Academy Program

Embedding Cybersecurity Certification with Academic Programs Introduction

Jason Brown, CISSP Chief Information Security Officer , Inc

[email protected] @jasonbrown17 https://linkedin.com/in/jasonbrown17

2 Agenda

● Background of Merit

● What is the Academy Program?

● How did we come up with this idea?

● How does it work?

● What does it cost?

● Who do I talk to?

3 Background of Merit Merit Network, Inc.

Merit exists for the benefit of our membership

Member owned since 1966

Governed by 12 public universities Supported by 300 affiliate members

501(c)3 non-profit

5 Introduction

6 Map of the Cyber Range

7 What is the Academy Program? What is the Academy Program?

The Academy Program is part of Merit’s drive for early credentialing of students.

● Students enroll in courses that cover the same material as certification courses, augmented by appropriate academic material. ● These courses are taught in the same time frame as other academic courses. ● At the end of the semester/term, students are eligible to sit for the certification exam, which is covered in the tuition.

9 What is Early Credentialing?

● Early credentialing embeds industry-recognized certification training into an academic program

● Obtaining certificates qualifies students for jobs in addition to degrees and experience

● Academy courses are accredited by the NSA, NIST, NICE, NICCS, DOJ, and the FBI

● Certificates however do not comply with 8570 credentialing requirements

10 DoD 8570

11 Mile2 Offerings

12 How Did We Come Up with the Idea? How Did We Come Up With This Idea?

● Dr. Adams used to teach at the US Military Academy.

● USMA divides all courses into 40 lessons. Most (if not all) certification courses are 40 hours. Hmm…

● Repackage the certification course over a semester or term. Add academic foundation. Lather, rinse, repeat…

● Because the Cyber Range bundles course tuition with the price of the certification exam, students receive a voucher to sit for the certification exam at the end of the class.

14 Course Delivery

● Courses can be delivered however you like

● Some have offered 8 or 16 week courses for X number of credit hours

● Each course can be set up to be delivered depending on your academic model

● It just cannot be set up to be taught for 1 - 40 hour week long course

15 How Does it Work? How Does It Work?

● Recruit a qualified instructor ○ Instructor should have experience teaching cybersecurity, working with virtual machines, and (preferably) working in the cybersecurity industry. ○ It is desired that he/she have the certification that they will be testing or an equivalent. ● Merit on-boards the instructor ○ This process teaches the instructor how to use the infrastructure. ○ Introduces the instructor to the labs and content. ○ Introduces the instructor to the support processes. ● School lists the course in its course catalog ○ Students enroll as with any other course ○ At the end of the course, the instructor requests exam vouchers from Merit

17 Access to the Material

● Curriculum is provided by Merit’s cybersecurity training partner, Mile2 ○ Students will be required to register on Mile2’s website in order to gain access to the digital book ● If you have a web browser and an connection, you can access the labs ● The labs are taught using Merit’s Cyber Range virtual environment ○ The Cyber Range is self contained ○ Do not have to worry about students launching attacks outside the Range ● There is a certification exam at the end of the course however it is not required if the student or professor desires to skip

18 Where are the Ranges Located?

19 Train the Trainer

● Training is provided to help the instructure get used to the environment ● Be qualified and experienced in the subject area ● What credentials do I need? ○ Hold an equivalent certification ○ Sit for a Mile2 exam (most cases free and provided by Merit) and score a 70% or higher ○ Obtain approval after showing experience ● Can an instructor bypass the training? ● How long does it take to onboard an instructor?

20 Where Does It Work?

Wayne State University has been teaching Academy Program courses for two years.

● “Basics of Cyber Security” = CISSP bootcamp ● “Basics of Penetration Testing” = CEH bootcamp

Both classes have wait lists each term. Graduates of the classes are picked for University IT jobs and internships.

Others have recently joined the program:

● Bowling Green State University ● Western Michigan University

21 What Does it Cost? What Does It Cost?

● Prices are set to fit within a school’s tuition structure. No additional fees or charges are necessary.

● Prices differ between 4-year schools and 2-year schools due to tuition structure differences.

● Merit sets a flat fee per student and that is due when the student pays their tuition

● In return, the school pays Merit

23 Who Do I Speak With? Who Do You Contact?

Tonia Cronin

Business Development Manager, Michigan Cyber Range

[email protected]

25 www.merit.edu 734.527.5700

1000 Oakbrook Drive Suite 200 Ann Arbor, Michigan 48104-6794

Thank You

26