Files in this item

FilesDescriptionFormat

application/pdf

application/pdfVendingMachinePoster_Draft.pdf (941kB)
Example CI projects overview 3: SDC vending machinePDF

application/pdf

application/pdfCTSC-CPP Intro.pdf (2MB)
Welcome, Intro to Supercomputing & Science Projects, CyberInfrastructure (CI)PDF

application/pdf

application/pdfCTSC-CPP Example CTSC Engagements.pdf (645kB)
Example CI projects overview 1: CTSC Projects - HTCondor, DKIST, OSiRISPDF

application/pdf

application/pdfsymmetric-crypto.pdf (244kB)
Crypto OverviewPDF

application/pdf

application/pdfMedical and Genomic Data Privacy.pdf (528kB)
Example CI projects overview 2: Medical/Genomic Data privacyPDF

application/pdf

application/pdfPKI_CPP_CTSC.pdf (990kB)
Public Key Infrastructure and DeploymentPDF

application/pdf

application/pdfCTSC-CPP CI Security Policies.pdf (2MB)
Security PoliciesPDF

application/pdf

application/pdfLog Analysis & Splunk.pdf (2MB)
Log Analysis and SPLUNKPDF

application/pdf

application/pdfCTSC-CPP ScienceDMZ Security.pdf (616kB)
Network Security in a Science DMZPDF

application/pdf

application/pdfCTSC SFS Traini ... and Access Management.pdf (1MB)
Federated Identity Management and Access ManagementPDF

application/pdf

application/pdfCTSC-CPP Incide ... or Cyberinfrastructure.pdf (255kB)
Incident ResponsePDF

application/pdf

application/pdfSIEM_OSSIM_Husain.pdf (1MB)
SIEM overview and OSSIM Case StudyPDF

application/pdf

application/pdfCTSC-CPP Incident Response Tabletop Plan.pdf (38kB)
Incident Response - tabletop exercisePDF

application/pdf

application/pdfIAM Hands On.pdf (2MB)
IAM Hands OnPDF

application/pdf

application/pdfIncident Response Handout.pdf (60kB)
Incident Response handoutPDF

application/pdf

application/pdfLog Analysis Command Reference.pdf (95kB)
Log Analysis Command ReferencePDF

application/pdf

application/pdfLog Analysis Exercise - Answers.pdf (129kB)
Log Analysis Exercise - AnswersPDF

application/pdf

application/pdfLog Analysis Exercise - No Commands.pdf (128kB)
Log Analysis Exercise - No CommandsPDF

application/pdf

application/pdfLog Analysis Exercise.pdf (113kB)
Log Analysis ExercisePDF

application/pdf

application/pdfMaster Informat ... ate - v2 - August 2014.pdf (127kB)
Master Information Security Policy & Procedures TemplatePDF

application/pdf

application/pdfMedical_Genomic_Data_Privacy_exercise.pdf (147kB)
Medical Genomic Data Privacy exercisePDF

application/pdf

application/pdfOSSIM_Handout.pdf (193kB)
OSSIM HandoutPDF

application/pdf

application/pdfPKILabHandout.pdf (85kB)
PKI Lab HandoutPDF

application/pdf

application/pdfScience DMZ Handout.docx.pdf (256kB)
Science DMZ HandoutPDF

application/pdf

application/pdfVMSetupPKILab.pdf (117kB)
VM Setup PKI LabPDF

Description

Title:CPP-CTSC SFS Cyberinfrastructure Security Workshop
Author(s):Husain, Mohammad; Basney, Jim; Avila, Kay; Zage, John; Chen, Tingting; Pike, Ron
Contributor(s):Dopheide, Jeannette
Subject(s):Cybersecurity
National Science Foundation (NSF)
Scholarship for Service
Center for Trustworthy Scientific Cyberinfrastructure (CTSC)
Abstract:Cal Poly Pomona and NSF Center for Trustworthy Scientific Cyberinfrastructure (CTSC) organized an on-site workshop at Cal Poly Pomona for CyberCorps Scholarship for Service (SFS) students nationwide that discussed the unique cybersecurity challenges of cyberinfrastructure and practical training on cybersecurity topics as it relates to cyberinfrastructure protection. Some presentations include worksheets, which are included in the file list. The VM can be accessed here: https://uofi.box.com/v/ctsc-cpp-vm Presentation Titles: - Welcome, Intro to Supercomputing & Science Projects, CyberInfrastructure (CI) - Example CI projects overview 1: CTSC Projects - HTCondor, DKIST, OSiRIS - Crypto Overview - Example CI projects overview 2: Medical/Genomic Data privacy - Public Key Infrastructure and Deployment - Security Policies - Log Analysis and SPLUNK - Network Security in a Science DMZ - Federated Identity Management and Access Management - Example CI projects overview 3: SDC vending machine - Incident Response - SIEM overview and OSSIM Case Study More information about CTSC can be found at: trustedci.org More information about Cal Poly Pomona's Scholarship for Service program can be found at: http://www.cpp.edu/~sfs/
Issue Date:2017-10-27
Genre:Presentation / Lecture / Speech
Type:Text
Image
Language:English
URI:http://hdl.handle.net/2142/98520
Date Available in IDEALS:2017-11-06


This item appears in the following Collection(s)

Item Statistics