SlideShare a Scribd company logo
1 of 2
Download to read offline
At-A-Glance
CyberPatriot: Inspiring Student Interest in Cybersecurity
and STEM
By 2018, the U.S. Department of Commerce estimates there will be
1.2 million unfilled science, technology, engineering, and mathematics
(STEM) jobs in the United States. The CyberPatriot program is helping
to fill that gap with qualified talent by exciting K–12 students about
cybersecurity or other STEM disciplines through education and
competition.
CyberPatriot features three programs:
National Youth Cyber Defense Competition
This event challenges high school and middle school students to
act as IT professionals who must manage a small company network.
Students compete in teams of five at their state and regional levels
and are evaluated on how well they can find and protect against known
vulnerabilities on a virtual network. Top teams earn an all-expenses-
paid trip to Washington, DC, to compete in a national event to earn
recognition and scholarships.
AFA CyberCamps
These five-day summer camps teach students across the coutnry about
cybersecurity and conclude with a mock competition.
Elementary School Cyber Education Initiative
Available to K–6 students, this free class teaches the importance of
online safety and helps students learn how to protect themselves on the
Internet.
Why Cybersecurity Matters
•	 Nearly all industries in the United States rely on cybersecurity,
including banking, commerce, manufacturing, and defense
•	 Predators can exploit young children on the Internet if proper security
practices aren’t followed
•	 Cyber careers are in high demand and currently there’s a workforce
shortage of one million information security professionals, worldwide
Air Force Association’s
CyberPatriot
The National Youth Cyber Education Program
© 2015 Cisco and/or its affiliates. All rights reserved.
CyberPatriot Benefits
•	 Helps students understand the
importance of cybersecurity
•	 Equips students to better protect
themselves on the Internet
•	 Teaches students skills that
can be used in college and the
workforce
•	 Encourages students to pursue
cyber or STEM-related careers
•	 Raises cybersecurity awareness in
schools
•	 Engages students to learn
about cybersecurity and STEM
disciplines
•	 Fosters teamwork and school
pride among students
•	 Fuels competitive spirit
At-A-Glance
Sources:
•	www.uscyberpatriot.org
•	Source for shortage of one million information security professionals: Cisco 2015 Annual Security Report
•	Source for 1.2 million unfilled STEM jobs: U.S. Department of Commerce
© 2015 Cisco and/or its affiliates. All rights reserved.
Participate in CyberPatriot: The Four-Step CSTP Method
1.	Find a Coach								
A coach is someone at your school who is passionate about providing
this opportunity to students and who doesn’t have to be an expert in
cybersecurity or computers.
2.	Get Support									
Your team will need technical and non-technical support. Technical
mentors are professionals, students, or IT-experienced adults who
can volunteer to help your coach and team understand cybersecurity
and related concepts in the competition. They can be at your school,
in the local community, at a four-year college, or employed at a local
business. Non-technical support includes adults willing to assist with
transportation, set up, or simply provide encouragement.
3.	Form a Team									
A team consists of up to five students. Each competitor has his or her
own role but the team needs to function as a whole as well. Players
need a computer or laptop that can run the virtual images used for
practice and competition and access the Internet.
4.	Practice 								
Here’s where the fun starts. Your team needs to practice often—
at least several hours a week leading up to the competition. The
stronger commitment your team has, the better chances you have of
winning and moving onto finals in Washington, DC.
Cisco and STEM
Cisco is committed to inspiring more people to pursue STEM education
and careers. We believe encouraging people to study STEM is
imperative for society. Through mentoring, IT training, and support for
schools and nonprofits, we are working to increase the pipeline of STEM
talent around the world. We are excited be a CyberPatriot sponsor and
to share access to the Cisco Network Academy® with teams.
For More Information
Visit https://www.uscyberpatriot.org/home to register your team, sign
up to volunteer, or explore more about the program, including costs,
competition requirements, and available resources.
To learn about other Cisco® STEM programs,
visit http://csr.cisco.com/pages/stem-at-cisco.
Cisco CyberPatriot
Training Materials
All teams participating in
CyberPatriot receive access to
the Cisco Networking Academy®
platform that includes three
CyberPatriot-specific training
courses:
•	 Instructor Course provides
instructors an introduction to the
site and instructions on how to
start teaching teams
•	 Content Course includes team
training modules that help
students increase their networking
knowledge. Coaches and mentors
can create a content course once
the instructor course is complete
•	 Competition Course allows teams
to access quizzes and Packet
Tracer activities
Questions about accessing the
course materials should be directed
to the CyberPatriot Program Office
at cpoc@uscyberpatriot.org, 		
not Cisco.

More Related Content

More from Cisco Security

AMP Helps Cisco IT Catch 50% More Malware threats
AMP Helps Cisco IT Catch 50% More Malware threatsAMP Helps Cisco IT Catch 50% More Malware threats
AMP Helps Cisco IT Catch 50% More Malware threatsCisco Security
 
A Reality Check on the State of Cybersecurity
A Reality Check on the State of CybersecurityA Reality Check on the State of Cybersecurity
A Reality Check on the State of CybersecurityCisco Security
 
Balance Data Center Security and Performance
Balance Data Center Security and PerformanceBalance Data Center Security and Performance
Balance Data Center Security and PerformanceCisco Security
 
The Cost of Inactivity: Malware Infographic
The Cost of Inactivity: Malware InfographicThe Cost of Inactivity: Malware Infographic
The Cost of Inactivity: Malware InfographicCisco Security
 
Data Center Security Challenges
Data Center Security ChallengesData Center Security Challenges
Data Center Security ChallengesCisco Security
 
Enterprise Strategy Group: Security Survey
Enterprise Strategy Group: Security SurveyEnterprise Strategy Group: Security Survey
Enterprise Strategy Group: Security SurveyCisco Security
 
Malware and the Cost of Inactivity
Malware and the Cost of InactivityMalware and the Cost of Inactivity
Malware and the Cost of InactivityCisco Security
 
Midsize Business Solutions: Cybersecurity
Midsize Business Solutions: CybersecurityMidsize Business Solutions: Cybersecurity
Midsize Business Solutions: CybersecurityCisco Security
 
Integrated Network Security Strategies
Integrated Network Security StrategiesIntegrated Network Security Strategies
Integrated Network Security StrategiesCisco Security
 
Cisco Addresses the Full Attack Continuum
Cisco Addresses the Full Attack ContinuumCisco Addresses the Full Attack Continuum
Cisco Addresses the Full Attack ContinuumCisco Security
 
Infonetics Network and Content Security Vendor Scorecard
Infonetics Network and Content Security Vendor ScorecardInfonetics Network and Content Security Vendor Scorecard
Infonetics Network and Content Security Vendor ScorecardCisco Security
 
Gartner Newsletter: Cisco TrustSec Deployed Across Enterprise Campus, Branch ...
Gartner Newsletter: Cisco TrustSec Deployed Across Enterprise Campus, Branch ...Gartner Newsletter: Cisco TrustSec Deployed Across Enterprise Campus, Branch ...
Gartner Newsletter: Cisco TrustSec Deployed Across Enterprise Campus, Branch ...Cisco Security
 
The Evolution of and Need for Secure Network Access
The Evolution of and Need for Secure Network AccessThe Evolution of and Need for Secure Network Access
The Evolution of and Need for Secure Network AccessCisco Security
 
Cisco 2014 Midyear Security Report
Cisco 2014 Midyear Security ReportCisco 2014 Midyear Security Report
Cisco 2014 Midyear Security ReportCisco Security
 
String of Paerls Infographic
String of Paerls InfographicString of Paerls Infographic
String of Paerls InfographicCisco Security
 
Midyear Security Report Infographic
Midyear Security Report InfographicMidyear Security Report Infographic
Midyear Security Report InfographicCisco Security
 
Cisco Annual Security Report Infographic
Cisco Annual Security Report InfographicCisco Annual Security Report Infographic
Cisco Annual Security Report InfographicCisco Security
 
City of Tomorrow Builds in Next-Generation Security
City of Tomorrow Builds in Next-Generation SecurityCity of Tomorrow Builds in Next-Generation Security
City of Tomorrow Builds in Next-Generation SecurityCisco Security
 
Laser Pioneer Secures Network End-to-End to Protect Assets
Laser Pioneer Secures Network End-to-End to Protect AssetsLaser Pioneer Secures Network End-to-End to Protect Assets
Laser Pioneer Secures Network End-to-End to Protect AssetsCisco Security
 
McAllen Intermediate School District
McAllen Intermediate School DistrictMcAllen Intermediate School District
McAllen Intermediate School DistrictCisco Security
 

More from Cisco Security (20)

AMP Helps Cisco IT Catch 50% More Malware threats
AMP Helps Cisco IT Catch 50% More Malware threatsAMP Helps Cisco IT Catch 50% More Malware threats
AMP Helps Cisco IT Catch 50% More Malware threats
 
A Reality Check on the State of Cybersecurity
A Reality Check on the State of CybersecurityA Reality Check on the State of Cybersecurity
A Reality Check on the State of Cybersecurity
 
Balance Data Center Security and Performance
Balance Data Center Security and PerformanceBalance Data Center Security and Performance
Balance Data Center Security and Performance
 
The Cost of Inactivity: Malware Infographic
The Cost of Inactivity: Malware InfographicThe Cost of Inactivity: Malware Infographic
The Cost of Inactivity: Malware Infographic
 
Data Center Security Challenges
Data Center Security ChallengesData Center Security Challenges
Data Center Security Challenges
 
Enterprise Strategy Group: Security Survey
Enterprise Strategy Group: Security SurveyEnterprise Strategy Group: Security Survey
Enterprise Strategy Group: Security Survey
 
Malware and the Cost of Inactivity
Malware and the Cost of InactivityMalware and the Cost of Inactivity
Malware and the Cost of Inactivity
 
Midsize Business Solutions: Cybersecurity
Midsize Business Solutions: CybersecurityMidsize Business Solutions: Cybersecurity
Midsize Business Solutions: Cybersecurity
 
Integrated Network Security Strategies
Integrated Network Security StrategiesIntegrated Network Security Strategies
Integrated Network Security Strategies
 
Cisco Addresses the Full Attack Continuum
Cisco Addresses the Full Attack ContinuumCisco Addresses the Full Attack Continuum
Cisco Addresses the Full Attack Continuum
 
Infonetics Network and Content Security Vendor Scorecard
Infonetics Network and Content Security Vendor ScorecardInfonetics Network and Content Security Vendor Scorecard
Infonetics Network and Content Security Vendor Scorecard
 
Gartner Newsletter: Cisco TrustSec Deployed Across Enterprise Campus, Branch ...
Gartner Newsletter: Cisco TrustSec Deployed Across Enterprise Campus, Branch ...Gartner Newsletter: Cisco TrustSec Deployed Across Enterprise Campus, Branch ...
Gartner Newsletter: Cisco TrustSec Deployed Across Enterprise Campus, Branch ...
 
The Evolution of and Need for Secure Network Access
The Evolution of and Need for Secure Network AccessThe Evolution of and Need for Secure Network Access
The Evolution of and Need for Secure Network Access
 
Cisco 2014 Midyear Security Report
Cisco 2014 Midyear Security ReportCisco 2014 Midyear Security Report
Cisco 2014 Midyear Security Report
 
String of Paerls Infographic
String of Paerls InfographicString of Paerls Infographic
String of Paerls Infographic
 
Midyear Security Report Infographic
Midyear Security Report InfographicMidyear Security Report Infographic
Midyear Security Report Infographic
 
Cisco Annual Security Report Infographic
Cisco Annual Security Report InfographicCisco Annual Security Report Infographic
Cisco Annual Security Report Infographic
 
City of Tomorrow Builds in Next-Generation Security
City of Tomorrow Builds in Next-Generation SecurityCity of Tomorrow Builds in Next-Generation Security
City of Tomorrow Builds in Next-Generation Security
 
Laser Pioneer Secures Network End-to-End to Protect Assets
Laser Pioneer Secures Network End-to-End to Protect AssetsLaser Pioneer Secures Network End-to-End to Protect Assets
Laser Pioneer Secures Network End-to-End to Protect Assets
 
McAllen Intermediate School District
McAllen Intermediate School DistrictMcAllen Intermediate School District
McAllen Intermediate School District
 

Recently uploaded

Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 

Recently uploaded (20)

Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 

Why Schools Should Participate in the CyberPatriot Program

  • 1. At-A-Glance CyberPatriot: Inspiring Student Interest in Cybersecurity and STEM By 2018, the U.S. Department of Commerce estimates there will be 1.2 million unfilled science, technology, engineering, and mathematics (STEM) jobs in the United States. The CyberPatriot program is helping to fill that gap with qualified talent by exciting K–12 students about cybersecurity or other STEM disciplines through education and competition. CyberPatriot features three programs: National Youth Cyber Defense Competition This event challenges high school and middle school students to act as IT professionals who must manage a small company network. Students compete in teams of five at their state and regional levels and are evaluated on how well they can find and protect against known vulnerabilities on a virtual network. Top teams earn an all-expenses- paid trip to Washington, DC, to compete in a national event to earn recognition and scholarships. AFA CyberCamps These five-day summer camps teach students across the coutnry about cybersecurity and conclude with a mock competition. Elementary School Cyber Education Initiative Available to K–6 students, this free class teaches the importance of online safety and helps students learn how to protect themselves on the Internet. Why Cybersecurity Matters • Nearly all industries in the United States rely on cybersecurity, including banking, commerce, manufacturing, and defense • Predators can exploit young children on the Internet if proper security practices aren’t followed • Cyber careers are in high demand and currently there’s a workforce shortage of one million information security professionals, worldwide Air Force Association’s CyberPatriot The National Youth Cyber Education Program © 2015 Cisco and/or its affiliates. All rights reserved. CyberPatriot Benefits • Helps students understand the importance of cybersecurity • Equips students to better protect themselves on the Internet • Teaches students skills that can be used in college and the workforce • Encourages students to pursue cyber or STEM-related careers • Raises cybersecurity awareness in schools • Engages students to learn about cybersecurity and STEM disciplines • Fosters teamwork and school pride among students • Fuels competitive spirit
  • 2. At-A-Glance Sources: • www.uscyberpatriot.org • Source for shortage of one million information security professionals: Cisco 2015 Annual Security Report • Source for 1.2 million unfilled STEM jobs: U.S. Department of Commerce © 2015 Cisco and/or its affiliates. All rights reserved. Participate in CyberPatriot: The Four-Step CSTP Method 1. Find a Coach A coach is someone at your school who is passionate about providing this opportunity to students and who doesn’t have to be an expert in cybersecurity or computers. 2. Get Support Your team will need technical and non-technical support. Technical mentors are professionals, students, or IT-experienced adults who can volunteer to help your coach and team understand cybersecurity and related concepts in the competition. They can be at your school, in the local community, at a four-year college, or employed at a local business. Non-technical support includes adults willing to assist with transportation, set up, or simply provide encouragement. 3. Form a Team A team consists of up to five students. Each competitor has his or her own role but the team needs to function as a whole as well. Players need a computer or laptop that can run the virtual images used for practice and competition and access the Internet. 4. Practice Here’s where the fun starts. Your team needs to practice often— at least several hours a week leading up to the competition. The stronger commitment your team has, the better chances you have of winning and moving onto finals in Washington, DC. Cisco and STEM Cisco is committed to inspiring more people to pursue STEM education and careers. We believe encouraging people to study STEM is imperative for society. Through mentoring, IT training, and support for schools and nonprofits, we are working to increase the pipeline of STEM talent around the world. We are excited be a CyberPatriot sponsor and to share access to the Cisco Network Academy® with teams. For More Information Visit https://www.uscyberpatriot.org/home to register your team, sign up to volunteer, or explore more about the program, including costs, competition requirements, and available resources. To learn about other Cisco® STEM programs, visit http://csr.cisco.com/pages/stem-at-cisco. Cisco CyberPatriot Training Materials All teams participating in CyberPatriot receive access to the Cisco Networking Academy® platform that includes three CyberPatriot-specific training courses: • Instructor Course provides instructors an introduction to the site and instructions on how to start teaching teams • Content Course includes team training modules that help students increase their networking knowledge. Coaches and mentors can create a content course once the instructor course is complete • Competition Course allows teams to access quizzes and Packet Tracer activities Questions about accessing the course materials should be directed to the CyberPatriot Program Office at cpoc@uscyberpatriot.org, not Cisco.