IT Connect Press Release
It seems like cybersecurity threats are in the news every day. From the billion Yahoo accounts and
passwords that were compromised, claims that Russian hackers tried to skew election results, or the
dramatic increase in ransomware attacks, cybersecurity experts are in high demand.
Helping develop the talent for the next generation of IT experts is the goal behind an intense five days
for students at the CSi Boot Camp at the University of Minnesota June 19-23rd. Students from all
Minnesota State colleges and institutions are eligible. Those chosen will be taking part in hands-on
learning from IT industry leaders and cybersecurity experts.
Hands-On Training
Students attending the CSi Boot Camp get more than lectures. They get hands-on training with realworld forensic tools and tactics to identify and thwart cybersecurity threats. “I especially liked the
hands-on presentations,” said Molly Payne, a recent college graduate with a degree in Computer
Forensics. “The Clifton Larsen Allen (session) had a lab set up, where we practiced exploitation tests,
using the actual tools we’ll use in the field.”
“The real-world experience opened my eyes wider,” said past participant Sergei Kalmuk, a student at
Century College majoring in Advance Networking and Security. “With cloud technologies, security is
changing every twenty minutes.”
The 2017 CSi Boot Camp is hosted by Advance IT Minnesota in partnership with Mn(C)3 Minnesota
Cyber Careers Consortium.
Students can study a variety of cybersecurity topics and tactics:
•
Cyber Offense and Testing, including Penetration Testing and Vulnerability Assessments
Students will get experience with penetration testing tools. Students will use a Linux laptop to
target vulnerable systems for testing.
•
Cyber Defense and Next Generation Firewalls
Justin Opatmy, a specialist in Security Infrastructure Protection for General Mills, will head up a lab
focused on Firewalls, Active Defense, and discuss security tools and resources.
•
Security Operations and Forensics, including Malicious Data and Memory Forensics Analysis.
Firasat Khan, Advance IT Minnesota, will also showcase new paradigms in IoT (Internet of Things)
Security and the potential threats. With more and more devices connected to the internet, there is
a growing concern about security.
•
Application Security, including Privileged Access Management and Threat Modeling
Getting into a secure system is bad enough, but if hackers can gain Privileged Access, they can do
serious damage. Gaining root privileges would allow hackers to change systems configs, install
viruses and software, and access secure data.
Students will also have the opportunity to visit local Fortune 500 companies to gain real-world
experience with security teams. At the end of the boot camp, students will go through an assessment
process to evaluate what they’ve learned.
High Demand Jobs
The cybersecurity job market is expanding at incredible pace. The industry is expected to grow to a
$170 billion industry by the year 2020, according to Gartner, Inc. Cloud security, threat intelligence, and
mobile security are the hot growth areas. Right now, there are more than 200,000 cybersecurity jobs
that companies in the United States are trying to fill. The number of job listings has grown by 74% in the
past five years, according to a Bureau of Labor Statistics study done by the Stanford University
Journalism program.
Experts at Cisco, considered the world leader in networking systems, estimate that there are more than
a million unfilled jobs worldwide. Almost every business used technology connected to the
internet. Every company, therefore, has a need for secure systems and regular protection measures.
The Cybersecurity Marketplace
How big is the cybersecurity market? Consider that four financial institutions – Bank of America, Citi,
Wells Fargo, and JP Morgan Chase – spend a collective $1.5 billion dollars a year on cybersecurity,
according to Forbes.
The threat potential is growing rapidly and it’s affecting more people than ever. The adoption of mobile
devices, like smartphones and tablets, has increased the opportunity for mischief. Reports show that
more than half the world’s population now uses a smartphone. Added to other in-home technology, that
means some 8 Billion internet-connected things are being used in 2017, according to research company
Gartner.
The impact of network intrusions is shocking. The FBI says losses to businesses cost billions of dollars
every year from attacks on systems. It’s not just businesses. Hospitals, government offices, school
districts, law enforcement agencies, and critical services like 9-1-1 centers are seeing increased
threats. While people picture computer geeks trying to break in to secure systems, the reality is more
likely criminal elements, spies, and terrorists.
Networking and Recruiting
Part of the curriculum is designed to help current and future job seekers to stand out from the crowd. In
addition to hands-on training and contacts. Sharon Boerbon-Hanson, Advanced IT Minnesota will help
students create their personal brand to highlight their unique skills.
In addition, it’s a great place for students to network for jobs as well as a place for businesses to
recruit. “I went into boot camp expecting I was going to get contacts for future employment,” said Eric
Wolkerstorfer, a previous attendee. “I thought it was be a great opportunity to network. It was.”
Article
Options