Skip to main content

Breadcrumb

  1. ACCESS Home
  2. Support
  3. Knowledge Base
  4. Knowledge Base Resources

Knowledge Base Resources

These resources are contributed by researchers, facilitators, engineers, and HPC admins. Please upvote resources you find useful!
Add a Resource

Filters

Topics

  • Show all (35)
  • (-) cybersecurity (12)
  • training (4)
  • data-security (3)
  • community-outreach (2)
  • encryption (2)
  • resources (2)
  • data-compliance (1)
  • lustre (1)
  • mpi (1)
  • openmp (1)
  • parallelization (1)
  • performance-tuning (1)
  • professional-development (1)
  • profiling (1)
  • secure-data-architecture (1)
  • workforce-development (1)

Topics

  • Show all (35)
  • (-) cybersecurity (12)
  • training (4)
  • data-security (3)
  • community-outreach (2)
  • encryption (2)
  • resources (2)
  • data-compliance (1)
  • lustre (1)
  • mpi (1)
  • openmp (1)
  • parallelization (1)
  • performance-tuning (1)
  • professional-development (1)
  • profiling (1)
  • secure-data-architecture (1)
  • workforce-development (1)

If you'd like to use more filters, please login to view them all.

An Introduction to Cryptography with Python
2
  • Workshop Tutorial
This comprehensive workshop is designed to guide participants through the world of cryptography, from foundational concepts to advanced implementations. Starting with the basics of encryption, decryption, and hashing, the workshop discusses real-world applications like SSL, blockchain, and digital signatures. Interactive Python-based coding examples, such as symmetric and asymmetric encryption, will provide hands-on experience. Participants will also learn to identify cryptographic vulnerabilities and perform attacks like length extension. Finally, the workshop also explores future trends such as quantum cryptography and zero-knowledge proofs, providing participants with the knowledge to apply cryptography in securing modern digital systems. Ideal for beginners and intermediate learners alike, this workshop is a step-by-step journey into mastering cryptographic principles and practices.
pythondata-securitycybersecurityencryptionsecure-data-architecture
2 Likes

Login to like
Type
website
Level
Beginner, Intermediate
NCSA HPC Training Moodle
1
  • NCSA HPC Training Moodle Site
Self-paced tutorials on high-end computing topics such as parallel computing, multi-core performance, and performance tools. Other related topics include 'Cybersecurity for End Users' and 'Developing Webinar Training.' Some of the tutorials also offer digital badges. Many of these tutorials were previously offered on CI-Tutor. A list of open access training courses are provided below. Parallel Computing on High-Performance Systems Profiling Python Applications Using an HPC Cluster for Scientific Applications Debugging Serial and Parallel Codes Introduction to MPI Introduction to OpenMP Introduction to Visualization Introduction to Performance Tools Multilevel Parallel Programming Introduction to Multi-core Performance Using the Lustre File System
performance-tuningprofilingparallelizationlustretrainingworkforce-developmentopenmppythonmpicybersecurity
1 Like

Login to like
Type
learning
Level
Beginner, Intermediate
Trusted CI
0
  • Trusted CI
The mission of Trusted CI is to lead in the development of an NSF Cybersecurity Ecosystem with the workforce, knowledge, processes, and cyberinfrastructure that enables trustworthy science and NSF’s vision of a nation that is a global leader in research and innovation.
cybersecuritytraining
0 Likes

Login to like
Type
website
Level
Beginner, Intermediate, Advanced
Cybersecurity Guide
0
  • Cybersecurity Guide
Cybersecurity Guide is a comprehensive resource for students and early career professionals that provides users with a wide range of resources and up-to-date information on cybersecurity, including cybersecurity degree programs and bootcamps, career guides, as well as online courses and training opportunities. Additionally, it covers trends, best practices, and much more.
resourcestrainingdata-securitycybersecurity
0 Likes

Login to like
Type
website
Level
Beginner, Intermediate, Advanced
Research Security Operations Center at IU
0
  • Research Security Operations Center
The NSF-funded ResearchSOC helps make scientific computing resilient to cyberattacks and capable of supporting trustworthy, productive research through operational cybersecurity services, training, and information sharing necessary to a community as unique and variable as research and education (R&E). ResearchSOC is a service offering from Indiana University's OmniSOC.
cybersecurity
0 Likes

Login to like
Type
website
Level
Beginner, Intermediate, Advanced
Cyber Security
0
  • Study Guides
learning cybersecurity is crucial for personal protection, safeguarding digital assets, financial security, and national security. It is important when it comes to consumer data protection for business, creating long lasting relationships with customers.
trainingdata-securitycybersecuritydata-complianceencryption
0 Likes

Login to like
Type
learning
Level
Beginner
Trusted CI Resources Page
0
  • Trusted CI Resources Page
Very helpful list of external resources from Trusted CI
cybersecurity
0 Likes

Login to like
Type
website
Level
Beginner, Intermediate, Advanced
Educause HEISC-800-171 Community Group
0
  • Educause HEISC-800-171 Community Group
The purpose of this group is to provide a forum to discuss NIST 800-171 compliance. Participants are encouraged to collaborate and share effective practices and resources that help higher education institutions prepare for and comply with the NIST 800-171 standard as it relates to Federal Student Aid (FSA), CMMC, DFARS, NIH, and NSF activities.
cybersecurity
0 Likes

Login to like
Type
website
Level
Beginner, Intermediate, Advanced
Regulated Research Community of Practice
0
  • Regulated Research Community of Practice
The daily news clearly shows the increasing threat to safety and privacy of data, personal as well as intellectual property. While the requirements such as DFARS 7012, HIPAA, and Cybersecurity Maturity Model Certification (CMMC) improve the consistency of data handling between agencies and contractors and grantees, it leaves academic institutions to figure out how to meet such requirements in a cost-effective way that fits the research and education mission of the institution. Most institutions, agencies, and companies act in isolation with one-off contract language to address data security and safeguarding concerns. Even though cybersecurity has a clear and uniform goal of protecting data, a onesize solution does not fit all academic institutions. By supporting this community with development of a community strategic roadmap, regular discussions and workshops, and a repository of generalized and specific resources for handling regulated research programs RRCoP lowers the barrier to entry for institutions handling new regulations.
community-outreachcybersecurity
0 Likes

Login to like
Type
website
Level
Beginner, Intermediate, Advanced
Master’s in Cybersecurity Degree Essentials
0
  • Master’s in Cybersecurity Degree
  • Take the lead: Find Online Cybersecurity Master’s Programs
Offers comprehensive information on various master's degree options in cybersecurity, including program details, admission requirements, and career opportunities, helping students make informed decisions about pursuing an advanced degree in cybersecurity.
resourcesprofessional-developmentcybersecurity
0 Likes

Login to like
Type
website
Level
Beginner, Intermediate, Advanced