SlideShare una empresa de Scribd logo
1 de 2
Descargar para leer sin conexión
At-A-Glance
CyberPatriot: Inspiring Student Interest in Cybersecurity
and STEM
By 2018, the U.S. Department of Commerce estimates there will be
1.2 million unfilled science, technology, engineering, and mathematics
(STEM) jobs in the United States. The CyberPatriot program is helping
to fill that gap with qualified talent by exciting K–12 students about
cybersecurity or other STEM disciplines through education and
competition.
CyberPatriot features three programs:
National Youth Cyber Defense Competition
This event challenges high school and middle school students to
act as IT professionals who must manage a small company network.
Students compete in teams of five at their state and regional levels
and are evaluated on how well they can find and protect against known
vulnerabilities on a virtual network. Top teams earn an all-expenses-
paid trip to Washington, DC, to compete in a national event to earn
recognition and scholarships.
AFA CyberCamps
These five-day summer camps teach students across the coutnry about
cybersecurity and conclude with a mock competition.
Elementary School Cyber Education Initiative
Available to K–6 students, this free class teaches the importance of
online safety and helps students learn how to protect themselves on the
Internet.
Why Cybersecurity Matters
•	 Nearly all industries in the United States rely on cybersecurity,
including banking, commerce, manufacturing, and defense
•	 Predators can exploit young children on the Internet if proper security
practices aren’t followed
•	 Cyber careers are in high demand and currently there’s a workforce
shortage of one million information security professionals, worldwide
Air Force Association’s
CyberPatriot
The National Youth Cyber Education Program
© 2015 Cisco and/or its affiliates. All rights reserved.
CyberPatriot Benefits
•	 Helps students understand the
importance of cybersecurity
•	 Equips students to better protect
themselves on the Internet
•	 Teaches students skills that
can be used in college and the
workforce
•	 Encourages students to pursue
cyber or STEM-related careers
•	 Raises cybersecurity awareness in
schools
•	 Engages students to learn
about cybersecurity and STEM
disciplines
•	 Fosters teamwork and school
pride among students
•	 Fuels competitive spirit
At-A-Glance
Sources:
•	www.uscyberpatriot.org
•	Source for shortage of one million information security professionals: Cisco 2015 Annual Security Report
•	Source for 1.2 million unfilled STEM jobs: U.S. Department of Commerce
© 2015 Cisco and/or its affiliates. All rights reserved.
Participate in CyberPatriot: The Four-Step CSTP Method
1.	Find a Coach								
A coach is someone at your school who is passionate about providing
this opportunity to students and who doesn’t have to be an expert in
cybersecurity or computers.
2.	Get Support									
Your team will need technical and non-technical support. Technical
mentors are professionals, students, or IT-experienced adults who
can volunteer to help your coach and team understand cybersecurity
and related concepts in the competition. They can be at your school,
in the local community, at a four-year college, or employed at a local
business. Non-technical support includes adults willing to assist with
transportation, set up, or simply provide encouragement.
3.	Form a Team									
A team consists of up to five students. Each competitor has his or her
own role but the team needs to function as a whole as well. Players
need a computer or laptop that can run the virtual images used for
practice and competition and access the Internet.
4.	Practice 								
Here’s where the fun starts. Your team needs to practice often—
at least several hours a week leading up to the competition. The
stronger commitment your team has, the better chances you have of
winning and moving onto finals in Washington, DC.
Cisco and STEM
Cisco is committed to inspiring more people to pursue STEM education
and careers. We believe encouraging people to study STEM is
imperative for society. Through mentoring, IT training, and support for
schools and nonprofits, we are working to increase the pipeline of STEM
talent around the world. We are excited be a CyberPatriot sponsor and
to share access to the Cisco Network Academy® with teams.
For More Information
Visit https://www.uscyberpatriot.org/home to register your team, sign
up to volunteer, or explore more about the program, including costs,
competition requirements, and available resources.
To learn about other Cisco® STEM programs,
visit http://csr.cisco.com/pages/stem-at-cisco.
Cisco CyberPatriot
Training Materials
All teams participating in
CyberPatriot receive access to
the Cisco Networking Academy®
platform that includes three
CyberPatriot-specific training
courses:
•	 Instructor Course provides
instructors an introduction to the
site and instructions on how to
start teaching teams
•	 Content Course includes team
training modules that help
students increase their networking
knowledge. Coaches and mentors
can create a content course once
the instructor course is complete
•	 Competition Course allows teams
to access quizzes and Packet
Tracer activities
Questions about accessing the
course materials should be directed
to the CyberPatriot Program Office
at cpoc@uscyberpatriot.org, 		
not Cisco.

Más contenido relacionado

Más de Cisco Security

The Evolution of and Need for Secure Network Access
The Evolution of and Need for Secure Network AccessThe Evolution of and Need for Secure Network Access
The Evolution of and Need for Secure Network Access
Cisco Security
 

Más de Cisco Security (20)

AMP Helps Cisco IT Catch 50% More Malware threats
AMP Helps Cisco IT Catch 50% More Malware threatsAMP Helps Cisco IT Catch 50% More Malware threats
AMP Helps Cisco IT Catch 50% More Malware threats
 
A Reality Check on the State of Cybersecurity
A Reality Check on the State of CybersecurityA Reality Check on the State of Cybersecurity
A Reality Check on the State of Cybersecurity
 
Balance Data Center Security and Performance
Balance Data Center Security and PerformanceBalance Data Center Security and Performance
Balance Data Center Security and Performance
 
The Cost of Inactivity: Malware Infographic
The Cost of Inactivity: Malware InfographicThe Cost of Inactivity: Malware Infographic
The Cost of Inactivity: Malware Infographic
 
Data Center Security Challenges
Data Center Security ChallengesData Center Security Challenges
Data Center Security Challenges
 
Enterprise Strategy Group: Security Survey
Enterprise Strategy Group: Security SurveyEnterprise Strategy Group: Security Survey
Enterprise Strategy Group: Security Survey
 
Malware and the Cost of Inactivity
Malware and the Cost of InactivityMalware and the Cost of Inactivity
Malware and the Cost of Inactivity
 
Midsize Business Solutions: Cybersecurity
Midsize Business Solutions: CybersecurityMidsize Business Solutions: Cybersecurity
Midsize Business Solutions: Cybersecurity
 
Integrated Network Security Strategies
Integrated Network Security StrategiesIntegrated Network Security Strategies
Integrated Network Security Strategies
 
Cisco Addresses the Full Attack Continuum
Cisco Addresses the Full Attack ContinuumCisco Addresses the Full Attack Continuum
Cisco Addresses the Full Attack Continuum
 
Infonetics Network and Content Security Vendor Scorecard
Infonetics Network and Content Security Vendor ScorecardInfonetics Network and Content Security Vendor Scorecard
Infonetics Network and Content Security Vendor Scorecard
 
Gartner Newsletter: Cisco TrustSec Deployed Across Enterprise Campus, Branch ...
Gartner Newsletter: Cisco TrustSec Deployed Across Enterprise Campus, Branch ...Gartner Newsletter: Cisco TrustSec Deployed Across Enterprise Campus, Branch ...
Gartner Newsletter: Cisco TrustSec Deployed Across Enterprise Campus, Branch ...
 
The Evolution of and Need for Secure Network Access
The Evolution of and Need for Secure Network AccessThe Evolution of and Need for Secure Network Access
The Evolution of and Need for Secure Network Access
 
Cisco 2014 Midyear Security Report
Cisco 2014 Midyear Security ReportCisco 2014 Midyear Security Report
Cisco 2014 Midyear Security Report
 
String of Paerls Infographic
String of Paerls InfographicString of Paerls Infographic
String of Paerls Infographic
 
Midyear Security Report Infographic
Midyear Security Report InfographicMidyear Security Report Infographic
Midyear Security Report Infographic
 
Cisco Annual Security Report Infographic
Cisco Annual Security Report InfographicCisco Annual Security Report Infographic
Cisco Annual Security Report Infographic
 
City of Tomorrow Builds in Next-Generation Security
City of Tomorrow Builds in Next-Generation SecurityCity of Tomorrow Builds in Next-Generation Security
City of Tomorrow Builds in Next-Generation Security
 
Laser Pioneer Secures Network End-to-End to Protect Assets
Laser Pioneer Secures Network End-to-End to Protect AssetsLaser Pioneer Secures Network End-to-End to Protect Assets
Laser Pioneer Secures Network End-to-End to Protect Assets
 
McAllen Intermediate School District
McAllen Intermediate School DistrictMcAllen Intermediate School District
McAllen Intermediate School District
 

Último

Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 

Último (20)

Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 

Why Schools Should Participate in the CyberPatriot Program

  • 1. At-A-Glance CyberPatriot: Inspiring Student Interest in Cybersecurity and STEM By 2018, the U.S. Department of Commerce estimates there will be 1.2 million unfilled science, technology, engineering, and mathematics (STEM) jobs in the United States. The CyberPatriot program is helping to fill that gap with qualified talent by exciting K–12 students about cybersecurity or other STEM disciplines through education and competition. CyberPatriot features three programs: National Youth Cyber Defense Competition This event challenges high school and middle school students to act as IT professionals who must manage a small company network. Students compete in teams of five at their state and regional levels and are evaluated on how well they can find and protect against known vulnerabilities on a virtual network. Top teams earn an all-expenses- paid trip to Washington, DC, to compete in a national event to earn recognition and scholarships. AFA CyberCamps These five-day summer camps teach students across the coutnry about cybersecurity and conclude with a mock competition. Elementary School Cyber Education Initiative Available to K–6 students, this free class teaches the importance of online safety and helps students learn how to protect themselves on the Internet. Why Cybersecurity Matters • Nearly all industries in the United States rely on cybersecurity, including banking, commerce, manufacturing, and defense • Predators can exploit young children on the Internet if proper security practices aren’t followed • Cyber careers are in high demand and currently there’s a workforce shortage of one million information security professionals, worldwide Air Force Association’s CyberPatriot The National Youth Cyber Education Program © 2015 Cisco and/or its affiliates. All rights reserved. CyberPatriot Benefits • Helps students understand the importance of cybersecurity • Equips students to better protect themselves on the Internet • Teaches students skills that can be used in college and the workforce • Encourages students to pursue cyber or STEM-related careers • Raises cybersecurity awareness in schools • Engages students to learn about cybersecurity and STEM disciplines • Fosters teamwork and school pride among students • Fuels competitive spirit
  • 2. At-A-Glance Sources: • www.uscyberpatriot.org • Source for shortage of one million information security professionals: Cisco 2015 Annual Security Report • Source for 1.2 million unfilled STEM jobs: U.S. Department of Commerce © 2015 Cisco and/or its affiliates. All rights reserved. Participate in CyberPatriot: The Four-Step CSTP Method 1. Find a Coach A coach is someone at your school who is passionate about providing this opportunity to students and who doesn’t have to be an expert in cybersecurity or computers. 2. Get Support Your team will need technical and non-technical support. Technical mentors are professionals, students, or IT-experienced adults who can volunteer to help your coach and team understand cybersecurity and related concepts in the competition. They can be at your school, in the local community, at a four-year college, or employed at a local business. Non-technical support includes adults willing to assist with transportation, set up, or simply provide encouragement. 3. Form a Team A team consists of up to five students. Each competitor has his or her own role but the team needs to function as a whole as well. Players need a computer or laptop that can run the virtual images used for practice and competition and access the Internet. 4. Practice Here’s where the fun starts. Your team needs to practice often— at least several hours a week leading up to the competition. The stronger commitment your team has, the better chances you have of winning and moving onto finals in Washington, DC. Cisco and STEM Cisco is committed to inspiring more people to pursue STEM education and careers. We believe encouraging people to study STEM is imperative for society. Through mentoring, IT training, and support for schools and nonprofits, we are working to increase the pipeline of STEM talent around the world. We are excited be a CyberPatriot sponsor and to share access to the Cisco Network Academy® with teams. For More Information Visit https://www.uscyberpatriot.org/home to register your team, sign up to volunteer, or explore more about the program, including costs, competition requirements, and available resources. To learn about other Cisco® STEM programs, visit http://csr.cisco.com/pages/stem-at-cisco. Cisco CyberPatriot Training Materials All teams participating in CyberPatriot receive access to the Cisco Networking Academy® platform that includes three CyberPatriot-specific training courses: • Instructor Course provides instructors an introduction to the site and instructions on how to start teaching teams • Content Course includes team training modules that help students increase their networking knowledge. Coaches and mentors can create a content course once the instructor course is complete • Competition Course allows teams to access quizzes and Packet Tracer activities Questions about accessing the course materials should be directed to the CyberPatriot Program Office at cpoc@uscyberpatriot.org, not Cisco.