Employability program in cybersecurity CyberCamp 2019

Subscribers:
6,000
Published on ● Video Link: https://www.youtube.com/watch?v=TTTbcMhtNhA



Duration: 54:00
0 views
0


#CyberCamp

The USF High School CyberCamp is being offered in two formats this year, virtual and in-person, to expand reach and to provide options suitable for all families.

The in-person option will provide campers a conference-like experience where they will have the opportunity to select sessions presented by various experts and teachers, participate in hands-on activities, and network with peers and industry professionals.

The virtual option will be similar to a virtual conference where campers will be given the opportunity to view and interact virtually with various presentations, participate in virtual experiences, and network through chat platforms. Both formats will run simultaneously and campers will be able to all interact regardless of the chosen format.

CAMP OVERVIEW
The USF CyberCamp encourages high school students (grades 9-12) from across the Tampa Bay area to pursue careers in the rapidly growing cybersecurity industry. The week-long program helps students learn what being an ethical hacker is all about.

Supported by local cybersecurity student groups and industry leaders, USF CyberCamp participants explore cybersecurity careers while networking with industry professionals within the Tampa-area cybersecurity community. The course curriculum is supported by Florida CyberHub resources and lesson plans from the Florida Center for Instructional Technology. Campers will work through hands-on cybersecurity exercises with experts virtually, engage with lectures from industry and community leaders, and network with cybersecurity students and professionals during this five-day camp. CyberCamp 2019 Hacking conference
#hacking, #hackers, #infosec, #opsec, #IT, #security




Other Videos By All Hacking Cons


2022-04-07La llamada de la muerte Jesus Pacheco CyberCamp 2019
2022-04-07Explotacion de vulnerabilidades en el microcodigo de las CPUs Pedro Candel CyberCamp 2019
2022-04-07Emulacion de adversarios De entender ATT&CK a construir tu propia emulacion CyberCamp 2019
2022-04-07Programa de empleabilidad en ciberseguridad CyberCamp 2019
2022-04-07La desinformacion en la era digital como reaprender a consumir para sortearla CyberCamp 2019
2022-04-07La investigacion policial del ciberdelito Maria Riesco CyberCamp 2019
2022-04-07La importancia de CyberCamp Francisco Polo CyberCamp 2019
2022-04-07The cybercrime police investigation Maria Riesco CyberCamp 2019
2022-04-07Opening Rosa Diaz CyberCamp 2019
2022-04-07Preventive Emergent Model to develop secure software José Carlos Sancho CyberCamp 2019
2022-04-07Employability program in cybersecurity CyberCamp 2019
2022-04-07Opening Francisco Polo CyberCamp 2019
2022-04-07Threat Hunting and attack simulations Lorien Doménech and Carlos Caballero CyberCamp 2019
2022-04-07OSINT and Social Engineering as vectors of attack on cybersecurity CyberCamp 2019
2022-04-07Perdiendo el control cuando el incidente ni es nuestro Roman Ramirez CyberCamp 2019
2022-04-07Future 4 0 More technological or more human Silvia Leal CyberCamp 2019
2022-04-07Evolution and improvement of Malware, real case Yassin Said CyberCamp 2019
2022-04-07Pentesting Hero Los superpoderes de la postexplotacion a través de iBombShell CyberCamp 2019
2022-04-07Singular paths that converge in cybersecurity Concepcion Cordon y Eduvigis Ortiz CyberCamp 201
2022-04-07Mediacion Parental en Internet ¿Lo estoy haciendo bien Gemma Martinez CyberCamp 2019
2022-04-07From sexting to sextorsion and grooming around Yolanda Corral CyberCamp 2019



Tags:
data
hacker
security
computer
cyber
internet
technology
hacking
attack
digital
virus
information
hack
online
crime
password
code
web
concept
thief
protection
network
scam
fraud
malware
secure
identity
criminal
phishing
software
access
safety
theft
system
firewall
communication
business
privacy
binary
account
spy
programmer
program
spyware
hacked
hacking conference
conference
learn
how to
2022
2021
cybersecurity
owned
break in
google
securing
exploit
exploitation
recon
social engineering