![Page 1: Computer Science @ CI - Michael Soltysprof.msoltys.com/wp-content/uploads/2018/11/ITGuild-Nov... · 2018-12-16 · Digital Forensics Collaboration with HTTF Penetration Testing!19](https://reader033.vdocuments.net/reader033/viewer/2022050313/5f75d423655b2e70e1743338/html5/thumbnails/1.jpg)
Computer Science @ CIMichael Soltys
Professor and Chair of Computer Science
November 27, 2018
Workforce Education Coalition IT Guild X
�1 /30
![Page 2: Computer Science @ CI - Michael Soltysprof.msoltys.com/wp-content/uploads/2018/11/ITGuild-Nov... · 2018-12-16 · Digital Forensics Collaboration with HTTF Penetration Testing!19](https://reader033.vdocuments.net/reader033/viewer/2022050313/5f75d423655b2e70e1743338/html5/thumbnails/2.jpg)
Outline
1. The story of us
2. Mechatronics
3. Cybersecurity
![Page 3: Computer Science @ CI - Michael Soltysprof.msoltys.com/wp-content/uploads/2018/11/ITGuild-Nov... · 2018-12-16 · Digital Forensics Collaboration with HTTF Penetration Testing!19](https://reader033.vdocuments.net/reader033/viewer/2022050313/5f75d423655b2e70e1743338/html5/thumbnails/3.jpg)
California State University at Channel Islands: Department of Computer Science
![Page 4: Computer Science @ CI - Michael Soltysprof.msoltys.com/wp-content/uploads/2018/11/ITGuild-Nov... · 2018-12-16 · Digital Forensics Collaboration with HTTF Penetration Testing!19](https://reader033.vdocuments.net/reader033/viewer/2022050313/5f75d423655b2e70e1743338/html5/thumbnails/4.jpg)
AJ BieszczadCI Rainbow Project
Houman DallaliMechatronics
Jason Isaacs Embedded Systems &
UAVs
Brian ThomsSocial Media, online
teaching
Michael SoltysAlgorithms & Security
4
![Page 5: Computer Science @ CI - Michael Soltysprof.msoltys.com/wp-content/uploads/2018/11/ITGuild-Nov... · 2018-12-16 · Digital Forensics Collaboration with HTTF Penetration Testing!19](https://reader033.vdocuments.net/reader033/viewer/2022050313/5f75d423655b2e70e1743338/html5/thumbnails/5.jpg)
ACM Regional Competitions 2018
![Page 6: Computer Science @ CI - Michael Soltysprof.msoltys.com/wp-content/uploads/2018/11/ITGuild-Nov... · 2018-12-16 · Digital Forensics Collaboration with HTTF Penetration Testing!19](https://reader033.vdocuments.net/reader033/viewer/2022050313/5f75d423655b2e70e1743338/html5/thumbnails/6.jpg)
ACM Regional Competitions 2018
The 2018 World Finals
![Page 7: Computer Science @ CI - Michael Soltysprof.msoltys.com/wp-content/uploads/2018/11/ITGuild-Nov... · 2018-12-16 · Digital Forensics Collaboration with HTTF Penetration Testing!19](https://reader033.vdocuments.net/reader033/viewer/2022050313/5f75d423655b2e70e1743338/html5/thumbnails/7.jpg)
ACM Regional Competitions 2018
1. Moscow State University2. Moscow Institute of Physics and Technology3. Peking University4. The University of Tokyo5. Seoul National University6. University of New South Wales7. Tsinghua University8. Shanghai Jiao Tong University9. St. Petersburg ITMO University10.University of Central Florida
The 2018 World Finals
https://icpc.baylor.edu/regionals/finder/world-finals-2018
![Page 8: Computer Science @ CI - Michael Soltysprof.msoltys.com/wp-content/uploads/2018/11/ITGuild-Nov... · 2018-12-16 · Digital Forensics Collaboration with HTTF Penetration Testing!19](https://reader033.vdocuments.net/reader033/viewer/2022050313/5f75d423655b2e70e1743338/html5/thumbnails/8.jpg)
Why so few engineers when everybody needs one?
• NSB: engineering degrees dropped 20% since 1985
• ACT: less than 6% high school seniors plan to take engineering
• AFS: 0.8% students plan to major in math
• Intel Science Fair: 6million Chinese students applied; 65K US students did (~100:1)
• 50% of US Engineering PhDs go to foreign students
• In next decade, 90% of world scientists & engineers will reside in Asia
![Page 10: Computer Science @ CI - Michael Soltysprof.msoltys.com/wp-content/uploads/2018/11/ITGuild-Nov... · 2018-12-16 · Digital Forensics Collaboration with HTTF Penetration Testing!19](https://reader033.vdocuments.net/reader033/viewer/2022050313/5f75d423655b2e70e1743338/html5/thumbnails/10.jpg)
We collaborate with
• Local Companies: Advisory Board
• Navy
• HTTF
• VCCC
• VCOE
![Page 11: Computer Science @ CI - Michael Soltysprof.msoltys.com/wp-content/uploads/2018/11/ITGuild-Nov... · 2018-12-16 · Digital Forensics Collaboration with HTTF Penetration Testing!19](https://reader033.vdocuments.net/reader033/viewer/2022050313/5f75d423655b2e70e1743338/html5/thumbnails/11.jpg)
Courses Courses Courses Courses
Has to have revisionScheme in place, but no
measurements
We propose to useABET SLO
Program Educational Objectives (POL)
Student Learning Outcomes
Rubrics
MSCSMechITCS
Department Mission
Statement
UniversityMission
Statement
ABET
![Page 12: Computer Science @ CI - Michael Soltysprof.msoltys.com/wp-content/uploads/2018/11/ITGuild-Nov... · 2018-12-16 · Digital Forensics Collaboration with HTTF Penetration Testing!19](https://reader033.vdocuments.net/reader033/viewer/2022050313/5f75d423655b2e70e1743338/html5/thumbnails/12.jpg)
Mechatronics = Mechanics + Electronics
![Page 13: Computer Science @ CI - Michael Soltysprof.msoltys.com/wp-content/uploads/2018/11/ITGuild-Nov... · 2018-12-16 · Digital Forensics Collaboration with HTTF Penetration Testing!19](https://reader033.vdocuments.net/reader033/viewer/2022050313/5f75d423655b2e70e1743338/html5/thumbnails/13.jpg)
• Mechatronics is a modern multi-disciplinary field of Engineering, combining Computer Hardware, Electronics and Mechanical Engineering in one.
A lot of Employment Opportunities!
![Page 14: Computer Science @ CI - Michael Soltysprof.msoltys.com/wp-content/uploads/2018/11/ITGuild-Nov... · 2018-12-16 · Digital Forensics Collaboration with HTTF Penetration Testing!19](https://reader033.vdocuments.net/reader033/viewer/2022050313/5f75d423655b2e70e1743338/html5/thumbnails/14.jpg)
![Page 15: Computer Science @ CI - Michael Soltysprof.msoltys.com/wp-content/uploads/2018/11/ITGuild-Nov... · 2018-12-16 · Digital Forensics Collaboration with HTTF Penetration Testing!19](https://reader033.vdocuments.net/reader033/viewer/2022050313/5f75d423655b2e70e1743338/html5/thumbnails/15.jpg)
![Page 16: Computer Science @ CI - Michael Soltysprof.msoltys.com/wp-content/uploads/2018/11/ITGuild-Nov... · 2018-12-16 · Digital Forensics Collaboration with HTTF Penetration Testing!19](https://reader033.vdocuments.net/reader033/viewer/2022050313/5f75d423655b2e70e1743338/html5/thumbnails/16.jpg)
Swarmathon
![Page 17: Computer Science @ CI - Michael Soltysprof.msoltys.com/wp-content/uploads/2018/11/ITGuild-Nov... · 2018-12-16 · Digital Forensics Collaboration with HTTF Penetration Testing!19](https://reader033.vdocuments.net/reader033/viewer/2022050313/5f75d423655b2e70e1743338/html5/thumbnails/17.jpg)
Cybersecurity
![Page 18: Computer Science @ CI - Michael Soltysprof.msoltys.com/wp-content/uploads/2018/11/ITGuild-Nov... · 2018-12-16 · Digital Forensics Collaboration with HTTF Penetration Testing!19](https://reader033.vdocuments.net/reader033/viewer/2022050313/5f75d423655b2e70e1743338/html5/thumbnails/18.jpg)
Example Buffer Overflow
![Page 19: Computer Science @ CI - Michael Soltysprof.msoltys.com/wp-content/uploads/2018/11/ITGuild-Nov... · 2018-12-16 · Digital Forensics Collaboration with HTTF Penetration Testing!19](https://reader033.vdocuments.net/reader033/viewer/2022050313/5f75d423655b2e70e1743338/html5/thumbnails/19.jpg)
OutlineCybersecurity at CI
Digital Forensics Collaboration with HTTF Penetration Testing
!19
![Page 20: Computer Science @ CI - Michael Soltysprof.msoltys.com/wp-content/uploads/2018/11/ITGuild-Nov... · 2018-12-16 · Digital Forensics Collaboration with HTTF Penetration Testing!19](https://reader033.vdocuments.net/reader033/viewer/2022050313/5f75d423655b2e70e1743338/html5/thumbnails/20.jpg)
SEAKER
!20
![Page 21: Computer Science @ CI - Michael Soltysprof.msoltys.com/wp-content/uploads/2018/11/ITGuild-Nov... · 2018-12-16 · Digital Forensics Collaboration with HTTF Penetration Testing!19](https://reader033.vdocuments.net/reader033/viewer/2022050313/5f75d423655b2e70e1743338/html5/thumbnails/21.jpg)
Voyager
!21
![Page 22: Computer Science @ CI - Michael Soltysprof.msoltys.com/wp-content/uploads/2018/11/ITGuild-Nov... · 2018-12-16 · Digital Forensics Collaboration with HTTF Penetration Testing!19](https://reader033.vdocuments.net/reader033/viewer/2022050313/5f75d423655b2e70e1743338/html5/thumbnails/22.jpg)
Password Beast
!22
![Page 23: Computer Science @ CI - Michael Soltysprof.msoltys.com/wp-content/uploads/2018/11/ITGuild-Nov... · 2018-12-16 · Digital Forensics Collaboration with HTTF Penetration Testing!19](https://reader033.vdocuments.net/reader033/viewer/2022050313/5f75d423655b2e70e1743338/html5/thumbnails/23.jpg)
Virus Total
!23
![Page 24: Computer Science @ CI - Michael Soltysprof.msoltys.com/wp-content/uploads/2018/11/ITGuild-Nov... · 2018-12-16 · Digital Forensics Collaboration with HTTF Penetration Testing!19](https://reader033.vdocuments.net/reader033/viewer/2022050313/5f75d423655b2e70e1743338/html5/thumbnails/24.jpg)
COMP 424/524
AWUS 036 ACH
!24
![Page 25: Computer Science @ CI - Michael Soltysprof.msoltys.com/wp-content/uploads/2018/11/ITGuild-Nov... · 2018-12-16 · Digital Forensics Collaboration with HTTF Penetration Testing!19](https://reader033.vdocuments.net/reader033/viewer/2022050313/5f75d423655b2e70e1743338/html5/thumbnails/25.jpg)
Course Outline1. Crypto: basics
2. Crypto: symmetric ciphers, Assignment: break a MAC
3. Crypto: DES, IDEA, AES, htpasswd; case study: break WEP
4. Crypto: blocks & hashes
5. Crypto: public key: D-H, ElGamal, RSA, elliptic curves
6. Authentication: kerberos
7. Tools:
I. OpenSSL & GnuPG
II. Hashcat & John Ripper
III. Kali Linux, Wireshark & Palo Alto Firewalls
IV. Malware
25
![Page 26: Computer Science @ CI - Michael Soltysprof.msoltys.com/wp-content/uploads/2018/11/ITGuild-Nov... · 2018-12-16 · Digital Forensics Collaboration with HTTF Penetration Testing!19](https://reader033.vdocuments.net/reader033/viewer/2022050313/5f75d423655b2e70e1743338/html5/thumbnails/26.jpg)
Cryptoanalysis How to break a code
Encoding vs Encryption
!26
![Page 27: Computer Science @ CI - Michael Soltysprof.msoltys.com/wp-content/uploads/2018/11/ITGuild-Nov... · 2018-12-16 · Digital Forensics Collaboration with HTTF Penetration Testing!19](https://reader033.vdocuments.net/reader033/viewer/2022050313/5f75d423655b2e70e1743338/html5/thumbnails/27.jpg)
8. CompTIA Security+
9. AWS security
10. Another assignment, usually coding in Python
11. Presentations
I. Long list of articles (articles more current than textbooks)
II. Ability to articulate ideas about security
27
![Page 28: Computer Science @ CI - Michael Soltysprof.msoltys.com/wp-content/uploads/2018/11/ITGuild-Nov... · 2018-12-16 · Digital Forensics Collaboration with HTTF Penetration Testing!19](https://reader033.vdocuments.net/reader033/viewer/2022050313/5f75d423655b2e70e1743338/html5/thumbnails/28.jpg)
Penetration Testing
Kali Linux Wireshark
Palo Alto Firewall!28
![Page 29: Computer Science @ CI - Michael Soltysprof.msoltys.com/wp-content/uploads/2018/11/ITGuild-Nov... · 2018-12-16 · Digital Forensics Collaboration with HTTF Penetration Testing!19](https://reader033.vdocuments.net/reader033/viewer/2022050313/5f75d423655b2e70e1743338/html5/thumbnails/29.jpg)
Capstone Showcase
November 29, 2018 3:00 - 5:00
Sierra Hall CSU CI
![Page 30: Computer Science @ CI - Michael Soltysprof.msoltys.com/wp-content/uploads/2018/11/ITGuild-Nov... · 2018-12-16 · Digital Forensics Collaboration with HTTF Penetration Testing!19](https://reader033.vdocuments.net/reader033/viewer/2022050313/5f75d423655b2e70e1743338/html5/thumbnails/30.jpg)
23rd International Conference on Knowledge-Based and Intelligent Information & Engineering Systems
http://kes2019.kesinternational.org
![Page 31: Computer Science @ CI - Michael Soltysprof.msoltys.com/wp-content/uploads/2018/11/ITGuild-Nov... · 2018-12-16 · Digital Forensics Collaboration with HTTF Penetration Testing!19](https://reader033.vdocuments.net/reader033/viewer/2022050313/5f75d423655b2e70e1743338/html5/thumbnails/31.jpg)
Questions?Michael Soltys
[email protected] www.msoltys.com @MichaelMSoltys
�31
www.msoltys.com/mechatronics www.msoltys.com/cybersecurity www.msoltys.com/aws