On Demand
On Demand
On Demand

Instructor Tom McLaughlin has taught for over 17 years professionally and enjoys seeing the 'lights come on' for students who are struggling with their studies. Tom uses a proven approach where students use something silly to associate with IT terms. His secret desire to be a stand-up comedian helps as well.


The success he has seen are students removing the fear of IT, passing certification exams, and still remembering things years down the road attested by emails he gets from past students.

The secret is knowing your topic well, and rehashing it into a simpler format for students to grasp. Basically you are a glorified cow... Be sure to join the session to find out how!

Why attend?

Tom will be sharing with you different approaches to lighten up training making it fun for the student, engaging and interactive.  This will provide you with insight on how you may take some of Tom’s approach and apply it to your training.




On Demand

Join Elizabeth K. Eger to learn how unconscious bias discourages women and other underrepresented individuals from pursuing education and careers in technology. In this interactive presentation, we will explore how educators and employers can effectively address hidden barriers in order to better attract and retain the diverse students/employees that will drive future innovation. Attendees will learn about concrete strategies and resources for implementing better practices in their classrooms and organizations.

Session takeaways include:

  • Explaining unconscious bias and how it operates
  • Understanding the impact of unconscious bias for women and other underrepresented individuals
  • Tips on how to eliminate unconscious bias in recruiting, teaching/tech classrooms, and workspaces.

Women in IT Resources

The Advancing Women in IT (AWIT) community has developed a library of resources that can be used to promote awareness of opportunities for women in IT. Join Cathy Alper as she reviews these resources

On Demand

Join Andrew Smith from the UK Open University, who uses social media, namely Twitter, LinkedIn and Facebook to reach out to his Security and Linux (as well as Cisco) students. Coined as ‘teaching by twitter’ - Andrew will share his experiences of extending the classroom into the social media space - using many free or low cost tools to reach students and larger audience. Before you join, you can see some of his work via @OUCyberSec, @OULinux and @OUCisco.


Why attend?

Andrew will show you how you can use social media to reach out to your students and connect with students outside the classroom, providing support and instruction in a medium they use daily.




On Demand
On Demand
On Demand
On Demand
On Demand
On Demand
On Demand
On Demand

Linux remains the key player in IoT, the cloud, security, and our mobile-aware world. Let’s take a look into each of the sectors where Linux is relevant, and take some time to learn more about how it works. This presentation will take a hands-on look into today’s myriad implementations of Linux. If you’re interested in learning more about how Linux is used today (as opposed to 20, 10, or 5 years ago), this presentation is for you.


Why attend?

This will help you position the importance of Linux in your educational program. It will also provide you with a lot of hands on examples for installing and tools used with linux in a networked environment.




On Demand

A course on CompTIA Security+ is often the first in-depth security course that most students take.  This makes teaching this course sometimes a challenge. 

Often  students are at different levels of experience and knowledge regarding security.  In addition, typically some students are extremely interested in security while other students are completely disinterested in the topic of security and "tune out" even before the course begins. 

With this wide array of students in Security+ courses:

  • What are some teaching strategies to spark interest in the disinterested? 
  • How can we use meaning instruction and activities that will help both beginning as well as advanced students learn about security? 

In this workshop we will explore teaching strategies for teaching Security+.




On Demand

October is National Cyber Security Awareness Month which is an annual campaign to raise awareness about cybersecurity. We live in a world that is more connected than ever before. The Internet touches almost all aspects of everyone’s daily life, whether we realize it or not. 

This is a great time to take a minute as technology instructors and think about how to discuss this topic with our students. Join us as we welcome Ron Culler, CTO of Secure Designs Inc and Charles Kolodgy, Senior Security Strategist at IBM as they share their expertise in the field of security and talk about current trends in cyber security threats and technologies used to protect large and small business data.

Ron and Charles will also discuss what students need to do in order to prepare for a career in cyber security and what to expect in various job roles. 

Why Attend:

This session will provide you with great examples of what industry experts are seeing in the field today providing you with topics and issues to be s

On Demand
On Demand
CSA+ Train-the-Trainer Course Intro CompTIA’s Stephen Schneiter and Guest Instructor Clay Leitzke, will not only teach you the content of CSA+, but will also share teaching strategies and labs you may use in the classroom. This session will be an introduction for the complete series that runs biweekly from January 10 to February 24. Session topics include: Overview of all CSA+ exam domains What to expect in the series and what’s expected of you? Review Course syllabus Review Assessment results Provide attendees access to Practice labs Registration link to the series
On Demand
On Demand

Dwight W. Thomas, Technical Lead, SCADA Networks & Security Enbridge Energy, will join us and share his experiences implementing and supporting IT in various industries. Dwight will discuss the emergence of IoT in manufacturing and the unique issues IoT brings to the technology field.


Why Attend:

Attend this session to help your students understand the role of IoT in the IT field. Gain knowledge of how IoT is used and share with your students.




On Demand
January 10, 2017 Session Recording Cover basic overview of Networking including: OSI - Prmary functions, devices, and addressing Numbering systems - binary, hex, decimal IPv4 Common ports 1.0 Threat Management 1.1 Given a scenario, apply environmental reconnaissance techniques using appropriate tools and processes
On Demand
January 12 we covered the following: Discussed the review questions from session 1. An answer key is provided and can be downloaded from the resources box. Reveiwed foundational concepts that are required for CSA+ objectives. Reviewed tools used to collect information about a network Reviewed objective 1.1 Given a scenario, apply environmental reconnaissance techniques using appropriate tools and processes. Reviewed Objective 1.2 Given a scenario, analyze the results of a network reconnaissance.
On Demand
January 17 we covered the following: Discussed review questions from week 1 collectively. Reviewed security threats in more detail pertaining to types and how threats may be introduced into a network. Discussed ways to mitigate attacks such as user training. Reviewed concepts of vulnerability vs threats Reviewed tools and parameters or switches used with tools to monitor network trafic and discover threats including NMAP and NSTAT Discussed Packet analysis vs protocol analysis Reviewed concepts of Netflow analysis
On Demand
January 19 we coved the following: Discussed review questions from session 3 1-17-17. Network segmentation Endpoint security Group policies ACLs Hardening Network Access Control - NAC Penetration Testing
On Demand
January 24 we covered the following: Data correlation and analytics, reviewing trend analysis Reveiwed training and exercises, red, blue and white teams. Risk evaluation. OWASP risk rating system Penetration testing Reverse engineering Vulnerability managemnet process Identification of requirements Establish scanning frequency Determining scanning criteria sensitivity levels server based vs. agent based
On Demand
January 31 we covered the following: Reviewed objective 2.1 including Discussion of policy Work flow Remediation General reports Discussed objective 2.2 including Analyzing scan reports to identify False Positive True Positive False Negative True Negative Determine trends Discuss best practices Discussed objective 2.3 including discussing common vulnerabilities in network hardware Discussed VPNs and Mobile access
On Demand
CSA+ Train-the-Trainer Domain 2 & 3 Session 7 CompTIA’s Stephen Schneiter and Guest Instructor Clay Leitzke, will not only teach you the content of CSA+, but will also share teaching strategies and labs you may use in the classroom. February 02 we covered the following: Reviewed objective 2.3 including Interconnected networks VPNs Indsutrial Control Systems (ICS) SCADA devices Began discussing objective 3.1 including a review of threat classification: Adware Spyware Logic bombs virus Trojans Bots/DDOS Backdoors Ransomware Also included in 3.1 we discussed scope of impact Downtime Recovery time Data integrity Economic System process criticality began reviewing types of datato conder in incident prioritization: Personally Identifiable Information (PII) Personal Health Information (PHI) Payment card information
On Demand
The February 07 session covered covered the following: Objectives for Domain 3 Cyber Incident Response (Objectives 3.1 - 3.2) Types of data Personally Identifiable Information (PII) Personal Health Information (PHI) Payment card information Intellectual property Corporate confidential Accounting data Mergers and acquisitions Forensics kit Digital forensics workstation Write blockers Cables Drive adapters Wiped removable media Cameras Crime tape Tamper-proof seals Documentation/forms Chain of custody form Incident response plan Incident form Call list/escalation list Forensic investigation suite Imaging utilities Analysis utilities Chain of custody Hashing utilities OS and process analysis Mobile device forensics Password crackers Cryptography tools Log viewers
On Demand
On Demand
February 09 we covered the following objectives for Domain 3 Cyber Incident Response: Objective 3.3 Explain the importance of communication during the incident response process. Stakeholders HR Legal Marketing Management Purpose of communication processes Limit communication to trusted parties Disclosure based on regulatory/legislative requirements Prevent inadvertent release of information Secure method of communication Role-based responsibilities Technical Management Law enforcement Retain incident response provide Objective 3.4 Given a scenario, analyze common symptoms to select the best course of action to support incident response. Common network-related symptoms Bandwidth consumption Beaconing Irregular peer-to-peer communication Rogue devices on the network Scan sweeps Unusual traffic spikes Common host-related symptoms Processor consumption Memory consumption Drive capacity consumption Unauthorized software Malicious processes Unauthorized changes Unauthorized privileges Data exfiltration Common application-related symptoms Anomalous activity Introduction of new accounts Unexpected output Unexpected outbound communication Service interruption Memory overflows
On Demand
On Demand
On Demand
On Demand
On Demand
On Demand
On Demand
On Demand
February 17 we covered the following objectives for Domain 3 Cyber Incident Response: Objective 3.4 Given a scenario, analyze common symptoms to select the best course of action to support incident response. Common network-related symptoms Bandwidth consumption Beaconing Irregular peer-to-peer communication Rogue devices on the network Scan sweeps Unusual traffic spikes Common host-related symptoms Processor consumption Memory consumption Drive capacity consumption Unauthorized software Malicious processes Unauthorized changes Unauthorized privileges Data exfiltration Common application-related symptoms Anomalous activity Introduction of new accounts Unexpected output Unexpected outbound communication Service interruption Memory overflows Objective 3.5 Summarize the incident recovery and post-incident response process. Containment techniques Segmentation Isolation Removal Reverse engineering Eradication techniques – Security+ Sanitization Reconstruction/reimage Secure disposal
On Demand
February 21 we covered the following objectives for Domain 4 Security Architecture and Tool Sets: Objective 4.1 Explain the relationship between frameworks, common policies, controls, and procedures. Regulatory compliance Frameworks NIST ISO COBIT SABSA TOGAF ITIL Policies Password policy Acceptable use policy Data ownership policy Data retention policy Account management policy Data classification policy Procedures Continuous monitoring Evidence production Patching Compensating control development Control testing procedures Manage exceptions Remediation plans Objective 4.2 Given a scenario, use data to recommend remediation of security issues related to identity and access management. Security issues associated with context-based authentication Time Location Frequency Behavioral Security issues associated with identities Personnel Endpoints Servers Services Roles Applications Security issues associated with identity repositories Directory services TACACS+ RADIUS Exploits Impersonation Man-in-the-middle Session hijack Cross-site scripting Privilege escalation Rootkit
On Demand
February 28 we covered the following objectives for Domain 4 Security Architecture and Tool Sets: 4.2 Given a scenario, use data to recommend remediation of security issues related to identity and access management. Security issues associated with context-based authentication Time Location Frequency Behavioral Security issues associated with identities Personnel Endpoints Servers Services Roles Applications Security issues associated with identity repositories Directory services TACACS+ RADIUS Security issues associated with federation and single sign-on Manual vs. automatic provisioning/deprovisioning Self-service password reset Exploits Impersonation Man-in-the-middle Session hijack Cross-site scripting Privilege escalation Rootkit 4.3 Given a scenario, review security architecture and make recommendations to implement compensating controls. Security data analytics Data aggregation and correlation Trend analysis Historical analysis Manual review Firewall log Syslogs Authentication logs Event logs Defense in depth Personnel Training Dual control Separation of duties Third party/consultants Cross training Mandatory vacation Succession planning Processes Continual improvement Scheduled reviews Retirement of processes Technologies Automated reporting Security appliances Security suites Outsourcing Security as a Service Cryptography Other security concepts Network design Network segmentation
On Demand
On Demand
On Demand
On Demand
On Demand
On Demand
On Demand
On Demand
On Demand
On Demand
On Demand
On Demand
On Demand
On Demand
On Demand
On Demand
On Demand
On Demand
On Demand
On Demand
On Demand
On Demand
On Demand
On Demand
On Demand
On Demand
On Demand
On Demand
On Demand
On Demand
On Demand
On Demand
On Demand
On Demand
On Demand
On Demand
On Demand
On Demand
On Demand
On Demand
On Demand
On Demand
On Demand
On Demand
On Demand
On Demand
On Demand
On Demand
On Demand
On Demand
On Demand
On Demand
On Demand
On Demand
On Demand
On Demand
On Demand
On Demand
On Demand
On Demand
On Demand
On Demand
On Demand
On Demand
On Demand
On Demand
On Demand
On Demand
On Demand
On Demand
On Demand
On Demand
On Demand
On Demand
On Demand
On Demand
On Demand
On Demand
On Demand
On Demand
On Demand
On Demand
On Demand
Oct 18, 2018 07:00 PM CDT
Oct 23, 2018 07:00 PM CDT
Oct 25, 2018 07:00 PM CDT
Oct 30, 2018 07:00 PM CDT
Nov 01, 2018 07:00 PM CDT
Nov 06, 2018 07:00 PM CST
Nov 08, 2018 07:00 PM CST
Nov 13, 2018 07:00 PM CST
Nov 15, 2018 06:30 PM CST
Jan 22, 2019 06:30 PM CST
Jan 24, 2019 07:00 PM CST
Jan 29, 2019 07:00 PM CST
Jan 31, 2019 07:00 PM CST
Feb 05, 2019 07:00 PM CST
Feb 07, 2019 07:00 PM CST
Feb 12, 2019 07:00 PM CST
Feb 14, 2019 07:00 PM CST
Feb 19, 2019 07:00 PM CST
Feb 21, 2019 07:00 PM CST
Feb 26, 2019 07:00 PM CST
Feb 28, 2019 06:30 PM CST
On Demand
On Demand
Oct 18, 2018 02:00 PM CDT
Oct 25, 2018 10:00 AM CDT
On Demand