National Youth Cyber Education Program11 H 21 M

This course is an introduction to the CyberPatriot national competition aimed at involving students with STEM and cyber security.

Just you? Training a whole team? There's an ITProTV plan that fits.

Start Training Today
  • Introduction to CyberPatriot and cybersecurity
    • Program Overview
    • CyberPatriot and Cybersecurity
    • The Competition
    • Introduction to Cybersecurity
  • Introduction to Online Safety
    • Online Safety
    • Online Safety Part 2
  • Cyber Ethics
    • Cyber Ethics
    • Current Event 1
    • Current Event 2
    • Current Event 3
    • Scenario 1
    • Scenario 2
    • Scenario 3
    • Scenario 4
    • Scenario 5
    • Scenario 6
  • Principles of Cybersecurity
    • Principles of Cybersecurity
    • CIA Triad
    • Threats and Vulnerabilities
    • Cyber Threats and Countermeasures
    • Cyber Threats and Countermeasures Part 2
    • Basic Cybersecurity Techniques
    • Basic Cybersecurity Techniques Part 2
  • Computer Basics and Virtualization
    • Computer Basics and Virtualization
    • How Computers Work
    • How Computers Work Part 2
    • Virtual Machines
    • Networking Basics
  • Microsoft Windows Basic and MSDN
    • Microsoft Windows Basics and MSDN
    • Windows Version History
    • Windows Basics
    • What is MSDN
    • How to Use MSDN for Training
  • Microsoft Windows Security Tools
    • Microsoft Windows Security Tools
    • Basic Security Policies and Tools
    • Basic Security Policies and Tools Part 2
    • Basic Security Policies and Tools Part 3
    • Account Management
    • Account Management Part 2
  • Microsoft Windows Security Configuration
    • Microsoft Windows Security Configuration
    • Windows File Protections
    • Windows Auditing
    • Performance Monitoring
  • Introduction to Linux and Ubuntu
    • Introduction to LInux and Ubuntu
    • What is Linux
    • Ubuntu Terminology and Concepts
    • Introduction to Ubuntu Command Lines
    • Introduction to Ubuntu Command Line Part 2
  • Ubuntu Security Configuration
    • Ubuntu Security
    • Basic GUI Security
    • Basic Command Line Security
    • Advanced Ubuntu Security

Program Overview

8 M

itprotv course thumbnailitprotv course thumbnailitprotv course thumbnail
  • Episode Description
  • Transcript

This segment highlights information pertaining to the CyberPatriot program. You will also be introduced to our show host Cherokee Boose and special guest Professor Steve Linthicum.

[SOUND] Welcome ladies and gentlemen. You've heard this term, Cyber Patriot, but you might not understand all the details associated with this program. That's okay, because I'm going to go ahead and help you out. My name is Cherokee Boose and I'll be acting as a show host through the duration of these shows. We also have a very special guest named Professor Steve Linthecome travelling all the way from California to go ahead and help you with these training videos. So let's go ahead and give him a warm welcome here. Welcome Steve. >> Thank you very much. And for you students out there, one of the reasons why I decided that this would be a great idea to work on putting this together, is I looked at the materials that you had available to you from Cyber Patriot. There were a whole series of slides, and we're going to use those slides so that we can present the materials in a fashion that I think will be much easier for you to absorb. And I really want to thank ITProTV for allowing me to come here and to provide you with these materials because I think it'll really benefit you as students. So why don't we go over to the slides that I prepared? Now, that's just basically the introductory slide. But as we go through it, I want to comment relative to what I call resource partners. And they're a bunch of entities that helped put this project together. Obviously one of them is ITPROTV, but we also have the CYBERPATRIOT program, we're using their materials, you're benefiting from what this group of individuals has done. They're sponsored by the airforce association, North of is a key sponsor associated with them, we have NDG here, NDG has a course that you're going to be able to have free access to The will teach you Linux principles and I think it's really good. There is incidentally with ITProTV, you're also going to have access to a free IT fundamentals course, which we go through a little bit of networking here, but we can't cover it all. So you're gonna have access to that. We got the Cisco Network Academy that's providing you access to their net academy program And there are a whole bunch of modules that your coach is going to have you go through. There.s Cyber Watch West, that's a academic centre of excellence based out of Washington. They are a key participant. We;ve got My College Sierra College it's obviously a key participant and the North by North Regional Consortium my college is a member of that. They've supported this effort. And I really want to thank the California Community College Chancellor's Office that has provided funding for this particular effort under their doing what matters program. So these are all key resource- >> Looks like a lot of people really care and are putting forth efforts to go ahead and make this initiative happen. And Steven I do appreciate you thanking ITProTV. But we'd like to thank you as well, and thank all of the adults and participants, the new students, as well, for doing this. Because it's such a great opportunity to really set you up for a better lifestyle. >> And the reason it's going to set you up for a better lifestyle is, if you prefer to go down this career path. As you go through here and you learn cybersecurity. If you think, boy, this would be fun to do as a job. I want to show you this next slide, because I think it's really important. This is a recent slide shot, a screen shot. Of the CyberSeek site. You can go to it, it's at It was funded by NIST, which is the National Institute of, what is it, Standards and Technology. >> Technology. >> Yeah, sometimes I want to say- >> We have so many acronyms. >> Yeah, they do. >> And you guys will find that out. [LAUGH] >> They do, and if you look at this slide >> And I pulled this last night off of the Internet. It indicates here in the lower left hand corner that there are currently in the United States 348,975 jobs. >> Overwhelming. >> The workforce, the totally employed workforce right now is about three quarters of a million >> People, now slightly over that. But look at that. all them are >> You see that huge deficit there. >> Yeah. They're working all those 3 quarters of a million are working and yet we have vacancies in 300, in almost 350,000 positions, so there is a heck of an opportunity here across the nation relative to jobs out there. And what we need, is we need people in those jobs. And you're well equipped to get there. You go through the Cyber Patriot program, perhaps go to a community college like Sierra, go through our training programs that are tied to industry driven certifications. And that's funny with cybersecurity and with a lot of IT, those industry driven certifications are of utmost importance. They prove to employers that you know something. They prove to employers because to keep them, you've got to continue continuing education we call it. >> Lifelong learners. >> Yeah lifelong learners. And so it's really important that you go through and you achieve those objectives. And what a great job this is. The key elements of it with regard to cybersecurity here, it's a bit of a challenge for companies and for governments to outsource cybersecurity. Beyond the jurisdictional limits of the courts of the United States. The FBI can't chase you in Eastern Europe very well if you do something wrong, so the employers are going to want to make sure you're from this country and you're in this country as you do your work. Another great news about this job is because so much of what you do is remote, meaning you're going to remote into systems, you don't necessarily need to be in an office building, your company's office building to do your work. You might be working from home, you might be working from the beach. >> [LAUGH] There really are so many benefits in working in IT, and personally >> Personally, I got into IT to really just better my family's life, and that's why I say it's possible for you to do the same. Because I didn't have a cyber patriot program like this. I really wish I did, because I am just so impressed with the amount of resources that you guys have available to you. And here's the thing. Even if you already don't have a really solid knowledge base, that's okay, because you have a lot of tools at your disposal. Right and a couple things I wanted to cover briefly back on the slides. The way that we've broken this out generally is at the beginning of each unit and I believe there are ten units, you'll have the opening slide. For example here it will identify Unit One with its heading. We will go through it and we'll go through it and do the standard sort of learning objectives. This is the way we teach today, we identify the students learning objectives and then we'll go through and, so first here im telling you what im going to teach you, then we'll go through the modules and I'll teach it. And then ultimately I'll remind you as to what I've taught you, so that's kind of the pattern were going to use >> 3 t's yea >> Yea >> And so here is, for example, section one. And at the end of each section, I mean, at the end of each unit we're going to go through and this is the final slide and the purpose of this final slide is I want this content to remain >> Current. And so I have set up a site and I'll go to it here. This is the link for it so make sure you know that link and go and visit it. This is the main page,this is the Cyber Patriot learning content. I've characterize it as center, and I broken down each module so that you can see what's there and I've put in contents that's recent >> That keeps you up to date relative to each one of the modules. So please go as you go through these units, make sure to check out that main page and check out your unit and see if there are any additional content that I think is important for you to know. Cool. So I'm excited, I don't know if you guys are, but let's go ahead and jump into some of that content, like Steve was just showing us. We're gonna go ahead and wrap up this introduction and get ready, get comfortable. We've got a lot of really great information coming your way. But for this particular segment, I'm gonna go ahead and sign off as your host, Cherokee Boose >> And I'm Professor Steve Linthicum. >> See you next time here for CyberPatriot. [MUSIC] >> Thank you for watching ITProTV.