Demonstrating our commitment to providing high-quality education in professionally relevant fields, Walden University has been designated by the National Security Agency (NSA) and the Department of Homeland Security (DHS) as a National Center of Academic Excellence in Cyber Defense through academic year 2024.
This designation means that our BSIT program meets the NSA and the DHS standards of quality and relevance in the information assurance (IA) and cyber defense (CD) disciplines. Our program’s stringent academic criteria reaffirms our commitment to excellence in the fields of IA and CD education.
Our fully online information assurance and security programs are available at the bachelor’s, master’s, and doctoral levels.
- Cyber Security: BS in Information Technology
Dr. Bob Duhainy, PhD
PhD, Walden University; MS, BS Southern Methodist University
Dr. Duhainy is a Core faculty of Computer Networks and Cyber security at the College of Management and Human Potential at Walden University, director of the center of Cyber security Education, and a dissertation chair at the Doctor of Information Technology program. For his Ph.D. dissertation, he has worked on developing the most effective approach for deploying a context- and location-aware network, which is particularly important to the U.S. government as it will allow hands-off processing and the tracking of medical supplies and weaponry. His research focused on RFID deployment methods, minimizing the required number of passive and active tags, and the power requirements needed to operate the networks. His research work includes using software agents to safe guard computer networks from attack. He is also involved in various security-related research projects, Virtual Reality Interoperability and Security, Multi Factor Authentication, Radio Waves Interference, Nefarious Code Detection, and System Vulnerabilities and Assessments. He is a member of the IEEE, ACM , ISC2 Cisco Networking Academy, AFCEA, NICE, CISSE and NIST. Dr. Duhainy has been an active member of the InfraGard-Boston chapters. He was trained by the Federal Bureau of Investigation (FBI) and Directorate of National Intelligence (DNI) on various topics, and actively serves as a state and local government groups on cybersecurity topics. He is also a frequent invited as a Subject Matter Expert (SME) on cybersecurity topics.
Dr. Duhainy’s teaching interest and courses taught at the Master’s and Doctoral levels include Ethical Hacking tools and incident handling techniques, legal issues in Cybercrime, Operating System and Network Architecture, Fundamentals of Information Assurance, Telecommunications and Networking, Information Assurance and Risk Management, Information and Systems Security, Computer Law, Crime, and Investigation, Information Security Governance, Seminar in Information Security, Development of Proactive and Reactive Security Plans.
Bob Duhainy, PhD
Doctor of Information Technology (DIT)
100 Washington Avenue South, Suite 1210
Minneapolis, MN 55401
Welcome to the Codebreaker Challenge!
The Codebreaker Challenge consists of a series of tasks that are worth a varying amount of points based upon their difficulty. All tasks will become available immediately once the Challenge goes live and can be solved in any order, though there may be some dependencies between tasks. The point value associated with each task is based on relative difficulty and schools will be ranked according to the total number of points accumulated by their students. It is still recommended to solve tasks in order since the tasks flow with the storyline, but that is not a requirement. Solutions may be submitted at any time for the duration of the Challenge. Good luck!
DISCLAIMER - The following is a FICTITIOUS story meant for providing realistic context for the Codebreaker Challenge and is not tied in any way to actual events.
Tech savvy terrorists have developed a new suite of communication tools to use for attack planning purposes. Their most recent creation — TerrorTime — is a secure mobile chat application that runs on Android devices. This program is of particular interest since recent intelligence suggests the majority of their communications are happening via this app. Your mission is to reverse-engineer and develop new exploitation capabilities to help discover and thwart future attacks before they happen. There are 7 tasks of increasing difficulty that you will be working through as part of this challenge. Ultimately, you will be developing capabilities that will enable the following:
- Spoof TerrorTime messages
- Masquerade (i.e., authenticate) as TerrorTime users without knowledge of their credentials
- Decrypt TerrorTime chat messages
We bring students the workforce experience before the workforce.
The NICE Challenge Project develops real-world cybersecurity challenges within virtualized business environments that bring students the workforce experience before the workforce. Our goal is to provide the most realistic experiences to students, at-scale year-round, while also generating useful assessment data about their knowledge, skills, and abilities for educators.
What is a NICE Challenge?
Each NICE Challenge has the following core elements: a narrative-driven scenario, a business environment (workspace), and a set of technical objectives and/or a written deliverable. Each of these elements is developed to immerse the player (student) in a real-world experience and create a valuable set of data allowing their curator (educator) to judge their readiness for the workforce.
There are currently two different types of NICE Challenges, technical and hybrid, which focus on different parts of the cybersecurity workforce.
To prepare the next generation of cybersecurity professionals.
NCL’s mission is to prepare the next generation of cybersecurity professionals by providing high school and college students, as well as their coaches, an online, safe platform of real-world cybersecurity challenges.
The NCL virtual training ground features a competitive process and a supportive community, helping students develop, improve and validate their cybersecurity skills.
Students’ progress and strengths are validated through their individual Scouting Reports and team rankings, enabling HR teams and recruiters to easily determine the students’ fit for open positions.
In 2011, a group of cybersecurity-focused academics from several public agencies got together and created an innovative way for students to apply what they were learning in class. It would be important to reduce barriers and excite young people to participate. Students would have easy access, no matter what their age, skill level or location. The NCL Competition was born. It was one of the earliest e-sports - a competitive game-meets-edutainment - and it would simulate real-life cyberthreats in a safe environment, for students to learn how to defend organizations against cyber-threats and keep them secure.
And it worked. Today, a growing population - more than 13,000 students of all ages, representing over 650 colleges and high schools across the U.S. - participates each year in the biannual competition.
Why NCL works
The benefits are clear.
FOR STUDENTS: NCL offers a fun way to learn and apply your skills in a safe environment - but it’s so much more than that, because with their NCL Scouting Reports you can present credible proof to employers of your hands-on expertise.
FOR FACULTY AND COACHES: Ever wished you could engage your cybersecurity students more effectively with real-world challenges? NCL does all that and more, accelerating student learning and skills.
FOR EMPLOYERS: With NCL Scouting Reports, you can be assured with specificity that your internships and jobs are going to workers who can hit the ground running. The Scouting Report ranks every player in each of nine categories, enabling employers to match skills to your specific needs.
FOR THE COUNTRY: The NCL Games serve the most serious purpose of all – the safety and security of people, organizations, communities, and countries.
PUBLISHED JOURNAL ARTICLES (2018-present)
Khan, R. A., Khan, S. U., Khan, H., Ilyas, M. (2021). Systematic Mapping Study on Security Approaches in Secure Software Engineering. IEEE Access, 9, 19139-19160. http://dx.doi.org/10.1109/access.2021.3052311
Ahmad, A., Khan, S. U., Khan, H., Khan, G. M., Ilyas, M. (2021). Challenges and Practices Identification via a Systematic Literature Review in the Adoption of Green Cloud Computing: Client’s Side Approach. IEEE Access, 9, 81828-81840. http://dx.doi.org/10.1109/access.2021.3085707
Halawi, L. A. (2021). The role of the Internet in Intelligence Gathering and Spreading Propaganda. Issues of Information Systems, 22(2), 231-238.
Duhainy, B. (2021). From Bummer to Bumper. Information Security Professional ISC2, 14(1), 29-32.
Pratt-Sensie, A., Miles, G. S. (2021). Security Limitations with Cloud Computing: Well-defined Security Measures Using Cloud Computing. Journal of Information Engineering and Applications, 11(2), 31-42. https://iiste.org/Journals/index.php/JIEA/article/view/56638
Burrell, D. N. Cybersecurity Workforce Development in Minority, Low Income, and Native American Reservation Communities. International Journal of Smart Education and Urban Society.
Burrell, D. N. Perspectives in Talent Management Strategies for Cybersecurity Job Roles in Public Safety and Health in Government Organizations. International Journal of Smart Education and Urban Society.
Burrell, D. N., Bhargava, N., Springs, D., Dawson, M., Burton, S. L. R., Anderson, D. P., Wright, J. B. (2020). Adopting Organizational Cultural Changes Concerning Whistle-Blowing in Healthcare Around Information Security in the “Internet of Things” World. International Journal of Hyperconnectivity and the Internet of Things, 4(1), 13-28. http://dx.doi.org/10.4018/ijhiot.2020010102
Burrell, D. N. (2020). Teaching Graduate Technology Management Students With Innovative Learning Approaches Around Cybersecurity. International Journal of ICT Research in Africa and the Middle East, 9(1), 82-90. http://dx.doi.org/10.4018/ijictrame.2020010105
Burrell, D. N. (2019). How Hiring Baby Boomers Can Assist with the Global Cybersecurity Employee Shortage. International Journal of Hyperconnectivity and the Internet of Things, 3(2), 1-10. http://dx.doi.org/10.4018/ijhiot.2019070101
Burrell, D. N. (2019). Assessing the Value of Executive Leadership Coaches for Cybersecurity Project Managers. International Journal of Human Capital and Information Technology Professionals, 10(2), 20-32. http://dx.doi.org/10.4018/ijhcitp.2019040102
Burrell, D. N., Dattola, A., Dawson, M. E., Nobles, C. (2019). A Practical Exploration of Cybersecurity Faculty Development With Microteaching. International Journal of Applied Management Theory and Research, 1(1), 32-44. http://dx.doi.org/10.4018/ijamtr.2019010103
Bhargava, N., Madala, M. K., Burrell, D. N. (2018). Emotional Acumen on the Propensity of Graduating Technology Students to Whistle-Blow About Organizational Cyber security Breaches. International Journal of Smart Education and Urban Society, 9(4), 1-14. http://dx.doi.org/10.4018/ijseus.2018100101
Burrell, D. N. (2018). Exploring leadership coaching as a tool to improve the people management skills of information technology and cybersecurity project managers. HOLISTICA – Journal of Business and Public Administration, 9(2), 107-126. http://dx.doi.org/10.2478/hjbpa-2018-0015
Burrell, D. N. (2018). An Exploration of the Critical Need for Formal Training in Leadership for Cybersecurity and Technology Management Professionals. International Journal of Hyperconnectivity and the Internet of Things, 2(1), 52-67. http://dx.doi.org/10.4018/ijhiot.2018010105
Burrell, D. N. (2018). An Exploration of the Cybersecurity Workforce Shortage. International Journal of Hyperconnectivity and the Internet of Things, 2(1), 29-41. http://dx.doi.org/10.4018/ijhiot.2018010103
Gould, D. A., Cleveland, S., Block, G. (2020). Evolutionary and Ideation Concepts for Cybersecurity Education. IGI-Global IJSEUS. www.igi-global.com/article/evolutionary-and-ideation-concepts-for-cybersecurity-education/242954
Gould, D. A. Organizational resilience approaches to cyber security. International Journal of Smart Education and Urban Society, 53-62. https://www.igi-global.com/article/organizational-resilience-approaches-to-cyber-security/214054
Gray, D., Tahlier, J. (2018). Survey helps begin conversation on using biometrics to deter financial aid fraud. Fraud Magazine, 33(1), 54-55. Not available online as it is only available in hard copy except to ACFE members
Harkiolakis, N. (2018). Cybersecurity policies and supporting regulations for maritime transportation system in the USA. Int. J. Teaching and Case Studies.
Igonor, A. S. (2020). A Mixed Public-Private Partnership Approach for Cyber Resilience of Space Technologies. In Critical Space Infrastructures: From Risk to Resilience. NATO Science for Peace and Security Series - D: Information and Communication Security, 57(120-130), 11.
Igonor, A. S. (2019). Cybersecurity Education: The Quest to Building Bridge Skills. The ISSA Journal, 17(8), 18-24.
Igonor, A. S. (2019). IOT Forensics Curriculum: Is It a Myth or Reality? Annual ADFSL Conference on Digital Forensics, Security and Law, 6.
Khan, H. (2020). Security Analysis of IoT Devices by Using Mobile Computing: A Systematic Literature Review. IEEEAccess, 8(1).
Khan, H. (2020). Spam detection approach for secure mobile messages communication using machine learning algorithms. Security and Communication Networks, 2020.
Khan, H. (2020). Modelling Features-Based Birthmarks for Security of End-to-End Communication System. Security and Communication Networks, 2020.
Khan, H., Al Share, K. A. (2019). Violators versus Non-Violators of Information Security Measures in Organizations – A Study of Distinguishing Factors. Journal of Organizational Computing and Electronic Commerce, 29(1), 4-23.
Banerjee, S. K., Radak, T. L., Khubchandani, J., Dunn, P. J. (2020). Food Insecurity and Mortality in American Adults: Results From the NHANES-Linked Mortality Study. Health promotion practice, 1524839920945927.
Talpade, M. S. (2019). Characteristics of cybersecurity victims at Clark Atlanta University. Annual Review of Cybertherapy and Telemedicine, 17, 159-162.
BOOK CHAPTERS (2018-present)
Bhatt, A. A. (2019). Chapter 13-Information Security and Confidentiality. Handbook of Informatics for Nurses and Healthcare Professionals. New York: Pearson.
Burrell, D. N. (2019). An Exploration of the Critical Need for Formal Training in Leadership for Cybersecurity and Technology Management Professionals. Human Performance Technology (pp. 1420-1432). IGI Global. http://dx.doi.org/10.4018/978-1-5225-8356-1.ch069
Macht, B. J. (presenter), Xavier University Artificial Intelligence Summit, "Identify and Avoid Bias When You Don’t Know You Have It," Xavier University, Online Conference, Yardley, PA, United States. (November 10, 2021).
Maiden, R., Boyd, L., The National Council on Rehabilitation Education, "On Guard: Best Practices for Security of ePHI on Electronic Media Storage," San Diego, CA, United States. (April 19, 2019).
Igbonagwam, O., "DATA CENTER A METAPHOR FOR CLOUD COMPUTATION SECURITY, RELIABILITY, AND AVAILABILITY EFFECTS," International Academy of Business and Public Administration Disciplines (IABPAD), Dallas, TX, Dallas, TX, United States. (April 20, 2019).
McKeeby, J. W., Rekik, I., Summer Institute in Nursing Informatics (SINI), "Rekik, I., McKeeby, J., (2018). Is My Organization Ready for a cybersecurity threat? Assessment and setting up plans.," University of Maryland, Nursing School, University of Maryland, Nursing School, Baltimore, MD. (2018).
McKeeby, J. W., Rekik, I., Summer Institute in Nursing Informatics (SINI)., "Rekik, I., McKeeby, J., (2018). Building a Security Management Plan for Networked Medical Devices," University of Maryland, Nursing School., Baltimore, MD, United States. (July 2018).
Mouras, T. A., Border Patrol and Cybersecurity Webinar., "Border Patrol and Cybersecurity Webinar." (April 26, 2019).
Talpade, M. S., Cyberpsychology conference, "Characteristics of cybersecurity victims at Clark Atlanta University," Norfolk State University, Norfolk, VA, United States. (June 24, 2019).
WOMEN IN CYBERSECURITY CONFERENCE (WICYS)
Location: Cleveland, OH | Date: March 17-19, 2022
WiCyS 2022 is the go-to event to help you get where you want to be. We help organizations recruit, retain and advance women in cybersecurity — all while creating a community of engagement, encouragement, and support at a technical conference.
The annual WiCyS conference is not only the flagship conference for women in cybersecurity but, regardless of gender, is the largest cybersecurity conference with equal representation of professionals and students.
COMMUNITY COLLEGE CYBER SUMMIT (3CS)
Location: Dayton, OH | Date: May 23-25, 2022
3CS is organized and produced by the National CyberWatch Center, National Resource Center for Systems Security and Information Assurance (CSSIA), CyberWatch West (CWW), and Broadening Advanced Technological Education Connections (BATEC), which are all funded by the National Science Foundation (NSF). The outcomes of 3CS leverage community college cybersecurity programs across the nation by introducing the latest technologies, best practices, curricula, products, and more.
NICE Conference and Expo
Location: Atlanta, GA | Date: June 6-8, 2022
The annual NICE Conference and Expo brings together thought leaders from industry, government, academia, and non-profit organizations to address the community's cybersecurity education, training, and workforce needs. This event provides an opportunity to share best practices from around the world and across sectors in order to build the workforce we need to confront cybersecurity risks today and in years to come.
CAE IN Cybersecurity Symposium
Location: Atlanta, GA | Date: June 9-10, 2022
Please join us for the annual CAE in Cybersecurity Symposium. The CAE in Cybersecurity Symposium provides community members and applicants the opportunity to network, receive community updates, and present their research to the community. The symposium is open to all existing Centers of Academic Excellence in Cyber Defense Education (CAE-CDE), Centers of Academic Excellence in Research (CAE-R), and Centers of Academic Excellence in Cyber Operations (CAE-CO), as well as government representatives and invitees. Registration is also open to institutions that have applied for CAE designation or are in the process of applying.
Attending the event is free, but registration is required in advance to gain access to the conference. Onsite registration is discouraged as you will not be eligible for travel assistance. The CAE-C Program Office approves each registration. Therefore, to make sure you are authorized to attend please register before the deadline.
Women in Information Technology International (WITI)
Location: Virtual | Date: June 21-22, 2022
WITI (Women in Technology International) is committed to empowering innovators, inspiring future generations and building inclusive cultures. A leading authority of women in tech and business, WITI has been advocating and recognizing women's contributions in the industry for more than 30 years. The organization delivers leading edge programs and platforms for individuals and companies — designed to empower professionals, boost competitiveness, and cultivate partnerships, globally. Our ecosystem includes more than 3 million professionals, 60 networks and 300 partners, worldwide.
Intelligence and National Security Summit
Location: National Harbor, MD | Date: September 15-16, 2022
The nation's premier intelligence and national security conference. The Intelligence and National Security Summit features powerful plenaries with senior IC leaders, engaging breakout sessions with top industry, academic, and government experts, and a virtual exhibit hall where you can learn about the latest technology innovations.
NATIONAL CYBER SUMMIT
Location: Huntsville, AL | Date: September 21-22, 2022
The National Cyber Summit is the nation’s most innovative cyber security-technology event, offering unique educational, collaborative and workforce development opportunities for industry visionaries and rising leaders. Our core focus is on two things: accessibility and connectivity.
Cybersecurity Career Awareness Week
Location: Virtual | Date: October Annually
Cybersecurity Career Awareness Week is a week-long campaign to call attention to the contributions to society and innovations that cybersecurity practitioners make.
It is a time to build awareness about the wide range of cybersecurity job opportunities, how cybersecurity plays a vital role in the lives of Americans, and how building a national cybersecurity workforce enhances America’s national security and promotes economic prosperity.
Location: Virtual | Date: November 14-16, 2022
For over twenty years, the Colloquium for Information Systems Security Education (CISSE) has been the sole forum in which the members of the academic field of cybersecurity have gathered to present and discuss new ideas. CISSE was first established to provide a single place to conduct productive conversations between a variety of government, industry, and academic on the topic of cybersecurity education. Ideas arising from those discussions have led to new and improved content and curricula for cybersecurity teaching.
NICE K12 Cybersecurity Education Conference
Location: St. Louis, MO | Date: December 5-6, 2022
The NICE K12 Cybersecurity Education Conference will feature timely and thought-provoking presentations that highlight effective collaborations, bold experiments and innovations, and other potentially game-changing methods in support of growing the cybersecurity workforce. Attendees will include training and educational leaders from academia, business, and government for two days of focused hands-on workshops and discussions in support of the NICE strategic goals: accelerate learning and skills development, nurture a diverse learning community, and guide career development and workforce planning.
Advancing Cybersecurity Risk Management Conference
Location: TBD | Date: TBD
The Advancing Cybersecurity Risk Management Conference is a continuation of the annual Cybersecurity Framework Workshops, and we’ve added even more topics and stakeholder groups associated with NIST projects:
- Risk Management Framework
- Supply Chain Risk Management
- Privacy Engineering
ANNUAL NATIONAL CYBERSECURITY SUMMIT
Location: TBD | Date: TBD
The Cybersecurity and Infrastructure Security Agency (CISA) is hosting the Annual National Cybersecurity Summit. The Cybersummit will bring together stakeholders from across the country to focus on CISA’s mission to “Defend Today, Secure Tomorrow” with presentations from targeted leaders across government, academia, and industry.
The Cybersummit is intended to be an inclusive event and will be particularly valuable for senior leaders, CISOs, general counsels, and policy experts at public and private sector organizations who have shown a commitment to advancing cybersecurity and risk management discussions.
CAE VIRTUAL CAREER FAIR
Location: Virtual | Date: TBD
The Centers of Academic Excellence (CAE) in Cybersecurity Community is hosting the annual CAE Virtual Career Fair (VCF). The virtual career fair is unique in that students/alumni are invited from 300+ institutions designated as CAEs in Research (CAE-R), Cyber Defense Education (CAE-CDE), and Cyber Operations (CAE-CO) to participate. Institutions receive the CAE in Cybersecurity designation after meeting the rigorous requirements of the program set forth by the National Security Agency (NSA) and Department of Homeland Security (DHS). The standards set forth by the NSA/DHS curriculum guidelines also ensure students from CAE institutions receive a quality cybersecurity education that prepares them for a career the cyber workforce.
CAE Executive Leadership Forum (ELF)
Location: TBD | Date: TBD
This event will be packed with important recent trends and new national initiatives in the cybersecurity space. The forum unites executive leadership from academia, industry, and government to seek collaborative strategies and solutions to advance cybersecurity. Work that can be accomplished because of the special relationships between a University President and the Institutions PI; allowing them the time and freedom to pursue their ideas to solve a national crisis in cybersecurity workforce education. The Executive Leadership Forum is intended for executive leaders. Should your President or Chancellor be unable to attend, we will welcome an executive from your institution (Dean or higher) to represent your institution.
Space Cybersecurity Symposium
Location: TBD | Date: TBD
Cybersecurity measures and policies are ubiquitous in the design, development, delivery, and operation of components supporting American space activities.
Join the Department of Commerce (DOC) and Department of Homeland Security (DHS) hosted symposium to learn about the latest cyber threats to space infrastructure, existing space cybersecurity policies, and industry cybersecurity experience and mitigation strategies. Information will be tailored to emerging companies; however, all companies are welcome to participate.
Computers & Security:
Cybersecurity and Infrastructure Security Agency’s (CISA):
Department of Homeland Security | Cybersecurity:
International Journal of Information and Learning Technology:
International Journal of Information Management:
International Journal of Information Systems in the Service Sector (IJISSS):
Information Security Education Journal (ISEJ):
Journal of Cases in Information technology (JCIT):
National Cybersecurity and Communications Integration Center (NCCIC):
National Cyber Investigative Joint Task Force:
NSA | Central Security Services (CSS) Resources for Students & Educators Resources for Students & Educators:
NSA Cyber Exercise:
NSA Student Programs: