{"id":6944,"date":"2012-09-05T08:08:59","date_gmt":"2012-09-05T13:08:59","guid":{"rendered":"http:\/\/www.mma-tx.info\/wordpress\/?p=6944"},"modified":"2015-02-08T17:32:37","modified_gmt":"2015-02-08T23:32:37","slug":"cyber-patriot-begin","status":"publish","type":"post","link":"https:\/\/www.mma-tx.org\/blog\/6944\/cyber-patriot-begin\/","title":{"rendered":"Cyber Patriot Begins"},"content":{"rendered":"<h1>Cyber Patriot Starts New Year<\/h1>\n<p><em>Mr. Bill Beckman<\/em><\/p>\n<p><a rel=\"nofollow\" href=\"http:\/\/www.mma-tx.org\/blog\/wp-content\/uploads\/2012\/09\/cyber2.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"alignright size-medium wp-image-6963\" title=\"cyber2\" alt=\"cyber patriot\" src=\"http:\/\/www.mma-tx.org\/blog\/wp-content\/uploads\/2012\/09\/cyber2-300x224.jpg\" width=\"300\" height=\"224\" srcset=\"https:\/\/www.mma-tx.org\/blog\/wp-content\/uploads\/2012\/09\/cyber2-300x224.jpg 300w, https:\/\/www.mma-tx.org\/blog\/wp-content\/uploads\/2012\/09\/cyber2.jpg 464w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a>This year the Marine Military Academy <b>Cyber Patriot<\/b> team will be doing things differently.\u00a0 To begin with we are using text books \u201cComputer Security Fundamentals\u201d.\u00a0\u00a0Computer Security Fundamentals, Second Edition is designed to be the ideal one-volume gateway into the entire field of computer security. This text brings together thoroughly updated coverage of all basic concepts, terminology, and issues, along with the practical skills essential to security.<\/p>\n<h2>Cyber Patriot Curriculum<\/h2>\n<p>Drawing on his extensive experience as both an IT professional and instructor, Chuck Easttom thoroughly covers core topics such as vulnerability assessment, virus attacks, buffer overflow, hacking, spyware, network defense, firewalls, VPNs, Intrusion Detection Systems, and passwords. Unlike many other authors, however, he also fully addresses more specialized issues, including cyber terrorism, industrial espionage and encryption &#8211; including public\/private key systems, digital signatures, and certificates.\u00a0 Check out the full list of materials and goals for the <i>Cyber Patriot<\/i> Program on the <a href=\"http:\/\/www.uscyberpatriot.org\/CP5\/Training.aspx\"><u>Cyber Patriot<\/u> Training Webpage<\/a>.<\/p>\n<p><a rel=\"nofollow\" href=\"http:\/\/www.mma-tx.org\/blog\/wp-content\/uploads\/2012\/09\/cyber3.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"alignleft size-medium wp-image-6970\" title=\"cyber3\" alt=\"cyber patriot\" src=\"http:\/\/www.mma-tx.org\/blog\/wp-content\/uploads\/2012\/09\/cyber3-300x257.jpg\" width=\"300\" height=\"257\" srcset=\"https:\/\/www.mma-tx.org\/blog\/wp-content\/uploads\/2012\/09\/cyber3-300x257.jpg 300w, https:\/\/www.mma-tx.org\/blog\/wp-content\/uploads\/2012\/09\/cyber3.jpg 435w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a>After\u00a0cadets complete the Cyber Patriot class successfully they will receive a certificate of completion for Computer Security Fundamentals which is the base line for IT security.\u00a0 They will have a working knowledge of how networks work and what is needed to secure them.\u00a0 \u00a0Each cadet will have homework, and lab assignments that they must complete by themselves or with a group.\u00a0 At the end of each chapter they are required to take and pass a test.\u00a0 Lab assignments will be done in class in a controlled environment.\u00a0 They will be using different type\u2019s tools and hacker knowledge to crack and bring down servers.\u00a0\u00a0First you need to think like a hacker to be able to defend better against a hacker.<\/p>\n<p>&nbsp;<\/p>\n<h2>Cyber Patriot Class<\/h2>\n<p><a rel=\"nofollow\" href=\"http:\/\/www.mma-tx.org\/blog\/wp-content\/uploads\/2012\/09\/cyber1.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"alignleft size-medium wp-image-6954\" title=\"cyber1\" alt=\"cyber patriot\" src=\"http:\/\/www.mma-tx.org\/blog\/wp-content\/uploads\/2012\/09\/cyber1-300x184.jpg\" width=\"300\" height=\"184\" srcset=\"https:\/\/www.mma-tx.org\/blog\/wp-content\/uploads\/2012\/09\/cyber1-300x184.jpg 300w, https:\/\/www.mma-tx.org\/blog\/wp-content\/uploads\/2012\/09\/cyber1.jpg 461w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a>Cyber Patriot is being taught by instructor and CyberPatriot coach Mr. William Beckman.\u00a0 Mr. Beckman is Chief of Network Management at Marine Military Academy and has served in this capacity for the last 16 years.\u00a0 His duties include security for the all campus computer systems. The maximum size of the class is 15 right now and the following cadets are in Computer Security Class:\u00a0 Jose Rodriguez, Daniil Murashov, Dylan Che, Logan Workman, Drew Hopkins, Kyle Rogers, Luis Ortiz, Paul Olga, Rustan Shaykhutdinov, Obiajulu Ezenwabachili, Lorenzo Casso, Chace Andrea, Nathan Logan, and Daniel Lamont.<\/p>\n<h3>About Cyber Patriot<\/h3>\n<p>CyberPatriot is the premier national high school cyber defense competition that is designed to give hands on exposure to the foundations of cyber security. <a href=\"http:\/\/www.uscyberpatriot.org\/about\/Pages\/default.aspx\">CyberPatriot <\/a>is <strong>not<\/strong> a hacking competition. CyberPatriot&#8217;s goal is to excite students about <a href=\"http:\/\/www.mma-tx.org\/blog\/?p=2443\">Science, Technology, Engineering, and Mathematics (STEM)<\/a> education.<\/p>\n<h3>\u00a0Learn More About Marine Military Academy and Cyber Patriot<\/h3>\n<p>Click on the image below to request information about enrollment or check out the <a href=\"http:\/\/www.mma-tx.org\/\">Marine Military Academy website<\/a>.<\/p>\n<p><a rel=\"nofollow\" href=\"http:\/\/www.mma-tx.org\/About-Us\/Contact-Us\/\"><img loading=\"lazy\" decoding=\"async\" title=\"calltoaction\" alt=\"Contact Us \" src=\"http:\/\/www.mma-tx.org\/blog\/wp-content\/uploads\/2012\/08\/calltoaction1.jpg\" width=\"289\" height=\"117\" \/><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Cyber Patriot Starts New Year Mr. Bill Beckman This year the Marine Military Academy Cyber Patriot team will be doing things differently.\u00a0 To begin with we are using text books \u201cComputer Security Fundamentals\u201d.\u00a0\u00a0Computer Security Fundamentals, Second Edition is designed to be the ideal one-volume gateway into the entire field of computer security. This text brings [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[25],"tags":[],"class_list":["post-6944","post","type-post","status-publish","format-standard","hentry","category-news"],"blocksy_meta":{"styles_descriptor":{"styles":{"desktop":"","tablet":"","mobile":""},"google_fonts":[],"version":6}},"_links":{"self":[{"href":"https:\/\/www.mma-tx.org\/blog\/wp-json\/wp\/v2\/posts\/6944","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.mma-tx.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.mma-tx.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.mma-tx.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.mma-tx.org\/blog\/wp-json\/wp\/v2\/comments?post=6944"}],"version-history":[{"count":58,"href":"https:\/\/www.mma-tx.org\/blog\/wp-json\/wp\/v2\/posts\/6944\/revisions"}],"predecessor-version":[{"id":12638,"href":"https:\/\/www.mma-tx.org\/blog\/wp-json\/wp\/v2\/posts\/6944\/revisions\/12638"}],"wp:attachment":[{"href":"https:\/\/www.mma-tx.org\/blog\/wp-json\/wp\/v2\/media?parent=6944"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.mma-tx.org\/blog\/wp-json\/wp\/v2\/categories?post=6944"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.mma-tx.org\/blog\/wp-json\/wp\/v2\/tags?post=6944"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}