Tech EDGE: CS4NE with Special Guests, Zaid Kakish and Tom Knudsen from Nullify at UNO
Tech EDGE
Author
03/04/2025
Added
0
Plays
Description
Kimberly and Guy chat with University of Nebraska-Omaha students Zaid Kakish and Tom Knudsen about their organization, Nullify, and the field of cybersecurity. Computer Science for Nebraska (CS4NE) University of Nebraska-Lincoln (UNL) Technology (Tech) Education In Digital and Global Environments (EDGE)
Innovation in Teacher Education
College of Education and Human Sciences | Department of Teaching, Learning and Teacher Education
Searchable Transcript
Toggle between list and paragraph view.
- [00:00:00.000](upbeat music)
- [00:00:06.090]Hi, I'm Guy Trainin
- [00:00:07.770]from the University of Nebraska-Lincoln.
- [00:00:10.770]And I'm Kimberly Ingraham-Beck from Gretna Public Schools.
- [00:00:13.999]And this is CS4NE.
- [00:00:16.710]And today we're talking to a couple
- [00:00:19.680]of students from Nullify.
- [00:00:21.630]Tell us a little bit about Nullify.
- [00:00:23.790]Yeah, so Nullify is a student-run
- [00:00:26.880]like group at UNO and they focus on cybersecurity.
- [00:00:31.350]So, they focus on helping spread information
- [00:00:34.650]about cybersecurity, but also,
- [00:00:37.890]not just at the collegiate level,
- [00:00:39.270]but they also hold an event every year
- [00:00:41.910]for high school students called Capture the Flag,
- [00:00:44.970]where it's a competition where students
- [00:00:48.630]solve problems and get a key
- [00:00:51.240]or a passphrase, which is called the flag.
- [00:00:54.750]And so it's super fun
- [00:00:57.210]And they often talk about it as CTF.
- [00:00:59.970]So, if you hear CTF, this is what they mean.
- [00:01:02.700]And I'm really excited
- [00:01:04.500]because I love the fact that students
- [00:01:06.720]who are actually becoming professionals in cybersecurity,
- [00:01:10.740]one of those areas that I know almost nothing about.
- [00:01:13.410]So, everything is a learning experience for me at least.
- [00:01:15.900]And I think for many teachers, if you just started
- [00:01:18.210]with computer science and you're just teaching programming
- [00:01:21.510]and algorithms and those kind of things,
- [00:01:24.210]cybersecurity sounds really far away,
- [00:01:26.940]but it is an emerging field.
- [00:01:28.500]It is exciting
- [00:01:29.550]and I'm excited to hear what they have to say.
- [00:01:32.340]Tell us a little bit about yourself
- [00:01:34.950]and your experience in cybersecurity.
- [00:01:37.770]So, hi, my name is Zaid Kakish.
- [00:01:39.420]I'm a current senior at the University of Nebraska, Omaha,
- [00:01:42.630]pursuing a dual degree
- [00:01:43.650]in computer science and cybersecurity.
- [00:01:46.650]A little bit about my experience in cybersecurity.
- [00:01:48.930]I'm currently working as an intern
- [00:01:51.120]in the software engineering and a little bit
- [00:01:52.590]of cybersecurity at MITRE.
- [00:01:54.840]I started off my career
- [00:01:56.310]as an intern at American National Bank, worked a lot
- [00:01:58.530]with cybersecurity and auditing
- [00:02:00.270]and then moved here to MITRE now where I am doing
- [00:02:03.780]and I'm really happy about the work I am doing.
- [00:02:06.150]Hello, I'm Tom Knudsen, I'm also a senior.
- [00:02:08.910]I major in cybersecurity and I'll be graduating this May.
- [00:02:14.380]I've been experiencing cybersecurity
- [00:02:17.550]basically ever since high school.
- [00:02:20.370]My high school had a CyberPatriots club,
- [00:02:24.150]it was through the Air Force where we messed
- [00:02:28.230]with different operating systems
- [00:02:31.200]and tried to figure out some different
- [00:02:34.500]like challenges through them.
- [00:02:36.510]Then in high school I joined Nullify
- [00:02:38.940]and then participated in the club.
- [00:02:41.760]And then through work experience,
- [00:02:44.400]this past summer, I worked at NCITE,
- [00:02:46.200]the National Counterterrorism Innovation, Technology
- [00:02:48.570]and Education Center over here on campus.
- [00:02:52.710]I worked in the Student Security Operations Center
- [00:02:54.870]using Splunk and Cortex XDR
- [00:02:58.200]to do threat hunts on the environment
- [00:03:01.110]and create dashboards.
- [00:03:02.430]Very cool. That's great.
- [00:03:04.470]So, could you tell us a little bit about Nullify?
- [00:03:07.650]Yeah. So, Nullify is our cybersecurity club at UNL.
- [00:03:11.250]We give talks twice a week.
- [00:03:12.840]We do an introduction once they talk
- [00:03:14.850]where we introduce students to new tools in cybersecurity.
- [00:03:18.060]Just kind of get them dipping their toes into the field,
- [00:03:21.120]messing around with different tools
- [00:03:22.440]so they can learn more on the extracurricular site.
- [00:03:26.880]On Fridays we do our advanced talk
- [00:03:28.740]where we cover more advanced tools.
- [00:03:30.990]We talk about recent trends in the fields.
- [00:03:33.510]For example, we did an RFID talk one time
- [00:03:35.790]about radio frequency, how you could clone RFID.
- [00:03:38.700]It was really fun to see,
- [00:03:39.780]a lot of students were really interested.
- [00:03:41.700]Just last week we had a Man-in-the-Middle attack demo.
- [00:03:44.460]I led that talk, it was really fun,
- [00:03:46.230]it showed how you can eavesdrop
- [00:03:48.570]onto different networks and listen in
- [00:03:50.700]about the packets are being sent as such.
- [00:03:53.730]Other than that, we do a lot
- [00:03:54.563]of Capture the Flag competitions.
- [00:03:56.010]So, we participate against other colleges,
- [00:03:58.170]other universities, just other institutions across the US,
- [00:04:01.620]and we participate in these Capture the Flag challenges,
- [00:04:04.620]which essentially test our hacking skills.
- [00:04:07.260]There are different categories, forensics,
- [00:04:09.360]password cracking, open-source intelligence,
- [00:04:12.600]all you can think of about cybersecurity.
- [00:04:14.160]And we participate in those challenges.
- [00:04:15.540]We compete and we win prizes. We sometimes go to finals.
- [00:04:20.250]It's a really fun challenge
- [00:04:21.240]and we really do those a lot at Nullify.
- [00:04:23.820]All right. So, what are the primary goals of Nullify?
- [00:04:27.660]So, our goal is to introduce students to cybersecurity,
- [00:04:31.650]if they are new, if they're already experienced,
- [00:04:34.080]we're looking to build their skillset
- [00:04:35.880]and help them improve in all aspects of cybersecurity.
- [00:04:38.850]We also want students to connect with network professionals
- [00:04:41.370]across the cybersecurity industry field.
- [00:04:44.430]We host a lot of guest talks with students
- [00:04:46.980]to help them connect more.
- [00:04:48.690]So for example,
- [00:04:49.560]we had the chief information security officer
- [00:04:51.840]at First National Technology Services
- [00:04:54.480]come in and give a talk.
- [00:04:56.100]We had Gallup come in and give a talk.
- [00:04:58.140]And then we have a few other people
- [00:05:00.780]from the cybersecurity industry that are coming
- [00:05:02.400]to give talks this upcoming semester.
- [00:05:04.290]So, we have a cybersecurity manager from Protiviti
- [00:05:07.050]coming in to talk to students
- [00:05:08.790]and introduce them about different aspects of cybersecurity,
- [00:05:11.460]how AI also plays into cybersecurity,
- [00:05:13.470]which is a really advancing field, and more.
- [00:05:16.530]So, we aim to really build that network
- [00:05:19.530]with students and cybersecurity professionals.
- [00:05:21.840]And then lastly, we want students
- [00:05:22.860]to have fun in cybersecurity.
- [00:05:24.240]That's why we introduced the CTFs.
- [00:05:26.610]We want them to compete and have fun
- [00:05:28.560]and really learn cybersecurity
- [00:05:30.090]in that practical environment.
- [00:05:31.740]I would also like to add, we have had,
- [00:05:33.480]like coming to give talks,
- [00:05:34.313]we also had the local FBI office come and give a talk.
- [00:05:37.530]One of the,
- [00:05:39.466]I think it was the computer scientist on their team,
- [00:05:42.240]he is a Nullify alumnus, so we've been able
- [00:05:44.400]to keep in contact with him
- [00:05:45.600]and bring him in to help give talks
- [00:05:47.460]and like talk about federal workforce.
- [00:05:49.920]That's super cool.
- [00:05:52.020]So, speaking of your Capture the Flag event
- [00:05:54.360]that you're hosting, what kind of challenges
- [00:05:56.670]can high school students expect to encounter?
- [00:05:58.950]Yeah, so our Capture the Flag event
- [00:06:00.390]will host six different categories.
- [00:06:02.460]We are looking to do forensics, password cracking,
- [00:06:05.520]log analysis, cryptography, OSINT,
- [00:06:08.610]a little bit of miscellaneous as well.
- [00:06:11.190]So, all sorts of challenges
- [00:06:12.690]across the cybersecurity industry.
- [00:06:15.270]A lot of challenges that we see are gonna be similar
- [00:06:17.820]to things that we would compete in at the college
- [00:06:20.850]and university level.
- [00:06:22.020]So, we are taking inspiration from challenges that we see
- [00:06:25.170]and essentially writing our own challenges
- [00:06:27.690]that we wanna direct towards high schools
- [00:06:30.180]and give them those challenges across all those categories.
- [00:06:33.000]Just to let them, you know,
- [00:06:34.170]dip their toes in all these different categories
- [00:06:36.030]in cybersecurities and cybersecurity
- [00:06:37.890]that they might see.
- [00:06:39.840]So, we will be doing challenges, all sorts from easy to hard
- [00:06:43.950]and we will be providing the resources
- [00:06:45.570]for the students to practice.
- [00:06:47.430]And so when they come in for the day of the event,
- [00:06:50.070]they are ready to go at a moments notice.
- [00:06:52.230]We will be providing the tools in the environments
- [00:06:55.050]so all the tools that they will use and learn
- [00:06:57.210]will be on the machines that we provide them.
- [00:06:59.730]And then, as I mentioned, the challenge will be easy
- [00:07:01.650]to hard and then we will have five challenges
- [00:07:03.810]for each of the categories.
- [00:07:05.700]Awesome.
- [00:07:06.533]And when is the Nullify Capture the Flag
- [00:07:10.380]for high school student events?
- [00:07:12.330]So, the Capture the Flag is right now scheduled
- [00:07:14.250]for Saturday, March 15th.
- [00:07:16.590]We are looking to have it from 9:00 AM to 4:00 PM,
- [00:07:19.710]just have the students coming into PKI
- [00:07:23.010]and, you know, participate there.
- [00:07:24.930]We will be providing lunch and breakfast
- [00:07:27.300]and they will be spending the entire day there.
- [00:07:29.640]We will also do 15 minute small talk intervals
- [00:07:32.130]where officers of Nullify will give a talk
- [00:07:34.980]about the different categories
- [00:07:36.600]and a little bit about the tools they're gonna use.
- [00:07:38.940]So for example, if we were talking
- [00:07:40.470]about a password cracking category, we would have one
- [00:07:43.770]of our officers talk about the tools such as Hashcat
- [00:07:45.990]or John the Ripper where, you know,
- [00:07:48.060]they would just do a quick demo,
- [00:07:49.440]cover what they are and how they could use them
- [00:07:51.780]in the challenges.
- [00:07:53.370]Other than that, the students will be participating
- [00:07:55.290]in those challenges.
- [00:07:56.280]We are gonna have a total about 30 challenges
- [00:07:59.010]so students can expect
- [00:08:00.480]to get really busy on Saturday with the challenges.
- [00:08:03.300]Should be really fun, really excited. Yeah.
- [00:08:06.810]That sounds fantastic.
- [00:08:09.060]I wanna kind of zoom out a little bit
- [00:08:12.930]and ask why do you think cybersecurity is such a critical,
- [00:08:17.670]I think we all know that it's critical
- [00:08:19.530]because we're all trying to protect ourselves online,
- [00:08:22.140]but why is it in such demand as a field?
- [00:08:26.580]I think it's in big demand
- [00:08:28.200]because every place, everywhere, needs security.
- [00:08:31.140]Whether, or it needs security protection,
- [00:08:33.360]data needs to be encrypted no matter where you are.
- [00:08:35.670]Whether it's by personally identifiable information
- [00:08:40.350]or just anything that's very sensitive needs to be secured
- [00:08:43.860]and there needs to be a correct way of handling that
- [00:08:46.590]and basically communicating with it.
- [00:08:49.650]Yeah, any field just needs some sort of cybersecurity in it
- [00:08:52.800]to protect it from outside threats over networks
- [00:08:57.810]or just over the internet and anything like that.
- [00:08:59.937]And I would like to also add one thing.
- [00:09:01.620]You see a lot of data breaches that are happening.
- [00:09:03.810]So, especially the medical field, you see a lot
- [00:09:07.080]of people targeting ransomware towards the medical field
- [00:09:09.630]to try and shut down the systems.
- [00:09:12.000]This goes to show how really important cybersecurity is
- [00:09:14.220]'cause if you can shut down a medical environment
- [00:09:16.800]for two days, that is really dangerous
- [00:09:18.930]and a lot of lives can be lost.
- [00:09:20.880]So, with cybersecurity being, you know, really important,
- [00:09:24.150]we need to defend those systems
- [00:09:25.980]and make it so that this attack never happens
- [00:09:28.440]in the first place.
- [00:09:29.700]So, cybersecurity can really save lives,
- [00:09:31.410]if you look at it from, really, an outside field,
- [00:09:34.080]especially like in the medical field, you know,
- [00:09:36.510]there's the financial field as well.
- [00:09:38.730]You wanna protect against breaches
- [00:09:42.150]with people's credit cards and information.
- [00:09:44.040]So, you don't want that fraud to happen.
- [00:09:46.020]So, cybersecurity really applies, you know,
- [00:09:48.306]and you see these attacks happening on a daily basis.
- [00:09:49.980]So, it is really more important now than ever.
- [00:09:52.950]And backing off of that as well,
- [00:09:54.360]not just like medical field
- [00:09:56.400]or financial field, just any critical infrastructure
- [00:09:59.217]is always being targeted by data breaches.
- [00:10:01.560]In the past we've seen...
- [00:10:05.250]What was I saying?
- [00:10:06.083]We've seen like national gas lines being targeted
- [00:10:09.930]by ransomware attacks or breaches and stuff like that.
- [00:10:13.530]And we've seen school systems face the same thing.
- [00:10:16.260]We've had, actually, what was it?
- [00:10:17.760]Last year, a school system
- [00:10:19.770]that had to close down because of ransomware
- [00:10:22.110]and they didn't have control over any of their data.
- [00:10:25.050]Nothing worked.
- [00:10:26.310]And so they actually asked the kids to stay home for a day
- [00:10:29.610]or two until they got everything back online.
- [00:10:32.130]So, it hits multiple systems in ways that are hard
- [00:10:36.570]to predict, but we all need that kind of protection
- [00:10:40.050]to minimize everything.
- [00:10:42.720]All right.
- [00:10:43.770]Yeah.
- [00:10:44.790]So, what advice would you give to high school students
- [00:10:47.310]who are maybe interested
- [00:10:48.360]in pursuing a career in cybersecurity?
- [00:10:51.120]I would say my biggest advice is start early.
- [00:10:54.090]Do your research, explore the areas
- [00:10:56.280]that you think you're interested in.
- [00:10:58.680]In high school, if I would give one advice
- [00:11:00.390]to myself back in high school is I would try
- [00:11:02.760]and get into Capture the Flag competitions.
- [00:11:05.280]These competitions really boosted my skill
- [00:11:07.950]more than anything in cybersecurity.
- [00:11:10.020]They will put you in that practical environment
- [00:11:11.820]and get you set up.
- [00:11:13.020]So, what I would recommend is look for open gyms
- [00:11:15.750]that are open 24/7 for CTFs, practice some challenges,
- [00:11:19.530]you know, if there are some aspects you're,
- [00:11:21.510]for example, you're interested
- [00:11:22.343]in cracking passwords, for example.
- [00:11:24.480]Do some research on that.
- [00:11:25.590]You can find a lot of cool things on that
- [00:11:27.900]and then maybe you can network into other different things.
- [00:11:31.200]So, if you wanna build your own home lab,
- [00:11:33.060]that could pique the interest in there, for example.
- [00:11:36.007]Keep your mind open and, you know, do your research.
- [00:11:39.030]If you're interested in something, make sure to look it up
- [00:11:41.340]and really try and look into
- [00:11:43.260]those Capture the Flag competitions.
- [00:11:45.623]I mean, I completely agree with you.
- [00:11:47.820]I'd say always just try to learn something new.
- [00:11:51.960]Or go try find different categories of cybersecurity
- [00:11:55.113]that you would find interesting
- [00:11:56.580]or that you could see yourself doing for a career
- [00:11:59.640]and just start learning more about it.
- [00:12:02.160]Some parts, like some aspects
- [00:12:04.080]of cybersecurity you may not like.
- [00:12:05.760]Like when it comes to me, I don't like doing
- [00:12:10.860]any kinda like attack or like red-teaming things.
- [00:12:13.290]I more like to do policy compliance
- [00:12:16.110]and like risk compliance and stuff like that.
- [00:12:19.470]So, find an aspect of cybersecurity
- [00:12:21.180]that you could see yourself doing as a career
- [00:12:24.660]and kind of try to stick with it
- [00:12:25.677]and learn as much as you can about it.
- [00:12:28.680]That's great.
- [00:12:29.857]And so we talked about what kids can do
- [00:12:32.430]or what students can do,
- [00:12:33.690]how can teachers in school better support students
- [00:12:36.450]who are interested in exploring cybersecurity?
- [00:12:39.480]So, what's your message to teachers and principals
- [00:12:42.690]and, you know, curriculum specialists?
- [00:12:45.990]I would say try and introduce as much activities
- [00:12:48.390]as you can with cyber to your students.
- [00:12:50.400]So, if you find a CTF
- [00:12:53.040]that you think they might be interested in, you know,
- [00:12:55.800]absolutely let them participate in that.
- [00:12:57.780]When we participate in a lot
- [00:12:59.100]of those national/international CTFs, we actually see a lot
- [00:13:01.770]of high schools in there.
- [00:13:03.720]So you know, for teachers I would recommend, you know,
- [00:13:06.690]trying to do your research into that event,
- [00:13:08.460]into events like that and, you know,
- [00:13:10.530]maybe sign up a team for those events.
- [00:13:13.350]I would also say probably network
- [00:13:15.000]with different organizations across Omaha and Nebraska.
- [00:13:18.780]There's a lot of people that offer cybersecurity insight.
- [00:13:21.660]So, we as Nullify, have been trying to connect
- [00:13:23.790]with schools across the Omaha
- [00:13:25.800]and Lincoln area to, you know,
- [00:13:27.510]talk about cyber-awareness to their students.
- [00:13:30.720]There's a lot of other organizations
- [00:13:32.130]in Omaha that also do that.
- [00:13:33.600]So, I know ISC2 is a big chapter here in Omaha
- [00:13:37.200]that they do, I think every two months
- [00:13:39.330]they have a cybersecurity awareness talk.
- [00:13:41.430]Different presenters will come and give different topics.
- [00:13:44.340]I went to their meeting last week,
- [00:13:45.480]it was really fun and I learned a lot.
- [00:13:47.730]So, I would say just try
- [00:13:48.810]and network with those different organizations
- [00:13:50.700]and, you know, introduce your students
- [00:13:53.310]to those professionals and just build that network there,
- [00:13:56.100]pique their interest in cybersecurity.
- [00:13:58.440]It can be really fun.
- [00:13:59.623]I also recommend
- [00:14:00.570]just try like if you have any STEM-oriented
- [00:14:02.853]like oriented clubs or like classes,
- [00:14:05.280]whether it's like robotics or something similar,
- [00:14:07.470]try to incorporate cybersecurity topics within those clubs
- [00:14:10.920]or within like any pure science classes.
- [00:14:13.380]Whether it's like getting into
- [00:14:14.670]like a little bit of like password cracking
- [00:14:17.010]or just like some intro-level cybersecurity topics
- [00:14:20.910]that you think the kids would enjoy
- [00:14:22.710]and could actually like learn.
- [00:14:24.630]So, you mentioned you've been speaking
- [00:14:26.460]with some classes about cybersecurity topics
- [00:14:29.610]from across the Omaha and Lincoln area.
- [00:14:31.620]Is that something that teachers from outside
- [00:14:34.830]of those areas can also take advantage of?
- [00:14:38.280]Absolutely. We can definitely make something work.
- [00:14:40.110]So, we are more than happy to come in and give a talk
- [00:14:43.680]to your school and your students about cybersecurity.
- [00:14:46.170]What we do at our club, things we see, you know,
- [00:14:49.860]we had one about two weeks ago
- [00:14:52.560]and it was like an hour-long discussion.
- [00:14:54.600]It was really fun.
- [00:14:56.070]We chatted about cybersecurity,
- [00:14:57.320]we really delved into RFID, amongst other things.
- [00:15:00.810]So, it was really fun.
- [00:15:02.340]But yes, absolutely, we are open to connect with you
- [00:15:05.820]and talk to your students about different things
- [00:15:07.400]in cybersecurity, we will have to probably,
- [00:15:10.710]if it's a three-hour compute, for example,
- [00:15:13.060]we'll have to plan it ahead and schedule
- [00:15:15.090]so we can just make some arrangements to work with that.
- [00:15:20.675]Awesome. So, how can they get in touch with you?
- [00:15:23.160]So, the best way is reach me by my email.
- [00:15:25.800]So, my email is zkakish,
- [00:15:28.590]that's Z-K-A-K-I-S-H @unomaha.edu.
- [00:15:34.410]So, this is the best way to get in touch with me.
- [00:15:37.590]I always check my UNO emails, you know,
- [00:15:40.530]with classes I have to check them. (laughs)
- [00:15:42.660]So, I also use that for other professional things.
- [00:15:45.780]So, one of them is HSCTF
- [00:15:47.430]and talking to students across the different
- [00:15:50.010]schools in Omaha and Lincoln.
- [00:15:52.140]So, that's the best way to reach out to me.
- [00:15:55.290]Alternatively, we have our website nullify.uno.
- [00:16:00.864]We have a Contact Us page where you can send an email
- [00:16:03.510]to our official Nullify email.
- [00:16:05.910]We're still working on actually setting that up fully
- [00:16:08.520]because we've had a few issues in the past
- [00:16:11.640]just with setting up an Outlook email and such.
- [00:16:14.280]But we get those emails,
- [00:16:16.200]but the best way to contact me is through me,
- [00:16:18.540]and if not, there's also that Nullify website
- [00:16:22.050]and contact email.
- [00:16:23.850]All right, well, thank you so much for joining us today.
- [00:16:26.820]We really appreciate you taking the time.
- [00:16:29.610]Yeah, absolutely. Thank you for having us on the podcast.
- [00:16:31.830]It was fun.
- [00:16:32.700]All right. Wow, that was great.
- [00:16:34.920]I really appreciate them taking the time to talk to us.
- [00:16:38.340]Super cool learning that they're not only working on
- [00:16:42.810]teaching people about cybersecurity in their university,
- [00:16:46.020]but they're also expanding out.
- [00:16:48.000]So, if anyone wants them to come talk
- [00:16:50.760]to their students about cybersecurity,
- [00:16:52.500]even just to like give students a little intro
- [00:16:54.990]into what cybersecurity is, definitely hit them up.
- [00:16:57.750]Even if you're not anywhere close to the metro area,
- [00:17:00.840]they will do virtual meetings as well.
- [00:17:04.290]So, definitely hit them up.
- [00:17:06.150]And what I learned,
- [00:17:07.800]because, for me, most of this is new,
- [00:17:09.810]what I learned is that cybersecurity
- [00:17:13.860]is a field that is emerging.
- [00:17:16.080]It seems like AI is not solving that.
- [00:17:18.600]And there's a need to a tremendous number of professionals.
- [00:17:22.500]And obviously, because every organization
- [00:17:25.050]that has an online presence needs somebody
- [00:17:27.450]to help them with that.
- [00:17:28.410]Whether they're hiring it from the outside
- [00:17:30.600]or they're hiring internally,
- [00:17:32.250]there are lots of jobs in that area
- [00:17:34.140]and it's an area where we can help channel kids.
- [00:17:37.650]And what I love about the Capture the Flag events
- [00:17:41.370]is it's making it fun.
- [00:17:43.200]And they actually talked about the fact that part
- [00:17:45.750]of their goal with Nullify is making sure people
- [00:17:48.240]are having fun.
- [00:17:49.470]Because my worry is all these people
- [00:17:51.090]hear about cybersecurity and they're thinking,
- [00:17:53.550]you know, "Is this what I wanna be excited about
- [00:17:56.820]or do I wanna make a game?"
- [00:17:58.320]And it sounds like there's actually great opportunities
- [00:18:01.500]to do important work, but also to really challenge yourself.
- [00:18:05.700]And that's, again, an opportunity for students.
- [00:18:08.640]There's definitely career paths.
- [00:18:10.590]And so I was super happy to hear
- [00:18:13.110]that students at the undergraduate level are getting engaged
- [00:18:17.130]in getting other people interested and connecting them
- [00:18:21.750]because I think you and I, as teachers,
- [00:18:24.510]can always talk about things,
- [00:18:25.980]but when somebody who's much closer, who's just a couple
- [00:18:28.500]of years removed from high school is talking
- [00:18:31.920]and saying, "This is exciting,
- [00:18:33.330]you want to do this," that's considerably more relevant.
- [00:18:38.582](upbeat music)
- [00:18:39.415]We listen. (laughs) Yes.
- [00:18:42.660]And so, this was a great opportunity
- [00:18:45.390]to talk, once again, about cybersecurity
- [00:18:47.700]and we'll see you next time on CS4NE.
- [00:18:51.761](upbeat music)
The screen size you are trying to search captions on is too small!
You can always jump over to MediaHub and check it out there.
Log in to post comments
Embed
Copy the following code into your page
HTML
<div style="padding-top: 56.25%; overflow: hidden; position:relative; -webkit-box-flex: 1; flex-grow: 1;"> <iframe style="bottom: 0; left: 0; position: absolute; right: 0; top: 0; border: 0; height: 100%; width: 100%;" src="https://mediahub.unl.edu/media/24278?format=iframe&autoplay=0" title="Video Player: Tech EDGE: CS4NE with Special Guests, Zaid Kakish and Tom Knudsen from Nullify at UNO" allowfullscreen ></iframe> </div>
Comments
0 Comments