Certifications and Standards in Academia. Dr. Jane LeClair, Chief Operating Officer National Cybersecurity Institute

Size: px
Start display at page:

Download "Certifications and Standards in Academia. Dr. Jane LeClair, Chief Operating Officer National Cybersecurity Institute"

Transcription

1 Certifications and Standards in Academia Dr. Jane LeClair, Chief Operating Officer National Cybersecurity Institute

2 Accreditation What is it? Why is it important? How is it attained?

3 The National Centers of Academic Excellence in Information Assurance Has been a two-step process sponsored by NSA 1. Committee on National Security Systems (CNSS) Training Standards as a prerequisite 2. Recognition as a Center for Academic Excellence CAE - Information Assurance Education CAE - 2 Year Education CAE - Research

4 CNSS Standards The CNSS defines several standards, which include standards on training in IT security: NSTISSI-4011 National Training Standard for Information Systems Security (INFOSEC) Professionals CNSSI-4012 National Information Assurance Training Standard for Senior Systems Managers CNSSI-4013 National Information Assurance Training Standard For System Administrators CNSSI-4014 Information Assurance Training Standard for Information Systems Security Officers NSTISSI-4015 National Training Standard for Systems Certifiers CNSSI-4016 National Information Assurance Training Standard For Risk Analysts

5 Criteria for Measurement 1. Outreach/Collaboration 2. IA Treated as a Multidisciplinary Science 3. University Encourages the Practice of IA 4. Academic Program Encourages Student Research in IA 5. Faculty Active in Current IA Practice and Research 6. IA Resources 7. IA Academic Program is Robust and Active 8. Declared Center of IA Education 9. Number of IA Faculty and Course Load

6 Criterion 1 -Outreach/Collaboration Provide evidence of partnerships in IA education with minority colleges and universities, two-year community colleges, or technical schools. Partnerships may include: shared curriculum and resources, shared faculty, and reciprocity of credits

7 Criterion 2 - IA Treated as a Multidisciplinary Science The academic program demonstrates that IA is not treated as a separate discipline, but as a multidisciplinary science with the body of IA knowledge incorporated into various disciplines

8 Criterion 3 - University Encourages the Practice of IA The academic program demonstrates how the university encourages the practice of IA, not merely that IA is taught

9 Criterion 4 - Academic Program Encourages Student Research in IA The academic program encourages student research in IA, since research fuels the relevancy and currency of IA curricula

10 Criterion 5 - Faculty Active in Current IA Practice and Research It is clearly demonstrated that the faculty is active in current IA practice and research, contributes to IA literature, and are members of IA professional societies or attend professional IA conferences

11 Criterion 6 -IA Resources The faculty and students have access to IA resources and reference materials

12 Criterion 7 - IA Academic Program is Robust and Active Academic program, within a nationally or regionally accredited four-year college or graduate-level university, has an area of study or focus area in IA. Identify the courses required for each area, and provide syllabus, enrollment data for current academic year (not projected), and actual graduation data (not projected) for the past two academic years. Courses must be verifiable through on-line course catalog

13 Criterion 8 Declared Center for IA Education The university has a declared "center" for IA education or a center for IA research from which the IA curriculum is emerging. The center may be school- or university-based. Provide documentation of the designation of the Center, signed by the Dean

14 Criterion 9 - Number of IA Faculty and Course Load University IA faculty consists of a sufficient number of full-time IA faculty members and additional members teaching at least one IA course. For the purposes of these criteria, full-time faculty may be defined as a professor dedicated to teaching three IA courses per semester, or two IA courses with research, or one IA course with research and with advisees at Masters and Doctoral Level. Shared and cross-departmental appointments for part-time and adjunct faculty may be counted, as well as institutional agreements for cooperative exchange of adjunct faculty between universities. This criterion requires a letter signed by the Dean identifying the faculty and teaching workload and a link to a biography or curriculum vitae for each faculty member

15 NEW NSA/DHS Information Assurance / Cyber Operations Designation Goal is to replace existing programs designated as CAE/IAE, CAE/2Y and CAE/R and replace the two step process CNSS/CAE Designation moves from Program to College level recognition Creation of a designation to distinguish strengths of each CAE Institution Benefit for students, employers, hiring managers throughout the nation New designation will be NSA/DHS CAE Cyber Operations and will replace previous designations 15

16 Criteria for Measurement CAE / Cyber Operations 1. Academic Content 2. Cyber Operations Recognized via Degree, Certificate or Focus Area 3. Program Accreditation or Curricula Review 4. Cyber Operations treated as an Inter-Disciplinary Science 5. Cyber Operations Academic Program is Robust and Active 6. Faculty Involvement in Cyber Operations-Related Research 7. Student Involvement in Cyber Operations-Related Research 8. Student Participation in Cyber Service-Learning Activities 9. Commitment to Participate in Summer Seminars Provided by the CAE-Cyber Operations program 10. Number of Faculty Involved in Cyber Operations Education and Research Activities

17 Criterion 1 Academic Content Program must include knowledge units covering 100% of the mandatory academic content 60% of the optional academic content

18 Criterion 1 Mandatory Academic Content 1. Low level programming languages C programming, Assembly Language programming 2. Software reverse engineering Reverse engineering for software specification recovery, malware analysis, tools, techniques, communications 3. Operating system theory Privileged vs non-privileged states, Concurrency and synchronization, processes and threads, process/thread management, inter-process communications, Memory management/virtual memory, Uni-processor and multi-processor interface and support, File systems, IO issues, Distributed OS issues 4. Networking Routing, network, and application protocols

19 Criterion 1 Mandatory Academic Content 5. Cellular and Mobile Communications Smart phone technologies, Embedded operating systems, Mobile protocols, Infrastructures, Core network 6. Discrete Math Algorithms, Statistics, Calculus I and II, Automata 7. Overview of Cyber Defense (must include hands-on lab) Network security techniques and components, cryptography, Malicious activity detection 8. Security Fundamental Principles Domain separation, Process isolation, resource encapsulation, Least privilege, Layering, Abstraction, Data hiding, Modularity, Simplicity of design, Minimization of implementation

20 Criterion 1 Mandatory Academic Content 9. Vulnerabilities Vulnerability taxonomy, Root causes of Vulnerabilities, Mitigation strategies for classes of vulnerabilities 10. Legal Laws, Regulations, Directives, Policies

21 Criterion 1 Optional Academic Content 1. Programmable logic languages Hardware design languages, Hardware programming Languages 2. FPGA design Synthesize, simulate and implement a programmable logic program 3. Wireless security 2G, 3G, 4G, WiFi, Bluetooth, RFID 4. Virtualization Virtualization techniques, Type 1 and Type 2 virtual machine architectures, Uses of virtualization for security, efficiency, simplicity, resource savings 5. Large scale distributed systems Cloud computing, cloud security

22 Criterion 1 Optional Academic Content 6. Risk management of information systems Models, Processes 7. Computer architecture Logic design 8. Microcontroller design Integrate discrete components 9. Software security analysis Source code analysis, binary code analysis, Static code analysis techniques, Dynamic code analysis techniques, Testing methodologies 10. Secure software development Secure programming principles and practices, Constructive techniques

23 Criterion 1 Optional Academic Content 11. Embedded systems Program microcontrollers to achieve an application-specific design 12. Forensics and incident response or media exploitation Operating system forensics, Media forensics, Network forensics, Component forensics 13. Systems programming Kernel intervals, Device drivers, Multi-threading, Use of alternate processors 14. Applied cryptography Use of symmetric and asymmetric encryption 15. SCADA systems Embedded systems in industrial infrastructures and control systems

24 Criterion 1 Optional Academic Content 16. HCI/Usable Security User interface issues 17. Offensive Cyber Operations Phases of cyber operation 18. Hardware Reverse Engineering Fundamental procedures such as probing, measuring and data collection to identify functionality and affect modifications

25 Criterion 2 Cyber Operations Recognized via Degree, Certificate or Focus Area Cyber Operations must be explicitly recognized as a focus area or specialization and students must meet requirements to be awarded such recognition

26 Criterion 3 Program Accreditation or Curricula Review Accreditation of the academic program (CS, EE, CE) on which the proposal is based will be considered a significant plus. All programs will undergo an in-person curriculum review

27 Criterion 4 Cyber Operations Treated as an Inter-Disciplinary Science Cyber operations concepts must be integrated into foundational curriculum courses as appropriate

28 Criterion 5 - Cyber Operations Academic Program is Robust and Active Evidence that courses are maintained current and offered frequently (e.g., every 18 months)

29 Criterion 6 Faculty Involvement in Cyber Operations-related Research Evidence of faculty grants, papers published, conference presentations related to the field of Cyber Operations

30 Criterion 7 Student Involvement in Cyber Operations-related Research Evidence of student work on grant research, papers published, conference presentations related to the field of Cyber Operations

31 Criterion 8 Student Participation in Cyber Service-Learning Activities Evidence of participation in local/ regional/ national cyber exercises, outreach to community colleges and high schools, etc

32 Criterion 9 Commitment to Participate in Summer Seminars Provided by CAE-Cyber Operations Program First application: stated commitment Renewals: 2 students and 1 faculty member per year

33 Criterion 10 Number of Faculty Involved in Cyber Operations Education and Research Activities At least 2 faculty actively teaching cyber

34 The National Centers of Academic Excellence in Cyber Operations Education Program Open to four-year colleges and graduate-level universities Applications are assessed against a specific set of academic requirements and programmatic criteria Measures the depth and maturity of programs Successful applicant institutions are designated as a CAE - Cyber Operations for 5 years Criteria are reviewed annually and strengthened as appropriate

35 Questions? Dr. Jane LeClair National Cybersecurity Institute 2000 M Street NW Suite 500 Washington, D.C TEL:

Center of Academic Excellence Cyber Operations Program 2013 Application

Center of Academic Excellence Cyber Operations Program 2013 Application Center of Academic Excellence Cyber Operations Program 2013 Application Name of Institution: Mailing Address of Institution: Date: Institution s President s Name and Official Email Address: Department

More information

Cyber Security in the Nuclear Age. Dr. Jane LeClair, Chief Operating Officer National Cybersecurity Institute at Excelsior College Washington, D.C.

Cyber Security in the Nuclear Age. Dr. Jane LeClair, Chief Operating Officer National Cybersecurity Institute at Excelsior College Washington, D.C. Cyber Security in the Nuclear Age Dr. Jane LeClair, Chief Operating Officer National Cybersecurity Institute at Excelsior College Washington, D.C. Overview 2 A Vested Interest Computers have provided the

More information

Goal. Vision. CAE IA/CD Program Eligibility and Summary

Goal. Vision. CAE IA/CD Program Eligibility and Summary Goal Vision National Centers of Academic Excellence in Information Assurance/Cyber Defense (IA/CD) Education Program Criteria for Measurement Jointly Sponsored by the National Security Agency (NSA) and

More information

NSA/DHS Centers of Academic Excellence for Information Assurance/Cyber Defense

NSA/DHS Centers of Academic Excellence for Information Assurance/Cyber Defense NSA/DHS Centers of Academic Excellence for Information Assurance/Cyber Defense Cyber Investigations Data Management Systems Security Data Security Analysis Digital Forensics Health Care Security Industrial

More information

Goal. Vision. CAE 2Y Program Eligibility and Summary

Goal. Vision. CAE 2Y Program Eligibility and Summary Goal National Centers of Academic Excellence in Information Assurance/Cyber Defense for Two-Year Education (CAE2Y) Program Criteria for Measurement Jointly Sponsored by the National Security Agency (NSA)

More information

UNM Information Assurance Scholarship for Service (SFS) Program

UNM Information Assurance Scholarship for Service (SFS) Program UNM Information Assurance Scholarship for Service (SFS) Program What is Information Assurance? Committee on National Security Systems (CNSS) defines information assurance (IA): Measures that protect and

More information

each standard. (You will be able to add/update this information just before formal submission after the Prepare for review button is selected.

each standard. (You will be able to add/update this information just before formal submission after the Prepare for review button is selected. National Centers of Academic Excellence for Information Assurance Education and Training Program for 2 Year Institutions (CAE-2Y) Criteria for Measurement July 2011 The National Security Agency (NSA) and

More information

Draft Cyber Sciences Knowledge Areas Cyber Education Project Learning Outcomes Committee David Gibson and Beth Hawthorne, Co-chairs October 2015

Draft Cyber Sciences Knowledge Areas Cyber Education Project Learning Outcomes Committee David Gibson and Beth Hawthorne, Co-chairs October 2015 Draft Cyber Sciences Knowledge Areas Cyber Education Project Learning Outcomes Committee David Gibson and Beth Hawthorne, Co-chairs October 2015 This paper summarizes the work of the Learning Outcomes

More information

MASTER OF SCIENCE IN INFORMATION ASSURANCE PROGRAM DEPARTMENT OF COMPUTER SCIENCE HAMPTON UNIVERSITY

MASTER OF SCIENCE IN INFORMATION ASSURANCE PROGRAM DEPARTMENT OF COMPUTER SCIENCE HAMPTON UNIVERSITY MASTER OF SCIENCE IN INFORMATION ASSURANCE PROGRAM DEPARTMENT OF COMPUTER SCIENCE HAMPTON UNIVERSITY HTTP://SCIENCE.HAMPTONU.EDU/COMPSCI/ The Master of Science in Information Assurance focuses on providing

More information

Sabbatical Leave Application

Sabbatical Leave Application LOS RIOS COMMUNITY COLLEGE DISTRICT Sabbatical Leave Application Name Lance Parks College: CRC Present Assignment: CIS Type of Leave Requested: A. Type A One Semester: Fall Spring X Entire Year Will you

More information

MEETING THE NATION S INFORMATION SECURITY CHALLENGES

MEETING THE NATION S INFORMATION SECURITY CHALLENGES MEETING THE NATION S INFORMATION SECURITY CHALLENGES TO ADDRESS SKILLS AND WORKFORCE SHORTAGES IN THE INFORMATION SECURITY INDUSTRY, THE NATIONAL SECURITY AGENCY AND THE DEPARTMENT OF HOMELAND SECURITY

More information

Meeting the CAE IA/CD Knowledge Units Requirements for the Polytechnic University of Puerto Rico

Meeting the CAE IA/CD Knowledge Units Requirements for the Polytechnic University of Puerto Rico Meeting the CAE IA/CD Knowledge Units Requirements for the Polytechnic University of Puerto Rico Diana M. Darabi, Master of Computer Science, IT Management and Information Assurance, Alfredo Cruz, PhD

More information

CESG Certification of Cyber Security Training Courses

CESG Certification of Cyber Security Training Courses CESG Certification of Cyber Security Training Courses Supporting Assessment Criteria for the CESG Certified Training (CCT) Scheme Portions of this work are copyright The Institute of Information Security

More information

Cyber Security at NSU

Cyber Security at NSU Cyber Security at NSU Aurelia T. Williams, Ph.D. Chair, Department of Computer Science Associate Professor of Computer Science June 9, 2015 Background Undergraduate computer science degree program began

More information

Protecting Energy s Infrastructure and Beyond: Cybersecurity for the Smart Grid

Protecting Energy s Infrastructure and Beyond: Cybersecurity for the Smart Grid Protecting Energy s Infrastructure and Beyond: Cybersecurity for the Smart Grid Which is it? Cyber Security ~or~ Cybersecurity? Dr. Ernie Lara President Presenters Estrella Mountain Community College Dr.

More information

Dr. Dave Dampier Professor of Computer Science and Engineering

Dr. Dave Dampier Professor of Computer Science and Engineering Dr. Dave Dampier Professor of Computer Science and Engineering Director, Distributed Analytics and Security Institute and the Center for Computer Security Research Mississippi State University CAE-2Y:

More information

NSA/DHS National Centers of Academic Excellence in Information Assurance/Cyber Defense 2014 List of Knowledge Units and Focus Areas

NSA/DHS National Centers of Academic Excellence in Information Assurance/Cyber Defense 2014 List of Knowledge Units and Focus Areas The CAE IA/CD academic requirements are based on meeting defined sets of Knowledge Units (KUs): 1. Core for 2 year programs - technical or applied emphasis 2. Core for 4 year + programs - technical or

More information

The USNA Cyber Program

The USNA Cyber Program The USNA Cyber Program Turning Midshipmen into Cyber Warriors CAPT Paul Tortora, USN Director, Center for Cyber Security Studies Bottom Line Up Front All Midshipmen now take two Cyber Security Courses

More information

CONCENTRATIONS: HIGH-PERFORMANCE COMPUTING & BIOINFORMATICS CYBER-SECURITY & NETWORKING

CONCENTRATIONS: HIGH-PERFORMANCE COMPUTING & BIOINFORMATICS CYBER-SECURITY & NETWORKING MAJOR: DEGREE: COMPUTER SCIENCE MASTER OF SCIENCE (M.S.) CONCENTRATIONS: HIGH-PERFORMANCE COMPUTING & BIOINFORMATICS CYBER-SECURITY & NETWORKING The Department of Computer Science offers a Master of Science

More information

The Case for Support: The Center for Cyber Security Studies at the U. S. Naval Academy

The Case for Support: The Center for Cyber Security Studies at the U. S. Naval Academy The Case for Support: The Center for Cyber Security Studies at the U. S. Naval Academy Computer and network security threats of the future are of concern today, and new strategies are required to ensure

More information

Information Systems and Tech (IST)

Information Systems and Tech (IST) California State University, San Bernardino 1 Information Systems and Tech (IST) Courses IST 101. Introduction to Information Technology. 4 Introduction to information technology concepts and skills. Survey

More information

Interdisciplinary Program in Information Security and Assurance. By Kossi Edoh NC A&T State University Greensboro

Interdisciplinary Program in Information Security and Assurance. By Kossi Edoh NC A&T State University Greensboro Interdisciplinary Program in Information Security and Assurance By Kossi Edoh NC A&T State University Greensboro Information Assurance The protection of electronic information and infrastructures that

More information

Erik Jonsson School of Engineering and Computer Science Interdisciplinary Programs

Erik Jonsson School of Engineering and Computer Science Interdisciplinary Programs Erik Jonsson School of Engineering and Computer Science Interdisciplinary Programs Software Engineering (B.S.S.E.) Goals of the Software Engineering Program The focus of the Software Engineering degree

More information

CNA 432/532 OSI Layers Security

CNA 432/532 OSI Layers Security CNA 432/532 OSI Layers Location: ECC 116 Days: Thursday Semester: Fall 2012 Times: 5:00-7:50 pm Professor: Dr. Amos Olagunju E-mail: aoolagunju@stcloudstate.edu Office Hrs: 3-4 MW, Office: ECC256 Other

More information

Computer Science. Master of Science

Computer Science. Master of Science Computer Science Master of Science The Master of Science in Computer Science program at UALR reflects current trends in the computer science discipline and provides students with a solid theoretical and

More information

Information Assurance Curricula and Certifications

Information Assurance Curricula and Certifications Information Assurance Curricula and Certifications Abstract Victor Piotrowski Department of Mathematics and Computer Science University of Wisconsin-Superior vpiotrow@uwsuper.edu Although there have been

More information

Bellevue University Cybersecurity Programs & Courses

Bellevue University Cybersecurity Programs & Courses Undergraduate Course List Core Courses: CYBR 250 Introduction to Cyber Threats, Technologies and Security CIS 311 Network Security CIS 312 Securing Access Control CIS 411 Assessments and Audits CYBR 320

More information

Cybersecurity AAS Program

Cybersecurity AAS Program Cybersecurity AAS Program New Program Proposal State Submission Steve Buchholz, Dean of Accreditation and Advancement July 2015 TABLE OF CONTENTS Executive Summary... 2 Identification and Description of

More information

Department of Computer Science

Department of Computer Science The University of Texas at San Antonio 1 Department of Computer Science The Department of Computer Science offers a Bachelor of Science degree in Computer Science and a Minor in Computer Science. Admission

More information

Introducing Maryville University s CYBER SECURITY ONLINE PROGRAMS. Bachelor of Science in Cyber Security & Master of Science in Cyber Security

Introducing Maryville University s CYBER SECURITY ONLINE PROGRAMS. Bachelor of Science in Cyber Security & Master of Science in Cyber Security Introducing Maryville University s CYBER SECURITY ONLINE PROGRAMS Bachelor of Science in Cyber Security & Master of Science in Cyber Security The cyber security industry is calling for more experts. And

More information

CYBER SECURITY TRAINING SAFE AND SECURE

CYBER SECURITY TRAINING SAFE AND SECURE CYBER SECURITY TRAINING KEEPING YOU SAFE AND SECURE Experts in Cyber Security training. Hardly a day goes by without a cyber attack being reported. With this ever-increasing threat there is a growing need

More information

Cybersecurity Definitions and Academic Landscape

Cybersecurity Definitions and Academic Landscape Cybersecurity Definitions and Academic Landscape Balkrishnan Dasarathy, PhD Program Director, Information Assurance Graduate School University of Maryland University College (UMUC) Email: Balakrishnan.Dasarathy@umuc.edu

More information

Master Degree Program in Computer Science (CS)

Master Degree Program in Computer Science (CS) Master Degree Program in Computer Science (CS) Students holding Bachelor s degree in Computer Science are accepted as graduate students, after meeting the general requirements stated below. Applicants

More information

OPERATING SYSTEMS (OPS)

OPERATING SYSTEMS (OPS) Computing Curricula - Computer Engineering Body of Knowledge 1 OPERATING SYSTEMS (OPS) OPS0. History and overview of operating systems [core] OPS1. Operating system function and design [core] OPS2. Operating

More information

The minimum background expected of any student entering the M.S.C.S. program is coursework equivalent to the following:

The minimum background expected of any student entering the M.S.C.S. program is coursework equivalent to the following: West Virginia University 1 Computer Science Degrees Offered Master of Science in Computer Science (M.S.C.S) Doctor of Philosophy in Computer Science (Ph.D.) Program Description The Masters of Science in

More information

Development of an Interdisciplinary Information Technology Auditing Program

Development of an Interdisciplinary Information Technology Auditing Program Development of an Interdisciplinary Information Technology Auditing Program Chienting Lin, Li-Chiou Chen, Pace University Abstract This paper provided an example for the development of an interdisciplinary

More information

Cybersecurity Major. College of Arts and Letters Interdisciplinary Studies. Program Guide. www.odu.edu/ccser. Version 3 August 2015.

Cybersecurity Major. College of Arts and Letters Interdisciplinary Studies. Program Guide. www.odu.edu/ccser. Version 3 August 2015. College of Arts and Letters Interdisciplinary Studies Program Guide Cybersecurity Major Version August 2015 Contents 1. Program Description and Course Requirements 2. Sample - year Course Plan. Pre- requisites

More information

COMPUTER SCIENCE. FACULTY: Jennifer Bowen, Chair Denise Byrnes, Associate Chair Sofia Visa

COMPUTER SCIENCE. FACULTY: Jennifer Bowen, Chair Denise Byrnes, Associate Chair Sofia Visa FACULTY: Jennifer Bowen, Chair Denise Byrnes, Associate Chair Sofia Visa COMPUTER SCIENCE Computer Science is the study of computer programs, abstract models of computers, and applications of computing.

More information

Course Content Summary ITN 261 Network Attacks, Computer Crime and Hacking (4 Credits)

Course Content Summary ITN 261 Network Attacks, Computer Crime and Hacking (4 Credits) Page 1 of 6 Course Content Summary ITN 261 Network Attacks, Computer Crime and Hacking (4 Credits) TNCC Cybersecurity Program web page: http://tncc.edu/programs/cyber-security Course Description: Encompasses

More information

Table 1. Summary of CSIS PhD Program Requirements

Table 1. Summary of CSIS PhD Program Requirements Table 1. Summary of CSIS PhD Program Requirements Program requirement MS degree credit 30 PhD courses in same unit 9 PhD courses in other unit 3 Research methodology courses 12 or 15 Breadth CSIS courses

More information

CAE Program Updates and Support

CAE Program Updates and Support May 29, 2015 CAE Program Updates and Support National CyberWatch Center Prince George s Community College Room 129B 301 Largo Road Largo, MD 20774 www.nationalcyberwatch.org 2 Webinar Protocol :: Mute

More information

Nettitude Ltd. (FHEQ) level 7] MSc Postgraduate Diploma Postgraduate Certificate. British Computer Society (BCS) Master s Degree in Computing

Nettitude Ltd. (FHEQ) level 7] MSc Postgraduate Diploma Postgraduate Certificate. British Computer Society (BCS) Master s Degree in Computing Faculty of Engineering and Informatics Programme Specification Programme title: MSc Cyber Security Academic Year: 2015/16 Degree Awarding Body: Partner(s), delivery organisation or support provider (if

More information

Cybersecurity Education

Cybersecurity Education Cybersecurity Education Issues & Approaches Derek A. Smith Director of Cybersecurity Initiatives at Excelsior College AFCEA November 18, 2014 Where we are now! Symantec: In a world of increased cybersecurity

More information

American Academy of Forensic Sciences

American Academy of Forensic Sciences American Academy of Forensic Sciences Forensic Science Education Programs Accreditation Commission (FEPAC) ACCREDITATION STANDARDS Adopted by FEPAC May 16, 2003 Approved by the AAFS Board of Directors

More information

Computer Scientist. Conduct research in latest computer and network security technologies for high assurance system security solutions

Computer Scientist. Conduct research in latest computer and network security technologies for high assurance system security solutions Computer Scientist Conduct research in latest computer and network security technologies for high assurance system security solutions Develop algorithms, tools and techniques to enhance information assurance

More information

Certification of Master s Degrees in Computer Science for Cyber Security

Certification of Master s Degrees in Computer Science for Cyber Security Certified Master s in Cyber Security Certification of Master s Degrees in Computer Science for Cyber Security Call for Applications Closing Date: 15 January 2016, 16:00 Briefing Meeting: 05 November 2015,

More information

Erik Jonsson School of Engineering and Computer Science

Erik Jonsson School of Engineering and Computer Science Erik Jonsson School of Engineering and Computer Science Bachelor of Science in Computer Science (B.S.C.S.) Goals for the Computer Science Program The undergraduate Computer Science program is committed

More information

Strengthening the Nexus: Government-Business- University cooperation and collaboration on security, training and research

Strengthening the Nexus: Government-Business- University cooperation and collaboration on security, training and research Strengthening the Nexus: Government-Business- University cooperation and collaboration on security, training and research November 1, 2011 Susan C. Aldridge, PhD University of Maryland University College

More information

Centers of Academic Excellence in Cyber Security (CAE-C) Knowledge Units Review

Centers of Academic Excellence in Cyber Security (CAE-C) Knowledge Units Review Centers of Academic Excellence in Cyber Security (CAE-C) Knowledge Units Review Review Process The Knowledge Unit (KU) Review Calendar divides the entire CAE-C KU list into 12 months for the purposes of

More information

Teaching Information Security to Engineering Managers

Teaching Information Security to Engineering Managers Teaching Information Security to Engineering Managers Julie Ryan Assistant Professor The George Washington University Washington, DC http://www.seas.gwu.edu/~infosec/ 1 Why Bother? Lots of CS and EE programs

More information

University of Maine B.S. In Cybersecurity Version 2.0

University of Maine B.S. In Cybersecurity Version 2.0 University of Maine B.S. In Cybersecurity Version 2.0 Prof. George Markowsky School of Computing & Information Science University of Maine April 27, 2015 Contents 1 Background 8 1.1 Evidence of Program

More information

Master of Science in Computer Science Information Systems

Master of Science in Computer Science Information Systems Master of Science in Computer Science Information Systems 1. General Admission Requirements. Admission to Graduate Studies (see graduate admission requirements). 2. Program Admission. In addition to meeting

More information

Master of Science (Electrical Engineering) MS(EE)

Master of Science (Electrical Engineering) MS(EE) Master of Science (Electrical Engineering) MS(EE) 1. Mission Statement: The mission of the Electrical Engineering Department is to provide quality education to prepare students who will play a significant

More information

American Academy of Forensic Sciences

American Academy of Forensic Sciences American Academy of Forensic Sciences Forensic Science Education Programs Accreditation Commission (FEPAC) ACCREDITATION STANDARDS Adopted by FEPAC May 16, 2003 Approved by the AAFS Board of Directors

More information

American Academy of Forensic Sciences

American Academy of Forensic Sciences American Academy of Forensic Sciences Forensic Science Education Programs Accreditation Commission (FEPAC) ACCREDITATION STANDARDS Adopted by FEPAC May 16, 2003 Approved by the AAFS Board of Directors

More information

USING INFORMATION ASSURANCE CURRICULUM STANDARDS AS A BASIS FOR A GRADUATE DEGREE

USING INFORMATION ASSURANCE CURRICULUM STANDARDS AS A BASIS FOR A GRADUATE DEGREE USING INFORMATION ASSURANCE CURRICULUM STANDARDS AS A BASIS FOR A GRADUATE DEGREE N. Paul Schembari, Mike Jochen East Stroudsburg University of Pennsylvania {nschembari, mjochen}@esu.edu ABSTRACT We describe

More information

Allegany College of Maryland. 239 Cisco Networking 2 * Offered Fall semester and

Allegany College of Maryland. 239 Cisco Networking 2 * Offered Fall semester and Cybersecurity comes to Allegany College of Maryland 107 Intro to Cybersecurity Offered fall and spring semesters. This course provides a broad overview of computer security, ethical issues and information

More information

Bachelor of Science in Computer Engineering (BSCoE) Essential Ideas

Bachelor of Science in Computer Engineering (BSCoE) Essential Ideas Mission Statement Bachelor of Science in Computer Engineering (BSCoE) Essential Ideas The mission statement for the Computer Engineering program as modified and adopted by the engineering faculty on July

More information

Cyber threats are growing.

Cyber threats are growing. Cyber threats are growing. So are your career opportunities. Put the future of your cybersecurity career in the hands of a respected online education leader. Everything you need to succeed. Excelsior College

More information

CHAPTER 1: OPERATING SYSTEM FUNDAMENTALS

CHAPTER 1: OPERATING SYSTEM FUNDAMENTALS CHAPTER 1: OPERATING SYSTEM FUNDAMENTALS What is an operating? A collection of software modules to assist programmers in enhancing efficiency, flexibility, and robustness An Extended Machine from the users

More information

Computer/Information Science Course Descriptions

Computer/Information Science Course Descriptions Computer/Information Science Course Descriptions COMS 1003: Introduction to Computer Based Systems Provides students with both computer concepts and hands-on applications. Although little or no prior computer

More information

Web-based Modules for Cyberphysical Systems Security

Web-based Modules for Cyberphysical Systems Security Web-based Modules for Cyberphysical Systems Security Janusz Zalewski, Florida Gulf Coast University Nary Subramanian, University of Texas at Tyler Andew Kornecki, Embry-Riddle Aeronautical University Bogdan

More information

Department of Computer Science

Department of Computer Science 82 Advanced Biochemistry Lab II. (2-8) The second of two laboratory courses providing instruction in the modern techniques of biochemistry. Experiments are performed on the isolation, manipulation and

More information

National Cyber League (NCL) Syllabus

National Cyber League (NCL) Syllabus Note to Faculty The NCL Syllabus is intended as a supplement to a CompTIA Security+ class, or related Network Security course. A primary goal of the NCL is to integrate exercises and competitions into

More information

WESTERN MICHIGAN UNIVERSITY COLLEGE OF AVIATION POLICY STATEMENT

WESTERN MICHIGAN UNIVERSITY COLLEGE OF AVIATION POLICY STATEMENT WESTERN MICHIGAN UNIVERSITY COLLEGE OF AVIATION POLICY STATEMENT It is the right, the responsibility, and the privilege of University faculties to participate in the governance of their departments. Fundamentally,

More information

CyberSecurity: Trends, Careers, & the Next Generation

CyberSecurity: Trends, Careers, & the Next Generation CyberSecurity: Trends, Careers, & the Next Generation Ludwig Goon March 2-4, 2016 Disclaimer: The view and opinions expressed in the presentation are that of the presenter and is not affiliated with employers.

More information

Building a Successful Cyber-security Program

Building a Successful Cyber-security Program Building a Successful Cyber-security Program David Dampier Distributed Analytics and Security Institute Mississippi Box 9627, HPC A129 Mississippi, MS 39762-9627 001-662-325-0779 dampier@dasi.msstate.edu

More information

Establishing and Maintaining a Cybersecurity Program: The GWU EMSE Experience

Establishing and Maintaining a Cybersecurity Program: The GWU EMSE Experience Establishing and Maintaining a Cybersecurity Program: The GWU EMSE Experience Julie J.C.H. Ryan, D.Sc. Assistant Professor Engineering Management and System Engineering School of Engineering and Applied

More information

A Curricular Strategy for Information Security Engineering

A Curricular Strategy for Information Security Engineering A Curricular Strategy for Information Security Engineering Abstract Richard Smith Department of Computer and Information Sciences (formerly QMCS) University of St. Thomas Existing textbooks and training

More information

Proposal for a Graduate Certificate in Information Assurance Education Track 2. Submitted. by the. School of Technology West Lafayette Campus

Proposal for a Graduate Certificate in Information Assurance Education Track 2. Submitted. by the. School of Technology West Lafayette Campus Graduate Council Document 03-24a Approved by the Graduate Council 11/20/03 Proposal for a Graduate Certificate in Information Assurance Education Track 2 Submitted by the School of Technology West Lafayette

More information

M.S. in Computer Science

M.S. in Computer Science 1 M.S. in Computer Science Degree Requirements Students will meet with the graduate advisor to assist them in formulating a program of study and selecting a possible specialization. The 30 credit requirement

More information

Department of Information Systems and Cyber Security

Department of Information Systems and Cyber Security The University of Texas at San Antonio 1 Department of Information Systems and Cyber Security All graduate programs in Information Systems and Cyber Security are accredited by AACSB International The Association

More information

An Information Assurance and Security Curriculum Implementation

An Information Assurance and Security Curriculum Implementation Issues in Informing Science and Information Technology Volume 3, 2006 An Information Assurance and Security Curriculum Implementation Samuel P. Liles and Reza Kamali Purdue University Calumet, Hammond,

More information

Course Content Summary ITN 262 Network Communication, Security and Authentication (4 Credits)

Course Content Summary ITN 262 Network Communication, Security and Authentication (4 Credits) Page 1 of 5 Course Content Summary ITN 262 Network Communication, Security and Authentication (4 Credits) TNCC Cybersecurity Program web page: http://tncc.edu/programs/cyber-security Course Description:

More information

Guidelines for Massachusetts Early Educator Preparation Programs Participating in the Early Childhood Educator Scholarships Program.

Guidelines for Massachusetts Early Educator Preparation Programs Participating in the Early Childhood Educator Scholarships Program. Guidelines for Massachusetts Early Educator Preparation Programs Participating in the Early Childhood Educator Scholarships Program Background The Departments of Higher Education and Early Education and

More information

TUSKEGEE CYBER SECURITY PATH FORWARD

TUSKEGEE CYBER SECURITY PATH FORWARD TUSKEGEE CYBER SECURITY PATH FORWARD Preface Tuskegee University is very aware of the ever-escalating cybersecurity threat, which consumes continually more of our societies resources to counter these threats,

More information

Please review current Graduate College policies and procedures.

Please review current Graduate College policies and procedures. Ph.D. Degree Requirements and Procedures Summary of Procedures for Ph.D. Students Complete every deficiency course with a grade of B or higher within the first two terms File an approved tentative program

More information

AC 2011-953: INDUSTRY-DRIVEN POWER ENGINEERING CURRICU- LUM DEVELOPMENT IN ELECTRICAL AND COMPUTER ENGINEER- ING TECHNOLOGY PROGRAM

AC 2011-953: INDUSTRY-DRIVEN POWER ENGINEERING CURRICU- LUM DEVELOPMENT IN ELECTRICAL AND COMPUTER ENGINEER- ING TECHNOLOGY PROGRAM AC 2011-953: INDUSTRY-DRIVEN POWER ENGINEERING CURRICU- LUM DEVELOPMENT IN ELECTRICAL AND COMPUTER ENGINEER- ING TECHNOLOGY PROGRAM Aleksandr Sergeyev, Michigan Technological University Aleksandr Sergeyev

More information

Doctor of Philosophy (PhD) in Computer Science

Doctor of Philosophy (PhD) in Computer Science Page 1 of 6 Doctor of Philosophy (PhD) in Computer Science Overview of Degree» Overview» Graduate Programs» BS Degree» CSCI Courses» All UGA Courses» Spr 2009 Schedule» Sum 2009 Schedule» Fall 2009 Schedule»

More information

University of La Verne. External Review. Computer Science. And. Computer Engineering. December 15, 2013. David Falconer, Ph.D.

University of La Verne. External Review. Computer Science. And. Computer Engineering. December 15, 2013. David Falconer, Ph.D. University of La Verne External Review Computer Science And Computer Engineering December 15, 2013 David Falconer, Ph.D. ABSTRACT This report documents the results of a program and department review of

More information

Department of Computer Science

Department of Computer Science Department of Computer Science Ali Sekmen, PhD 2, Chair 005, McCord Hall 615-963-5712 Faculty: K. Al Nasr, W. Chen, E. Erdemir, M. Hayes, H. Miao, T. Rogers, G. Shao, F. Yao General Statement: The Department

More information

APPOINTMENT TO AND PROMOTION OF ACADEMIC STAFF

APPOINTMENT TO AND PROMOTION OF ACADEMIC STAFF This policy applies to Faculty only. Appointment Types APPOINTMENT TO AND PROMOTION OF ACADEMIC STAFF In policies, practices, and procedures related to faculty appointments, the University shall not engage

More information

167 th Air Wing Fast Track Cyber Program Blue Ridge Community and Technical College

167 th Air Wing Fast Track Cyber Program Blue Ridge Community and Technical College 167 th Air Wing Fast Track Cyber Program Blue Ridge Community and Technical College Information Security Certificate: Designed to introduce students to programming, security basics, network monitoring,

More information

CIS 253. Network Security

CIS 253. Network Security CIS 253 Network Security Approved: May 6, 2011 EFFECTIVE DATE: Fall 2011 COURSE PACKAGE FORM Team Leader and Members Andra Goldberg, Matt Butcher, Steve Sorden, Dave White Date of proposal to Curriculum

More information

UNDERGRADUATE DEGREE PROGRAMME IN COMPUTER SCIENCE ENGINEERING SCHOOL OF COMPUTER SCIENCE ENGINEERING, ALBACETE

UNDERGRADUATE DEGREE PROGRAMME IN COMPUTER SCIENCE ENGINEERING SCHOOL OF COMPUTER SCIENCE ENGINEERING, ALBACETE UNDERGRADUATE DEGREE PROGRAMME IN COMPUTER SCIENCE ENGINEERING SCHOOL OF COMPUTER SCIENCE ENGINEERING, ALBACETE SCHOOL OF COMPUTER SCIENCE, CIUDAD REAL Core Subjects (CS) Compulsory Subjects (CPS) Optional

More information

Information and Communications Technology Courses at a Glance

Information and Communications Technology Courses at a Glance Information and Communications Technology Courses at a Glance Level 1 Courses ICT121 Introduction to Computer Systems Architecture This is an introductory course on the architecture of modern computer

More information

FedVTE Training Catalog SUMMER 2015. advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov

FedVTE Training Catalog SUMMER 2015. advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov FedVTE Training Catalog SUMMER 2015 advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov Access FedVTE online at: fedvte.usalearning.gov If you need any assistance please

More information

Chapter 2 Operating System Overview

Chapter 2 Operating System Overview Operating Systems: Internals and Design Principles, 6/E William Stallings Chapter 2 Operating System Overview Dave Bremer Otago Polytechnic, N.Z. 2008, Prentice Hall Roadmap Operating System Objectives/Functions

More information

National Standards. Council for Standards in Human Service Education. http://www.cshse.org 2013 (2010, 1980, 2005, 2009)

National Standards. Council for Standards in Human Service Education. http://www.cshse.org 2013 (2010, 1980, 2005, 2009) Council for Standards in Human Service Education National Standards ASSOCIATE DEGREE IN HUMAN SERVICES http://www.cshse.org 2013 (2010, 1980, 2005, 2009) I. GENERAL PROGRAM CHARACTERISTICS A. Institutional

More information

(Advanced Topics in) Operating Systems Winter Term 2009 / 2010. Jun.-Prof. Dr.-Ing. André Brinkmann brinkman@upb.de Universität Paderborn PC

(Advanced Topics in) Operating Systems Winter Term 2009 / 2010. Jun.-Prof. Dr.-Ing. André Brinkmann brinkman@upb.de Universität Paderborn PC (Advanced Topics in) Operating Systems Winter Term 2009 / 2010 Jun.-Prof. Dr.-Ing. André Brinkmann brinkman@upb.de Universität Paderborn PC 1 Overview Overview of chapter 3: Case Studies 3.1 Windows Architecture.....3

More information

CS Matters in Maryland CS Principles Course

CS Matters in Maryland CS Principles Course CS Matters in Maryland CS Principles Course Curriculum Overview Project Goals Computer Science (CS) Matters in Maryland is an NSF supported effort to increase the availability and quality of high school

More information

Naval Postgraduate School Department of Computer Science Graduation Checklist for MSCS Degree 6203P Subspecialty Code (Revised: Fall AY14)

Naval Postgraduate School Department of Computer Science Graduation Checklist for MSCS Degree 6203P Subspecialty Code (Revised: Fall AY14) Naval Postgraduate School Department of Computer Science Graduation Checklist for MSCS Degree 6203P Subspecialty Code () Name/Rank/Service: Month/Year Enrolled: Projected Graduation Date: CS Track: 1.

More information

2. EXPLAIN CHANGE TO DEGREE PROGRAM AND GIVE A DETAILED RATIONALE FOR EACH INDIVIDUAL CHANGE:

2. EXPLAIN CHANGE TO DEGREE PROGRAM AND GIVE A DETAILED RATIONALE FOR EACH INDIVIDUAL CHANGE: PROPOSED CHANGES TO THE BACHELOR OF SCIENCE IN ELECTRICAL AND COMPUTER ENGINEERING DEGREE PROGRAM IN THE COCKRELL SCHOOL OF ENGINEERING CHAPTER IN THE UNDERGRADUATE CATALOG 2016-2018 or LAW SCHOOL CATALOG

More information

James B. Fenwick, Jr., Program Director and Associate Professor Ph.D., The University of Delaware FenwickJB@appstate.edu

James B. Fenwick, Jr., Program Director and Associate Professor Ph.D., The University of Delaware FenwickJB@appstate.edu 118 Master of Science in Computer Science Department of Computer Science College of Arts and Sciences James T. Wilkes, Chair and Professor Ph.D., Duke University WilkesJT@appstate.edu http://www.cs.appstate.edu/

More information

CSC 4304: Systems Programming

CSC 4304: Systems Programming Course Outcomes CSC 4304 Credit Hours: 3 hours Prerequisites: CSC 4103 CSC 4304: Systems Programming Prerequisites By Topic: Basic programming knowledge in C/C++. Basic constructs of programming: e.g.

More information

Cybersecurity High School and Beyond

Cybersecurity High School and Beyond Cybersecurity High School and Beyond High School Career Fair and Expo March 29, 2014 Diane G. Miller, CCP Director, Operations Northrop Grumman Information Security Program Director, CyberPatriot Topics

More information

University of Maryland University College: Master of Science in Digital Forensics and Cyber Investigation

University of Maryland University College: Master of Science in Digital Forensics and Cyber Investigation BOARD OF REGENTS SUMMARY OF ITEM FOR ACTION, INFORMATION OR DISCUSSION TOPIC: COMMITTEE: University of Maryland University College: Master of Science in Digital Forensics and Cyber Investigation Education

More information