Michigan: Inspiring the next generation of cybersecurity experts

Similar documents
Study Group Handbook

Engineering Our Future

IMPORTANT: PLEASE READ THE FOLLOWING DIRECTIONS CAREFULLY PRIOR TO PREPARING YOUR APPLICATION PACKAGE.

Science Fair Rules and Requirements

Barstow Community College NON-INSTRUCTIONAL

No Child Left Behind Bill Signing Address. delivered 8 January 2002, Hamilton, Ohio

Growth of empowerment in career science teachers: Implications for professional development

STRATEGIC GROWTH FROM THE BASE OF THE PYRAMID

The Use of Statistical, Computational and Modelling Tools in Higher Learning Institutions: A Case Study of the University of Dodoma

Allington Primary School Inspection report - amended

Midw Forum AMOUNT. award up. MAF Scholarship. Applicants. of the. Applicants. skills. The four page. notified of. award

Alabama

I set out below my response to the Report s individual recommendations.

Michigan State University

A non-profit educational institution dedicated to making the world a better place to live

There are three things that are extremely hard steel, a diamond, and to know one's self. Benjamin Franklin, Poor Richard s Almanac, 1750

THE IIA OCEAN STATE INSIDER

The College of Law Mission Statement

Colorado

Dublin City Schools Career and College Ready Academies FAQ. General

Oregon Institute of Technology Computer Systems Engineering Technology Department Embedded Systems Engineering Technology Program Assessment

Leveraging MOOCs to bring entrepreneurship and innovation to everyone on campus

FROM THE DEPARTMENT CHAIR

Lesson 1: Job Advertisements (18-25 minutes)

Soaring With Strengths

Unit 7 Data analysis and design

DO SOMETHING! Become a Youth Leader, Join ASAP. HAVE A VOICE MAKE A DIFFERENCE BE PART OF A GROUP WORKING TO CREATE CHANGE IN EDUCATION

SUPPORTING COMMUNITY COLLEGE DELIVERY OF APPRENTICESHIPS

UNDERSTANDING DECISION-MAKING IN RUGBY By. Dave Hadfield Sport Psychologist & Coaching Consultant Wellington and Hurricanes Rugby.

National Survey of Student Engagement The College Student Report

Effective Team Resource Management. Danielle Marciniak, M.S. ASDA Vice President

A Decision Tree Analysis of the Transfer Student Emma Gunu, MS Research Analyst Robert M Roe, PhD Executive Director of Institutional Research and

Cara Jo Miller. Lead Designer, Simple Energy Co-Founder, Girl Develop It Boulder

Business Analytics and Information Tech COURSE NUMBER: 33:136:494 COURSE TITLE: Data Mining and Business Intelligence

Course Content Concepts

National Survey of Student Engagement at UND Highlights for Students. Sue Erickson Carmen Williams Office of Institutional Research April 19, 2012

By Laurence Capron and Will Mitchell, Boston, MA: Harvard Business Review Press, 2012.

Cognitive Thinking Style Sample Report

Introductory thoughts on numeracy

PROVIDING AND COMMUNICATING CLEAR LEARNING GOALS. Celebrating Success THE MARZANO COMPENDIUM OF INSTRUCTIONAL STRATEGIES

understandings, and as transfer tasks that allow students to apply their knowledge to new situations.

Testing for the Homeschooled High Schooler: SAT, ACT, AP, CLEP, PSAT, SAT II

ADDENDUM 2016 Template - Turnaround Option Plan (TOP) - Phases 1 and 2 St. Lucie Public Schools

Getting Started with Deliberate Practice

Case study Norway case 1

The Teaching and Learning Center

Regan's Resume Last Edit : 31 March 2008

Taking Kids into Programming (Contests) with Scratch

Sponsorship Packet. Dougherty Valley High School Robotics Club Albion Road, San Ramon, CA 94582

Indiana Collaborative for Project Based Learning. PBL Certification Process

Kelli Allen. Vicki Nieter. Jeanna Scheve. Foreword by Gregory J. Kaiser

Ministry of Education General Administration for Private Education ELT Supervision

Leading Positive Results

AAC/BOT Page 1 of 9

MASP: Building a System of Support for ALL Michigan s Students. Michigan Association of School Psychologists

Sample Of Welcome Back Letter From Vacation

Lyman, M. D. (2011). Criminal investigation: The art and the science (6th ed.). Upper Saddle River, NJ: Prentice Hall.

Virtually Anywhere Episodes 1 and 2. Teacher s Notes

On-Line Data Analytics

MASTER S COURSES FASHION START-UP

GENERAL BUSINESS 7397, section 18842: BOOKS AN MBA SHOULD READ

HENG- CHIEH JAMIE WU

Undergraduate Program Guide. Bachelor of Science. Computer Science DEPARTMENT OF COMPUTER SCIENCE and ENGINEERING

Engineering, Science & Mathematics

Writing Unit of Study

Day 1 Note Catcher. Use this page to capture anything you d like to remember. May Public Consulting Group. All rights reserved.

White Paper. The Art of Learning

Mastering Team Skills and Interpersonal Communication. Copyright 2012 Pearson Education, Inc. publishing as Prentice Hall.

BUSINESS HONORS PROGRAM

Essentials of Ability Testing. Joni Lakin Assistant Professor Educational Foundations, Leadership, and Technology

GRIT. The Secret to Advancement STORIES OF SUCCESSFUL WOMEN LAWYERS

UPPER ARLINGTON SCHOOLS

Appendix K: Survey Instrument

SEARCH PROSPECTUS: Dean of the College of Law

Welcome to ACT Brain Boot Camp

Colorado State University Department of Construction Management. Assessment Results and Action Plans

Curricular Reviews: Harvard, Yale & Princeton. DUE Meeting

Roadmap to College: Highly Selective Schools

Red Flags of Conflict

Table of Contents. Internship Requirements 3 4. Internship Checklist 5. Description of Proposed Internship Request Form 6. Student Agreement Form 7

5 Guidelines for Learning to Spell

Current, Best Strategies to Differentiate MATH Instruction (Grades K 3)

Telekooperation Seminar

An Analysis of PharmD Industry Fellowships

St Matthew s RC High School, Nuthurst Road, Moston, Manchester, M40 0EW

Fundraising 101 Introduction to Autism Speaks. An Orientation for New Hires

THIS KIT CONTAINS ALL THE INFORMATION YOU NEED

Initial teacher training in vocational subjects

26 th Annual Conference and Exposition January 28, 2017 The City Centre Sheraton Hotel Indianapolis, Indiana

Synthesis Essay: The 7 Habits of a Highly Effective Teacher: What Graduate School Has Taught Me By: Kamille Samborski

1110 Main Street, East Hartford, CT Tel: (860) Fax: (860)

DEPARTMENT OF KINESIOLOGY AND SPORT MANAGEMENT

2013 DISCOVER BCS NATIONAL CHAMPIONSHIP GAME NICK SABAN PRESS CONFERENCE

Executive Session: Brenda Edwards, Caddo Nation

Aviation English Training: How long Does it Take?

Axiom 2013 Team Description Paper

Improving recruitment, hiring, and retention practices for VA psychologists: An analysis of the benefits of Title 38

Georgia Tech College of Management Project Management Leadership Program Eight Day Certificate Program: October 8-11 and November 12-15, 2007

CROSS-BATTERY ASSESSMENT, SLD DETERMINATION, AND THE ASSESSMENT- INTERVENTION CONNECTION

Using Team-based learning for the Career Research Project. Francine White. LaGuardia Community College

Transcription:

Michigan: Inspiring the next generation of cybersecurity experts A report detailing Michigan s leadership in finding, motivating, and developing the cyber-capable workforce in the United States.

Dear Governor Snyder, Your insight and leadership in bringing CyberStart to the students of Michigan is already paying dividends for them in the form of learning and scholarships, and it can lead to future job growth and improved cybersecurity in Michigan. Results of the CyberStart pilot program, are summarized below. But before you dig into the numbers and see the lists of highperforming Michigan students, please turn to the back cover of this booklet to enjoy personal notes that participating students wrote specifically for you. Program Highlights: In just two weeks in July, your communications team was able to sign up 104 Michigan students. Over 75% of them solved at least one of the assessment challenges and 60% solved enough to be invited to test their cyber aptitude on the 250+ challenges of the full CyberStart program, which they did during August 2017. At the same time your fellow governors in six states signed up a total of nearly 3,300 students. Three Michigan high school and college students were in the overall top 50 nationally, and eight Michigan students won scholarships for more advanced education in cybersecurity. The state of Michigan excelled in the Moon Base being above average in 6 out of the 7 programming topics covered. Topics included: files, sockets, strings and cryptography. As you might guess from the students notes, they liked CyberStart: 79% rated the game either excellent or very good (and this is a tough crowd!) 93% are considering further cybersecurity training after the program 60% 104 79 students initially registered to see how well they could do on CyberStart Assess, the program s qualifying exam. 62 students got one or more answers correct in CyberStart Assess. students qualified for the CyberStart Game. Please let me know if there is anything I can do to help as you continue to identify talent and grow the next generation of cybersecurity experts in Michigan. Sincerely, Alan Paller 16 students reached the elite levels (7+) in the HQ base of the program. SANS Institute Director of Research apaller@sans.org Scholarships 8 Michigan s next cybersecurity professionals.

Program Introduction CyberStart is a forward-thinking skills program designed to supply specialist cybersecurity education to young people across the United States. Using a suite of online challenges, tools and games it aims to inspire the next generation of cybersecurity professionals while identifying the best and most talented young Americans. We are facing a significant shortage of trained and skilled cybersecurity professionals at a time when online technologies continue to evolve, and cybercriminals are becoming more sophisticated. The only way to solve this problem is to introduce, develop and help young people in high school and college pursue a career in this sector. Phases CyberStart Assess is a set of 8 questions that test a student s aptitude and existing knowledge of computer security. Based on identifiable, measurable key skills and traits, it works to find young people who possess the innate qualities of an effective security practitioner. Questions look for traits such as problem solving, logical extrapolation and attention to detail, all of which have been proven to be crucial to succeed in a security career. Goals Supply specialist cybersecurity education for 16+year olds. Grow the U.S. cyber capable workforce. CyberStart Game is where students become exposed to specialist cybersecurity education. Using a suite of online tools, challenges and games, players attempt to solve more than 250 challenges, all of which are realistic examples of tests and threats faced by practicing cybersecurity engineers in their day-to-day lives. The CyberStart Game enables students to start studying security with challenges written by experts who practice these skills in the real world. Inspire the next generation of cybersecurity experts. Identify the most elite young talent. What Do Players Learn? The CyberStart Game has over 300 hours of content and covers 14 main topic areas. There are two bases that make up the game, each containing several levels and challenges that candidates move through: the Headquarters Base and the Moon Base. Bases The Headquarters Base forms the main part of the game. Players take on the role of a junior agent in the Cyber Protection Agency, where they deploy their forensics and offensive skills to sleuth through challenges and tackle various online cyber criminal gangs. As they work their way up through the organization, their training develops each of the security disciplines. The HQ Base teaches students skills in: Binary Cryptography Forensics Linux Open-source intelligence Programming Web application The Moon Base is where players learn how to program. Players go through a series of challenges, building up progressively, to write their own programs in Python. The aim of the Moon Base is for players to use all the skills they have learned to stop an alien invasion. The Moon Base has three training levels that are step by step guides to the basics of programming. Later levels teach students skills in: Programming cryptography Debugging Files Functions Loops Sockets Strings

CyberStart Players in Michigan Key ** In the top 100 and awarded a scholarship * Awarded a scholarship Last Name First Name School Cai Yu Michigan Technological Carrara Daniel Michigan Technological Cisco Kyle of Detroit Mercy Top 100/ Scholarship Corser Robert Spring Arbor * Cullifer Ginger DePaul Cushard Jessica Eastern Michigan Danna Tyler Sault Area High School Dunlap Stuart Ellis Homeschool Faraj Ali of Michigan, Dearborn Flickema Adam Eastern Michigan * Fortner Darian of Michigan Dearborn Ghebredngl Nahom East Lansing High School Goosen Joshua Central Michigan Gwinner Caleb Spring Arbor Hattrick Noah Spring Arbor Huffman Andrew Genesee Christian School Johnson Candace Central Michigan Last Name First Name School Kaminga Dalton Michigan Technological Kpachavi Yannick Ferris State Lee Wellington of Michigan Martinez Emmanuel Spring Arbor McCubbin Adam Grand Ledge High School Metzger Ben Michigan Technological Mitchell Phil Spring Arbor Moulton David Graduate Nostros Kronno Lake Orion High School Poindexter Matthew Central Michigan Popovich Kevin Davenport Raub Tristan ITT Technical Institute Top 100/ Scholarship Richards Dylan Central Michigan ** Risinger Ashley Davenport Rossow Nathan Central Michigan * Savich Mel of Michigan Schuette Kyle Eastern Michigan ** Spiller Kiersten Spring Arbor * Taubitz Trevor Michigan Technological Wilks Jordin Central Michigan Williams Dylan Ferris State Witt Bret S Davenport ** Zoltowski Alex Central Michigan *

Strengths & Weaknesses Headquarters Base categories State average Seven state average Difference Linux 24.09 20.97 14.91 Web application 33.38 30.84 8.24 Forensics 32.48 28.03 15.89 Binary 9.21 9.21 0.01 Cryptography 48.78 44.83 8.82 Programming 18.99 16.19 17.26 Open-source intelligence Moon Base categories 70.81 68.40 3.52 State average Seven state average Difference Cryptography 12.5 8.11 54.12 Debug 26.09 23.53 10.87 File 17.83 12.83 38.90 Functions 28.26 22.46 25.83 Loops 8.70 7.42 17.20 Sockets 15.49 11.31 36.98 Strings 4.35 6.55-33.63 Student Feedback - Previous Knowledge A survey sent to everyone who played the CyberStart Game asked players for feedback on their previous knowledge, what they had learned, and what they enjoyed most about the program. 10 9 8 7 6 5 4 3 2 1 0 Have you previously participated in a Capture the Flag competition? 64% This is my first None of the these Robotics IT/Computer systems Networking Digital forensics Cybersecurity 36% Have done 1-2 CTFs before 3% 3% 12% 16% 29% 0% 0% Have done 3-5 CTFs before 35% More than 5 CTFs Have you taken any courses in the following subjects? You may select more than one answer. 0 0.2 0.4 0.6 0.8 1 Example of Majors of CyberStart Participants: Computer science Robotics engineering Computer systems Information assurance Digital forensics Computer networking These charts demonstrate that most students who played CyberStart Game in Michigan had never been exposed to a Capture the Flag style teaching method. Knowing this, it is encouraging that 60% of players made it through to the CyberStart Game. However, players from Michigan did have quite a lot of experience in other relevant cybersecurity subject areas - in particular computer systems and networking. This showed that there is a strong group of students keen to build upon their existing knowledge. One of the benefits of CyberStart is that it engaged with this group and developed their interest in cybersecurity. This in turn is likely to accelerate their entry into the profession and fast-track Michigan s next generation of cybersecurity experts. It is encouraging to see that students who had no previous experience were able to engage with the CyberStart tool and progress as well as students already interested in the industry with a basic foundation of knowledge.

Student Feedback on CyberStart How would you rate your experience of using CyberStart? 8 50% 7 6 5 29% 4 3 14% 2 7% 1 0% 0 Excellent Very good Good Fair Poor How likely is it that you would recommend CyberStart to a friend? Extremley likely 43% Quite likely 36% Neither likely or unlikely 21% Quite unlikely 0% Extremley unlikely 0% 0 1 2 3 4 5 6 7 Which challenges did you enjoy the most? 4.5 29% 29% 4 3.5 21% 3 2.5 14% 2 1.5 7% 1 0.5 0% 0 Linux Web attacks Forensics Cryptography Binary attacks Programming The response to the tool has shown that the training and teaching in CyberStart has engaged the instinctive ways people learn and identified those who naturally think like a cybersecurity practitioner. These encouraging results reflect the enourmous success of the program in engaging with a variety of ages, genders and skill level. The students response to the game has been exciting: 79% of students rated the game either excellent or very good with 79% saying they would recommend the program to a friend. Not a single player rated the game poor or said it was unlikely they would recommend it to a friend. Students in Michigan were most engaged with web attack and forensic challenges. Student Feedback on Career Impact Had you considered a career in cybersecurity before the program? 21% Yes 7% 93% 79% Has the program made you consider further training in cybersecurity? Yes No No 100% of students who answered no to considering a career in cybersecurity in the past are now considering further training. The aim of the CyberStart program is to grow Michigan s cyber-capable workforce and promote cyber security as an exciting and recognized career. These graphs support our mission and present a group of young people who are now on the right path to a cyber security career. Of the CyberStart participants in Michigan, 79% of players were already interested in a career in cybersecurity before the program. After the program, this number increased. 93% of players are now considering further training. This is encouraging when looking at the future of cyber security professionals in the state. In addition, 21% of students had never considered a career in cyber security before playing the CyberStart Game. After completing challenges in a variety of cyber security disciplines, 100% of these students are now considering further training in the area. This is an exciting program result that shows a real step change in reducing the skills gap in Michigan.

Thanks so much for sponsoring such an amazing program. This program was better at teaching me some of the basics than any high school computer teacher I had. You are able to do hands on challenges to test your knowledge and it allows for that critical thinking aspect of yourself to come out. Thank you again. Nathan Rossow, Central Michigan, College Sophomore Thanks! CyberStart has been a lot of fun so far, and it s an exciting test of abilities that I haven t been able to learn at school. Increasing awareness for cybersecurity is always good. Noah Hattrick, Spring Arbor, College Senior I really appreciate this program and think it is a great way for someone to test their skills or to get people interested in cyber security who otherwise wouldn t be. Robert Corser, Spring Arbor, College Junior Thank you for providing this great learning opportunity. Phil Mitchell, Spring Arbor, College Senior Thank you. This program allows students and young adults the opportunity to explore the world of network security. By exposing them to this line of work, students may develop a vested interest in the field and pursue a career. Dalton Kaminga, Michigan Technological, College Freshman Contact Information: E-mail: cyberstart@sans.org Web: www.sans.org/cyberstartus