{"id":12983,"date":"2024-08-21T15:06:02","date_gmt":"2024-08-21T22:06:02","guid":{"rendered":"https:\/\/www.ewu.edu\/cstem\/?page_id=12983"},"modified":"2025-12-08T11:28:35","modified_gmt":"2025-12-08T19:28:35","slug":"institute","status":"publish","type":"page","link":"https:\/\/www.ewu.edu\/cstem\/cybersecurity\/institute\/","title":{"rendered":"Cybersecurity Center"},"content":{"rendered":"","protected":false},"excerpt":{"rendered":"","protected":false},"author":462,"featured_media":12818,"parent":5152,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-12983","page","type-page","status-publish","has-post-thumbnail","hentry"],"acf":{"background_image_type":"custom","background":{"ID":9778,"id":9778,"title":"CatalystFacade","filename":"CatalystFacade.jpg","filesize":1907129,"url":"https:\/\/www.ewu.edu\/cstem\/wp-content\/uploads\/sites\/5\/2022\/07\/CatalystFacade.jpg","link":"https:\/\/www.ewu.edu\/cstem\/contact-us\/catalystfacade\/","alt":"Catalyst exterior","author":"434","description":"","caption":"","name":"catalystfacade","status":"inherit","uploaded_to":30,"date":"2022-07-28 22:38:41","modified":"2024-07-17 04:30:40","menu_order":0,"mime_type":"image\/jpeg","type":"image","subtype":"jpeg","icon":"https:\/\/www.ewu.edu\/cstem\/wp-includes\/images\/media\/default.png","width":1928,"height":1440,"sizes":{"thumbnail":"https:\/\/www.ewu.edu\/cstem\/wp-content\/uploads\/sites\/5\/2022\/07\/CatalystFacade-150x150.jpg","thumbnail-width":150,"thumbnail-height":150,"medium":"https:\/\/www.ewu.edu\/cstem\/wp-content\/uploads\/sites\/5\/2022\/07\/CatalystFacade-300x224.jpg","medium-width":300,"medium-height":224,"medium_large":"https:\/\/www.ewu.edu\/cstem\/wp-content\/uploads\/sites\/5\/2022\/07\/CatalystFacade-768x574.jpg","medium_large-width":768,"medium_large-height":574,"large":"https:\/\/www.ewu.edu\/cstem\/wp-content\/uploads\/sites\/5\/2022\/07\/CatalystFacade-1024x765.jpg","large-width":1024,"large-height":765,"1536x1536":"https:\/\/www.ewu.edu\/cstem\/wp-content\/uploads\/sites\/5\/2022\/07\/CatalystFacade-1536x1147.jpg","1536x1536-width":1536,"1536x1536-height":1147,"2048x2048":"https:\/\/www.ewu.edu\/cstem\/wp-content\/uploads\/sites\/5\/2022\/07\/CatalystFacade.jpg","2048x2048-width":1928,"2048x2048-height":1440,"gform-image-choice-sm":"https:\/\/www.ewu.edu\/cstem\/wp-content\/uploads\/sites\/5\/2022\/07\/CatalystFacade.jpg","gform-image-choice-sm-width":300,"gform-image-choice-sm-height":224,"gform-image-choice-md":"https:\/\/www.ewu.edu\/cstem\/wp-content\/uploads\/sites\/5\/2022\/07\/CatalystFacade.jpg","gform-image-choice-md-width":400,"gform-image-choice-md-height":299,"gform-image-choice-lg":"https:\/\/www.ewu.edu\/cstem\/wp-content\/uploads\/sites\/5\/2022\/07\/CatalystFacade.jpg","gform-image-choice-lg-width":600,"gform-image-choice-lg-height":448}},"background_vertical_alignment":"center","text_style":"allcaps","readability_aid":"overlay","title":"","bold_title":"Cybersecurity Center","content":"","component_options_toggle":false,"component_options":{"component_options_toggle":false,"component_options":{"disable_component":false,"nickname":"","identifier":"","navigable":false}},"primary_content_copy":"<h2>About<\/h2>\n<p>The EWU Cybersecurity Center (Institute) supports and coordinates research and education in information assurance and cyber defense in support of Eastern Washington University\u2019s teaching, learning, scholarly, and creative activity goals.<\/p>\n<p>With our recognized Center of Academic Excellence in Cybersecurity <span class=\"TextRun SCXW257193806 BCX2\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"none\"><a href=\"https:\/\/www.ewu.edu\/cstem\/csee\/computer-science-cyber-operations-bs\/\"><span class=\"NormalTextRun SCXW257193806 BCX2\" data-ccp-parastyle=\"Normal (Web)\">Program of Study <\/span><span class=\"NormalTextRun SCXW257193806 BCX2\" data-ccp-parastyle=\"Normal (Web)\">Bachelor of Science in Computer Science<\/span><\/a><span class=\"NormalTextRun SCXW257193806 BCX2\" data-ccp-parastyle=\"Normal (Web)\"> Cyber Operations, <\/span><\/span>you will build a solid foundation in security principles, computing, and software development so you\u2019re prepared to safeguard digital information and systems.<\/p>\n<p>Our cyber operations programs will help you become an offensive strategist learning:<\/p>\n<ul>\n<li>How to preempt system attacks<\/li>\n<li>Combine AI capabilities with an adversarial mindset<\/li>\n<li>Problem-solve in teams<\/li>\n<li>Write and understand malware while making technically sound and ethically responsible decisions<\/li>\n<\/ul>\n<p>Our cyber defense programs are grounded in:<\/p>\n<ul>\n<li>The practical application of secure code and secure systems design<\/li>\n<li>Hands-on training through competitions, real-world hacking scenarios, and simulated cyber-attacks<\/li>\n<li>Customized projects and research to fit your interests<\/li>\n<\/ul>\n<p>Whichever path you choose, we\u2019ll prepare you with the technical, legal, and ethical expertise to take on the cyber challenges of today and tomorrow.<\/p>\n","blocks":[{"acf_fc_layout":"destination-eastern","module_background_color":"white","title":"Our Mission","subtitle":"We understand the importance of collaboration and networking in the cybersecurity field. That's why we foster connections between students, businesses, and industry professionals. Through internships, partnerships, and networking events, students have the chance to engage with the broader cybersecurity community, gaining valuable insights and building relationships that can propel their careers forward.","features":[{"icon":"global-supply","image":false,"feature_title":"Promote","feature_content":"Promote cybersecurity and cyber awareness curriculum that is based on current industry needs, challenges and situations.","link":""},{"icon":"head-gear","image":false,"feature_title":"Learn","feature_content":"Create opportunities for cybersecurity students to expand their knowledge and collaborate on team-based projects.","link":""},{"icon":"management","image":false,"feature_title":"Network","feature_content":"Connect cybersecurity professionals with students for networking that provides insight into the industry.","link":""}],"show_details":true,"details_title":"Opportunities","copy":"<p>In addition to the students earning a Bachelor of Science in Computer Science with a Cybersecurity minor, there are opportunities to participate in a myriad of cybersecurity events, including membership in the EWU&#8217;s <a href=\"https:\/\/ewu.edu\/cyberclub\/\" target=\"_blank\" rel=\"noopener\">Cybersecurity Club<\/a>.<\/p>\n","second_column_type":"quote","copy_2":"","quote":"EWU Cyber students are on their way to the 2024 National Cyber League, a collegiate cybersecurity competition. ","component_options_toggle":true,"component_options":{"disable_component":false,"nickname":"Mission","identifier":"mission","navigable":false}},{"acf_fc_layout":"copy-with-image","layout":"small-image","show_left":false,"module_background_color":"off-white","title":"National Certifications","copy":"<p>The <a href=\"https:\/\/www.nsa.gov\/\">National Security Agency (NSA)<\/a> has designated EWU as a <a href=\"https:\/\/www.nsa.gov\/Academics\/Centers-of-Academic-Excellence\/\">National Center of Academic Excellence in Cyber Defense (NCAE-C)<\/a>.<\/p>\n<p>Eastern is the only four-year institution in eastern Washington to earn this classification.<\/p>\n<p>&nbsp;<\/p>\n","image":{"ID":13003,"id":13003,"title":"CAE_seal","filename":"CAE_seal-1.png","filesize":221768,"url":"https:\/\/www.ewu.edu\/cstem\/wp-content\/uploads\/sites\/5\/2024\/08\/CAE_seal-1.png","link":"https:\/\/www.ewu.edu\/cstem\/cybersecurity\/institute\/cae_seal-2\/","alt":"seal","author":"462","description":"","caption":"","name":"cae_seal-2","status":"inherit","uploaded_to":12983,"date":"2024-08-21 23:14:21","modified":"2024-08-21 23:14:34","menu_order":0,"mime_type":"image\/png","type":"image","subtype":"png","icon":"https:\/\/www.ewu.edu\/cstem\/wp-includes\/images\/media\/default.png","width":600,"height":600,"sizes":{"thumbnail":"https:\/\/www.ewu.edu\/cstem\/wp-content\/uploads\/sites\/5\/2024\/08\/CAE_seal-1-150x150.png","thumbnail-width":150,"thumbnail-height":150,"medium":"https:\/\/www.ewu.edu\/cstem\/wp-content\/uploads\/sites\/5\/2024\/08\/CAE_seal-1-300x300.png","medium-width":300,"medium-height":300,"medium_large":"https:\/\/www.ewu.edu\/cstem\/wp-content\/uploads\/sites\/5\/2024\/08\/CAE_seal-1.png","medium_large-width":600,"medium_large-height":600,"large":"https:\/\/www.ewu.edu\/cstem\/wp-content\/uploads\/sites\/5\/2024\/08\/CAE_seal-1.png","large-width":600,"large-height":600,"1536x1536":"https:\/\/www.ewu.edu\/cstem\/wp-content\/uploads\/sites\/5\/2024\/08\/CAE_seal-1.png","1536x1536-width":600,"1536x1536-height":600,"2048x2048":"https:\/\/www.ewu.edu\/cstem\/wp-content\/uploads\/sites\/5\/2024\/08\/CAE_seal-1.png","2048x2048-width":600,"2048x2048-height":600,"gform-image-choice-sm":"https:\/\/www.ewu.edu\/cstem\/wp-content\/uploads\/sites\/5\/2024\/08\/CAE_seal-1.png","gform-image-choice-sm-width":300,"gform-image-choice-sm-height":300,"gform-image-choice-md":"https:\/\/www.ewu.edu\/cstem\/wp-content\/uploads\/sites\/5\/2024\/08\/CAE_seal-1.png","gform-image-choice-md-width":400,"gform-image-choice-md-height":400,"gform-image-choice-lg":"https:\/\/www.ewu.edu\/cstem\/wp-content\/uploads\/sites\/5\/2024\/08\/CAE_seal-1.png","gform-image-choice-lg-width":600,"gform-image-choice-lg-height":600}},"youtube_video_id":"","video_orientation":"horizontal","image_alt":"National Centers of Academic Excellence","secondary_image":"Geo-texture-blk.svg","background_vertical_alignment":"center","background_horizontal_alignment":"center","background_crop":"chevron","component_options_toggle":true,"component_options":{"disable_component":false,"nickname":"Certifications","identifier":"","navigable":false}},{"acf_fc_layout":"destination-eastern","module_background_color":"white","title":"Degrees in Cybersecurity","subtitle":"We offer two bachelor's degrees and one minor, with a focus on collaboration and hands-on learning to help you grow and thrive.","features":[{"icon":"computer-report","image":false,"feature_title":"Computer Science Cyber Operations <br> Bachelor of Science ","feature_content":"CAE-C Program of Study builds a deep understanding of hands-on computer science, cybersecurity, needed for cyber operations.","link":{"title":"Learn More","url":"https:\/\/www.ewu.edu\/cstem\/csee\/computer-science-cyber-operations-bs\/","target":""}},{"icon":"database","image":false,"feature_title":"Cyber Operations <br> Bachelor of Science","feature_content":"Explore the full spectrum of cyberspace operations while developing both technical and non-technical skills.","link":{"title":"Learn More","url":"https:\/\/www.ewu.edu\/cstem\/csee\/cyber-operations-bs\/","target":""}},{"icon":"certificate","image":false,"feature_title":"Cybersecurity <br> Master of Science","feature_content":"Level up your cybersecurity skills and learn how to protect critical information from evolving threats.","link":{"title":"Learn More","url":"https:\/\/www.ewu.edu\/cstem\/cybersecurity\/minor\/","target":""}}],"show_details":false,"details_title":"","copy":"","second_column_type":"quote","copy_2":"","quote":"","component_options_toggle":false,"component_options":{"disable_component":false,"nickname":"","identifier":"","navigable":false}},{"acf_fc_layout":"two-column-explicit","module_background_color":"white","include_header":true,"include_images":true,"intro_title":"Clubs &amp; Outreach","intro_title_style":"h2","sub_heading":"","intro_title_position":"","include_intro_copy":false,"intro_copy":"","columns":[{"image":{"ID":12795,"id":12795,"title":"CyberClub-winners","filename":"CyberClub-winners.jpg","filesize":176194,"url":"https:\/\/www.ewu.edu\/cstem\/wp-content\/uploads\/sites\/5\/2024\/07\/CyberClub-winners.jpg","link":"https:\/\/www.ewu.edu\/cstem\/cyber\/cyberclub-winners\/","alt":"group of students","author":"462","description":"","caption":"","name":"cyberclub-winners","status":"inherit","uploaded_to":12744,"date":"2024-07-25 23:15:35","modified":"2024-08-21 18:49:15","menu_order":0,"mime_type":"image\/jpeg","type":"image","subtype":"jpeg","icon":"https:\/\/www.ewu.edu\/cstem\/wp-includes\/images\/media\/default.png","width":640,"height":360,"sizes":{"thumbnail":"https:\/\/www.ewu.edu\/cstem\/wp-content\/uploads\/sites\/5\/2024\/07\/CyberClub-winners-150x150.jpg","thumbnail-width":150,"thumbnail-height":150,"medium":"https:\/\/www.ewu.edu\/cstem\/wp-content\/uploads\/sites\/5\/2024\/07\/CyberClub-winners-300x169.jpg","medium-width":300,"medium-height":169,"medium_large":"https:\/\/www.ewu.edu\/cstem\/wp-content\/uploads\/sites\/5\/2024\/07\/CyberClub-winners.jpg","medium_large-width":640,"medium_large-height":360,"large":"https:\/\/www.ewu.edu\/cstem\/wp-content\/uploads\/sites\/5\/2024\/07\/CyberClub-winners.jpg","large-width":640,"large-height":360,"1536x1536":"https:\/\/www.ewu.edu\/cstem\/wp-content\/uploads\/sites\/5\/2024\/07\/CyberClub-winners.jpg","1536x1536-width":640,"1536x1536-height":360,"2048x2048":"https:\/\/www.ewu.edu\/cstem\/wp-content\/uploads\/sites\/5\/2024\/07\/CyberClub-winners.jpg","2048x2048-width":640,"2048x2048-height":360,"gform-image-choice-sm":"https:\/\/www.ewu.edu\/cstem\/wp-content\/uploads\/sites\/5\/2024\/07\/CyberClub-winners.jpg","gform-image-choice-sm-width":300,"gform-image-choice-sm-height":169,"gform-image-choice-md":"https:\/\/www.ewu.edu\/cstem\/wp-content\/uploads\/sites\/5\/2024\/07\/CyberClub-winners.jpg","gform-image-choice-md-width":400,"gform-image-choice-md-height":225,"gform-image-choice-lg":"https:\/\/www.ewu.edu\/cstem\/wp-content\/uploads\/sites\/5\/2024\/07\/CyberClub-winners.jpg","gform-image-choice-lg-width":600,"gform-image-choice-lg-height":338}},"title":"EWU Cybersecurity Club","heading_tag":"h3","show-hr":true,"copy":"<p>The EWU Cybersecurity Club is a student organization at EWU that fosters a community around all aspects of cybersecurity. Students who are passionate about cybersecurity, offering opportunities to learn, volunteer in the local community, and network with industry professionals.<\/p>\n<p><a class=\"btn\" href=\"https:\/\/www.ewu.edu\/cstem\/cybersecurity\/club\/\">Learn More<\/a><\/p>\n"},{"image":{"ID":12821,"id":12821,"title":"20220927-CatalystEvent-015 (1)","filename":"20220927-CatalystEvent-015-1.jpg","filesize":762059,"url":"https:\/\/www.ewu.edu\/cstem\/wp-content\/uploads\/sites\/5\/2024\/07\/20220927-CatalystEvent-015-1.jpg","link":"https:\/\/www.ewu.edu\/cstem\/cybersecurity\/institute\/20220927-catalystevent-015-1\/","alt":"","author":"462","description":"","caption":"","name":"20220927-catalystevent-015-1","status":"inherit","uploaded_to":12983,"date":"2024-07-26 21:58:43","modified":"2024-08-21 22:46:24","menu_order":0,"mime_type":"image\/jpeg","type":"image","subtype":"jpeg","icon":"https:\/\/www.ewu.edu\/cstem\/wp-includes\/images\/media\/default.png","width":1200,"height":800,"sizes":{"thumbnail":"https:\/\/www.ewu.edu\/cstem\/wp-content\/uploads\/sites\/5\/2024\/07\/20220927-CatalystEvent-015-1-150x150.jpg","thumbnail-width":150,"thumbnail-height":150,"medium":"https:\/\/www.ewu.edu\/cstem\/wp-content\/uploads\/sites\/5\/2024\/07\/20220927-CatalystEvent-015-1-300x200.jpg","medium-width":300,"medium-height":200,"medium_large":"https:\/\/www.ewu.edu\/cstem\/wp-content\/uploads\/sites\/5\/2024\/07\/20220927-CatalystEvent-015-1-768x512.jpg","medium_large-width":768,"medium_large-height":512,"large":"https:\/\/www.ewu.edu\/cstem\/wp-content\/uploads\/sites\/5\/2024\/07\/20220927-CatalystEvent-015-1-1024x683.jpg","large-width":1024,"large-height":683,"1536x1536":"https:\/\/www.ewu.edu\/cstem\/wp-content\/uploads\/sites\/5\/2024\/07\/20220927-CatalystEvent-015-1.jpg","1536x1536-width":1200,"1536x1536-height":800,"2048x2048":"https:\/\/www.ewu.edu\/cstem\/wp-content\/uploads\/sites\/5\/2024\/07\/20220927-CatalystEvent-015-1.jpg","2048x2048-width":1200,"2048x2048-height":800,"gform-image-choice-sm":"https:\/\/www.ewu.edu\/cstem\/wp-content\/uploads\/sites\/5\/2024\/07\/20220927-CatalystEvent-015-1.jpg","gform-image-choice-sm-width":300,"gform-image-choice-sm-height":200,"gform-image-choice-md":"https:\/\/www.ewu.edu\/cstem\/wp-content\/uploads\/sites\/5\/2024\/07\/20220927-CatalystEvent-015-1.jpg","gform-image-choice-md-width":400,"gform-image-choice-md-height":267,"gform-image-choice-lg":"https:\/\/www.ewu.edu\/cstem\/wp-content\/uploads\/sites\/5\/2024\/07\/20220927-CatalystEvent-015-1.jpg","gform-image-choice-lg-width":600,"gform-image-choice-lg-height":400}},"title":"GenCyber Student Camp","heading_tag":"h3","show-hr":true,"copy":"<p>Students in grades 6-8 have the opportunity to participate in various activities that will give them a taste of what it&#8217;s like to work in this exciting field. They will learn about different types of cyber attacks, explore ways to prevent them, and even<\/p>\n<p><a class=\"btn\" href=\"https:\/\/inside.ewu.edu\/gencyber\/\">Learn More<\/a><\/p>\n"}],"component_options_toggle":true,"component_options":{"disable_component":false,"nickname":"Clubs &amp; Outreach","identifier":"","navigable":false}},{"acf_fc_layout":"eastern-stories","module_background_color":"white","title":"Eastern Stories","starting_display_type":"multisite_tag","tag":"featured","category":"","multisite_tag":"Cybersecurity","multisite_curated_stories":false,"include_cat":false,"include_cta":true,"button_text":"More Cybersecurity Stories","button_link":"https:\/\/www.ewu.edu\/news-search\/?q=cybersecurity","component_options_toggle":false,"component_options":{"disable_component":false,"nickname":"","identifier":"","navigable":false}},{"acf_fc_layout":"accordion-with-notes","module_background_color":"off-white","accordion_position":"bottom","title":"Faculty &amp; Resources","notes":"<p>Our goal is to bring students and businesses together to learn more about cybersecurity, volunteer with the local community, and network with industry professionals.<\/p>\n<p>Under the leadership of <a href=\"mailto:ssteiner@ewu.edu\">Director Stu Steiner<\/a>\u00a0(the Center&#8217;s point of contact) the EWU Cybersecurity Institute advances applied learning through industry collaboration, research, and community impact. Our faculty and staff play a critical role in preparing students for the cybersecurity workforce. View the complete Faculty and Staff directory to meet the full team.<\/p>\n<p><a class=\"btn\" href=\"https:\/\/www.ewu.edu\/cstem\/cyber\/faculty-staff\/\">Meet the Faculty<\/a><\/p>\n","include_spacing":true,"expanded":false,"sections":[{"label":"EWU Resources","copy":"<h4>EWU IT Security<\/h4>\n<p>The mission of <a href=\"https:\/\/inside.ewu.edu\/it\/information-security\/\" target=\"_blank\" rel=\"noopener\">EWU&#8217;s Office of Information Security<\/a>\u00a0is to protect EWU&#8217;s computer networks and the information that flows over it.<\/p>\n<p>To fulfill this mission, our office provides a wide variety of services to the EWU community that help minimize the occurrence and risk of security incidents. We work closely with other higher education institutions, outside security organizations and researchers to stay informed.<\/p>\n"},{"label":"Cybersecurity Resources","copy":"<h4>The National Cybersecurity and Communications Integration Center<\/h4>\n<p>The mission of <a href=\"https:\/\/www.us-cert.gov\/\" target=\"_blank\" rel=\"external noopener\">The National Cybersecurity and Communications Integration Center<\/a> is to reduce the risk of systemic cybersecurity and communications challenges in their role as the nation\u2019s flagship cyber defense, incident response and operational integration center.<\/p>\n<h4>Women in Cybersecurity WiCys<\/h4>\n<p><a href=\"https:\/\/www.wicys.org\/\" target=\"_blank\" rel=\"noopener\">WiCyS<\/a> is a global community of women and men, we are dedicated to bringing talented women together to celebrate and foster their passion and drive for cybersecurity.<\/p>\n<h4>National Cyberwatch<\/h4>\n<p><a href=\"https:\/\/www.nationalcyberwatch.org\/\" target=\"_blank\" rel=\"external noopener\">National Cyberwatch Center<\/a> consists of a group of higher education institutions, businesses, and government agencies focused on collaborative efforts to advance information security education and strengthen the national cybersecurity workforce.<\/p>\n<h4>IT Career Finder<\/h4>\n<p><a href=\"https:\/\/www.itcareerfinder.com\/it-careers.html\" target=\"_blank\" rel=\"external noopener\">IT Career Finder<\/a> helps individuals interested in\u00a0information technology\u00a0identify potential careers in the field.<\/p>\n<p><a href=\"https:\/\/www.sjvc.edu\/guides\/information-technology-career-guide\/\" target=\"_blank\" rel=\"noopener\">Information Technology Career Guide<\/a> covers in-depth information regarding information technology career paths, traits and skills for I.T. workers, as well as education and certification requirements for these positions.<\/p>\n<h4>Cybersecurity Guide<\/h4>\n<p><a href=\"https:\/\/cybersecurityguide.org\/\" target=\"_blank\" rel=\"noopener\">Cybersecurity Guide<\/a> is focused on providing information for students seeking a career in cybersecurity.<\/p>\n<h4 class=\"meta__heading\">Cyber Crime Investigation<\/h4>\n<p>Criminal activity taking place in the digital world, known as cyber crime, comes in various forms. Like in the physical world, cyber crime is investigated by trained professionals who gather and secure evidence to confront cyber criminal activity and prosecute crimes. This type of investigation is known as a cyber crime investigation. The information from Marysville University can be found <a href=\"https:\/\/online.maryville.edu\/blog\/cyber-crime-investigation\/\" target=\"_blank\" rel=\"noopener\">here<\/a>.<\/p>\n<h4 class=\"meta__heading\">Cybersecurity National Jobs<\/h4>\n<p>Open national cybersecurity jobs can be found <a href=\"http:\/\/CyberSecurityJobs.com\">here<\/a>.<\/p>\n"},{"label":"Cybersecurity Competitions","copy":"<h4>DOE CyberForce Competition<\/h4>\n<p>The <a href=\"https:\/\/cyberforcecompetition.com\/\" target=\"_blank\" rel=\"noopener\">DOE CyberForce competition<\/a> encourages unique defense strategies and techniques in safeguarding cyber assets.<\/p>\n<h4>National Cyber League<\/h4>\n<p class=\"\"><a href=\"https:\/\/nationalcyberleague.org\/\" target=\"_blank\" rel=\"noopener\">The National Cyber League (NCL)<\/a> is the most inclusive, performance-based, learning-centered collegiate cybersecurity competition today!<\/p>\n<p class=\"\">The NCL, powered by Cyber Skyline, enables students to prepare and test themselves against practical cybersecurity challenges that they will likely face in the workforce, such as identifying hackers from forensic data, pen-testing and auditing vulnerable websites, recovering from ransomware attacks and much more!<\/p>\n<h4>NCAE Cyber Games<\/h4>\n<p><a href=\"https:\/\/www.ncaecybergames.org\/#\">NCAE Cyber Games<\/a> is dedicated to inspiring college students to enter the exciting realm of cyber competitions.\u00a0 NCAE Cyber Games is for college students who have never competed before where they can learn about cyber competitions in an environment focused on teamwork, building confidence, and growing your skills.<\/p>\n<h4>Spokane Cyber Cup<\/h4>\n<p><a href=\"https:\/\/spokanectf.github.io\/\">Spokane Cyber Cup<\/a> is an educational cyber capture-the-flag competition. General coaches are available to help students. This competition is more about education then winning.<\/p>\n"},{"label":"Regional \/ National Cybersecurity News","copy":"<h4>Regional \/ National Cybersecurity News Links<\/h4>\n<ul>\n<li><a href=\"https:\/\/www.ewu.edu\/news-search\/?q=cybersecurity\">Cybersecurity &amp; Infrastructure Security Agency News<\/a><\/li>\n<li><a href=\"https:\/\/www.securityweek.com\/\">Security Week News<\/a><\/li>\n<li><a href=\"https:\/\/thehackernews.com\/\">The Hacker News<\/a><\/li>\n<li><a href=\"https:\/\/cyberscoop.com\/\">Cyber Scoop<\/a><\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n"}],"component_options_toggle":true,"component_options":{"disable_component":false,"nickname":"Resource","identifier":"resource","navigable":false}},{"acf_fc_layout":"two-column-explicit","module_background_color":"white","include_header":true,"include_images":false,"intro_title":"Board Membership &amp; Industrial Partnerships","intro_title_style":"h2","sub_heading":"","intro_title_position":"","include_intro_copy":false,"intro_copy":"","columns":[{"image":false,"title":"Advisory Board","heading_tag":"h3","show-hr":true,"copy":"<p>The external board of advisors contains local and national industry professionals and faculty from other institutions, to provide programmatic guidance over the activities of the center and the program as a whole. This board provides a connection between the program, Center for Network Computing and Cybersecurity, College of Science Technology Engineering and Mathematics, the Computer Science Department, and the local community.<\/p>\n<h3>Board Leadership<\/h3>\n<ul>\n<li>Rebecca Long, Future Ada &amp; Engie Impact \u2014 <em>Board Chair<\/em><\/li>\n<li>Joe Dumoulin, Aon \u2014 <em>Board Vice Chair<\/em><\/li>\n<li>Brian Schmidt, Engie Impact \u2014 <em>Board Secretary<\/em><\/li>\n<\/ul>\n"},{"image":false,"title":"","heading_tag":"h3","show-hr":true,"copy":"<h3>Industrial Partnerships<\/h3>\n<ul>\n<li>Internet Archives<\/li>\n<li>LabCorp<\/li>\n<li>F5 Networks<\/li>\n<li>RiskLens<\/li>\n<li>Surge<\/li>\n<li>Identity Mind<\/li>\n<li>Fast Enterprises<\/li>\n<li>Itron<\/li>\n<li>Commerce Architects<\/li>\n<li>Maplewood Software<\/li>\n<li>Intrinium<\/li>\n<li>Intellitect<\/li>\n<li>Schweitzer Engineering<\/li>\n<li>Inland Northwest Health Services<\/li>\n<\/ul>\n"}],"component_options_toggle":true,"component_options":{"disable_component":false,"nickname":"Board Membership &amp; Industrial Partnerships","identifier":"board","navigable":false}},{"acf_fc_layout":"section-footer","contact":"<p><strong>EWU Cybersecurity Institute<br \/>\n<\/strong><br \/>\nPoint of Contact:<br \/>\nStu Steiner<br \/>\np:<a href=\"tel:509.730.5788\"> 509.730.5788<\/a><br \/>\ne: <a href=\"mailto:ssteiner@ewu.edu\">ssteiner@ewu.edu<\/a><\/p>\n","icons":[{"icon":"youtube","link":{"title":"Youtube","url":"https:\/\/www.youtube.com\/@EWUCybersecurity","target":"_blank"}}],"message":"<p>The EWU Cybersecurity Institute supports and coordinates research and education in information assurance and cyber defense in support of Eastern Washington University\u2019s teaching, learning, scholarly, and creative activity goals.<\/p>\n","association_badges":[{"image":{"ID":12145,"id":12145,"title":"CAE TRANSPARENT","filename":"CAE-TRANSPARENT-1-e1710865979643.png","filesize":150237,"url":"https:\/\/www.ewu.edu\/cstem\/wp-content\/uploads\/sites\/5\/2024\/02\/CAE-TRANSPARENT-1-e1710865979643.png","link":"https:\/\/www.ewu.edu\/cstem\/cybersecurity\/cyber-operations-bs\/cae-transparent-2\/","alt":"","author":"517","description":"","caption":"","name":"cae-transparent-2","status":"inherit","uploaded_to":9936,"date":"2024-02-12 03:10:54","modified":"2024-02-12 03:10:54","menu_order":0,"mime_type":"image\/png","type":"image","subtype":"png","icon":"https:\/\/www.ewu.edu\/cstem\/wp-includes\/images\/media\/default.png","width":355,"height":338,"sizes":{"thumbnail":"https:\/\/www.ewu.edu\/cstem\/wp-content\/uploads\/sites\/5\/2024\/02\/CAE-TRANSPARENT-1-e1710865979643-150x150.png","thumbnail-width":150,"thumbnail-height":150,"medium":"https:\/\/www.ewu.edu\/cstem\/wp-content\/uploads\/sites\/5\/2024\/02\/CAE-TRANSPARENT-1-e1710865979643-300x286.png","medium-width":300,"medium-height":286,"medium_large":"https:\/\/www.ewu.edu\/cstem\/wp-content\/uploads\/sites\/5\/2024\/02\/CAE-TRANSPARENT-1-e1710865979643.png","medium_large-width":355,"medium_large-height":338,"large":"https:\/\/www.ewu.edu\/cstem\/wp-content\/uploads\/sites\/5\/2024\/02\/CAE-TRANSPARENT-1-e1710865979643.png","large-width":355,"large-height":338,"1536x1536":"https:\/\/www.ewu.edu\/cstem\/wp-content\/uploads\/sites\/5\/2024\/02\/CAE-TRANSPARENT-1-e1710865979643.png","1536x1536-width":355,"1536x1536-height":338,"2048x2048":"https:\/\/www.ewu.edu\/cstem\/wp-content\/uploads\/sites\/5\/2024\/02\/CAE-TRANSPARENT-1-e1710865979643.png","2048x2048-width":355,"2048x2048-height":338,"gform-image-choice-sm":"https:\/\/www.ewu.edu\/cstem\/wp-content\/uploads\/sites\/5\/2024\/02\/CAE-TRANSPARENT-1-e1710865979643.png","gform-image-choice-sm-width":300,"gform-image-choice-sm-height":286,"gform-image-choice-md":"https:\/\/www.ewu.edu\/cstem\/wp-content\/uploads\/sites\/5\/2024\/02\/CAE-TRANSPARENT-1-e1710865979643.png","gform-image-choice-md-width":355,"gform-image-choice-md-height":338,"gform-image-choice-lg":"https:\/\/www.ewu.edu\/cstem\/wp-content\/uploads\/sites\/5\/2024\/02\/CAE-TRANSPARENT-1-e1710865979643.png","gform-image-choice-lg-width":355,"gform-image-choice-lg-height":338}},"image_alt":"Center of Academic Excellence in Cybersecurity","link":""}],"component_options_toggle":false,"component_options":{"disable_component":false,"nickname":"","identifier":"","navigable":false}}],"secondary_nav_menu_type":"menu","secondary_nav_menu":"cybersecurity","page_hide_sidebar":false,"page_enable_page_nav":false,"intro_title":"","page_override_title":"","page_persona_bar_default_tab":""},"_links":{"self":[{"href":"https:\/\/www.ewu.edu\/cstem\/wp-json\/wp\/v2\/pages\/12983","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.ewu.edu\/cstem\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.ewu.edu\/cstem\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.ewu.edu\/cstem\/wp-json\/wp\/v2\/users\/462"}],"replies":[{"embeddable":true,"href":"https:\/\/www.ewu.edu\/cstem\/wp-json\/wp\/v2\/comments?post=12983"}],"version-history":[{"count":34,"href":"https:\/\/www.ewu.edu\/cstem\/wp-json\/wp\/v2\/pages\/12983\/revisions"}],"predecessor-version":[{"id":87623,"href":"https:\/\/www.ewu.edu\/cstem\/wp-json\/wp\/v2\/pages\/12983\/revisions\/87623"}],"up":[{"embeddable":true,"href":"https:\/\/www.ewu.edu\/cstem\/wp-json\/wp\/v2\/pages\/5152"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.ewu.edu\/cstem\/wp-json\/wp\/v2\/media\/12818"}],"wp:attachment":[{"href":"https:\/\/www.ewu.edu\/cstem\/wp-json\/wp\/v2\/media?parent=12983"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}