My title Page contents

LSU Cyber Program Adds Digital Forensics, Industrial Systems

Louisiana State University is gearing up to expand its cybersecurity programming to train participants to defend against large-scale attacks on enterprise and control systems.

According to a news release, a $350,000 grant from the Louisiana Board of Regents Cybersecurity Talent Initiative Fund and $100,000 from industry partners is contributing to the next stage of LSU’s FIREStarter program, an initiative established last year with the launch of a lab for cyber range exercises simulating real-time cyber attacks. The announcement said the new funding will go toward digital forensics and industrial control systems technologies, expanding the university’s cybersecurity course offerings, and future research on industrial control systems security.

LSU’s computer science professor Golden Richard III, principal investigator on the project and director of LSU’s Applied Cybersecurity Lab, said in a public statement that the new lab will be an entirely hands-on experience.

“We will be putting the same software and hardware components in the lab that digital forensics practitioners use on a day-to-day basis to work real cases. It’s our anticipation that every student in the cybersecurity concentration, plus any other interested computer science students [and possibly more from other disciplines], will have the opportunity to be exposed to state-of-the-art hardware and software tools for digital forensics and industrial control systems,” Richard said. “From the industrial control systems [side], we will have both equipment for teaching students the basics of programming PLCs, as well as small-scale ‘simulations’ of real industrial control systems, e.g., a water-treatment plant, power plant, etc. These are really cool and on roll-away carts, with the real hardware tucked inside. This means that you can formulate real attacks and defenses and see if they work.”

According to the announcement, the FIREStarter 2 funding comes shortly after LSU President William Tate IV launched LSU’s Scholarship First Agenda, which aims to bolster cybersecurity and cyber defense programming at the university in the years ahead. Richard said the goal of the FIREstarter 2 program is to develop homegrown IT talent in Louisiana.

“Louisiana is loaded with industrial control systems — chemical, petroleum, et al.,” he said in a public statement. “Teaching students to defend these systems, and ultimately creating a local workforce that can tackle this challenge, is practically a no-brainer if the resources are available to do it. And now they are. From a digital forensics standpoint, there are virtually no digital forensics firms left in Louisiana. All the practitioners have been slurped up by bigger firms. We’d like to change that and repopulate Louisiana with brilliant digital forensics practitioners.”

The announcement said Richard and Andrew Case, senior cybersecurity consultant in the LSU Applied Cybersecurity Lab, will soon represent the university at one of the largest IT security events later this year at the Black Hat conference in Las Vegas, at which they’ll lead a presentation, “New Memory Forensics Techniques to Defeat Device Monitoring Malware.” In 2021, they delivered a presentation on “Fixing a Memory Forensics Blind Spot: Linux Kernel Tracing.”

“LSU’s applied cybersecurity program produces the best memory forensics research in the world,” Richard said in a statement. “That’s one of our primary strengths, and both Black Hat talks present(ed) cutting-edge memory forensics work aimed at detecting stealthy malware. Presenting at Black Hat provides amazing exposure for the program, as the conference is attended by thousands of cybersecurity professionals from academia, industry and government.”

Computer Forensics Report
Computer Forensics

Computer Forensics Report: Unveiling the Digital Trail

In the world of digital investigations, a computer forensics report is the linchpin that transforms complex technical findings into a comprehensible narrative. It serves as a crucial document, providing a systematic account of the methods, findings, and conclusions derived from a digital forensic examination. In this article, we delve into the intricacies of computer forensics […]

Read More
Memory Forensics Demystified
Computer Forensics

Unearthing Digital Secrets: Memory Forensics Demystified

Memory Forensics Demystified. In the realm of digital investigations, Memory Forensics stands as a beacon of revelation. This intricate discipline, often akin to a digital autopsy, involves the meticulous analysis of a computer’s volatile memory. It’s where secrets, once thought buried, come to light. The Symphony of Binary Fragments Memory forensics delves into the ephemeral […]

Read More
Digital Evidence Laws
Computer Forensics

Deciphering the Legal Landscape: Digital Evidence Laws

Digital Evidence Laws. In the fast-paced digital age, the trail of evidence is no longer confined to physical documents or tangible objects. Digital evidence has become the cornerstone of modern investigations, offering a treasure trove of insights into cybercrimes, corporate malfeasance, and more. However, this digital frontier brings with it a host of legal complexities […]

Read More
Open chat
Iam Guest Posting Service
I Have 600 Site
Status : Indexed All
Good DA : 40-60
Different Nice I Category
Drip Feed Allowed
I can instant publish

My Service :
1. I will do your orders maximum of 1X24 hours, if at the time i’am online. I will do a maximum of 1 hour and the process is complete.
2. If any of you orders are not completed a maximum of 1x24 hours, you do not have to pay me, or free.
3. For the weekend, I usually online, that weekend when i’am not online, it means i’am working Monday.
4. For the payment, maximum payed one day after published live link.
5. Payment via paypal account
If you interesting, please reply
Thank You