REPRESENT IT
  • About
  • Register
  • Team
  • Speakers
  • Contact

PROGRAM DATES                                                  

First Session - COMPLETED        ​
February 27th; February 28th; March 6th; March 7th

Second Session -  COMPLETED
March 13th; March 14th; March 20th; March 21st

Third Session - COMPLETED
March 27th; March 28th; April 3rd; April 4th
Represent IT - Office Hours Session


Fourth Session - COMPLETED
April 10th; April 11th; April 17th; April 18th

Fifth Session - COMPLETED
April 24th; April 25th; May 1st; May 2nd

​ DAILY SCHEDULE

Day One: Introduction to CyberSecurity
Day Two: Coding in Python
Day Three: Understanding Forensics 
Day Four:  Introduction to Virtual Machines and Linux


10 : 00 - 11 : 00 AM  
Program Introductions and Guest Speakers

11 : 00 - 11 : 10 AM  Break

11 : 10 -  11 : 40 AM   
CyberSecurity Lectures

11 : 40 - 12 : 10 PM    
Hands-On Components with CyberStart Game

12 : 10 -  1 : 00 PM  Lunch Break and Q/A Sessions

1 : 00 - 1 : 30 PM       
CyberSecurity Lectures Continued

1 : 30 - 2 : 00 PM      
Hands-On Components with CyberStart Game Continued

2 : 00 - 2 : 10 PM   Break

2 : 10 - 3 : 00 PM      
Real-World Applications, Career Connections, and CyberSecurity Opportunities

Represent IT is a free and virtual CyberSecurity-based program meant to encourage interest in the field, bring to light the need for increased representation in IT, provide educational resources for students to learn critical CyberSecurity concepts, and give participants opportunities to network with guest speakers from the industry and learn from their experiences in the field.

WHAT YOU WILL LEARN...

LINUX

Linux is an operating system that is free and open-source, meaning that anyone can look through its code. Getting to know Linux is important, as most security tools are built for the Linux operating system.

CRYPTOGRAPHY & FORENSICS

Computer forensics is the process of examining digital media in order to identify, preserve, recover, and analyze, then presenting facts about that digital information, while Cryptography refers to the study of secure communications techniques

PYTHON

Learning to program is a key step in understanding how computers work, with many programs being created to help create tools to complete tasks quickly and efficiently. Python is simple and easy to learn a language that is used regularly by professionals in information security.

PROGRAM BENEFITS

Join a Community

Meet with other girls interested and excited about CyberSecurity and Technology, and network with professionals in the industry!

Build Skills & Add to your Resume

Learn real-world skills in CyberSecurity and add a certificate of completion to your resume when you attend all days of a program session

Win & Receive Cool Prizes

Attend all days of a program session to receive a swag bag and compete in a CyberSecurity competition on the final day of the program to win prizes and show-off your CyberSecurity knowledge!

Connect with us on Instagram!

Copyright © 2020 Represent IT

  • About
  • Register
  • Team
  • Speakers
  • Contact