Air Force Training Courses

Total Page:16

File Type:pdf, Size:1020Kb

Air Force Training Courses Fall 2014 Course Schedule TPL036: Introduction to Ruby and Rails .................................................................................................................................. 2 TPL482: JSON and JSON Schema ............................................................................................................................................. 3 SV066: Linux/Unix Security ..................................................................................................................................................... 4 TSV436: Secure Code Review .................................................................................................................................................. 5 1 | P a g e Approved for Public Release; Distribution Unlimited. Case Number 14-3731 ©2014 The MITRE Corporation. ALL RIGHTS RESERVED Fall 2014 Course Schedule TPL036: Introduction to Ruby and Rails Course Description: This course provides a thorough introduction to the Ruby programming language. Students will explore what differentiates Ruby from other modern programming languages. The class will have a strong focus on the tools that Ruby provides to generate logic and build applications with less code than other programming languages. Once a basic understanding of the Ruby programming language is attained, the class will provide an introduction to Ruby on Rails. This is a popular development framework for rapidly creating web applications. Students will leave the class with the tools they need to create simple Ruby and Rails applications and explore the ecosystem further on their own. Course Objectives: • Install and setup a Ruby and Rails environment • Identify the basics of the Ruby programming language. • Create and configure a Rails application • Develop a basic understanding of programming with Ruby, with the tools necessary to learn more • Provide knowledge on the architecture of a Ruby on Rails application, with the ability to create a basic web application using it. Format: Lecture/Lab Prerequisites: Experience with an object oriented programming language, such as Java or C# Target Audience: This course is open to all MITRE technical staff. Length: 2 Days (14 Hours) Schedule: 11-Feb-2015 - 12-Feb-2015 (8:30 - 4:30) Instructor: Andy is an architect and developer on popHealth, a Ruby-based open source platform for calculating clinical quality measures. The design of popHealth allows the software to calculate quality measures for very large groups of patients in an easily scalable fashion. Andy is Technical Lead of the current effort to deploy a popHealth prototype installation at VA. Andy holds a BS in Electrical Engineering from Eastern Nazarene College and an MS in Computer Systems Engineering from Boston University. 2 | P a g e Approved for Public Release; Distribution Unlimited. Case Number 14-3731 ©2014 The MITRE Corporation. ALL RIGHTS RESERVED Fall 2014 Course Schedule TPL482: JSON and JSON Schema Course Description: JSON is a data format that is increasingly being used for data exchanges due to its compactness. JSON Schema is a simple, powerful schema language for validating JSON-formatted data. In this course you will learn the JSON data format and you will learn the JSON Schema language. You will learn how to write JSON documents. You will learn how to create JSON Schemas and validate JSON documents against JSON Schemas. Format: Lecture/Lab Prerequisites: None Target Audience: All MITRE Staff Length: Two Days Schedule: 3-Feb-2015 - 4-Feb-2015 (8:00 - 4:00) Instructor: Roger Costello ([email protected]) is a lead staff in E54C, Agile and Adaptive Software Engineering. He has worked extensively in the Internet technologies area. Roger has been actively involved with XML and the entire family of XML technologies for several years. Roger has created and taught over a dozen different courses on the XML technologies and is regularly invited to talk at XML conferences. He has traveled to many of the MITRE sites around the world, providing XML training. Roger is regularly invited to teach XML courses to the Boston chapter of the IEEE. As well as XML training, Roger consults for numerous MITRE projects that are using XML technologies. He has a Ph.D. in Computer Science from Ohio State University. 3 | P a g e Approved for Public Release; Distribution Unlimited. Case Number 14-3731 ©2014 The MITRE Corporation. ALL RIGHTS RESERVED Fall 2014 Course Schedule SV066: Linux/Unix Security Course Description: This course is a hands-on introduction to Linux/Unix security fundamentals that are critical to cyber security. Curriculum will start from basic host security, working up to Security-Enhanced Linux (SELinux) and Mandatory Access Control (MAC) configuration. This course will be designed to fill in knowledge gaps for attendees. Attendees with all levels of technical backgrounds will benefit from this class. Critical components include audit configuration, data encryption, securely managing system resources, kernel security and managing privileges. Each component will be examined on both Linux based systems (CentOS) and Unix/BSD based systems (FreeBSD) to further enhance the learning process by showing different ways to address similar problems. The class will incorporate hands-on exercises and labs. Students will gain an understanding of host based security configuration concepts. These concepts will be demonstrated by student labs based on common misconfigurations that students must address by applying concepts learned throughout the class. The class will culminate when students are asked to secure a system that has been preconfigured with bugs that have been stacked to form an insecure user environment. It is expected that attendees will have knowledge in one or more topics covered in the class. This class is meant to fill in gaps and allow students to build on their previous knowledge to become more technically skilled cyber security professionals. Solid foundational knowledge will allow students to easily understand more advanced topics. The technical confidence students will gain in this class will allow them to quickly tackle technical hurdles in their day-to-day work. We need more ¿ninjas¿ in MITRE tech centers, who are not intimidated by the unknown, and have a broad technical background, enabling them to overcome adversity to solve critical cyber security problems. Course Objectives: • Introduce Linux host based security • Review security options available to a Linux/Unix host • Review auditing options available to a Linux/Unix host • Learn fundamentals of Mandatory Access Control (MAC) • Learn how to implement privilege separation for users and processes • Understand security implications of default Linux/Unix configurations • All attendees will apply all knowledge through lab exercises during the course Format: Lab Prerequisites: Minimal networking, system administration, and/or cyber security knowledge. Target Audience: Junior tech staff Senior tech staff that have found themselves working in a lab Engineers changing disciplines to cyber security Engineers in other fields supporting cyber work. Length: 2 Days (14 Hours) 4 | P a g e Approved for Public Release; Distribution Unlimited. Case Number 14-3731 ©2014 The MITRE Corporation. ALL RIGHTS RESERVED Fall 2014 Course Schedule Schedule: February 5-6, 2015 (8:30-4:30) Instructor: Derek Anderson ([email protected]) is a Lead Cyber Security Engineer in Department J83C - Army/Navy Security. He supports various customers performing vulnerability assessments and prototype development. Previous to MITRE, he worked in a world-class managed security service SOC as a Security Analyst. Derek holds a BS in Information Technology from Rochester Institute of Technology and is currently enrolled in a Masters program in Information Assurance at Capitol College. TSV436: Secure Code Review Course Description: This course is designed to help developers bring a secure coding mindset into typical project peer reviews. The course briefly talks about the development lifecycle and the importance of peer reviews in delivering a quality product. How to perform this review is discussed and how to keep secure coding a priority during the review is stressed. A variety of hands-on exercises will address common coding mistakes, what to focus on during a review, and how to manage limited time. Throughout the course, the class will break out into pairs and perform example peer reviews on sample code. Perl will be used for the hands-on exercises; however every attempt will be made to generalize the code such that anyone with an understanding of a coding language will be comfortable. Course Objectives: • Describe how peer reviews fit into the software development process • Start a peer review and gain the necessary background about the code • Identifty techniques for making sense of a large amount of code • Review common secure coding mistakes • Create report findings that go back to the developer Format: Lecture plus team exercises Prerequisites: TSV100 Introduction to Secure Coding Target Audience: Developers Length: One day (7 hours) Schedule: 29-Jan-2015 (Session 0005) Instructor: Drew Buttner has been at MITRE since 2001 and is one of the leaders of MITRE's software assurance work program in support of both MITRE internal and its Government sponsors. His experience and technical expertise is in the areas of code development, standardization, and static code analysis. The past couple of years he has provided support to both the Department of Defense and NIST in their research of static analysis tools. Currently he is working to establish a secure code review practice for the MITRE Community. 5 | P a g e Approved for Public Release; Distribution Unlimited. Case Number 14-3731 ©2014 The MITRE Corporation. ALL RIGHTS RESERVED .
Recommended publications
  • AMIA 2017 Annual Symposium
    AMIA 2017 Annual Symposium Washington, DC, USA 4 - 8 November 2017 Volume 1 of 3 ISBN: 978-1-5108-5307-2 Printed from e-media with permission by: Curran Associates, Inc. 57 Morehouse Lane Red Hook, NY 12571 Some format issues inherent in the e-media version may also appear in this print version. Copyright© (2017) by American Medical Informatics Association All rights reserved. Printed by Curran Associates, Inc. (2018) For permission requests, please contact American Medical Informatics Association at the address below. American Medical Informatics Association 4720 Montgomery Lane, Suite 500 Bethesda, Maryland 20814 USA Phone: (301) 657-1291 Fax: (301) 657-1296 www.amia.org Additional copies of this publication are available from: Curran Associates, Inc. 57 Morehouse Lane Red Hook, NY 12571 USA Phone: 845-758-0400 Fax: 845-758-2633 Email: [email protected] Web: www.proceedings.com TABLE OF CONTENTS VOLUME 1 Enabling Interoperability between Healthcare Devices and EHR Systems.................................................................................................1 Swapna Abhyankar ; Paul Schluter ; Kathryn Bennett ; Daniel J. Vreeman ; Clement J. McDonald Applying a Process-based Framework to examine Interunit Patient Transfers .........................................................................................3 Joanna Abraham ; Shirley Burton ; Imade Ihianle Medical Benefit Drug Claims: Assessing the NDC Documentation Gap .....................................................................................................5
    [Show full text]
  • Fall 2014 Course Schedule
    Fall 2014 Course Schedule TPL011: Introduction to C Programming ................................................................................................................................ 2 TPL036: Introduction to Ruby and Rails ................................................................................................................................. 2 TPL064: An Introduction to Computer Vision and Automated Object Recognition ................................................................ 3 TPL103: Introduction to Intel x86-64 ....................................................................................................................................... 4 TPL109: Introduction to ARM (Advanced/Acorn RISC Machine) Architecture & Software Systems ..................................... 5 TPL465: Intermediate Intel x86: Architecture, Assembly, and Applications ........................................................................... 6 TPL477: Introduction to Android Forensics and Security Testing ........................................................................................... 8 TPL482: JSON and JSON Schema ........................................................................................................................................ 9 TST414: Introduction to Bayesian Data Analysis.................................................................................................................. 10 TSV062: Privacy Engineering ..............................................................................................................................................
    [Show full text]
  • Software Design
    Software Design April 26, 2013 1. Introduction 1.1.1. Purpose of This Document This document provides a high level description of the design and implementation of Cypress, an open source certification testing tool for the calculation of Clinical Quality Measures (CQMs) as part of the stage 2 Meaningful Use (MU2) requirements of the EHR Incentive Program. This document has been written for software engineers, software architects, and technical program managers. The latest information about Cypress is available at the project’s open source website[1]. 1.1.2. Overview Cypress is an open source (see section 5) certification testing tool that automates testing of the ability of electronic health record (EHR) systems to correctly calculate MU Stage 2 CQM results. Cypress is recognized by the Office of the National Coordinator of Health IT (ONC) as the official test tool for use by Authorized Testing Laboratories (ATL) in CQM certification. In addition, Cypress can be used, free of charge, for pre-certification testing by any EHR developer. The CQM certification criteria addressed by Cypress are: • Capture and Export - the ability of an EHR system to capture the data required for each CQM for which the EHR system is being certified through its clinical user interface and to create a QRDA-I formatted data file with appropriate content that can be input by another EHR system for use in CQM calculation • Import and Calculate - the ability of an EHR system to incorporate data (from other EHR systems where necessary) in QRDA-I format and correctly calculate the CQM results and present them in QRDA-III format • Electronic Submission - the capability of an EHR system to create a standard data file that can be electronically accepted by the Centers for Medicaid & Medicare Services (CMS) Cypress includes a standard set of synthetic patient records that exercise all of the MU Stage 2 CQMs.
    [Show full text]
  • Toby Cabot Email: [email protected] URL: Http
    Toby Cabot Email: [email protected] URL: http://www.caboteria.org/~tobyc/ Who am I? • I'm a technical architect, engineer, and erstwhile manager who has been responsible for software development and IT organizations that build and run large, high-volume transaction systems. I design and write software and have grown and managed organizations up to 35 people. • I have been successful at clean-slate development efforts, and have also taken 'raw' applications and turned them into manageable products. • I have written, deployed, and managed business-critical Ruby On Rails applications, both web-facing and internal. • I have worked extensively with large-scale technology, both proprietary and Open Source. • I am well-versed in the procedural aspects of software development such as configuration management and policy development, and have worked extensively with Agile, Scrum, Kanban, and User Stories. Back in the dark ages I was even involved in an ISO-9000 certification (twice), and in a CMM effort. • I have managed IT organizations through periods of growth and technology transitions. Employment History Chief Software and Operations Architect Affectiva, Boston, MA April 2013–Present Affectiva is an MIT Media Lab spin-off that reads peoples' emotions from their facial expressions. We use Tensorflow, Ruby on Rails, Python, MySQL, and Presto/Hadoop. We run our infrastructure on AWS using AMI's and Docker and we use Terraform, Chef and ad-hoc Python scripts to manage it. I'm the company's engineering technical leader. This involves applying the core technology to specific applications such as market research, cloud API's, and mobile apps.
    [Show full text]
  • Assessment H (Health Information Technology)
    Prepared by: The MITRE Corporation A Product of the CMS Alliance to Modernize Healthcare Federally Funded Research and Development Center Centers for Medicare & Medicaid Services (CMS) Prepared for: U.S. Department of Veterans Affairs At the Request of: Veterans Access, Choice, and Accountability Act of 2014 Section 201: Independent Assessment of the Health Care Delivery Systems and Management Processes of the Department of Veterans Affairs Assessment H (Health Information Technology) September 1, 2015 Prepared by CAMH under: Prime Contract No. HHS-M500-2012-00008I Prime Task Order No. VA118A14F0373 This document was prepared for authorized distribution only. It has not been approved for public release. ©2015 The MITRE Corporation. All rights reserved. Assessment H (Health Information Technology) This page intentionally left blank. The views, opinions, and/or findings contained in this report are those of The MITRE Corporation should not be construed as an official government position, policy, or decision. ii Assessment H (Health Information Technology) Preface Congress enacted and President Obama signed into law the Veterans Access, Choice, and Accountability Act of 2014 (Public Law 113-146) (“Veterans Choice Act”), as amended by the Department of Veterans Affairs (VA) Expiring Authorities Act of 2014 (Public Law 113-175), to improve access to timely, high-quality health care for Veterans. Under “Title II – Health Care Administrative Matters,” Section 201 calls for an Independent Assessment of 12 areas of VA’s health care delivery systems and management processes. VA engaged the Institute of Medicine of the National Academies to prepare an assessment of access standards and engaged the Centers for Medicare & Medicaid Services (CMS) Alliance to Modernize Healthcare (CAMH)1 to serve as the program integrator and as primary developer of the remaining 11 Veterans Choice Act independent assessments.
    [Show full text]
  • 2011 Annual Progress Report
    Office of the National Coordinator for Health Information Technology Strategic Health IT Advanced Research Projects (SHARP) AREA 4: Secondary Use of EHR Data (SHARPn) Program Annual Progress Report Reporting period: 1/1/2011 – 12/31/2011 Program: AREA 4 - Secondary Use of EHR Data (SHARPn) Award Number: 90TR0002 Prime DUNS: 006471700 Principal Investigators: Christopher Chute, MD, DrPh, Mayo Clinic; Stan Huff, MD, Intermountain Healthcare Program Manager: Lacey Hart, MBA, PMP® Program Background ............................................................................................................. 3 Clinical Data Normalization (DN) ............................................................................................ 4 Clinical Natural Language Processing (cNLP) ........................................................................... 6 High-throughput Phenotyping (HTP) .................................................................................... 10 Infrastructure & Scalability .................................................................................................. 13 Data Quality (DQ) ................................................................................................................ 17 Evaluation Framework ......................................................................................................... 19 Program Outputs ................................................................................................................. 20 Events ................................................................................................................................
    [Show full text]
  • Assessment H (Health Information Technology)
    Prepared by: The MITRE Corporation A Product of the CMS Alliance to Modernize Healthcare Federally Funded Research and Development Center Centers for Medicare & Medicaid Services (CMS) Prepared for: U.S. Department of Veterans Affairs At the Request of: Veterans Access, Choice, and Accountability Act of 2014 Section 201: Independent Assessment of the Health Care Delivery Systems and Management Processes of the Department of Veterans Affairs Assessment H (Health Information Technology) September 1, 2015 Prepared by CAMH under: Prime Contract No. HHS-M500-2012-00008I Prime Task Order No. VA118A14F0373 This document was prepared for authorized distribution only. It has not been approved for public release. ©2015 The MITRE Corporation. All rights reserved. Assessment H (Health Information Technology) This page intentionally left blank. The views, opinions, and/or findings contained in this report are those of The MITRE Corporation should not be construed as an official government position, policy, or decision. ii Assessment H (Health Information Technology) Preface Congress enacted and President Obama signed into law the Veterans Access, Choice, and Accountability Act of 2014 (Public Law 113-146) (“Veterans Choice Act”), as amended by the Department of Veterans Affairs (VA) Expiring Authorities Act of 2014 (Public Law 113-175), to improve access to timely, high-quality health care for Veterans. Under “Title II – Health Care Administrative Matters,” Section 201 calls for an Independent Assessment of 12 areas of VA’s health care delivery systems and management processes. VA engaged the Institute of Medicine of the National Academies to prepare an assessment of access standards and engaged the Centers for Medicare & Medicaid Services (CMS) Alliance to Modernize Healthcare (CAMH)1 to serve as the program integrator and as primary developer of the remaining 11 Veterans Choice Act independent assessments.
    [Show full text]