PAGE 88 • 2024 STATE TECHNICAL STANDARDS SERIES: OCCUPATIONAL SUPPORT TRADES B CONTEST: CYBERSECURITY, CONTEST: CYBERSECURITY, LIMITED DEMO LIMITED DEMO Series Director: KATIE CUNNINGHAM • 508-529-7758 EXT. 2012 • [email protected] Competition: Blackstone - TBD with Event Manager: TBD REQUIREMENTS AND SCOPE OF CONTEST Advisors will be sent log-on information for the Learning Management System Learning Management System, which will be open on April 10. Contestants must submit an electronic copy of their resumé to the LMS LMS by April 22, by 5:00pm. Clothing Requirements: avoid a clothing penalty Black dress pants NO jeans or leggings Black shoes, no heels NO sneakers White polo shirt, or official SkillsUSA polo shown NO cell phones or SmartWatches allowed Tool Requirements: Contestants must submit online a one-page type-written resume, failure to do so will result in a 50-point penalty 1. Supplied by the technical committee: This includes all reference materials, diagrams, and instruction required for the contest Switch fabric for network connectivity Personal computers Network server system Hardware firewalls Network cables Console cables Wireless access points Wireless network capability Tablet PCs/smartphone Autopsy software (installed) AccessData FTK Imager (installed) USB thumb drives Write blocker device SD card reader Bootable Kali USB thumb drives WiFi adapters capable of promiscuous mode operation Log files from PCs, access points, servers, and routers USB thumb drives, L2/L3 managed switches, enterprise routers, Putty software 2. Supplied by the contestant: Resumé Blank paper Pen or pencil Skill Performance: This portion of the competition consists of several provisioning, testing, deployment, operational and maintenance, and protection and defensive procedures, with the end goals set by the technical committee. Contestants must successfully complete assigned tasks at several independent activity stations. The tasks are designed to provide a variety of cyber security challenges based on the recommended best practices of the industry. Approximately 45 minutes are allowed at each station. Contest Guidelines: 1. The contest requires a team of two: Each will have to display equivalent subject matter expertise in all competency areas. 2. Each contestant in the team will cycle through the following activity stations. You will be given 45 minutes at each station. a) End-Point Security Station: Contestants will display knowledge of industry standard processes and procedures for hardening an end-point or stand-alone computing device. b) Enterprise Router Security: This task contains activities associated with accessing an enterprise switch and router, configuring them to create network security structures and establish security for the devices themselves. c) Server Hardening: This task contains activities related to hardening servers against attack. d) Network Boundary Security: This task contains activities related to installing and configuring typical network boundary devices and structures to form an effective network zone or edge security systems. e) Wireless Security: This task contains activities related to installing, configuring and securing wireless access points and mobile devices. f) Network Forensics: This task contains activities related to network forensic activities associated with Incident Response Actions. Contestants will use appropriate measures to collect information from a variety of sources to identify, analyze and report cyber events that occur (or might occur) to protect information, information systems, and networks from cyber threats. g) Pen Testing: This task contains activities related to the process of penetration testing. The contestant will plan, prepare, and execute tests of systems to evaluate results against specifications and requirements as well as analyze and report on test results. Online Online Resumé Resumé Submission Submission