salt
  • 12. Implementation – Learning Outcomes • Use auditing features with Oracle to monitor, track, and identify any user who reads, inserts, updates, or deletes data from specific tables • Analyze large Apache http server files for possible botnet attacks
  • 13. Implementation • Before AWS • After AWS • After AWS Educate
  • 14. Important Considerations • AWS Free Tier • AWS approval • AWS versus University Help Desk • AWS Educate requirements • Demo
  • 15. Student and Faculty Feedback • “The labs were excellent!” • “Content is relevant and up to date to the professional world.” • “Good teaching and interesting and useful assignments.” • “Instructions were easy to follow.”
  • 16. Next Steps • Automated process for class creation • Adoption by other programs • Dedicated support at the university
  • 17. Summary • AWS Educate accelerates learning at University of Maryland Global Campus • Prepares students for real-world jobs to fill cybersecurity workforce gaps • Anticipate continued improvement in teaching tools and learning materials from AWS Educate
  • 18. July 10-11, 2019 The Conference Center,
  • 19. James Robertson, Program Chair and Collegiate Professor Computer Science, University of Maryland University College David Greer, Senior Vice President and Chief Programs Officer, Project Lead the Way
  • 20. • Activity, Project and Problem-Based (APB) Curriculum • Relevant Content, In-demand Knowledge and Skills • Unmatched Professional Development K-12 Cybersecurity Workforce Development David Greer
  • 21. Agenda • Project Lead the Way (PLTW) overview • Workforce needs • The PLTW cybersecurity experience • Preparing and supporting teachers • Questions
  • 22. Project Lead The Way (PLTW) Project Lead The Way is a nonprofit organization that provides a transformative learning experience for PreK-12 students and teachers across the U.S. Through our PreK-12 pathways in computer science, engineering, and biomedical science, we empower students to develop the in-demand knowledge and transportable skills to thrive in an evolving world. • PreK-12 pathways in computer science, engineering and biomedical science • Over 11,500 schools • Millions of students in all 50 states • Trained over 65,000 teachers
  • 23. Our PreK-12 Pathway PLTW Launch (PreK-5) PLTW Gateway (6-8) PLTW Engineering (9-12) PLTW Biomedical Science (9-12) PLTW Computer Science (9-12) • Computer Science Essentials • Cybersecurity (10th Grade or above) • Computer Science Principles (AP) • Computer Science A (AP)
  • 24. PLTW’s Commitment to CS education We believe all students – beginning at a young age – need access to quality computer science education. Providing a PreK-12 CS experience that inspires student interest, is inclusive, and prepares students to thrive in an evolving world. Offering a comprehensive PreK-12 solution, including a wide range of CS modules, units, and courses that build on each other and flow naturally together. Being actively engaged with the CS community, our network of educators, and partners to inform PLTW students’ and teachers’ experience. Helping districts and schools provide smoother transitions between elementary, middle, and high school computer science coursework.
  • 25. The PLTW Cybersecurity Experience Turning a National Problem into Student Opportunities
  • 26.
  • 27. “Organizations continue to struggle with finding security talent – from leadership to entry-level members – to combat increasingly sophisticated cyber threats and manage complex infrastructures.” James Robinson - PLTW Cybersecurity advisory board member and TPRM product management/information security officer at Optiv
  • 28. Sparks Student Interest and Fosters In-Demand Skills Connected to Industry and Aligned to Standards Engaging, Secure, and Responsible PLTW is committed to providing students with inspiring and relevant learning experiences. The Cybersecurity course accomplishes this through three key benefits:
  • 29. By the end of the course, students will be able to: • Identify cybersecurity threats and protect against them. • Detect intrusions and respond to attacks. • Begin to examine their own digital footprint and better defend their own personal data. • Learn how organizations protect themselves in today’s world. • Establish an ethical code of conduct while learning to defend data in today’s complex cyberworld. Course Units Benefit #1: Student Interest and In-Demand Skills Students train to solve real-world problems as cybersecurity experts do. Personal Cybersecurity System Security Network Security Applied Cybersecurity 1 2 3 4
  • 30. • Follows National Cybersecurity Workforce Framework (NICE Framework or NCWF) • Aligns to Computer Science Teachers Association (CSTA) K-12 standards and Common Core Standards • Ensures access to the most in- demand and relevant experiences (Cybersecurity course's advisory board) Benefit #2: Connected and Aligned Industry connection and standards alignment informed course development.
  • 31. Main Components Benefit #3: Engaging, Secure, and Responsible Students explore operating systems in isolation and learn an ethical approach. Ethical Approach Well-Known Exploits Network Security Labs 1 2 3
  • 32. PLTW Network Security Labs Powered by AWS Security Labs Virtual Desktops In browser, no additional software or configuration Within Courses Custom environment, custom activities Safe, Secure, Isolated All tasks embedded within security labs 1 2 3 “PLTW Network Security Labs provide a safe space to explore exploits that would not be accessible in a school’s network environment.”
  • 33. Network Security Lab Example In this activity students work through a scenario: The “Bank of Virgil” is a testing and training site for employees. It allows them to witness and explore exploits such as XXS and SQL injection. Launching the Lab: Server Exploits
  • 34. Network Security Lab Example In this activity students work through a scenario: The “Bank of Virgil” is a testing and training site for employees. It allows them to witness and explore exploits such as XXS and SQL injection. Activity 2.3.1 Securing Ecommerce Data
  • 35. Network Security Lab Example Activity 2.3.1 Securing Ecommerce Data In this activity students work through a scenario: The “Bank of Virgil” is a testing and training site for employees. It allows them to witness and explore exploits such as XXS and SQL injection.
  • 36. Network Security Lab Example Activity 2.3.1 Securing Ecommerce Data In this activity students work through a scenario: The “Bank of Virgil” is a testing and training site for employees. It allows them to witness and explore exploits such as XXS and SQL injection.
  • 37. Network Security Lab Example Activity 2.3.1 Securing Ecommerce Data How to mitigate? • Students explore software • Compare algorithms • View low vs. high security • Recognize security measures • Prohibit exploits
  • 38. Preparing Teachers to Facilitate the Cybersecurity Course A Blended Approach
  • 39. • Eager to learn as they teach • Embraces the world of cybersecurity • Tech-enthusiastic • Exhibits excitement and curiosity • Demonstrates a willingness to learn new things, engage students, and lead unmatched learning experiences Characteristics of a Cybersecurity Teacher Teachers do not need to have computer science or prior programing experience.
  • 40. What Does Training Look Like? PLTW cybersecurity professional development components include: (30 Hours) Prerequisite Training (14-24 Hours) Onsite Core Training (5 Days) Job-Embedded Training (30 Hours) During each training component, teachers will experience the curriculum from the student perspective as well as work to prepare themselves to effectively facilitate the course. Because of this, it is imperative that teachers complete training as they implement the curriculum.
  • 41. Conclusion • Workforce needs • Start early • Provide relevance • Support teachers • Connect to college and career
  • 42. For more information, contact: David Greer – dgreer@pltw.org