Internships and Student Seminars

Internships and Student Seminars

OmniSOC 2019 interns lined up in a hallway in the IU Data Center

2021 Internship Program

REGISTRATION IS NOW OPEN!

OmniSOC member universities are partnering with Elastic to offer a series of virtual seminars on basic network threat hunting and security in summer 2021. The series will consist of eight seminars, each approximately three hours, presented over Zoom and will include presentations, Q&A sessions, and lab work. OmniSOC staff are excited to have this opportunity to partner with Elastic to bring this series to our staff and student communities. We anticipate a full house for this event so please sign up early!

2021 registration is now open – Registration closes May 28th, 2021!

OmniSOC virtual seminar series with Elastic

June 28 – July 15, 2021

ALL TIMES EASTERN

CSM cyber foundations training

Monday, June 28: 2-5pm Eastern – Elastic Day 1 – Intro to Linux, how to run commands- [Elastic TBD]

  • Overview: 
    • This course will familiarize students with the Linux operating system and help them navigate the command line. Students will learn how to create and manipulate files as well as run commands in conjunction to perform simple searches and filtering of text.
  • Topic areas: 
    • Design principles
    • CLI fundamentals (w/ lab)
    • Using editors (w/ lab)
    • Searching & filtering (w/ lab)

Tuesday, June 29: 2-5pm Eastern – Networking fundamentals – Scott Orr

  • Overview: 
    • This course will give students an overview on networking topics focusing primarily on the TCP/IP stack. Application layer topics will also be covered. Students will be provided with packet captures for a wireshark exercise.
  • Topic areas: 
    • TCP/IP stack
    • SMTP/HTTP/DNS/etc.
    • Wireshark decoding

Wednesday, June 30: 2-5pm Eastern – Elastic Day 3 – Zeek / Signature Engine – [Elastic TBD?]

  •  Overview:  
    • This course will familiarize students with Zeek and its ability to analyze network traffic. Students will create, view, and search Zeek ASCII logs to gain a better understanding of what data is provided by Zeek.
  • Topic areas: 
    • What is Zeek?
    • Zeek project history
    • Running Zeek from the command line (w/ lab)
    • ASCII logs overview (w/ lab)
    • Filtering and sorting data (w/ lab)
    • Capture the Flag (w/ lab)
    • IU provides short 30 minute on Signature Engines – [Keith Lehigh]

Thursday, July 1: 2-5pm Eastern – Elastic Hands-on exercises using the tools from Day 1 – [Sean Cochran?]

  • Overview:
    • This course will familiarize students with Kibana and its ability to filter and visualize data in a clear and concise picture. Students will learn how to filter and search using the Lucene query syntax and will learn how to navigate and filter pre-made dashboards.
  • Topic areas:
    • Kibana overview
    • Lucene searching
    • Filtering
    • Dashboards

Kibana threat hunting

Tuesday, July 6: 2-5pm Eastern – Elastic threat hunting

  • Overview: 
    • This course will have students searching through a snapshot in time to find malicious activity that took place. Students will utilize a capture-the-flag environment to help guide them in their pursuit of discovering what malicious activity took place.
  • Topic areas:
    • Individual hunt day 1

Thursday July 8:  2-5pm Eastern – Elastic threat hunting – [Elastic TBD?]

  • Overview: 
    • This course will have students searching through a snapshot in time to find malicious activity that took place. Students will utilize a capture the flag environment to help guide them in their pursuit of discovering what malicious activity took place.
  • Topic areas:
    • Individual hunt day 2

Not Elastic: incident response and guest speakers

Tuesday, July 13: 2-5pm Eastern – Incident response process and forensic analysis – [Tim Goth, incident response manager, and Mike Simpson, lead security engineer, Kurt Seiffert, principal security engineer]

  • Overview: 
    • This course will be split into two sections. The first part of the day will cover incident response (IR). Students will hear stories of how IR functions when an event occurs. The second part of the day will cover forensic analysis and how it fits in to incident response.
  • Topic areas: 
    • How incident response works and why it is important.
    • Tales from the trenches
    • Forensic analysis and how it fits in with IR

Thursday, July 15: 2-5pm Eastern – View from the CISOs office – Keith Lehigh will introduce

  • Overview: 
    • This course will provide students with insights into a “day in the life” of cybersecurity operations in a university security office
    • TBD (sample of proposed titles, names need to be confirmed)
      • TBD, chief information security officer, Indiana University
      • Jenn Disney, security analyst, University of Nebraska
      • TBD, IU University Information Policy Office
      • TBD, OmniSOC security operations and threat intelligence manager
      • Hanna Tun, lead security engineer, OmniSOC
      • Others TBD

How to Apply

When applying, you will need two references, unofficial copies of your transcripts, and a personal statement. Your personal statement (2 pages maximum) must include responses to the following:

  • Why do I want to participate in the OmniSOC Internship program (what do I hope to gain from this summer research experience)?
  • What are my short- and long-term career goals?
  • What are my personal qualities, research, and/or technical skills that are applicable for this research experience? In particular, comment on experience with scripting or programming languages (Python, Matlab, etc.) and command line experience (Unix/Linux).

Apply HERE