Master of Information Technology Security

Size: px
Start display at page:

Download "Master of Information Technology Security"

Transcription

1 Program Proposal for Master of Information Technology Security Submission to Post-secondary Education Quality Assessment Board February 3, 2004 Master of Information Technology Security 1

2 1 ORGANIZATION AND PROGRAM INFORMATION 1.1 Submission Title Page Full Legal Name of Organization: Operating Name of Organization: Common acronym of Organization: URL for Organization Homepage: University of Ontario Institute of Technology University of Ontario Institute of Technology UOIT Degree Level and Type to be awarded for program or part of program: Master of Information Technology Security (MITS) Proposed Degree Title: Information Technology Security Proposed Degree Nomenclature: M.I.T.S. Date of Submission: February 2, 2004 Location where program to be delivered: University of Ontario Institute of Technology 2000 Simcoe St. N. Oshawa, ON L1H 7K4 Contact Information: Person responsible for this submission: Dr. Bernadette Schell Dean, School of Business and Information Technology University of Ontario Institute of Technology 2000 Simcoe Street North Oshawa, Ontario, L1H 7K4 Tel: Fax: Master of Information Technology Security 2

3 1.2 Table of Contents Section of Submission Page # 1. Title Page 1.1 Title Page Table of Contents 3 4. Program Degree-Level Standard 4.1 Program Degree-Level Standard Summary 4 6. Program Content Standard 6.3 Program Comparison Statement Tables: Program Comparison Table: Course Descriptions and Learning Outcomes Capacity to Deliver Standard 8.7 Table: Enrolment Projections and Staffing Implications Resource Renewal and Upgrading Plans Credential Recognition Standard 9.1 Program Design and Credential Recognition Consultation 26 Master of Information Technology Security 3

4 4 PROGRAM DEGREE-LEVEL STANDARD Degree-Level Summary UOIT is committed to providing high quality, challenging, research-oriented graduate programs of study which clearly meet and/or exceed the standards required of masters degrees. The MITS program is a graduate professional program as defined in the Handbook for Public Organizations, and its design is guided by benchmarks described in the Postsecondary Education Quality Assessment Board Handbook for Applicants. This unique MITS program is the first of its kind in Canada and one of a handful of such specialized IT Security graduate degree programs in North America and globally. (These include James Madison University, Mary Washington College, and Idaho State University in the United States and the University of The Hague in the Netherlands), Eminently qualified faculty and well-respected educators have reviewed the draft of the MITS program. UOIT's School of Business and Information Technology currently has at least five highly qualified faculty who will deliver the curriculum in interesting and challenging ways and ensure that students are exposed to knowledge at the forefront of the discipline. The MITS program expects students to advance their knowledge and understanding of complex issues in the field of information technology security and to approach problems in systematic and innovative ways. Relevant Knowledge and Understanding The MITS program is designed to enable students to acquire a high level of knowledge and to develop skills to tackle problems in the rapidly evolving information technology security field. The program draft has been reviewed by academics and Master of Information Technology Security 4

5 industry professionals. Each course has been designed to help students develop an understanding of current theory, research, and practice in information technology security. The proposed MITS program not only emphasizes excellence in graduate level business and information technology security knowledge but soundness in transferable skills (i.e., interpersonal relations, leadership and team building, communication, critical analysis and decision making) and in business and IT ethics. Graduates of the MITS program will engage in a general research-based curriculum and gain a solid foundation of technical knowledge related to the key areas of information technology security. They will have an in-depth understanding of the technological, managerial, social, political, economic, and global issues that affect computer security technology and management. Skill Development The MITS program prepares graduates to take the CISSP exam offered by the International Information Systems Security Certification Consortium, Inc. (ISC) 2 is a notfor-profit consortium and certification organization. It is charged with the responsibility for maintaining various Common Bodies of Knowledge (CBK) for Information Security Professionals, including those for CISSPs (Certificate of Information Systems Security Professionals), certifying the minimum acceptable competence for professionals seeking to hold various credentials (also including CISSP and SSCP). The CISSP Certification designations are recognized and honored by the technology industry worldwide. They continue to grow in recognition and stature as a mark of excellence in the industry. Moreover, (ISC) 2 certifications are required for employment in an ever-increasing number of private and public sector organizations. CISSP and other (ISC) 2 certifications identify individuals as having demonstrated competence and industry knowledge directly related to job performance by virtue of meeting the examination prerequisites and Master of Information Technology Security 5

6 passing the required examination(s). Clearly, as more and more employers seek and even require one or more of the (ISC) 2 certifications, these certifications significantly benefit individuals seeking advancement, improved marketability or access to peer networking. Therefore, the MITS curriculum consists of learning outcomes based on the identified (ISC) 2 common bodies of knowledge. These outcomes include: a. To understand the research process in the discipline of information technology security. b. Demonstrates mastery of the basics of information security by producing a practical, original research paper or case study. c. Demonstrates mastery of risk assessment, IT infrastructure, and related security policies. d. Master the content of these 10 Domains in the CISSP exam: d.1 Access Control Systems and Methodology d.2 Applications and Systems Development d.3 Business Continuity Planning d.4 Cryptography d.5 Law, Investigation and Ethics d.6 Operations Security d.7 Physical security d.8 Security Architecture and Models d.9 Security Management Practices d.10 Telecommunications, Network and Internet Security e. Master the content of these Domains in the SANS Security Essentials Course: e.1 Risk Assessment and Auditing e.2 Host and Network Based Intrusion Detection e.3 Honeypots, Firewalls and Perimeter Protection e.4 Security Policy e.5 Password Management e.6 Security Incident Handling e.7 Information Warfare and Hacking e.8 Web Security e.9 Network Fundamentals and IP Concepts and Behaviour e.10 Primary Threats for Perimeter Protection e.11 PGP, Steganography e.12 Anti-viral tools e.13 Windows (2000, XP, NT, 98) Security Administration and Auditing e.14 IIS Security e.15 Unix Security Fundaments f. Understand different types of security related issues and applications in various businesses and disciplines. Master of Information Technology Security 6

7 To achieve the objectives of the program and to enhance students learning experiences, it is important for the program to provide students with the necessary hands-on skills and knowledge and opportunities to apply these in original ways. The School of Business and Information Technology will have a Hacker Research Lab, a dedicated space which literally mimics a network setting. Faculty members will incorporate various IT security lab assignments into the MITS courses. For example, groups of students will be assigned to work as either defense or attack teams. The defense team s role will be to secure its system with available hardware and software tools, while the attack team s role will be to attempt to breach the security system as designed by the defense team. This simulated network environment will train our graduate students to better understand IT security from two different perspectives; namely, from that of a technology security officer and from that of a criminally-motivated hacker. Application Students will acquire a systematic knowledge of inquiry and research methods, including qualitative and quantitative approaches. They will use technology models and infrastructure to examine and evaluate risks involved in technological applications, and they will be expected to use sound decision-making strategies to solve problems. Students will be called upon to use IT tools and techniques with greater frequency and efficiency as they complete multifaceted assignments and group projects, analyze progressively complex cases and problems and participate in field-based projects. The IT Security Capstone Research Projects I & II offer students the opportunity to apply core course concepts and techniques to a substantial project in the workplace. The MITS students will understand and be able to apply the best of current practice, but they will also be able to act as managers of transformation to improve that practice as Master of Information Technology Security 7

8 the field evolves. They will be required to work with a faculty member in conducting a research project in areas of IT security. They will be expected to identify a realistic problem or set of problems, and, over two semesters (approximately 7-8 months), to engage in a comprehensive analysis of the problem area(s) to arrive at appropriate solution(s) based on empirical research processes. They will be required to present their findings to a panel of faculty assessors. Their understanding of relevant theory related to IT security technology, their ability to use appropriate qualitative and quantitative methods of analysis and to create and evaluate a range of options, and their research and project management skills will all be challenged during the design and implementation of the project and at the final presentation. Cognitive Skills Problem solving, critical analysis, and synthesis are cognitive skills essential to success in any discipline. MITS students are expected to utilize these skills throughout the program and they will be provided with ample opportunities to refine these skills through such delivery models as problem based learning activities, collaborative and independent work, simulation lab exercises, attack and defense role play in the Hacker Research Lab, written critiques of theory and research, structured debates and discussions in classes, and oral presentations that require justification of decisions. Students will be actively engaged in these intellectual processes as they work with IT security challenges encountered by individuals in the profession. Such realistic and practical assignments will develop and strengthen students abilities to critically analyze the information they see, hear and read, to identify assumptions and implicit values, to gather appropriate data to inform and guide decision-making, to propose new hypotheses, to create and assess a range of solutions, to predict risks and to evaluate outcomes. Students will be required to work in teams in appropriate courses; they will Master of Information Technology Security 8

9 be exposed to a variety of perspectives and called upon to listen, assess and incorporate the ideas of others into the problem solving process. Collaborative activities will enable them to pose questions, devise and sustain arguments, and, most importantly, to be active participants in the learning process. While engaged in such interactive processes, they will learn from and contribute to the learning of others. Lifelong Learning Realistic case studies and lab exercises, presentations by representatives from the IT industry, and the capstone research projects will expose MITS students to the complexities and challenges of a dynamic and ever-changing IT security field. MITS graduates will work in highly complex and unpredictable environments, across different types of corporations and institutions, with a wide variety of colleagues and clients. Change and ambiguity are normal features of a technological environment and students will develop positive attitudes and pro-active strategies to manage them. Students will come to recognize that a strong base of technology knowledge and management skills, an ability to locate and utilize resources effectively, and a willingness to take informed risks will serve them well in demanding situations and changing environments. Students will learn how to engage in advanced research by using print and electronic publications, including scholarly journals, books, and prominent security research websites for the most up-to-date information on IT security. They will recognize the need for independent and ongoing learning to maintain currency in a rapidly changing field and to further develop their professional skills. MITS graduates will have the advanced knowledge base and skill set to undertake further education to support and advance their careers. Master of Information Technology Security 9

10 Transferable Skills All courses in the MITS curriculum have been designed to emphasize the development of qualities and transferable skills which contribute to the students' success as independent learners and as team players. Throughout the entire program, MITS students will be involved in a variety of tasks that involve the demonstration of effective communication skills using oral, written, graphic and electronic formats. They will be expected to share information in ways which are suitable for both lay and specialist audiences. Students will participate in small and large group activities and hone their skills as both team members and leaders. The coursework in the program will require hours of research along with activities involving practical applications. The demanding workload will require students to organize their time and manage their projects efficiently in order to meet clearly defined standards of performance and expected deadlines. UOIT is confident that the proposed MITS program is sufficiently comprehensive and rigorous to meet the standards of a graduate degree program and to provide students with the necessary knowledge base, technical, cognitive, and interpersonal skills and positive attitudes that will enable them to experience personal, academic, and professional success during their graduate studies at UOIT and beyond Samples of Student Work Since this program is not yet offered by the University, this section is not applicable to this submission. Master of Information Technology Security 10

11 6 PROGRAM CONTENT STANDARD 6.3 Program Comparisons The Applicant has on file and available upon request the research undertaken to complete Appendix n. The Applicant found that there are not more than five similar or related existing programs offered at Ontario universities and that there are more than three similar or related existing programs offered at universities in other jurisdictions (outside Canada) which could have been included in Appendix n. This unique MITS program, the first of its kind in Canada and one of a handful of such specialized IT Security graduate degree programs in North America and globally, prepares students to work in the high-tech professions as well as in business corporations, particularly in the IT security areas. Moreover, UOIT's partnership with the SANS (SysAdmin, Audit, Network, Security) Institute in the United States, the trusted leader in information security research, education, and certification, will allow MITS graduates to write tests for GIAC (Global Information Assurance Certification). No other graduate degree programs in Canada offer such a tangible career outcome Program Comparison Tables Institution: Carleton University Program Name & Credential: Bachelor of Computer Science - Information Systems Security Stream Program Description: Information Systems Security is concerned with security issues related to all aspects of networked information systems. Security has become an important parameter in the technological well being of our society, and affects all sectors in business, government and academia due to our dependence on information technology. This stream is for students interested in acquiring a solid background in computer science and software engineering, as well as depth in both the foundations and the practice of information systems security, including computer and network security, cryptography, and software security. It provides new career opportunities for security analysts and software engineers with an understanding of security issues in networked information systems. The broad spectrum of subject areas covered ranges from cryptographic applications to secure operating systems to security threats impacting network availability, and includes information storage, transmission and delivery. ( Similarities and Differences: Although there is no graduate degree level program in information technology security offered at Carleton University, this stream is offered at the undergraduate level. UOIT's proposed program provides opportunities for graduates of Carleton's program with appropriate qualifications to pursue a graduate level degree. Master of Information Technology Security 11

12 Institution: University of Ottawa Program Name & Credential: B.Sc. and M.Sc. in Computer Science Program Description: The University of Ottawa offers Masters level courses in the areas of Software Engineering, Theory of Computing, Computer Applications and Computer Systems. Similarities and Differences: There are a few courses related to Information Technology Security within these offerings but there is not a distinct undergraduate or master's level degree in the security area. Institution: James Madison University, Virginia Program Name & Credential: M.Sc. in Computer Science (with a concentration in Information Security) Program Description: People involved in information security must be able to understand and systematically employ and manage InfoSec concepts, principles, methods, techniques, practices and procedures drawn from U.S. statutes, current or pending. InfoSec experts also must understand procedures followed by the Department of Defense, federal, state and local governments, industry and businesses. The nature of information security education demands expertise concentrated in areas of information technologies, administrative operations, and law and regulation. The JMU Master of Science in Computer Science with a concentration in Information Security program will deliver this to the graduate student. The program is entirely Internet-based, with courses designed so that students and professors can maximize the use of their time asynchronously. Course objectives center on the the technical aspects of information security including: network and web security, intrusion detection, trusted systems, audit trails, secure operations, cryptography, legal issues, policies and procedures, as well as the management and implementation of computer science technology as it focuses on information security. Managing information security programs consists of preserving information confidentiality and protection, risk management, data and system integrity, availability, authenticity and utility. Similarities and Differences: The components of UOIT's proposed program are similar to the JMU model described above. Unlike JMU, UOIT's program is not Internet-based. Master of Information Technology Security 12

13 Institution: Mary Washington College, Virginia Program Name & Credential: Graduate Certificate in Information Security Program Description: James Monroe Center for Graduate and Professional Studies (JMC) at Mary Washington College in Virginia offers an entirely online 18-credit graduate certificate in Information Security. To offer the most up-to-date material, JMC partnered with a national leader in information security research and education, the SANS (SysAdmin, Audit, Network, Security) Institute. A SANS certification exam is included with each course. Students learn how to improve information security in order to prevent and minimize attacks on computer systems using commercially available tools. To gain admission to JMC's information security program, a student must have a bachelor's degree from a regionally accredited college or university, as well as a strong background in computer networks or operating systems. The typical participant is currently employed as a systems or network administrator or in a similar position. Similarities and Differences: UOIT's proposed program targets a similar applicant market and the curriculum has been developed to prepare the program graduates for SANS certification. The UOIT program is not offered in the online format. Master of Information Technology Security 13

14 6.6.2 Course Descriptions and Learning Outcomes Program Map - Master of Information Technology Security YEAR ONE SEMESTER ONE (9 credit hours) MITS 5100G Law & Ethics of IT Security MITS 5200G Advanced Communications Networks MITS 5300G Operating Systems Security SEMESTER TWO (9 credit hours) MITS 5400G Secure Software Systems MITS 5500G Cryptography and Secure Communications MITS 5600G Elective* YEAR TWO SEMESTER ONE (9 credit hours) MITS 6100G Attack and Defence MITS 6200G ecommerce Infrastructure Security MITS 6300G IT Security Capstone Research Project I SEMESTER TWO (9 credit hours) MITS 6400G Biometrics/Access Control and Smart Card Technology MITS 6500G Incident Handling, Recovery, Policies, & Risk Management MITS 6600G IT Security Capstone Research Project II *ELECTIVES MITS 5610G MITS 5620G Special Topics in IT Security Example: Multimedia Technology Special Topics in IT Management Examples: Economics of Information Technology Contemporary Management for IT Security Professionals Risk Management for Information Systems Nuclear Safety Management Note: All courses are 3 credit hours unless otherwise noted. Master of Information Technology Security 14

15 Classroom Requirements Naturally, classes for students will be scheduled in rooms which are an appropriate size to accommodate the learning activity. Smaller lecture rooms and break-out rooms for tutorials and small group activities will be available as needed. Classes and tutorials in all subjects require the use of computers and so all classrooms, seminar rooms and labs used by students will have wireless connectivity or will be wired for computer use and internet access. Additional physical requirements will include: data projectors in all classrooms, blinds on windows to reduce sun glare, comfortable and ergonomically sound chairs and tables for computing, white board with markers/eraser, and bulletin board display space in classrooms. Construction for the 50,000-square-foot School of Business and Information Technology building is expected to complete by September Details about this new facility are provided in Section Laboratory Facilities In order to enhance students learning experience and provide them with the necessary security hands-on skills and knowledge, the School will launch a Hacker Research Lab. This lab will mimic a network setting with equipment such as servers, clients, firewalls, routers, etc. Two groups of students will be assigned to work as defense and attack teams. The defense team is to secure their system with available hardware and software tools while the attack team will attempt to breach the security system as designed by the defense team. This simulated environment will train our students to better understand the information technology security from two different perspectives, namely, a technology security officer and a hacker. This lab is described in detail in Section Equipment Requirements The University of Ontario Institute of Technology is committed to advancing the highest quality of learning, teaching, research and professional practice. This means using educational technologies to enhance the learning experience, inspire innovative teaching and foster student success. This is learning and teaching for the 21st century. A laptop in every hand At the heart of our program is a personal laptop for each student. The connectivity that the laptop provides gives every student an equal opportunity to communicate with faculty, access course materials, make quality presentations, conduct research and pursue personal knowledge. The laptop facilitates broad access to information and gives professors the opportunity to employ advanced learning technologies. Master of Information Technology Security 15

16 Each student receives a current model of the IBM ThinkPad complete with hardware and software. Personal assistance, computer support, service and training are included. The laptop is upgraded every two years to ensure students and faculty have the most current capacity and technology. Students' laptops will be equipped with software tools which are relevant to the course and program. Access anytime The latest wireless technology is available in common public areas such as seminar rooms, learning commons, cafeterias and other special areas. Every laptop includes a wireless network card to ensure connectivity at the user's convenience as well as connection to wired laptop classrooms. A comprehensive data network-part of the campus and residence infrastructureprovides access to other students, faculty, program materials and the internet. Access to education resources from residence and off campus is available. Support and Service From the moment that students pick up a personal laptop at the university's Mobile Computing Centre, the University will ensure that they have access to on-going support and service. The Centre provides personal assistance in configuring, installing and testing software as well as regularly scheduled training seminars and hardware servicing. Drop-in or call-in Helpdesk services are available at the Centre. Master of Information Technology Security 16

17 6.6.1 Course Descriptions and Learning Outcomes Year 1, Semester 1 LAW AND ETHICS OF IT SECURITY This course covers the many ways in which commercial law applies to information technology security. As more and more business transactions and communications are now conducted electronically, the IT function within an institution has become the custodian of the official business records. This course introduces the laws governing the daily business of an institution or government agency, as those laws apply to the protection of information and computer systems. Emerging issues, such as privacy and information disclosures, will be discussed in the course. Learning Outcomes: 1. To assess technological issues in respect to legal and ethical issues. 2. To analyze the legal and ethical implications when implementing and deploying technology. 3. To demonstrate the basic understanding of legal and privacy issues related to technology by citing landmark cases. 4. To state legal resources used in technology applications. ADVANCED COMMUNICATION NETWORKS Networks are the essential components to information transmission, without which there are no communications. This course presents an overview of telecommunications networks and the fundamental concepts of the field, as well as advanced topics and detailed network architectures. This course blends an accessible technical presentation of important networking concepts with many business applications. Addressing networks from a top-down approach, this course shows students the big picture of networks in general so that they may see how the various parts of the network fit in to the picture. The course gives detailed descriptions of the principles associated with each layer and highlights many examples drawn from the Internet and wireless networks. The TCP/IP protocol stack will be discussed in detail with a variety of examples on its various layers. This course also describes all aspects of various wireless systems, from cordless phones, pagers, PDAs to mobile phones and wireless computers. The wide deployment of cellular phones for M-commerce applications and wireless LANs in corporate environments have resulted in interesting security challenges. Learning Outcomes: 1. To identify, describe, and evaluate a variety of electronic communications environments. 2. To apply the best communication environments and tools to solve problems. 3. Estimate the need for a communications networks and to evaluate methods for the selection of the best solutions. Master of Information Technology Security 17

18 4. To demonstrate the ability to design and implement security features for communications networks and related computer hardware and software. 5. To understand the various networking protocols and their applications and implications of security issues. OPERATING SYSTEMS SECURITY Study of operating system security with particular focus on the Windows and Unix/Linux operating system. Provide an overview of the security risk and management of the specified operating systems, and the preventive efforts to use the security features builtin within the systems and third-party applications. Understand and familiarize with various essentials reference sources available on the subjects on computer security, including organizations such as CERT. Learning Outcomes: 1. To understand the core security environment in an operating systems. 2. To demonstrate strengthening security features in an operating systems, including Unix and Windows. 3. To gain work experience in securing operating system via updates and patches. Year 1, Semester 2 SECURE SOFTWARE SYSTEMS Computer security is a bigger problem today than ever before even though most organizations have firewalls, antivirus software, and intrusion detection in place to keep attackers out. The simple cause for the problem at the heart of all computer security problems is bad software. This course takes a proactive approach to computer security and covers areas from the technical side of coding secure software to more managerial and project management tasks. Common coding problems like buffer overflows, random number generation and password authentication are addressed. A secondary focus is set on the a software design process; it needs to be set up so that security is built in at the very early stages and considered throughout the design process and not patched in a later point of time. Risk management in the development cycle as well as software and system audits will be discussed within the course. Learning Outcomes: 1. To understand the issues in developing secure software systems and how it differs from traditional software design. 2. To apply the knowledge by developing practical software secure systems. 3. To test software systems for their security measures. 4. To be aware of the current and future trends in secure software systems. 5. To describe the role and limitations of formal management and quality assurance practices in ensuring software quality. 6. To understand the security feature development in software engineering. 7. To understand how to manage risk in software planning. Master of Information Technology Security 18

19 CRYPTOGRAPHY AND SECURE COMMUNICATIONS Secrecy is certainly important to the security or integrity of information transmission. Indeed, the need for secure communications is more profound than ever, recognizing that the conduct of much of our commerce and business is being carried out today through the medium of computers and digital networks. This course is on cryptography, the umbrella term used to describe the science of secret communications. In this course, students with strong mathematical background learn the details about the transformation of a message into coded form by encryption and the recovery of the original message by decryption. This course describes cryptography through which secrecy, authentication, integrity, and non-repudiation can all be provided. Learning Outcomes: 1. To know how to break a number of historical ciphers. 2. To understand the different roles of information and complexity theory in cryptography. 3. To be aware of the number theory used in the RSA system. 4. To discuss and evaluate the security of new ciphers either in later courses or when in jobs. 5. To implement the DES and RSA algorithms in a high level language. 6. To state the modern methods of cryptography. ELECTIVES Students will select one of the following: Special Topics in IT Security OR Special Topics in IT Management Year 2, Semester 1 ATTACK AND DEFENCE The course covers attackers tactics and strategies and presents ways in finding vulnerabilities and discovering intrusions. It also discusses the latest cutting-edge insidious attack vectors, the oldie-but-goodie attacks that are still so prevalent, and everything in between. This course also presents the understanding tools needed to defend against attackers maintaining access and covering their tracks. This course examines and reviews various types of hacking tools and ways to harden the system or application against the attack. The course also discusses defenses and attacks for Windows, Unix, switches, routers and other systems. Master of Information Technology Security 19

20 Learning Outcomes: 1. To demonstrate the skills to identify potential targets for a computer attack and to locate tools needed to test the systems effectively for vulnerabilities. 2. To understand various tools exploit holes and to state ways to protect systems from each type of attacks. 3. To understand how attackers manipulate systems to discover hints associated with system compromise. ECOMMERCE INFRASTRUCTURE SECURITY This course introduces the main components of an ecommerce setup and covers the security related problems with these components. This course will visit some topics that are addressed in context of Advanced Networking or Operating System Security. It will provide an ecommerce context to these more technical issues. Major components that will be discussed are VPNs in business contexts, Mail Systems, Web Servers, and in particular Middleware Suites like Microsoft s.net framework and Sun s J2EE architecture and it s implementation in industrial strength products like JBOSS and IBM s WebSphere. Strategy and policy topics on how to find the right balance between security and usability will be addressed as well as the management of maintaining a secure infrastructure. Learning Outcomes: 1. To understand issues raised by securing e-commerce and other related applications. 2. To state how institutions and corporations should protect sensitive and confidential information. 3. To demonstrate how to work with Web Services applications, such as.net or J2EE technology by developing applications for the environments. 4. To understand the ways to secure an ecommerce environment. IT SECURITY CAPSTONE RESEARCH PROJECT I This course provides students with an opportunity to gather knowledge and skills learned from the program coursework and to conduct a research project with industrial applications. Students are expected to do a research literature review and to develop a set of hypotheses for a research project in IT security. A research proposal outlining alternative remedies to the problem and hypotheses should be submitted to the research faculty advisor by the end of the course semester. Learning Outcomes: 1. To apply and synthesize the knowledge and skills gained in the individual courses in the program of study to a project in information technology security. 2. To define a project, formulate its requirements and processes for carrying it out to a satisfactory conclusion 3. To research existing work and other relevant information for the project. 4. To perform project planning, preparation, budgeting, documentation and presentation of the conduct and results of the project 5. To demonstrate the required level of technical knowledge to solve problems presented by the chosen project. Master of Information Technology Security 20

MASTER OF SCIENCE IN INFORMATION ASSURANCE PROGRAM DEPARTMENT OF COMPUTER SCIENCE HAMPTON UNIVERSITY

MASTER OF SCIENCE IN INFORMATION ASSURANCE PROGRAM DEPARTMENT OF COMPUTER SCIENCE HAMPTON UNIVERSITY MASTER OF SCIENCE IN INFORMATION ASSURANCE PROGRAM DEPARTMENT OF COMPUTER SCIENCE HAMPTON UNIVERSITY HTTP://SCIENCE.HAMPTONU.EDU/COMPSCI/ The Master of Science in Information Assurance focuses on providing

More information

MSc Cyber Security UKPASS P052286. Course 1 Year Full-Time, 2-3 Years Part-Time

MSc Cyber Security UKPASS P052286. Course 1 Year Full-Time, 2-3 Years Part-Time MSc Cyber Security International Students Can Apply UKPASS P052286 Code: Course 1 Year Full-Time, 2-3 Years Part-Time Length: Start Dates: September 2015, January 2016, September 2016, January 2017 Department:Department

More information

MS Information Security (MSIS)

MS Information Security (MSIS) MS Information Security (MSIS) Riphah Institute of Systems Engineering (RISE) Riphah International University, Islamabad, Pakistan 1. Program Overview: The program aims to develop core competencies in

More information

Bachelor of Information Technology (Network Security)

Bachelor of Information Technology (Network Security) Bachelor of Information Technology (Network Security) Course Structure Year 1: Level 100 Foundation knowledge subjects SEMESTER 1 SEMESTER 2 ITICT101A Fundamentals of Computer Organisation ITICT104A Internetworking

More information

Course Specification MSc Accounting 2016-17 (MSACT)

Course Specification MSc Accounting 2016-17 (MSACT) LEEDS BECKETT UNIVERSITY Course Specification MSc Accounting 2016-17 (MSACT) Our courses undergo a process of review periodically, in addition to annual review and enhancement. Course Specifications are

More information

Course Bachelor of Information Technology majoring in Network Security or Data Infrastructure Engineering

Course Bachelor of Information Technology majoring in Network Security or Data Infrastructure Engineering Course Bachelor of Information Technology majoring in Network Security or Data Infrastructure Engineering Course Number HE20524 Location Meadowbank OVERVIEW OF SUBJECT REQUIREMENTS Note: This document

More information

Technology Courses. The following chart outlines the required courses in each of these three categories for the Ph.D. curriculum:

Technology Courses. The following chart outlines the required courses in each of these three categories for the Ph.D. curriculum: ITP PH.D. PROGRAM CONTENTS Overview... 2 Course Requirements... 3 Core Course Requirement... 4 Technology Course Requirement... 5 Business/Economic/Policy Course Requirement... 6 Preliminary Exam... 7

More information

Security Transcends Technology

Security Transcends Technology INTERNATIONAL INFORMATION SYSTEMS SECURITY CERTIFICATION CONSORTIUM, INC. Career Enhancement and Support Strategies for Information Security Professionals Paul Wang, MSc, CISA, CISSP Paul.Wang@ch.pwc.com

More information

Department of Information Systems and Cyber Security

Department of Information Systems and Cyber Security The University of Texas at San Antonio 1 Department of Information Systems and Cyber Security All graduate programs in Information Systems and Cyber Security are accredited by AACSB International The Association

More information

Bellevue University Cybersecurity Programs & Courses

Bellevue University Cybersecurity Programs & Courses Undergraduate Course List Core Courses: CYBR 250 Introduction to Cyber Threats, Technologies and Security CIS 311 Network Security CIS 312 Securing Access Control CIS 411 Assessments and Audits CYBR 320

More information

Track 2: Introductory Track PREREQUISITE: BASIC COMPUTER EXPERIENCE

Track 2: Introductory Track PREREQUISITE: BASIC COMPUTER EXPERIENCE Anne Arundel Community College Tracks Anne Arundel Community College s computer technologies courses have been organized into 10 suggested tracks. The tracks are arranged to ensure that students have the

More information

Textbooks: Matt Bishop, Introduction to Computer Security, Addison-Wesley, November 5, 2004, ISBN 0-321-24744-2.

Textbooks: Matt Bishop, Introduction to Computer Security, Addison-Wesley, November 5, 2004, ISBN 0-321-24744-2. CSET 4850 Computer Network Security (4 semester credit hours) CSET Elective IT Elective Current Catalog Description: Theory and practice of network security. Topics include firewalls, Windows, UNIX and

More information

Full time 2 years Part time 3 years

Full time 2 years Part time 3 years Programme Specification Programme Title: HND Computer Networks and Security Awarding Institution: Teaching Institution: Division and/or Faculty/Institute: Professional accreditation Final award(s): Interim

More information

Cisco Security Optimization Service

Cisco Security Optimization Service Cisco Security Optimization Service Proactively strengthen your network to better respond to evolving security threats and planned and unplanned events. Service Overview Optimize Your Network for Borderless

More information

Information and Network Security Certificate Program

Information and Network Security Certificate Program Information and Network Security Certificate Program University of California, Irvine, P.O. Box 6050, Irvine, CA 92612-6050 www.extension.uci.edu PROGRAM DESCRIPTION Data security is critical and increasingly

More information

LINUX / INFORMATION SECURITY

LINUX / INFORMATION SECURITY LINUX / INFORMATION SECURITY CERTIFICATE IN LINUX SYSTEM ADMINISTRATION The Linux open source operating system offers a wide range of graphical and command line tools that can be used to implement a high-performance,

More information

RARITAN VALLEY COMMUNITY COLLEGE COURSE OUTLINE. CISY 229 Information Security Fundamentals

RARITAN VALLEY COMMUNITY COLLEGE COURSE OUTLINE. CISY 229 Information Security Fundamentals RARITAN VALLEY COMMUNITY COLLEGE COURSE OUTLINE CISY 229 Information Security Fundamentals I. Basic Course Information A. Course Number & Title: CISY-229 Information Security Fundamentals B. New or Modified

More information

National Qualifications Framework for Higher Education in Thailand IMPLEMENTATION HANDBOOK

National Qualifications Framework for Higher Education in Thailand IMPLEMENTATION HANDBOOK National Qualifications Framework for Higher Education in Thailand IMPLEMENTATION HANDBOOK November 2006 National Qualifications Framework for Higher Education in Thailand Implementation Handbook Table

More information

Lecturer in the School of Computer Applications

Lecturer in the School of Computer Applications Lecturer in the School of Computer Applications Job Description The School of Computer Applications is responsible for the disciplines of computing and quantitative methods within the University and has

More information

Faculty of Nursing. Master s Project Manual. For Faculty Supervisors and Students

Faculty of Nursing. Master s Project Manual. For Faculty Supervisors and Students 1 Faculty of Nursing Master s Project Manual For Faculty Supervisors and Students January 2014 2 Table of Contents Overview of the Revised MN Streams in Relation to Project 3 The Importance of Projects

More information

LOUGHBOROUGH UNIVERSITY

LOUGHBOROUGH UNIVERSITY LOUGHBOROUGH UNIVERSITY Programme Specification Computer Science Please note: This specification provides a concise summary of the main features of the programme and the learning outcomes that a typical

More information

INFORMATION SYSTEMS AND TECHNOLOGY MANAGEMENT

INFORMATION SYSTEMS AND TECHNOLOGY MANAGEMENT INFORMATION SYSTEMS AND TECHNOLOGY MANAGEMENT UNDERGRADUATE Bachelor's programs Bachelor of Business Administration with a concentration in information systems and technology management (http:// bulletin.gwu.edu/business/undergraduate-programs/

More information

Department of Mathematics and Computer Sciences

Department of Mathematics and Computer Sciences Department of Mathematics and Computer Sciences DEGREES Learning Technologies (MS) Instructional Design and Technology (MS) CERTIFICATES Learning Technologies Virtual Worlds in Education Instructional

More information

Nettitude Ltd. (FHEQ) level 7] MSc Postgraduate Diploma Postgraduate Certificate. British Computer Society (BCS) Master s Degree in Computing

Nettitude Ltd. (FHEQ) level 7] MSc Postgraduate Diploma Postgraduate Certificate. British Computer Society (BCS) Master s Degree in Computing Faculty of Engineering and Informatics Programme Specification Programme title: MSc Cyber Security Academic Year: 2015/16 Degree Awarding Body: Partner(s), delivery organisation or support provider (if

More information

Curran, K. Tutorials. Independent study (including assessment) N/A

Curran, K. Tutorials. Independent study (including assessment) N/A MODULE TITLE: MODULE CODE: Systems Security COM535 YEAR OF REVISION: 2013/14 MODULE LEVEL: 6 CREDIT POINTS: 20 MODULE STATUS: SEMESTER: 1 LOCATION: E-LEARNING: PREREQUISITE(S): CO-REQUISITE(S): MODULE

More information

The Next Generation of Security Leaders

The Next Generation of Security Leaders The Next Generation of Security Leaders In an increasingly complex cyber world, there is a growing need for information security leaders who possess the breadth and depth of expertise necessary to establish

More information

LONDON SCHOOL OF COMMERCE. Programme Specification for the. Cardiff Metropolitan University. BSc (Hons) in Computing

LONDON SCHOOL OF COMMERCE. Programme Specification for the. Cardiff Metropolitan University. BSc (Hons) in Computing LONDON SCHOOL OF COMMERCE Programme Specification for the Cardiff Metropolitan University BSc (Hons) in Computing Contents Programme Aims and Objectives Programme Structure Programme Outcomes Mapping of

More information

REQUIREMENTS. for OMAN S SYSTEM OF QUALITY ASSURANCE IN HIGHER EDUCATION

REQUIREMENTS. for OMAN S SYSTEM OF QUALITY ASSURANCE IN HIGHER EDUCATION APPROVED VERSION Page 1 REQUIREMENTS for OMAN S SYSTEM OF QUALITY ASSURANCE IN HIGHER EDUCATION APPROVED VERSION Page 2 TABLE OF CONTENTS INTRODUCTION Part One: Standards I. Standards for Quality Assurance

More information

Programme Specification and Curriculum Map for MSc Computer and Network Security

Programme Specification and Curriculum Map for MSc Computer and Network Security Programme Specification and Curriculum Map for MSc Computer and Network Security 1. Programme title MSc Computer and Network Security 2. Awarding institution Middlesex University 3. Teaching institution

More information

Programme Specification. MSc Accounting. Valid from: September 2014 Faculty of Business

Programme Specification. MSc Accounting. Valid from: September 2014 Faculty of Business Programme Specification MSc Accounting Valid from: September 2014 Faculty of Business 1 SECTION 1: GENERAL INFORMATION Awarding body: Teaching institution and location: Final award: Programme title: Interim

More information

Cisco Advanced Services for Network Security

Cisco Advanced Services for Network Security Data Sheet Cisco Advanced Services for Network Security IP Communications networking the convergence of data, voice, and video onto a single network offers opportunities for reducing communication costs

More information

Cyber Defense Operations Graduate Certificate

Cyber Defense Operations Graduate Certificate The SANS Technology Institute makes shorter groups of courses available to students who are unable to commit to a full master s degree program. These certificate programs will augment your skills, provide

More information

Curriculum and Module Handbook. Master s Degree Programme. in Finance (Master of Science in Finance) 1 September 2015

Curriculum and Module Handbook. Master s Degree Programme. in Finance (Master of Science in Finance) 1 September 2015 Curriculum and Module Handbook Master s Degree Programme in Finance (Master of Science in Finance) 2015 1 September 2015 1 The curriculum was developed by the following University of Liechtenstein faculty

More information

Programme Specification. Computer Networks and Security with Foundation. Creative Technologies Academic Group. Division and/or Faculty/Institute:

Programme Specification. Computer Networks and Security with Foundation. Creative Technologies Academic Group. Division and/or Faculty/Institute: Programme Specification BSc (Hons) Computer Networks and Security with Foundation Awarding Institution: Teaching Institution: Division and/or Faculty/Institute: Professional accreditation Final award(s):

More information

MSc in Network Centred Computing. For students entering in October 2009. contributions from other EU universities Faculty of Science

MSc in Network Centred Computing. For students entering in October 2009. contributions from other EU universities Faculty of Science MSc in Network Centred Computing (NCC) For students entering in October 2009 Awarding Institution: The University of Reading Teaching Institution: The University of Reading, with contributions from other

More information

Information Technology Career Cluster Introduction to Cybersecurity Course Number: 11.48100

Information Technology Career Cluster Introduction to Cybersecurity Course Number: 11.48100 Information Technology Career Cluster Introduction to Cybersecurity Course Number: 11.48100 Course Description: Introduction to Cybersecurity is designed to provide students the basic concepts and terminology

More information

Programme Specification

Programme Specification Programme Specification Course record information Name and level of final award: MSc Cyber Security and Forensics Name and level of intermediate awards: Postgraduate Diploma in Cyber Security and Forensics

More information

Part one: Programme Specification

Part one: Programme Specification Part one: Programme Specification Course record information Name and level of final award: Name and level of intermediate awards: Awarding body/institution: Status of awarding body/institution: Location

More information

Course Descriptions November 2014

Course Descriptions November 2014 Master of Science In Information Security Management Course Descriptions November 2014 Master of Science in Information Security Management The Master of Science in Information Security Management (MSISM)

More information

GRADUATE STUDIES. education. uoit.ca/graduate OSHAWA, CANADA

GRADUATE STUDIES. education. uoit.ca/graduate OSHAWA, CANADA GRADUATE STUDIES education. uoit.ca/graduate OSHAWA, CANADA INTRODUCTION MESSAGE FROM THE DIRECTOR Education as a concept is rapidly changing in its objectives, content and modalities. The role of technology

More information

Faculty of Education Graduate Studies. www.education.uoit.ca

Faculty of Education Graduate Studies. www.education.uoit.ca Faculty of Education Graduate Studies www.education.uoit.ca A MESSAGE FROM THE DIRECTOR Thank you for considering the Faculty of Education at the University of Ontario Institute of Technology (UOIT) for

More information

Plymouth University. Faculty of Science and Engineering. School of Computing Electronics and Mathematics. Programme Specification

Plymouth University. Faculty of Science and Engineering. School of Computing Electronics and Mathematics. Programme Specification Plymouth University Faculty of Science and Engineering School of Computing Electronics and Mathematics Programme Specification MSc Network Systems Engineering Programme codes: 2359 (Sept), 2938(Jan) September

More information

INDIANAPOLIS, IN 2011 CATALOG Volume 78

INDIANAPOLIS, IN 2011 CATALOG Volume 78 TABLE OF CONTENTS CURRICULA 2 SCHOOL OF INFORMATION TECHNOLOGY 2 INFORMATION SYSTEMS AND CYBERSECURITY (RESIDENCE PROGRAM) 2 INFORMATION SYSTEMS AND CYBERSECURITY (ONLINE PROGRAM) 3 INFORMATION SYSTEMS

More information

RARITAN VALLEY COMMUNITY COLLEGE COURSE OUTLINE. CISY 275 UNIX and Linux Security Management

RARITAN VALLEY COMMUNITY COLLEGE COURSE OUTLINE. CISY 275 UNIX and Linux Security Management RARITAN VALLEY COMMUNITY COLLEGE COURSE OUTLINE CISY 275 UNIX and Linux Security Management I. Basic Course Information A. Course Number & Title: CISY-275 - UNIX and Linux Security Management B. Date of

More information

Post-graduate Programmes in Construction. Chartered Institute of Building; Royal Institution of Chartered Surveyors

Post-graduate Programmes in Construction. Chartered Institute of Building; Royal Institution of Chartered Surveyors MSc Construction Management (full-time) For students entering in 2014/5 Awarding Institution: Teaching Institution: Relevant QAA subject Benchmarking group(s): Faculty: Programme length: Date of specification:

More information

OVERVIEW DEGREES & CERTIFICATES

OVERVIEW DEGREES & CERTIFICATES OVERVIEW DEGREES & CERTIFICATES 015 The best. Made better. SANS graduate programs are the ultimate expression of our 25 years dedicated to the education and development of information security professionals.

More information

Principles of Information Assurance Syllabus

Principles of Information Assurance Syllabus Course Number: Pre-requisite: Career Cluster/Pathway: Career Major: Locations: Length: 8130 (OHLAP Approved) Fundamentals of Technology or equivalent industry certifications and/or work experience. Information

More information

UNDERGRADUATE PROGRAMME SPECIFICATION

UNDERGRADUATE PROGRAMME SPECIFICATION UNDERGRADUATE PROGRAMME SPECIFICATION Programme Title: Awarding Body: Teaching Institution: Final Awards: Intermediate Awards: Mode of Study: Computer Networks and Security Staffordshire University Faculty

More information

Hackers are here. Where are you?

Hackers are here. Where are you? 1 2 What is EC-Council Certified Security Analyst Licensed Penetration Tester Program You are an ethical hacker. Your last name is Pwned. You dream about enumeration and you can scan networks in your sleep.

More information

DEPARTMENT OF MATHEMATICS AND STATISTICS GRADUATE STUDENT HANDBOOK. April 2015

DEPARTMENT OF MATHEMATICS AND STATISTICS GRADUATE STUDENT HANDBOOK. April 2015 DEPARTMENT OF MATHEMATICS AND STATISTICS GRADUATE STUDENT HANDBOOK April 2015 Postal address: Department of Mathematics and Statistics, Washington State University, Pullman, WA 99164-3113 Voice: 509-335-8645

More information

ASSOCIATE DEGREE OF BUSINESS COURSE OUTLINE 2015. Information correct as of August 2014. Provider CRICOS Code 00020G Higher Education Provider

ASSOCIATE DEGREE OF BUSINESS COURSE OUTLINE 2015. Information correct as of August 2014. Provider CRICOS Code 00020G Higher Education Provider GOVERNMENT OF WESTERN AUSTRALIA ASSOCIATE DEGREE OF BUSINESS COURSE OUTLINE 2015 Information correct as of August 2014. Provider CRICOS Code 00020G Higher Education Provider The Administrative Information

More information

PROGRAMME SPECIFICATION Postgraduate Diploma / Master of Science Psychology

PROGRAMME SPECIFICATION Postgraduate Diploma / Master of Science Psychology Faculty of Education, Health and Sciences PROGRAMME SPECIFICATION Postgraduate Diploma / Master of Science Psychology Valid from September 2012 www.derby.ac.uk/ehs 1 CONTENTS SECTION ONE: GENERAL INFORMATION...

More information

Doctoral Programs. the globally networked management school

Doctoral Programs. the globally networked management school Doctoral Programs the globally networked management school Accreditation Accreditation is the review of the quality of higher education institutions and programs. Why is accreditation important? It is

More information

Information Technology Department

Information Technology Department Information Technology Department Information Technology Department About Us The Information Technology Department is one of the largest departments at Ahlia University, offering thirty five undergraduate

More information

Programme name Advanced Practice in Health and Social Care (Advanced Nurse Practitioner- Neonatal/Child/Adult)

Programme name Advanced Practice in Health and Social Care (Advanced Nurse Practitioner- Neonatal/Child/Adult) PROGRAMME SPECIFICATION KEY FACTS Programme name Advanced Practice in Health and Social Care (Advanced Nurse Practitioner- Neonatal/Child/Adult) Award MSc School School of Health Sciences Department Division

More information

RARITAN VALLEY COMMUNITY COLLEGE COURSE OUTLINE. CISY 276 Windows Security Management

RARITAN VALLEY COMMUNITY COLLEGE COURSE OUTLINE. CISY 276 Windows Security Management RARITAN VALLEY COMMUNITY COLLEGE COURSE OUTLINE CISY 276 Windows Security Management I. Basic Course Information A. Course Number & Title: CISY-276 Windows Security Management B. Date of Revision: Spring

More information

PROGRAMME SPECIFICATION UNDERGRADUATE PROGRAMMES. Cass Business School Department or equivalent UG Programme (Cass Business School) UCAS Code

PROGRAMME SPECIFICATION UNDERGRADUATE PROGRAMMES. Cass Business School Department or equivalent UG Programme (Cass Business School) UCAS Code PROGRAMME SPECIFICATION UNDERGRADUATE PROGRAMMES KEY FACTS Programme name Business Studies Award BSc (Hons) School Cass Business School Department or equivalent UG Programme (Cass Business School) UCAS

More information

Information Security Engineering

Information Security Engineering Master of Science In Information Security Engineering Course Descriptions November 2014 Master of Science in Information Security Engineering The program of study for the Master of Science in Information

More information

MSc in Computer and Information Security

MSc in Computer and Information Security MSc in Computer and Information Security Programme Specification Primary Purpose: Course management, monitoring and quality assurance. Secondary Purpose: Detailed information for students, staff and employers.

More information

e-code Academy Information Security Diploma Training Discerption

e-code Academy Information Security Diploma Training Discerption e-code Academy Information Security Diploma Training 2015 I. CONTENTS II. INTRODUCTION... 2 OVERVIEW... 2 COPYRIGHTS AND TRADEMARKS... 2 III. OBJECTIVE... 3 LIST OF POSTGRADUATE COURSES... 3 FIRST SEMESTER

More information

A Guide to Learning Outcomes, Degree Level Expectations and the Quality Assurance Process in Ontario

A Guide to Learning Outcomes, Degree Level Expectations and the Quality Assurance Process in Ontario A Guide to Learning Outcomes, Degree Level Expectations and the Quality Assurance Process in Ontario A Guide to Learning Outcomes, Degree Level Expectations and the Quality Assurance Process in Ontario

More information

Researching and Choosing a School

Researching and Choosing a School Researching and Choosing a School Updated October 2015 This section is to help you determine what school best suits your learning style and training needs. It is your responsibility to investigate all

More information

UNIVERSITY OF BRADFORD

UNIVERSITY OF BRADFORD UNIVERSITY OF BRADFORD Faculty of Engineering and Informatics School of Electrical Engineering and Computer Science Programme title: 3+0 BEng Electrical and Electronic Engineering (NAMAL) Awarding Institution:

More information

University of Bradford: Postgraduate Programme specification. UNIVERSITY OF BRADFORD School of Management

University of Bradford: Postgraduate Programme specification. UNIVERSITY OF BRADFORD School of Management University of Bradford: Postgraduate Programme specification UNIVERSITY OF BRADFORD School of Management Programme title: Doctor of Business Administration Awarding and teaching institution: Final award:

More information

SMU PhD IN BUSINESS Advance knowledge at Asia s leading business and management university

SMU PhD IN BUSINESS Advance knowledge at Asia s leading business and management university SMU PhD IN BUSINESS Advance knowledge at Asia s leading business and management university Message from Associate Dean (Research) and Programme Director The Lee Kong Chian School of Business at the Singapore

More information

Network Security Course Specifications2011-2012

Network Security Course Specifications2011-2012 Assiut University Faculty of Computers & Information Department of Information Technology Quality Assurance Unit Network Security Course Specifications2011-2012 Relevant program B.Sc. in Computers and

More information

Computer Network Engineering

Computer Network Engineering 226 Computer Network Engineering Computer Network Engineering Degrees, Certificates and Awards Associate in Science: Computer Network Engineering Certificate of Achievement: Computer Network Engineering

More information

PROGRAMME SPECIFICATION

PROGRAMME SPECIFICATION PROGRAMME SPECIFICATION Course record information Name and level of final award: Name and level of intermediate awards: The BSc (Hons) Computer Science is a B.Sc. BSc (Hons) Computer Science with Industrial

More information

PROGRAMME SPECIFICATION

PROGRAMME SPECIFICATION MANCHESTER METROPOLITAN UNIVERSITY PS/1 PROGRAMME SPECIFICATION Basic Programme Details 1 Programme title MSc Sport and Exercise Science (MScSES) 2 Mode(s) and duration MScSES : Full -time study : 12 months,

More information

Hackers are here. Where are you?

Hackers are here. Where are you? 1 2 What is EC-Council Certified Security Analyst Licensed Penetration Tester Program You are an ethical hacker. Your last name is Pwned. You dream about enumeration and you can scan networks in your sleep.

More information

Introduction to Cyber Security / Information Security

Introduction to Cyber Security / Information Security Introduction to Cyber Security / Information Security Syllabus for Introduction to Cyber Security / Information Security program * for students of University of Pune is given below. The program will be

More information

DIGITAL FORENSICS SPECIALIZATION IN BACHELOR OF SCIENCE IN COMPUTING SCIENCE PROGRAM

DIGITAL FORENSICS SPECIALIZATION IN BACHELOR OF SCIENCE IN COMPUTING SCIENCE PROGRAM DIGITAL FORENSICS SPECIALIZATION IN BACHELOR OF SCIENCE IN COMPUTING SCIENCE PROGRAM Proposed Program Title: Bachelor of Science in Computing Science- Specialization in Digital Forensics Specialization

More information

IT Security. Securing Your Business Investments

IT Security. Securing Your Business Investments Securing Your Business Investments IT Security NCS GROUP OFFICES Australia Bahrain China Hong Kong SAR India Korea Malaysia Philippines Singapore Sri Lanka Securing Your Business Investments! Information

More information

POSTGRADUATE PROGRAMME SPECIFICATION

POSTGRADUATE PROGRAMME SPECIFICATION POSTGRADUATE PROGRAMME SPECIFICATION Programme Title: Awarding Body: Teaching Institution: Final Awards: Intermediate Awards: Mode of Study: UCAS Codes: QAA Subject Benchmarks: MSc Cloud Computing Staffordshire

More information

Penetration testing & Ethical Hacking. Security Week 2014

Penetration testing & Ethical Hacking. Security Week 2014 Penetration testing & Ethical Hacking Security Week 2014 Agenda Penetration Testing Vulnerability Scanning Social engineering Security Services offered by Endava 2 3 Who I am Catanoi Maxim Information

More information

Computer Security. Principles and Practice. Second Edition. Amp Kumar Bhattacharjee. Lawrie Brown. Mick Bauer. William Stailings

Computer Security. Principles and Practice. Second Edition. Amp Kumar Bhattacharjee. Lawrie Brown. Mick Bauer. William Stailings Computer Security Principles and Practice Second Edition William Stailings Lawrie Brown University ofnew South Wales, Australian Defence Force Academy With Contributions by Mick Bauer Security Editor,

More information

New Cavendish Street. Business Studies. n/a

New Cavendish Street. Business Studies. n/a PROGRAMME SPECIFICATION Course Record Information Name and level of final & intermediate Awards MA Music Business Management Postgraduate Certificate in Music Business Management Postgraduate Diploma in

More information

University of Plymouth. Programme Specification. M.Eng. Mechanical Engineering

University of Plymouth. Programme Specification. M.Eng. Mechanical Engineering University of Plymouth Faculty of Technology Programme Specification M.Eng. Mechanical Engineering Date: 19 th June 2007 Brief description of Programme The MEng programme is a 5 year thick sandwich or

More information

City University of Hong Kong

City University of Hong Kong CIR-MAJ City University of Hong Kong Department of Computer Science Effective from Semester A 2015/16 For Students Admitted/Changed to the Major with Catalogue Term Semester A 2015/16 and thereafter Part

More information

E-commerce. Security. Learning objectives. Internet Security Issues: Overview. Managing Risk-1. Managing Risk-2. Computer Security Classifications

E-commerce. Security. Learning objectives. Internet Security Issues: Overview. Managing Risk-1. Managing Risk-2. Computer Security Classifications Learning objectives E-commerce Security Threats and Protection Mechanisms. This lecture covers internet security issues and discusses their impact on an e-commerce. Nov 19, 2004 www.dcs.bbk.ac.uk/~gmagoulas/teaching.html

More information

OCR LEVEL 3 CAMBRIDGE TECHNICAL

OCR LEVEL 3 CAMBRIDGE TECHNICAL Cambridge TECHNICALS OCR LEVEL 3 CAMBRIDGE TECHNICAL CERTIFICATE/DIPLOMA IN IT NETWORKED SYSTEMS SECURITY J/601/7332 LEVEL 3 UNIT 28 GUIDED LEARNING HOURS: 60 UNIT CREDIT VALUE: 10 NETWORKED SYSTEMS SECURITY

More information

Graduate Program Policies and Procedures

Graduate Program Policies and Procedures The University of British Columbia Department of Physics & Astronomy Graduate Program Policies and Procedures May 2007 Table of Contents 1 Introduction 4 2 Programs 4 3 Admissions 4 3.1 Eligibility 4 3.2

More information

Please review current Graduate College policies and procedures.

Please review current Graduate College policies and procedures. Ph.D. Degree Requirements and Procedures Summary of Procedures for Ph.D. Students Complete every deficiency course with a grade of B or higher within the first two terms File an approved tentative program

More information

Previous Approvals: April 5, 2005; May 6, 2008; November 2, 2010; May 3, 2011, May 3, 2011, May 7, 2013

Previous Approvals: April 5, 2005; May 6, 2008; November 2, 2010; May 3, 2011, May 3, 2011, May 7, 2013 RYERSON UNIVERSITY POLICY OF SENATE PERIODIC PROGRAM REVIEW OF GRADUATE AND UNDERGRADUATE PROGRAMS Policy Number 126 Previous Approvals: April 5, 2005; May 6, 2008; November 2, 2010; May 3, 2011, May 3,

More information

MSc Cyber Security. identity. hacker. virus. network. information

MSc Cyber Security. identity. hacker. virus. network. information identity MSc Cyber Security hacker virus QA is the foremost provider of education in the UK. We work with individuals at all stages of their careers, from our award-winning apprenticeship programmes, through

More information

Programme Specification. MRes Developmental Psychology. Valid from: September 2012 Faculty of Health & Life Sciences

Programme Specification. MRes Developmental Psychology. Valid from: September 2012 Faculty of Health & Life Sciences Programme Specification MRes Developmental Psychology Valid from: September 2012 Faculty of Health & Life Sciences SECTION 1: GENERAL INFORMATION Awarding body: Teaching institution and location: Final

More information

Student Guide for the Ph.D. Degree Program in Educational Administration and Policy Studies

Student Guide for the Ph.D. Degree Program in Educational Administration and Policy Studies Department of Educational Administration and Policy Studies State University of New York at Albany Student Guide for the Ph.D. Degree Program in Educational Administration and Policy Studies April 2001

More information

Academic/Instructional Methodologies and Delivery Systems. Classroom Instruction

Academic/Instructional Methodologies and Delivery Systems. Classroom Instruction Academic/Instructional Methodologies and Delivery Systems ITT Technical Institutes are institutes of higher learning that are committed to offering quality undergraduate and continuing education locally,

More information

BSc (Honours) Computing and Information Systems (Distance Learning)

BSc (Honours) Computing and Information Systems (Distance Learning) BSc (Honours) Computing and Information Systems (Distance Learning) Programme Specification Primary Purpose: Course management, monitoring and quality assurance. Secondary Purpose: Detailed information

More information

Programme Specification and Curriculum Map for BSc Honours Computing, Graphics and Games

Programme Specification and Curriculum Map for BSc Honours Computing, Graphics and Games Programme Specification and Curriculum Map for BSc Honours Computing, Graphics and Games 1. Programme title BSc Honours Computing, Graphics and Games 2. Awarding institution Middlesex University 3. Teaching

More information

Master of Arts in Higher Education (both concentrations)

Master of Arts in Higher Education (both concentrations) Higher Education Dickinson Hall, Room 419 (501) 569-3267 Master of Arts and Doctor of Education The Master of Arts in Higher Education is designed for those individuals who are interested in entering or

More information

Mechanical Engineering Program. Policies and Procedures

Mechanical Engineering Program. Policies and Procedures Mechanical Engineering Program Policies and Procedures For M.S. and Ph.D. Degrees in Mechanical Engineering At the University of California, Merced Submitted by: Ashlie Martini Chair of the Mechanical

More information

Certifications and Standards in Academia. Dr. Jane LeClair, Chief Operating Officer National Cybersecurity Institute

Certifications and Standards in Academia. Dr. Jane LeClair, Chief Operating Officer National Cybersecurity Institute Certifications and Standards in Academia Dr. Jane LeClair, Chief Operating Officer National Cybersecurity Institute Accreditation What is it? Why is it important? How is it attained? The National Centers

More information

2011-2012 Program Guidebook

2011-2012 Program Guidebook 2011-2012 Program Guidebook Organizational Leadership, PhD Online-Blended 1 Table of Contents Department Educational Model and Goals... 3 TCSPP Individual and Cultural Differences... 4 Program Competencies...

More information

RESTRICTED. Professional Accreditation Handbook For Computer Science Programmes

RESTRICTED. Professional Accreditation Handbook For Computer Science Programmes Professional Accreditation Handbook For Computer Science Programmes Revised by authority of the Accreditation Committee for Computer Science Programmes as of August 2014 CONTENTS 1. FRAMEWORK FOR ACCREDITATION

More information

---Information Technology (IT) Specialist (GS-2210) IT Security Competency Model---

---Information Technology (IT) Specialist (GS-2210) IT Security Competency Model--- ---Information Technology (IT) Specialist (GS-2210) IT Security Model--- TECHNICAL COMPETENCIES Computer Forensics Knowledge of tools and techniques pertaining to legal evidence used in the analysis of

More information

Graduate Program Policies and Procedures

Graduate Program Policies and Procedures The University of British Columbia Department of Physics & Astronomy Graduate Program Policies and Procedures Sept 2011 Table of Contents 1. Introduction!... 4 2. Programs!... 4 3. Admissions!... 4 3.1.

More information

Curriculum Proposal Training Assessment Forms Center for Teaching and Learning

Curriculum Proposal Training Assessment Forms Center for Teaching and Learning Curriculum Proposal Training Assessment Forms Center for Teaching and Learning Monica Varner, Ph.D. Director of Assessment and Institutional Effectiveness and Center for Teaching and Learning Associate

More information

Critical Controls for Cyber Security. www.infogistic.com

Critical Controls for Cyber Security. www.infogistic.com Critical Controls for Cyber Security www.infogistic.com Understanding Risk Asset Threat Vulnerability Managing Risks Systematic Approach for Managing Risks Identify, characterize threats Assess the vulnerability

More information