Grow Your Cybersecurity Skills with Upcoming Workshops and Events

At the Center for Cybersecurity Education, we schedule various workshops throughout the year to help you improve your repertoire of cybersecurity skills! Our workshops include presentations and in-person, live events that help build and educate students on cybersecurity awareness.

Check back here through the upcoming semester for future workshop dates and registration information!

Cybercrime Skills Workshops - Fall Semester 2023

Forensic Tool Validation -- Presented by Dan Mares -- October 21, 23 – 08:00 AM - 12:00 PM

KSU Center, Room 462, 3333 Busbee Dr NW, Kennesaw, GA 30144

This is an in-person only, live event limited to the first 40 registrants:

Topics will include:

  • General software tool validation and design with emphasis on and testing of file cataloging/listing processes for forensic reliability)
  • Forensic Software validation and design (emphasis on hashing and testing hashing software)
  • Testing Forensic file copying and zip/unzipping for forensic investigations, and testing

A significant amount of the lecture and activities in this course will use the Windows Command Line and will require a working knowledge of the command window. You should have the knowedge and skill to use the command line to gain maximum value from this workshop. You can acquire a basic set of command line skills by viewing the Beginner's Guide to the Windows Command Prompt.

Each participant must bring their own Windows capable laptop computer. 

VIEW MEETING MATERIALS

Past Workshops

  • Forensic Tool Validation -- Presented by Dan Mares -- March 18 – 08:00 AM - 12:00 PM

    KSU Center, Room 462 and 460, 3333 Busbee Dr NW, Kennesaw, GA 30144

    This is an in-person only, live event limited to the first 40 registrants:

    Topics will include:

    • General software tool validation and design with emphasis on and testing of file cataloging/listing processes for forensic reliability)
    • Forensic Software validation and design (emphasis on hashing and testing hashing software)
    • Testing Forensic file copying and zip/unzipping for forensic investigations, and testing

    A significant amount of the lecture and activities in this course will use the Windows Command Line and will require a working knowledge of the command window. You should have the knowedge and skill to use the command line to gain maximum value from this workshop. You can acquire a basic set of command line skills by viewing the Beginner's Guide to the Windows Command Prompt.

    Each participant must bring their own Windows capable laptop computer. 

  • Forensic Tool Validation -- Presented by Dan Mares -- October 1 – 9:00-11:00 AM

    KSU Center, Room 462 and 460, 3333 Busbee Dr NW, Kennesaw, GA 30144

    This is an in-person only, live event with three sessions, each building on the prior work, and limited to the first 40 registrants:

    Day 1 - October 1, General software tool validation and design with emphasis on and testing of file cataloging/listing processes for forensic reliability), Room 462

    Day 2 - October 8, Forensic Software validation and design (emphasis on hashing and testing hashing software), Room 460

    Day 3 - October 15, Testing Forensic file copying and zip/unzipping for forensic investigations, and testing, Room 462

    Each participant must bring their own Windows capable laptop computer.

    Meeting materials will be distributed online.

    Please register ONLY if you can attend all three sessions. CPE credit available on request.

    Prior to registration, you will need to complete the readiness self-assessment. When you register for the event, you will need to report your score from the self-assessment. The purpose of the self-assessment is to make sure you are ready to get the most out of this event and review your understanding of command line and ensure you will benefit from the event.

    If you want to register please follow these steps:

    1) Visit the web site

    2) Read the entire website and follow the directions to download and complete the pretest. Please note, your ability to read and follow the directions, complete the download of the exam, and complete the exam is a part of the exam process. There is no technical support to assist you. Trust us when we tell you everything is working on the server side. You need to make the client side function.

    3) If your pretest performance is suitable to your expectations (everything in this pretest is prerequisite knowledge for this course) than proceed to the signup.com link to register. You will need to report the number of correctly answered pretest questions in the signup process. If you did not do well enough to be successful in the workshop, please do not sign up and try to study for the next time it is offered.

    4) Visit SignUp to see if there is a spot remaining for you to attend and complete the registration information.

     
    We're using SignUp (the leading online SignUp and reminder tool) to organize our upcoming SignUps.

    Here's how it works in 3 easy steps:

    1)View our Sign Up

    2) Sign up! It's Easy - you will NOT need to register an account or keep a password on SignUp.

    Note: SignUp.com does not share your email address with anyone. If you prefer not to use your email address, please contact me and I can sign you up manually.

  • Forensic Tool Validation -- Presented by Dan Mares  -- April 9, 16, and 23  -- 9:00 - 10:00 AM
    KSU Center, Room 460, 3333 Busbee Dr NW, Kennesaw, GA 30144

    This is an in-person only, live event with three sessions, each building on the prior work, and limited to the first 40 registrants:

    April 9, General software validation and design (emphasis on file cataloging/listing processes),
    April 16, Hashing and testing hashing software, and
    April 23, Forensic copying and testing

  • Featuring use of Wireshark, the world’s foremost and widely-used network protocol analyzer.

    Join us to improve your Cyber Skills with these Cybercrime Skills Workshops. 

    Each session involves hands on learning, but space is limited. The sessions are offered in person (limited to 20 participants) and remotely (limited to 50 participants). Register early to ensure you have a spot!

    Betty DuBois owns Packet Detectives, an application and network performance consulting and training firm based in Atlanta, GA. She has been solving packet mysteries since 1997.

    Experienced with a range of hardware and software packet capture solutions, she captures the right data, in the right place, and at the right time to find the real culprit. Betty presents each year at SharkFest, the Wireshark Developer and User Conference, and is active in the Wireshark community. Using packets to solve crimes against networks and applications is her passion. Teaching others to do the same is her calling.