In this hour long Webinar... Password crackers such as John the Ripper ("JtR") are an integral part of a forensic practitioner's toolkit. However, many of us just use the default "rules" defined in the configuration file rather than using optimized rules. But in real-world settings users are choosing more complex passwords. This behavior is enforced/encouraged in corporate environments by password complexity and rotation policies. In this presentation, we will demonstrate how JtR's default rule-set can be improved to crack tens of thousands of additional passwords.
Practical Cryptography: Steps for applying encryption in today's networksApril 11, 2012
In this hour long Webinar...The world has moved to "the cloud" rapidly over the past two years. You will learn about essential information for securing a cloud-based presence. Topics will include balancing scalability and security, steps for choosing a secure provider, current techniques for overcoming typical cloud security issues, and cloud forensics.
The Cloud, Security, and You: Tips, Tricks and TrapsMarch 21, 2012
In this hour long Webinar...Encrypting data at rest and in transit has become a standard procedure. But how, exactly, do today's devices use encryption? We invite you to learn more about practical encryption in our upcoming Webinar.
Internship and Scholarship opportunitiesFebruary 09, 2012
Internship and Scholarship opportunities:
Department of Homeland Security HS-STEM Summer Internship Program for students in Science, Technology, Engineering, and Mathematics. Deadline: January 5, 2012
AFCEA Educational Foundation Intelligence & Cyber Studies Scholarship. Deadline: November 1, 2012
Boren Scholarships and Fellowship. Deadline: February 9, 2012
Membership with CyberWatch ConsortiumDecember 05, 2011
We are pleased to announce that the Hood College Center for Computer Security and Information Assurance of the Department of Computer Science has been accepted as a member of the CyberWatch Consortium. Funded by the National Science Foundation, CyberWatch is a consortium of higher education institutions, businesses, and government agencies whose mission is to improve the quantity and quality of the information assurance (IA) workforce.