<html>
<head>
<meta http-equiv="Content-Type" content="text/html; charset=utf-8">
</head>
<body>
<div dir="ltr">
<div class="gmail_quote">
<div dir="ltr">
<p class="MsoNormal"><span style="font-size:9.5pt;font-family:Arial;background-image:initial;background-position:initial;background-size:initial;background-repeat:initial;background-origin:initial;background-clip:initial">Hi all,</span></p>
<p class="MsoNormal"><span style="font-size:9.5pt;font-family:Arial;background-image:initial;background-position:initial;background-size:initial;background-repeat:initial;background-origin:initial;background-clip:initial"><br>
</span></p>
<p class="MsoNormal"><span style="font-size:9.5pt;font-family:Arial;background-image:initial;background-position:initial;background-size:initial;background-repeat:initial;background-origin:initial;background-clip:initial"><span style="font-family:Arial,Helvetica,sans-serif;font-size:small">You
 are cordially </span><span style="font-family:Arial,Helvetica,sans-serif;font-size:small">invited</span><span style="font-family:Arial,Helvetica,sans-serif;font-size:small"> to attend LIS5916 Cyber Defense Operations and Incidents Response class term project
 presentation at <font color="#0000ff"><b><u>WJB2010</u></b></font> from <b><u><font color="#0000ff">3:30pm to 4:50pm</font></u></b> on
<u><font color="#0000ff"><b>December 03</b></font></u> (<b>TOMORROW</b>). Throughout the semester, students from this class set up their own networks (using Palo Alto Networks firewalls) and their own services (e.g., ftp servers) on the Redhat Linux to create
 their own "de-militarized zone." To protect their own trusted networks, students also successfully set up virtual private network tunneling for secure communication.</span></span></p>
<p class="MsoNormal"><span style="font-size:9.5pt;font-family:Arial;background-image:initial;background-position:initial;background-size:initial;background-repeat:initial;background-origin:initial;background-clip:initial"><span style="font-family:Arial,Helvetica,sans-serif;font-size:small"><br>
</span></span></p>
<p class="MsoNormal"><span style="font-size:9.5pt;font-family:Arial;background-image:initial;background-position:initial;background-size:initial;background-repeat:initial;background-origin:initial;background-clip:initial"><span style="font-family:Arial,Helvetica,sans-serif;font-size:small">In
 the term project, students from each team were tasked to serve as penetration testers to poke at the vulnerabilities of other teams' systems and networks (as protected by Palo Alto Networks firewalls). At the same time, students were also the first responders
 to protect their own networks and perform disaster recovery. Cyber defense strategies, implementation of their networks and systems, as well as their exploitation of other teams' systems vulnerabilities will be thoroughly discussed. </span></span>Disclosure
 of hacking exploits and counter measures will be addressed in the presentations, and a Live Demo will be included featuring the use and support of the CCI Virtual Lab.</p>
<p class="MsoNormal"><br>
</p>
<p class="MsoNormal">Special thanks to the CCI Helpdesk team (especially Kyle Muller) for their superior professional support that makes this virtual lab with intensive defense and offense exercises possible!</p>
<p class="MsoNormal" style="background-image:initial;background-position:initial;background-size:initial;background-repeat:initial;background-origin:initial;background-clip:initial">
<br>
</p>
<p class="MsoNormal" style="background-image:initial;background-position:initial;background-size:initial;background-repeat:initial;background-origin:initial;background-clip:initial">
<span style="font-size:9.5pt;font-family:Arial">Let me know if you can participate as a judge. I look forward to hearing from you!</span></p>
<p class="MsoNormal" style="background-image:initial;background-position:initial;background-size:initial;background-repeat:initial;background-origin:initial;background-clip:initial">
<br>
</p>
<p class="MsoNormal" style="background-image:initial;background-position:initial;background-size:initial;background-repeat:initial;background-origin:initial;background-clip:initial">
<span style="font-size:9.5pt;font-family:Arial">Thanks,</span></p>
<p class="MsoNormal" style="background-image:initial;background-position:initial;background-size:initial;background-repeat:initial;background-origin:initial;background-clip:initial">
<span style="font-size:9.5pt;font-family:Arial">Shuyuan</span></p>
<p class="MsoNormal" style="background-image:initial;background-position:initial;background-size:initial;background-repeat:initial;background-origin:initial;background-clip:initial">
<span style="font-size:9.5pt;font-family:Arial"><br>
</span></p>
<div>
<div dir="ltr" data-smartmail="gmail_signature">
<div dir="ltr">
<div>
<div dir="ltr">
<div>
<div dir="ltr"><span style="color:rgb(0,0,0);font-size:13px"><font face="arial, helvetica, sans-serif">--</font></span>
<div style="color:rgb(0,0,0);font-size:13px"><font face="arial, helvetica, sans-serif">Shuyuan Mary Ho | Associate Professor</font>
<div><font face="arial, helvetica, sans-serif">Florida State University School of Information</font></div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</body>
</html>