{"id":5023,"date":"2023-05-30T06:00:05","date_gmt":"2023-05-30T10:00:05","guid":{"rendered":"https:\/\/www.forsythtech.edu\/?page_id=5023"},"modified":"2024-06-06T14:58:06","modified_gmt":"2024-06-06T18:58:06","slug":"davis-itec-cybersecurity-center","status":"publish","type":"page","link":"https:\/\/www.forsythtech.edu\/about-forsyth\/contact-details\/locations\/davis-itec-cybersecurity-center\/","title":{"rendered":"Davis iTec Cybersecurity Center"},"content":{"rendered":"\r\n<div class=\"fy-hero lazyload\" style=\"background-image:inherit;\" data-bg-image=\"url(https:\/\/www.forsythtech.edu\/wp-content\/uploads\/2023\/03\/Aerial-resize-2.jpg)\">\r\n\t\r\n\r\n\t<div class=\"fy-hero__container container\">\r\n\r\n\t\t\r\n\r\n\t\t<div class=\"row\">\r\n\t\t\t<div class=\"fy-hero__inner col-12 offset-lg-1 col-lg-10\">\r\n\t\t\t\t<h1 data-aos=\"fade-up\" class=\"fy-hero__title fy-h1\" aria-label=\"main\" role=\"main\">Davis iTec Cybersecurity Center<\/h1>\r\n\t\t\t\t\t\t\t<\/div>\r\n\t\t<\/div>\r\n\t<\/div>\r\n\t\t<div class=\"iframe-wrapper d-none d-md-block\" aria-label=\"Background Video\">\r\n\t\t<\/div>\r\n<\/div>\n\n<div class=\"container\"><div class=\"row\"><div class=\"col-12 col-sm-12 col-md-12 col-lg-10 offset-lg-1 ecity2\">\n<div style=\"height:100px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<\/div><\/div><\/div>\n\n<div class=\"container\"><div class=\"row\"><div class=\"col-12 col-sm-12 col-md-12 col-lg-10 offset-lg-1 ecity2\">\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" data-src=\"https:\/\/www.forsythtech.edu\/wp-content\/uploads\/2024\/02\/NewLogo.png\" alt=\"\" class=\"wp-image-15182 lazyload\" src=\"data:image\/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==\" style=\"--smush-placeholder-width: 978px; --smush-placeholder-aspect-ratio: 978\/484;\" \/><\/figure>\n<\/div><\/div><\/div>\n\n<div class=\"container\"><div class=\"row\"><div class=\"col-12 col-sm-12 col-md-12 col-lg-10 offset-lg-1 ecity2\">\n<div style=\"height:100px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<\/div><\/div><\/div>\n\n\r\n<div class=\"fy-text-block\">\r\n\t<div class=\"fy-text-block__container  container\">\r\n\t\t<div class=\"row\">\r\n\t\t\t<div class=\"fy-text-block__content col-12 col-sm-12 offset-md-1 col-md-10 offset-lg-2 col-lg-8\">\r\n\t\t\t\t<h2 data-aos=\"fade-up\" class=\"fy-text-block__title fy-h2\">DHS\/NSA Recognized<\/h2>\r\n\t\t\t\t<p data-aos=\"fade-up\" class=\"fy-text-block__text fy-paragraph\">Forsyth Technical Community College is a DHS\/NSA recognized Center of Academic Excellence in Cyber Defense Education.<\/p>\n<p data-aos=\"fade-up\" class=\"fy-text-block__text fy-paragraph\">The Committee on National Security Systems in conjunction with the National Security Agency (NSA) and the Department of Homeland Security (DHS) jointly announced Forsyth Technical Community College the designation as a Center of Academic Excellence in Cyber Defense. Students can choose several options to obtain this recogination as well as receive your degree credential. Review options under program options. In addition, certification exams are highly recommended after completing certificate related courses.<\/p>\n\t\t\t\t\t\t\t<\/div>\r\n\t\t<\/div>\r\n\t<\/div>\r\n<\/div>\n\n\r\n<div class=\"fy-text-block\">\r\n\t<div class=\"fy-text-block__container fy-text-block__container--light-teal container\">\r\n\t\t<div class=\"row\">\r\n\t\t\t<div class=\"fy-text-block__content col-12 col-sm-12 offset-md-1 col-md-10 offset-lg-2 col-lg-8\">\r\n\t\t\t\t<h2 data-aos=\"fade-up\" class=\"fy-text-block__title fy-h2\">Cyber Security Center<\/h2>\r\n\t\t\t\t<p data-aos=\"fade-up\" class=\"fy-text-block__text fy-paragraph\">The Cyber Security Center is committed to improving the practice of protecting information and training individuals in security concepts.<\/p>\n<p data-aos=\"fade-up\" class=\"fy-text-block__text fy-paragraph\">The center will seek to establish partnerships, support information security research, assist development and sharing of resources and perform the following:<\/p>\n<ul>\n<li>The college will seek to establish and foster partnerships with industry, educational institutions, and professional organizations.<\/li>\n<li>The college will support research efforts in cyber security and information security as well as any new cyber initiative.<\/li>\n<li>The college will use various methods to develop and distribute resources to facilitate improved cyber security and information security.<\/li>\n<\/ul>\n\t\t\t\t\t\t\t<\/div>\r\n\t\t<\/div>\r\n\t<\/div>\r\n<\/div>\n\n\r\n<div class=\"fy-text-block\">\r\n\t<div class=\"fy-text-block__container  container\">\r\n\t\t<div class=\"row\">\r\n\t\t\t<div class=\"fy-text-block__content col-12 col-sm-12 offset-md-1 col-md-10 offset-lg-2 col-lg-8\">\r\n\t\t\t\t<h2 data-aos=\"fade-up\" class=\"fy-text-block__title fy-h2\"><\/h2>\r\n\t\t\t\t<p data-aos=\"fade-up\" class=\"fy-text-block__text fy-paragraph\"><a href=\"https:\/\/www.caecommunity.org\/\"><img decoding=\"async\" class=\"size-medium wp-image-15180 aligncenter lazyload\" data-src=\"https:\/\/www.forsythtech.edu\/wp-content\/uploads\/2024\/02\/Offical-CAE-Seal-2023-296x300.png\" alt=\"CAE Seal\" width=\"296\" height=\"300\" data-srcset=\"https:\/\/www.forsythtech.edu\/wp-content\/uploads\/2024\/02\/Offical-CAE-Seal-2023-296x300.png 296w, https:\/\/www.forsythtech.edu\/wp-content\/uploads\/2024\/02\/Offical-CAE-Seal-2023.png 493w\" data-sizes=\"(max-width: 296px) 100vw, 296px\" src=\"data:image\/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==\" style=\"--smush-placeholder-width: 296px; --smush-placeholder-aspect-ratio: 296\/300;\" \/><\/a><\/p>\n<p data-aos=\"fade-up\" class=\"fy-text-block__text fy-paragraph\">Forsyth Technical Community College has recently achieved the prestigious status of being selected as a CAE Regional Resource Center (CRRC) by the National Security Agency (NSA). Out of the ten CRRCs established nationwide, each responsible for a specific geographic region, Forsyth Tech has been entrusted with the responsibility for our designated region.<\/p>\n<p data-aos=\"fade-up\" class=\"fy-text-block__text fy-paragraph\">In our capacity as a CRRC, we will host a variety of events and workshops, fostering a collaborative atmosphere among the CRRCs and the Center for National Research Centers (CNRCs). Through such collaboration, we aim to minimize program duplication, maximize resource sharing, and ultimately strengthen the overall cybersecurity education landscape.<\/p>\n\t\t\t\t\t\t\t\t\t<a  rel=\"noopener\"  data-aos=\"fade-up\" href=\" https:\/\/www.caecommunity.org\/ \" target=\"_blank\" class=\"fy-text-block__button fy-btn-primary\">CAE<\/a>\r\n\t\t\t\t\t\t\t<\/div>\r\n\t\t<\/div>\r\n\t<\/div>\r\n<\/div>\n\n\r\n<div class=\"fy-text-block\">\r\n\t<div class=\"fy-text-block__container fy-text-block__container--light-teal container\">\r\n\t\t<div class=\"row\">\r\n\t\t\t<div class=\"fy-text-block__content col-12 col-sm-12 offset-md-1 col-md-10 offset-lg-2 col-lg-8\">\r\n\t\t\t\t<h2 data-aos=\"fade-up\" class=\"fy-text-block__title fy-h2\">Applications for the Fall 2024 Cyber Corps<\/h2>\r\n\t\t\t\t<p data-aos=\"fade-up\" class=\"fy-text-block__text fy-paragraph\">Scholarship for Service is now open until May 5, 2024.<\/p>\n<p data-aos=\"fade-up\" class=\"fy-text-block__text fy-paragraph\">Please visit the link below to apply.<\/p>\n\t\t\t\t\t\t\t\t\t<a  rel=\"noopener\"  data-aos=\"fade-up\" href=\"https:\/\/forms.office.com\/r\/rg3vLFNNQ5\" target=\"_blank\" class=\"fy-text-block__button fy-btn-primary\">Cyber Corps Application<\/a>\r\n\t\t\t\t\t\t\t<\/div>\r\n\t\t<\/div>\r\n\t<\/div>\r\n<\/div>\n\n<section class=\"fy-accordion-section whitebg\">\r\n\t<div class=\"container\">\r\n\t\t<div class=\"row\">\r\n\t\t\t<div data-aos=\"fade-up\" class=\"fy-accordion-section__left col-12 col-md-6 col-lg-5\">\r\n\t\t\t\t<h2 class=\"fy-accordion-section__title\">More Information<\/h2>\r\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\r\n\t\t\t<div data-aos=\"fade-up\" data-aos-delay=\"100\" class=\"fy-accordion-section__right col-12 col-md-6 offset-lg-1 col-lg-6\">\r\n\t\t\t\t<h6 class=\"fy-accordion-section__subtitle\"><\/h6>\r\n\t\t\t\t<div class=\"fy-accorodion\" id=\"fy-accordion\">\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"fy-accordion__item\">\r\n\t\t\t\t\t\t\t\t\t<button id=\"itemblock_6b1f6c9dea6ab590d05179833dc182641\" class=\"fy-accordion__button\" data-toggle=\"collapse\"\r\n\t\t\t\t\t\t\t\t\t\t\tdata-target=\"#collapseblock_6b1f6c9dea6ab590d05179833dc182641\" aria-expanded=\"true\" aria-controls=\"collapseblock_6b1f6c9dea6ab590d05179833dc182641\">\r\n\t\t\t\t\t\t\t\t\t\tPoint of Contact\t\t\t\t\t\t\t\t\t<\/button>\r\n\t\t\t\t\t\t\t\t\t<div id=\"collapseblock_6b1f6c9dea6ab590d05179833dc182641\" class=\"fy-accordion__collapse collapse show\" aria-labelledby=\"itemblock_6b1f6c9dea6ab590d05179833dc182641\"\r\n\t\t\t\t\t\t\t\t\t\t data-parent=\"#fy-accordion\">\r\n\t\t\t\t\t\t\t\t\t\t<div class=\"fy-accordion__content\">\r\n\t\t\t\t\t\t\t\t\t\t\t<p>Thomas Brown<\/p>\n<p>Department Chair, IT-Networking, Support and Security<\/p>\n<p>336-734-7503<\/p>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"mailto:tbrown@forsythtech.edu\"  rel=\"noopener\"  target=\"_blank\" class=\"fy-btn-primary mt-4\">Email Thomas<\/a>\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"fy-accordion__item\">\r\n\t\t\t\t\t\t\t\t\t<button id=\"itemblock_6b1f6c9dea6ab590d05179833dc182642\" class=\"fy-accordion__button\" data-toggle=\"collapse\"\r\n\t\t\t\t\t\t\t\t\t\t\tdata-target=\"#collapseblock_6b1f6c9dea6ab590d05179833dc182642\" aria-expanded=\"true\" aria-controls=\"collapseblock_6b1f6c9dea6ab590d05179833dc182642\">\r\n\t\t\t\t\t\t\t\t\t\tIT- Systems Security (PoS Validated by NSA CAE PMO)\t\t\t\t\t\t\t\t\t<\/button>\r\n\t\t\t\t\t\t\t\t\t<div id=\"collapseblock_6b1f6c9dea6ab590d05179833dc182642\" class=\"fy-accordion__collapse collapse \" aria-labelledby=\"itemblock_6b1f6c9dea6ab590d05179833dc182642\"\r\n\t\t\t\t\t\t\t\t\t\t data-parent=\"#fy-accordion\">\r\n\t\t\t\t\t\t\t\t\t\t<div class=\"fy-accordion__content\">\r\n\t\t\t\t\t\t\t\t\t\t\t<p><span class=\"NormalTextRun SCXW86022025 BCX0\">Studying\u00a0<\/span><span class=\"NormalTextRun SCXW86022025 BCX0\">s<\/span><span class=\"NormalTextRun SCXW86022025 BCX0\">ystems security\u00a0<\/span><span class=\"NormalTextRun SCXW86022025 BCX0\">at Forsyth Tech will teach you<\/span><span class=\"NormalTextRun SCXW86022025 BCX0\">\u00a0how to design<\/span><span class=\"NormalTextRun SCXW86022025 BCX0\">\u00a0security architectures,\u00a0<\/span><span class=\"NormalTextRun SCXW86022025 BCX0\">ensure\u00a0<\/span><span class=\"NormalTextRun SCXW86022025 BCX0\">data integrity through encryption, design Virtual Private Networks, SSL, SSH, and\u00a0<\/span><span class=\"NormalTextRun SpellingErrorV2Themed SCXW86022025 BCX0\">IPSec<\/span><span class=\"NormalTextRun SCXW86022025 BCX0\">,\u00a0<\/span><span class=\"NormalTextRun SCXW86022025 BCX0\">mitigate threats<\/span><span class=\"NormalTextRun SCXW86022025 BCX0\">,\u00a0<\/span><span class=\"NormalTextRun SCXW86022025 BCX0\">configure firewalls, detect intrusions, and<\/span>\u00a0<span class=\"NormalTextRun SCXW86022025 BCX0\">even\u00a0<\/span><span class=\"NormalTextRun SCXW86022025 BCX0\">apply the appropriate defense against intrusions utilizing software and hardware.<\/span><\/p>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/www.forsythtech.edu\/program_tracks\/it-systems-security-2\/\"  rel=\"noopener\"  target=\"_blank\" class=\"fy-btn-primary mt-4\">IT \u2013 Systems Security<\/a>\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"fy-accordion__item\">\r\n\t\t\t\t\t\t\t\t\t<button id=\"itemblock_6b1f6c9dea6ab590d05179833dc182643\" class=\"fy-accordion__button\" data-toggle=\"collapse\"\r\n\t\t\t\t\t\t\t\t\t\t\tdata-target=\"#collapseblock_6b1f6c9dea6ab590d05179833dc182643\" aria-expanded=\"true\" aria-controls=\"collapseblock_6b1f6c9dea6ab590d05179833dc182643\">\r\n\t\t\t\t\t\t\t\t\t\tSoutheastern Regional Resource Center:\t\t\t\t\t\t\t\t\t<\/button>\r\n\t\t\t\t\t\t\t\t\t<div id=\"collapseblock_6b1f6c9dea6ab590d05179833dc182643\" class=\"fy-accordion__collapse collapse \" aria-labelledby=\"itemblock_6b1f6c9dea6ab590d05179833dc182643\"\r\n\t\t\t\t\t\t\t\t\t\t data-parent=\"#fy-accordion\">\r\n\t\t\t\t\t\t\t\t\t\t<div class=\"fy-accordion__content\">\r\n\t\t\t\t\t\t\t\t\t\t\t<p>View the CRRC site for more information including:<\/p>\n<p>-Links to student cybersecurity activities available to students<\/p>\n<p>-Cybersecurity News<\/p>\n<p>-Links to security resources and awareness<\/p>\n<p>-Up-to-date links to key cybersecurity resources for students such as cyber competitions<\/p>\n<p>-Documentation on our Advisory Board<\/p>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/crrc.forsythtech.edu\/\"  rel=\"noopener\"  target=\"_blank\" class=\"fy-btn-primary mt-4\">CRRC<\/a>\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t\t\t\t\r\n\t\t\t\t<\/div>\r\n\r\n\t\t\t\t\t\t\t<\/div>\r\n\t\t<\/div>\r\n\t<\/div>\r\n<\/section>\n\n<div class=\"container\"><div class=\"row\"><div class=\"col-12 col-sm-12 col-md-12 col-lg-10 offset-lg-1 ecity2\">\n<div style=\"height:100px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<\/div><\/div><\/div>\n\n<div class=\"container\"><div class=\"row\"><div class=\"col-12 col-sm-12 col-md-12 col-lg-10 offset-lg-1 ecity2\">\n<div style=\"height:100px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<\/div><\/div><\/div>\n\n<div class=\"container\"><div class=\"row\"><div class=\"col-12 col-sm-12 col-md-12 col-lg-10 offset-lg-1 ecity2\">\n<h2 class=\"wp-block-heading\"><strong>Davis iTEC Cyber Security Center Faculty Members<\/strong><\/h2>\n<\/div><\/div><\/div>\n\n<div class=\"container\"><div class=\"row\"><div class=\"col-12 col-sm-12 col-md-12 col-lg-10 offset-lg-1 ecity2\">\n<figure class=\"wp-block-table\"><table><tbody><tr><td class=\"has-text-align-left\" data-align=\"left\"><strong>Name<\/strong><\/td><td class=\"has-text-align-left\" data-align=\"left\"><strong>Position<\/strong><\/td><td><strong>Specialty<\/strong><\/td><\/tr><tr><td class=\"has-text-align-left\" data-align=\"left\">Thomas Brown<\/td><td class=\"has-text-align-left\" data-align=\"left\">Department Chair<\/td><td>Cybersecurity\/System Security\/Networking<\/td><\/tr><tr><td class=\"has-text-align-left\" data-align=\"left\">Victoria Ferrell<\/td><td class=\"has-text-align-left\" data-align=\"left\">Program Coordinator<\/td><td>Cybersecurity\/System Security<\/td><\/tr><tr><td class=\"has-text-align-left\" data-align=\"left\">Calvin Wilkins<\/td><td class=\"has-text-align-left\" data-align=\"left\">Adjunct Instructor<\/td><td>Cybersecurity\/System Security<\/td><\/tr><tr><td class=\"has-text-align-left\" data-align=\"left\">Curby Simmerson<\/td><td class=\"has-text-align-left\" data-align=\"left\">Adjunct Instructor<\/td><td>Cybersecurity\/System Security<\/td><\/tr><tr><td class=\"has-text-align-left\" data-align=\"left\">Eric Betties<\/td><td class=\"has-text-align-left\" data-align=\"left\">Adjunct Instructor<\/td><td>Cybersecurity\/System Security<\/td><\/tr><tr><td class=\"has-text-align-left\" data-align=\"left\">Ganna Bliman<\/td><td class=\"has-text-align-left\" data-align=\"left\">Adjunct Instructor<\/td><td>Networking<\/td><\/tr><tr><td class=\"has-text-align-left\" data-align=\"left\">Jana Minor Oliver<\/td><td class=\"has-text-align-left\" data-align=\"left\">Adjunct Instructor<\/td><td>Cybersecurity\/System Security<\/td><\/tr><tr><td class=\"has-text-align-left\" data-align=\"left\">Jerry Paul<\/td><td class=\"has-text-align-left\" data-align=\"left\">Adjunct Instructor<\/td><td>Cybersecurity\/System Security<\/td><\/tr><tr><td class=\"has-text-align-left\" data-align=\"left\">Johnai Myers<\/td><td class=\"has-text-align-left\" data-align=\"left\">Adjunct Instructor<\/td><td>Cybersecurity\/System Security<\/td><\/tr><tr><td class=\"has-text-align-left\" data-align=\"left\">Latesa Brown Barrett<\/td><td class=\"has-text-align-left\" data-align=\"left\">Adjunct Instructor<\/td><td>Cybersecurity\/System Security<\/td><\/tr><tr><td class=\"has-text-align-left\" data-align=\"left\">Michael Sletten<\/td><td class=\"has-text-align-left\" data-align=\"left\">Adjunct Instructor<\/td><td>Cybersecurity\/System Security<\/td><\/tr><tr><td class=\"has-text-align-left\" data-align=\"left\">Mike Smith<\/td><td class=\"has-text-align-left\" data-align=\"left\">Instructor<\/td><td>Systems Security\/Networking<\/td><\/tr><tr><td class=\"has-text-align-left\" data-align=\"left\">Nancy Miller<\/td><td class=\"has-text-align-left\" data-align=\"left\">Instructor<\/td><td>Systems Security\/Networking<\/td><\/tr><tr><td class=\"has-text-align-left\" data-align=\"left\">Nebra Hasley<\/td><td class=\"has-text-align-left\" data-align=\"left\">Adjunct Instructor<\/td><td>Cybersecurity\/System Security<\/td><\/tr><tr><td class=\"has-text-align-left\" data-align=\"left\">Nnenna Martin<\/td><td class=\"has-text-align-left\" data-align=\"left\">Instructor<\/td><td>Cybersecurity\/System Security<\/td><\/tr><tr><td class=\"has-text-align-left\" data-align=\"left\">Renee Himmelspach<\/td><td class=\"has-text-align-left\" data-align=\"left\">Adjunct Instructor<\/td><td>Cybersecurity\/System Security<\/td><\/tr><tr><td class=\"has-text-align-left\" data-align=\"left\">Todd York<\/td><td class=\"has-text-align-left\" data-align=\"left\">Adjunct Instructor<\/td><td>Networking<\/td><\/tr><\/tbody><\/table><\/figure>\n<\/div><\/div><\/div>","protected":false},"excerpt":{"rendered":"<p>Davis iTEC Cyber Security Center Faculty Members Name Position Specialty Thomas Brown Department Chair Cybersecurity\/System Security\/Networking Victoria Ferrell Program Coordinator Cybersecurity\/System Security Calvin Wilkins Adjunct Instructor Cybersecurity\/System Security Curby Simmerson [&hellip;]<\/p>\n","protected":false},"author":14,"featured_media":0,"parent":5021,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"_tec_requires_first_save":true,"_EventAllDay":false,"_EventTimezone":"","_EventStartDate":"","_EventEndDate":"","_EventStartDateUTC":"","_EventEndDateUTC":"","_EventShowMap":false,"_EventShowMapLink":false,"_EventURL":"","_EventCost":"","_EventCostDescription":"","_EventCurrencySymbol":"","_EventCurrencyCode":"","_EventCurrencyPosition":"","_EventDateTimeSeparator":"","_EventTimeRangeSeparator":"","_EventOrganizerID":[],"_EventVenueID":[],"_OrganizerEmail":"","_OrganizerPhone":"","_OrganizerWebsite":"","_VenueAddress":"","_VenueCity":"","_VenueCountry":"","_VenueProvince":"","_VenueState":"","_VenueZip":"","_VenuePhone":"","_VenueURL":"","_VenueStateProvince":"","_VenueLat":"","_VenueLng":"","_VenueShowMap":false,"_VenueShowMapLink":false,"_tribe_blocks_recurrence_rules":"","_tribe_blocks_recurrence_description":"","_tribe_blocks_recurrence_exclusions":"","footnotes":""},"class_list":["post-5023","page","type-page","status-publish","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.5 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>David iTec Cybersecurity Center | Forsyth Tech<\/title>\n<meta name=\"description\" content=\"We&#039;re a DHS\/NSA recognized Center of Academic Excellence in Cyber Defense Education. Learn more about our David iTec Cybersecurity Center &amp; student resources.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.forsythtech.edu\/about-forsyth\/contact-details\/locations\/davis-itec-cybersecurity-center\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"David iTec Cybersecurity Center | Forsyth Tech\" \/>\n<meta property=\"og:description\" content=\"We&#039;re a DHS\/NSA recognized Center of Academic Excellence in Cyber Defense Education. Learn more about our David iTec Cybersecurity Center &amp; student resources.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.forsythtech.edu\/about-forsyth\/contact-details\/locations\/davis-itec-cybersecurity-center\/\" \/>\n<meta property=\"og:site_name\" content=\"Forsyth Tech Community College\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/forsythtech\" \/>\n<meta property=\"article:modified_time\" content=\"2024-06-06T18:58:06+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.forsythtech.edu\/wp-content\/uploads\/2024\/02\/NewLogo.png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@ForsythTechCC\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.forsythtech.edu\/about-forsyth\/contact-details\/locations\/davis-itec-cybersecurity-center\/\",\"url\":\"https:\/\/www.forsythtech.edu\/about-forsyth\/contact-details\/locations\/davis-itec-cybersecurity-center\/\",\"name\":\"David iTec Cybersecurity Center | Forsyth Tech\",\"isPartOf\":{\"@id\":\"https:\/\/www.forsythtech.edu\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.forsythtech.edu\/about-forsyth\/contact-details\/locations\/davis-itec-cybersecurity-center\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.forsythtech.edu\/about-forsyth\/contact-details\/locations\/davis-itec-cybersecurity-center\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.forsythtech.edu\/wp-content\/uploads\/2024\/02\/NewLogo.png\",\"datePublished\":\"2023-05-30T10:00:05+00:00\",\"dateModified\":\"2024-06-06T18:58:06+00:00\",\"description\":\"We're a DHS\/NSA recognized Center of Academic Excellence in Cyber Defense Education. Learn more about our David iTec Cybersecurity Center & student resources.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.forsythtech.edu\/about-forsyth\/contact-details\/locations\/davis-itec-cybersecurity-center\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.forsythtech.edu\/about-forsyth\/contact-details\/locations\/davis-itec-cybersecurity-center\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.forsythtech.edu\/about-forsyth\/contact-details\/locations\/davis-itec-cybersecurity-center\/#primaryimage\",\"url\":\"https:\/\/www.forsythtech.edu\/wp-content\/uploads\/2024\/02\/NewLogo-e1710444572499.png\",\"contentUrl\":\"https:\/\/www.forsythtech.edu\/wp-content\/uploads\/2024\/02\/NewLogo-e1710444572499.png\",\"width\":326,\"height\":484,\"caption\":\"itec logo\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.forsythtech.edu\/about-forsyth\/contact-details\/locations\/davis-itec-cybersecurity-center\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.forsythtech.edu\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"About Forsyth\",\"item\":\"https:\/\/www.forsythtech.edu\/about-forsyth\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Contact Details\",\"item\":\"https:\/\/www.forsythtech.edu\/about-forsyth\/contact-details\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Locations\",\"item\":\"https:\/\/www.forsythtech.edu\/about-forsyth\/contact-details\/locations\/\"},{\"@type\":\"ListItem\",\"position\":5,\"name\":\"Davis iTec Cybersecurity Center\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.forsythtech.edu\/#website\",\"url\":\"https:\/\/www.forsythtech.edu\/\",\"name\":\"Forsyth Tech Community College\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.forsythtech.edu\/#organization\"},\"alternateName\":\"Forsyth Tech\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.forsythtech.edu\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.forsythtech.edu\/#organization\",\"name\":\"Forsyth Tech Community College\",\"url\":\"https:\/\/www.forsythtech.edu\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.forsythtech.edu\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.forsythtech.edu\/wp-content\/uploads\/2023\/06\/forsyth-logo.png\",\"contentUrl\":\"https:\/\/www.forsythtech.edu\/wp-content\/uploads\/2023\/06\/forsyth-logo.png\",\"width\":867,\"height\":163,\"caption\":\"Forsyth Tech Community College\"},\"image\":{\"@id\":\"https:\/\/www.forsythtech.edu\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/forsythtech\",\"https:\/\/x.com\/ForsythTechCC\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"David iTec Cybersecurity Center | Forsyth Tech","description":"We're a DHS\/NSA recognized Center of Academic Excellence in Cyber Defense Education. Learn more about our David iTec Cybersecurity Center & student resources.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.forsythtech.edu\/about-forsyth\/contact-details\/locations\/davis-itec-cybersecurity-center\/","og_locale":"en_US","og_type":"article","og_title":"David iTec Cybersecurity Center | Forsyth Tech","og_description":"We're a DHS\/NSA recognized Center of Academic Excellence in Cyber Defense Education. Learn more about our David iTec Cybersecurity Center & student resources.","og_url":"https:\/\/www.forsythtech.edu\/about-forsyth\/contact-details\/locations\/davis-itec-cybersecurity-center\/","og_site_name":"Forsyth Tech Community College","article_publisher":"https:\/\/www.facebook.com\/forsythtech","article_modified_time":"2024-06-06T18:58:06+00:00","og_image":[{"url":"https:\/\/www.forsythtech.edu\/wp-content\/uploads\/2024\/02\/NewLogo.png","type":"","width":"","height":""}],"twitter_card":"summary_large_image","twitter_site":"@ForsythTechCC","twitter_misc":{"Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.forsythtech.edu\/about-forsyth\/contact-details\/locations\/davis-itec-cybersecurity-center\/","url":"https:\/\/www.forsythtech.edu\/about-forsyth\/contact-details\/locations\/davis-itec-cybersecurity-center\/","name":"David iTec Cybersecurity Center | Forsyth Tech","isPartOf":{"@id":"https:\/\/www.forsythtech.edu\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.forsythtech.edu\/about-forsyth\/contact-details\/locations\/davis-itec-cybersecurity-center\/#primaryimage"},"image":{"@id":"https:\/\/www.forsythtech.edu\/about-forsyth\/contact-details\/locations\/davis-itec-cybersecurity-center\/#primaryimage"},"thumbnailUrl":"https:\/\/www.forsythtech.edu\/wp-content\/uploads\/2024\/02\/NewLogo.png","datePublished":"2023-05-30T10:00:05+00:00","dateModified":"2024-06-06T18:58:06+00:00","description":"We're a DHS\/NSA recognized Center of Academic Excellence in Cyber Defense Education. Learn more about our David iTec Cybersecurity Center & student resources.","breadcrumb":{"@id":"https:\/\/www.forsythtech.edu\/about-forsyth\/contact-details\/locations\/davis-itec-cybersecurity-center\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.forsythtech.edu\/about-forsyth\/contact-details\/locations\/davis-itec-cybersecurity-center\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.forsythtech.edu\/about-forsyth\/contact-details\/locations\/davis-itec-cybersecurity-center\/#primaryimage","url":"https:\/\/www.forsythtech.edu\/wp-content\/uploads\/2024\/02\/NewLogo-e1710444572499.png","contentUrl":"https:\/\/www.forsythtech.edu\/wp-content\/uploads\/2024\/02\/NewLogo-e1710444572499.png","width":326,"height":484,"caption":"itec logo"},{"@type":"BreadcrumbList","@id":"https:\/\/www.forsythtech.edu\/about-forsyth\/contact-details\/locations\/davis-itec-cybersecurity-center\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.forsythtech.edu\/"},{"@type":"ListItem","position":2,"name":"About Forsyth","item":"https:\/\/www.forsythtech.edu\/about-forsyth\/"},{"@type":"ListItem","position":3,"name":"Contact Details","item":"https:\/\/www.forsythtech.edu\/about-forsyth\/contact-details\/"},{"@type":"ListItem","position":4,"name":"Locations","item":"https:\/\/www.forsythtech.edu\/about-forsyth\/contact-details\/locations\/"},{"@type":"ListItem","position":5,"name":"Davis iTec Cybersecurity Center"}]},{"@type":"WebSite","@id":"https:\/\/www.forsythtech.edu\/#website","url":"https:\/\/www.forsythtech.edu\/","name":"Forsyth Tech Community College","description":"","publisher":{"@id":"https:\/\/www.forsythtech.edu\/#organization"},"alternateName":"Forsyth Tech","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.forsythtech.edu\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.forsythtech.edu\/#organization","name":"Forsyth Tech Community College","url":"https:\/\/www.forsythtech.edu\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.forsythtech.edu\/#\/schema\/logo\/image\/","url":"https:\/\/www.forsythtech.edu\/wp-content\/uploads\/2023\/06\/forsyth-logo.png","contentUrl":"https:\/\/www.forsythtech.edu\/wp-content\/uploads\/2023\/06\/forsyth-logo.png","width":867,"height":163,"caption":"Forsyth Tech Community College"},"image":{"@id":"https:\/\/www.forsythtech.edu\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/forsythtech","https:\/\/x.com\/ForsythTechCC"]}]}},"_links":{"self":[{"href":"https:\/\/www.forsythtech.edu\/wp-json\/wp\/v2\/pages\/5023","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.forsythtech.edu\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.forsythtech.edu\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.forsythtech.edu\/wp-json\/wp\/v2\/users\/14"}],"replies":[{"embeddable":true,"href":"https:\/\/www.forsythtech.edu\/wp-json\/wp\/v2\/comments?post=5023"}],"version-history":[{"count":35,"href":"https:\/\/www.forsythtech.edu\/wp-json\/wp\/v2\/pages\/5023\/revisions"}],"predecessor-version":[{"id":16348,"href":"https:\/\/www.forsythtech.edu\/wp-json\/wp\/v2\/pages\/5023\/revisions\/16348"}],"up":[{"embeddable":true,"href":"https:\/\/www.forsythtech.edu\/wp-json\/wp\/v2\/pages\/5021"}],"wp:attachment":[{"href":"https:\/\/www.forsythtech.edu\/wp-json\/wp\/v2\/media?parent=5023"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}