{"id":2174,"date":"2019-08-29T14:29:43","date_gmt":"2019-08-29T14:29:43","guid":{"rendered":"http:\/\/shuyuanmaryho.com\/?page_id=2174"},"modified":"2019-09-03T15:59:27","modified_gmt":"2019-09-03T15:59:27","slug":"fc2-research","status":"publish","type":"page","link":"https:\/\/shuyuanmaryho.com\/?page_id=2174","title":{"rendered":"FC2 Capacity Building 2018 Award"},"content":{"rendered":"<div class=\"fcbkbttn_buttons_block\" id=\"fcbkbttn_left\"><div class=\"fcbkbttn_button\">\n                            <a href=\"https:\/\/www.facebook.com\/\" target=\"_blank\">\n                                <img decoding=\"async\" src=\"https:\/\/shuyuanmaryho.com\/wp-content\/plugins\/facebook-button-plugin\/images\/standard-facebook-ico.png\" alt=\"Fb-Button\" \/>\n                            <\/a>\n                        <\/div><div class=\"fcbkbttn_like \"><fb:like href=\"https:\/\/shuyuanmaryho.com\/?page_id=2174\" action=\"like\" colorscheme=\"light\" layout=\"standard\"  width=\"450px\" size=\"small\"><\/fb:like><\/div><\/div><h3><strong>Capture-the-Flag (CTF) Scenario-based Cybersecurity Exercises Development<\/strong><\/h3>\n<p>This project (#3910-1007-00-B, 7\/01\/2018-12\/31\/2019) awarded by Florida Center for Cybersecurity (FC2, also known as CyberFlorida) 2018 Capacity Building Program, specifically involves the development of modular scenario-based exercises that include forensics of the cloud and Internet of Things (IoT), as well as social media dis-\/mis-information scenarios for capture-the-flags (CTFs) exercises. This is an effort to prepare both instructors and students for future advances in dynamic cybersecurity tactics, as well as current defensive operations.<\/p>\n<p>Below is a list of the exercises that can be downloaded by instructors for classroom instruction.<\/p>\n<h3><strong>Cloud Forensics<\/strong><\/h3>\n<p><strong>For Instructor:<\/strong><\/p>\n<ul>\n<li><a href=\"http:\/\/shuyuanmaryho.com\/wp-content\/uploads\/2019\/08\/cloudforensics-ctf-challenge1-2019.08.28-instructor-finalgl.docx\">cloudforensics-ctf-challenge1-2019.08.28-instructor-final(gl)<\/a><\/li>\n<li><a href=\"http:\/\/shuyuanmaryho.com\/wp-content\/uploads\/2019\/08\/cloudforensics-ctf-challenge2-2019.08.28-instructor-finalgl.docx\">cloudforensics-ctf-challenge2-2019.08.28-instructor-final(gl)<\/a><\/li>\n<li><a href=\"http:\/\/shuyuanmaryho.com\/wp-content\/uploads\/2019\/08\/cloudforensics-ctf-challenge3-2019.08.28-instructor-finalgl.docx\">cloudforensics-ctf-challenge3-2019.08.28-instructor-final(gl)<\/a><\/li>\n<\/ul>\n<p><strong>For Student:<\/strong><\/p>\n<ul>\n<li><a href=\"http:\/\/shuyuanmaryho.com\/wp-content\/uploads\/2019\/08\/cloudforensics-ctf-challenge1-2019.08.28-student-finalgl.docx\">cloudforensics-ctf-challenge1-2019.08.28-student-final(gl)<\/a><\/li>\n<li><a href=\"http:\/\/shuyuanmaryho.com\/wp-content\/uploads\/2019\/08\/cloudforensics-ctf-challenge2-2019.08.28-student-finalgl.docx\">cloudforensics-ctf-challenge2-2019.08.28-student-final(gl)<\/a><\/li>\n<li><a href=\"http:\/\/shuyuanmaryho.com\/wp-content\/uploads\/2019\/08\/cloudforensics-ctf-challenge3-2019.08.28-student-finalgl.docx\">cloudforensics-ctf-challenge3-2019.08.28-student-final(gl)<\/a><\/li>\n<\/ul>\n<h3>Disinformation Forensics<\/h3>\n<p><strong>For Instructor:<\/strong><\/p>\n<ul>\n<li><a href=\"http:\/\/shuyuanmaryho.com\/wp-content\/uploads\/2019\/08\/disinformation-ctf-challenge-2019.08.28-instructor-finalgl.docx\">disinformation-ctf-challenge-2019.08.28-instructor-final(gl)<\/a><\/li>\n<\/ul>\n<p><strong>For Student:<\/strong><\/p>\n<ul>\n<li><a href=\"http:\/\/shuyuanmaryho.com\/wp-content\/uploads\/2019\/08\/disinformation-ctf-challenge-2019.08.28-student-finalgl.docx\">disinformation-ctf-challenge-2019.08.28-student-final(gl)<\/a><\/li>\n<\/ul>\n<h3><strong>IoT Forensics<\/strong><\/h3>\n<p><strong>For Instructor:<\/strong><\/p>\n<ul>\n<li><a href=\"http:\/\/shuyuanmaryho.com\/wp-content\/uploads\/2019\/08\/IoT-ctf-challenge-2019.08.28-instructor-finalgl.docx\">IoT-ctf-challenge-2019.08.28-instructor-final(gl)<\/a><\/li>\n<li><a href=\"http:\/\/shuyuanmaryho.com\/wp-content\/uploads\/2019\/08\/IoT-ctf-challenge2-2019.08.29-instructor-finalgl.docx\">IoT-ctf-challenge2-2019.08.29-instructor-final(gl)<\/a><\/li>\n<\/ul>\n<p><strong>For Student:<\/strong><\/p>\n<ul>\n<li><a href=\"http:\/\/shuyuanmaryho.com\/wp-content\/uploads\/2019\/08\/IoT-ctf-challenge-2019.08.28-student-finalgl.docx\">IoT-ctf-challenge-2019.08.28-student-final(gl)<\/a><\/li>\n<li><a href=\"http:\/\/shuyuanmaryho.com\/wp-content\/uploads\/2019\/08\/IoT-ctf-challenge2-2019.08.29-student-finalgl.docx\">IoT-ctf-challenge2-2019.08.29-student-final(gl)<\/a><\/li>\n<\/ul>\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Capture-the-Flag (CTF) Scenario-based Cybersecurity Exercises Development This project (#3910-1007-00-B, 7\/01\/2018-12\/31\/2019) awarded by Florida Center for Cybersecurity (FC2, also known as CyberFlorida) 2018 Capacity Building Program, specifically involves the development of modular scenario-based exercises that include forensics of the cloud and &hellip; <a href=\"https:\/\/shuyuanmaryho.com\/?page_id=2174\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-2174","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/shuyuanmaryho.com\/index.php?rest_route=\/wp\/v2\/pages\/2174","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/shuyuanmaryho.com\/index.php?rest_route=\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/shuyuanmaryho.com\/index.php?rest_route=\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/shuyuanmaryho.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/shuyuanmaryho.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=2174"}],"version-history":[{"count":9,"href":"https:\/\/shuyuanmaryho.com\/index.php?rest_route=\/wp\/v2\/pages\/2174\/revisions"}],"predecessor-version":[{"id":2207,"href":"https:\/\/shuyuanmaryho.com\/index.php?rest_route=\/wp\/v2\/pages\/2174\/revisions\/2207"}],"wp:attachment":[{"href":"https:\/\/shuyuanmaryho.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=2174"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}