Resources

Cybersecurity Student Clubs:

Mines Students Regularly Participate in the Following Cybersecurity Competitions:

Other Resources:

  • CAE Community is a Hub for National Centers of Academic Excellence.  You can find a number of valuable resources and events on its website.
  • The Office of Information Security (OIS) is located within the Colorado School of Mines department of Information & Technology Solutions (ITS) and works with the campus community to increase the security of the campus information infrastructure, including the data network and connected hosts.
  • Mines ITS (Information Technology & Solutions) Cybersecurity Awareness Resources
  • The NIST NICE (National Initiative for Cybersecurity Education) National Cybersecurity Workforce Framework s a national resource that categorizes and describes cybersecurity work. It provides employers, employees, educators, students, and training providers with a common language to define cybersecurity work as well as a common set of tasks and skills required to perform cybersecurity work. Through the process of identifying the cybersecurity workforce and using a standard set of terms we can work together to educate, recruit, train, develop, and retain a highly-qualified workforce. 
  • STOP. THINK. CONNECT.™ is the global cybersecurity awareness campaign to help all digital citizens stay safer and more secure online. The message was created by an unprecedented coalition of private companies, non-profits and government organizations with leadership provided by the National Cyber Security Alliance (NCSA) and the Anti-Phishing Working Group (APWG). The campaign was launched in October of 2010 by the STOP. THINK. CONNECT. Messaging Convention in partnership with the U.S. government, including the White House. NCSA, in partnership with the APWG, continue to lead the campaign. The Department of Homeland Security leads the federal engagement in the campaign.
  • Symantec Security Response is a worldwide team of security engineers, threat analysts, and researchers who develop a variety of content on the latest threats that impact organizations and end users.  Its Security Response Publications are very useful resources.  For example, its Internet Security Threat Report provides an overview and analysis of the year in global threat activity.