Computational Thinking and Skills: A Foundation for STEM and Cybersecurity Education

Success in multiple industry sectors or any of the hundreds of new tech-heavy jobs emerging in the modern economy requires a core competency: computational thinking and skills. Computational thinking and skills extend beyond computer programming to include a larger set of knowledge and skills broadly captured by a wide swath of STEM disciplines, including cybersecurity. This webinar will explain why acquiring computational thinking and skills are important for STEM-related careers and how to incorporate and assess computational thinking and skills as part of cybersecurity education and training programs.
Watch Now

Spotlight

OTHER ON-DEMAND WEBINARS

To Protect and Secure: Selling Cybersecurity as a Service

Auvik Networks

A new year brings new threats, new exploits—and new MSP opportunities in cybersecurity. Understanding global technology trends and cyberthreats like ransomware can help you successfully deliver security as a service to your clients. Auvik AVP of product management Patrick Albert talks with Tayler Feigl, Channel Development Manager, APAC at Datto to discuss key findings in Datto’s annual State of the Channel Ransomware Report, the result of interviewing 100,000 small to mid-sized business (SMBs) around the globe. You’ll hear what your MSP peers are doing to prepare, protect, and recover against ransomware, and investigate how you can use these findings to sell cybersecurity as part of your managed services offering.
Watch Now

Tracking attackers. Why attribution matters and how to do it

Black Hills Information Security

In this BHIS webcast we cover some new techniques and tactics on how to track attackers via various honey tokens. We cover how to track with Word Web Bugs in ADHD, and cover the awesome toolkit from Thinkst. We also cover some of the legal ramifications involved in do this. I am covering this for a couple of reasons. First, there are a lot of companies who are selling cyber deception in the form of honeypots, which is cool – but not near enough for attribution. Also, it is time to start gearing up for Black Hat.
Watch Now

Endpoint Security Got You Down? No PowerShell? No Problem

Black Hills Information Security

Do your PowerShell scripts keep getting caught? Tired of dealing with EDRs & Windows Defender every time you need to pop a box? In this one-hour webcast, we introduce a somewhat new Red Team approach that we call BYOI (Bring Your Own Interpreter). Turns out, by harnessing the powah of C# and the .NET framework you can embed entire interpreters inside of a C# binary. This allows you to dynamically access all of the .NET API from a scripting language of your choosing without going through Powershell in any way! We also cover some basic .NET & C# concepts in order to understand why this is possible and all the hype surrounding offensive C# tradecraft.
Watch Now

Anatomy of Container Attack Vectors and Mitigations

Data breach

Container adoption is skyrocketing, and so are concerns around securing container-based applications. While the market is still in its early phase of embracing this technology, lessons learned from securing Fortune 500 enterprise deployments against simple and sophisticated attacks alike are showing the path forward. Join us on an investigative journey as we explore popular attack vectors that have been used to breach container-based environments, provide best practices and tools to mitigate them, and discuss associated business risks.
Watch Now