Cybersecurity Education

Size: px
Start display at page:

Download "Cybersecurity Education"

Transcription

1 Cybersecurity Education Issues & Approaches Derek A. Smith Director of Cybersecurity Initiatives at Excelsior College AFCEA November 18, 2014

2 Where we are now! Symantec: In a world of increased cybersecurity attacks, an estimated 300,000 cybersecurity jobs are vacant in the United States

3 Where we are now! Rand Corporation: The nationwide shortage of cybersecurity professionals -- particularly for positions within the federal government -- creates risks for national and homeland security, according to a June study by Rand Corporation.

4 Where we are now! ISC2: The reasons for an inability to bridge the need for additional information security workers are fueled by three factors: business conditions, executives not fully understanding the need, and an inability to locate appropriate information security professionals (ISC2)

5

6 Where we are now! Contributing factor: Competing budget priorities, a narrow pipeline of prospects, training shortfalls, ambiguous skill-set requirements and a tug of war between the public and private sectors all add complexity to the process FCW Magazine

7 While billions of dollars are being spent on new technologies to secure cyberspace, it is the people with the right knowledge, skills, and abilities to implement those technologies who will determine success

8 Understanding the trends Four common trends that drive the need for cyber education: information security is increasing in relevance is increasing in attention and demand from students, private industry and government agencies more domains to secure and more ways to attack. focus more on the practices (not just general security)

9 Straining to address the needs and trends finding qualified instructors and professors struggling for resources with competing subject critical lack of equipment, laboratories and opportunities for students to get hands-on experience dynamic curriculum

10 Different approaches, common ground Common themes: Cybersecurity must evolve into a formal discipline in the curriculum similar to other existing disciplines. Programs must teach a combination of theory and practice. Cybersecurity should be taught in an integrated fashion, with all students learning basic principles. Independent study and student interest groups are a key teaching tool. Government and industry collaboration is extremely important. Providing strong faculty development opportunities is a must.

11 Program Components Technology Technology specific items Skills development (hands-on) Theory and research Critical Thinking Analysis and decision making Problem solving Finding unique solutions Information Literacy not just technology literacy Research process Interpersonal skills Team work Communications capabilities Writing, presentations

12 Cyber Security Content Areas (Examples at all training / education levels) Systems maintenance, patches, upgrades Content security Data assurance Physical security User education Detection (hacks, probes, etc.) Deterrence (fire walls, honey pots, etc.) Forensics (evidence gathering, preservation) Policy development Forward planning and professional development Preparation for certification Security budgeting & public communications Research all areas

13 "One of the first things at the high level is actually defining what it is you want this person to do because it's not as broad as it's sometimes made out to be when you just say 'cybersecurity career field,'" Howard Schmidt, formerly White House cybersecurity coordinator.

14 The Workforce Framework lists and defines 32 specialty areas of cybersecurity work and provides a description of each. Each of the types of work is placed into one of seven overall categories. The Workforce Framework also identifies common tasks and knowledge, skills, and abilities (KSA's) associated with each specialty area. The Workforce Framework will be used as guidance to the federal government, will be made available to the private, public, and academic sectors for describing cybersecurity work and workforces, and related education, training, and professional development. NICE Framework The National Initiative for Cybersecurity Education (NICE) developed the National Cybersecurity Workforce Framework (the Workforce Framework) to define the cybersecurity workforce and provide a common taxonomy and lexicon by which to classify and categorize workers.

15 Linking efforts at all levels Seven different tenets for cybersecurity education 1. Holistic 2. Interdisciplinary 3. Diverse programs 4. Business-focused 5. Hands-on 6. Research-oriented 7. Common language and science

16 Meeting the demands of tomorrow Increase awareness and expertise Treat security education as a global issue Approach security comprehensively, linking technical to non technical fields Seek innovative ways to fund labs and pursue real-world projects Advance a science of security

17 How We Approach It: Heavy doses of theory & fundamental principles Softer skills: writing, communications, problem solving, critical thinking, team work Some levels include lots of hands-on Different approaches depending on level Intro. level typically more skills based (also a mixed set of students and student backgrounds) Intermediate some hands-on but includes softer skills (theory, critical thinking, problem solving, communications, team work) Advanced managerial or research

18 Student Expectations Mind set preparation Understanding what the professional does Detailed analysis Constant monitoring Responsibility issues Want it immediately Expecting hands-on work in most programs Employment expectations High-paying jobs In some areas a security clearance is an issue

19 Faculty Preparation Full-time vs. part-time/professional faculty Backgrounds vary Technically adept but don t teach well Good teachers but don t know technology Teaching ability: preparation & in the classroom Keeping up with the changing technology New theories, problems, tools, techniques Developing specialization areas (may go out-ofdate ) Balancing: hands-on, theory, KSA's, softer skills Up to date on technology, law, business needs, costs/benefits

20 Sample Programs Capitol College Doctor of Science in information assurance (DSc) Master of Science in information assurance (MSIA) The Bachelor of Science in cyber and information security (BSCIS) Computer and Network Security(Certificate) Digital Forensics and Incident Handling (Graduate Certificate) Information Assurance Administration (Graduate Certificate) Network Protection (Graduate Certificate) Secure Cloud Computing (Graduate Certificate) Secure Mobile Technology (Graduate Certificate) Secure Software Development (Graduate Certificate) Security Management (Graduate Certificate)

21 Sample Programs University of Maryland, University College MASTER OF SCIENCE IN CYBERSECURITY MASTER OF SCIENCE IN CYBERSECURITY POLICY MASTER OF SCIENCE IN DIGITAL FORENSICS AND CYBER INVESTIGATION MASTER OF SCIENCE IN INFORMATION TECHNOLOGY: INFORMATION ASSURANCE BACHELOR OF SCIENCE IN CYBERSECURITY BACHELOR OF SCIENCE IN COMPUTER NETWORKS AND SECURITY BACHELOR OF SCIENCE IN SOFTWARE DEVELOPMENT AND SECURITY CYBERSECURITY POLICY CYBERSECURITY TECHNOLOGY DIGITAL FORENSICS AND CYBER INVESTIGATION FOUNDATIONS OF CYBERSECURITY INFORMATION ASSURANCE

22 Sample Programs Prince George s Community College Cybersecurity Assoc. of Applied Science Cybersecurity Certificate Cybersecurity Management, Certificate

23 Sample Programs Excelsior College Five Cybersecurity Programs Certified to Meet the NSA s Committee on National Security Systems (CNSS) Training Standards Master of Business Administration in Cybersecurity Management Master of Science in Cybersecurity Bachelor of Science in Cyber Operations Bachelor of Science in Information Technology [Without Concentration] Bachelor of Science in Information Technology (Cybersecurity) Undergraduate Cybersecurity Certificate Graduate Cybersecurity Management Certificate

24 Questions? Derek A. Smith Director, National Cyber Security Institute Excelsior College

MEETING THE NATION S INFORMATION SECURITY CHALLENGES

MEETING THE NATION S INFORMATION SECURITY CHALLENGES MEETING THE NATION S INFORMATION SECURITY CHALLENGES TO ADDRESS SKILLS AND WORKFORCE SHORTAGES IN THE INFORMATION SECURITY INDUSTRY, THE NATIONAL SECURITY AGENCY AND THE DEPARTMENT OF HOMELAND SECURITY

More information

TURNING THE RISING TIDE OF CYBERSECURITY THREATS

TURNING THE RISING TIDE OF CYBERSECURITY THREATS TURNING THE RISING TIDE OF CYBERSECURITY THREATS With cyber attacks on the rise, there s a growing need for digital forensic professionals with the knowledge and skills to investigate technology crimes

More information

Cybersecurity education for the next generation Emerging best practices

Cybersecurity education for the next generation Emerging best practices Cybersecurity education for the next generation Emerging best practices Presented at the 2013 NIST/NICE Workshop Gaithersburg, Maryland Marisa S. Viveros Vice President, Cyber Security Innovation IBM Corporate

More information

Cyber Security at NSU

Cyber Security at NSU Cyber Security at NSU Aurelia T. Williams, Ph.D. Chair, Department of Computer Science Associate Professor of Computer Science June 9, 2015 Background Undergraduate computer science degree program began

More information

Cybersecurity education for the next generation. Advancing a collaborative approach

Cybersecurity education for the next generation. Advancing a collaborative approach Cybersecurity education for the next generation Advancing a collaborative approach 2 Cybersecurity education for the next generation In a world of increasing information security threats, academic initiatives

More information

National Initiative for Cybersecurity Careers and Studies (NICCS) Webinar

National Initiative for Cybersecurity Careers and Studies (NICCS) Webinar National Initiative for Cybersecurity Careers and Studies (NICCS) Webinar April 25, 2013 Welcome to the NICCS Webinar! Thank you for joining us today. During this presentation, you will: Learn about the

More information

Capacity Building in Cyber Security Literacy: An Inter-disciplinary Approach

Capacity Building in Cyber Security Literacy: An Inter-disciplinary Approach Capacity Building in Cyber Security Literacy: An Inter-disciplinary Approach This material is based upon work supported by the National Science Foundation under Grant No. 1516724 Project Organization University

More information

Cybersecurity Definitions and Academic Landscape

Cybersecurity Definitions and Academic Landscape Cybersecurity Definitions and Academic Landscape Balkrishnan Dasarathy, PhD Program Director, Information Assurance Graduate School University of Maryland University College (UMUC) Email: Balakrishnan.Dasarathy@umuc.edu

More information

Allegany College of Maryland. 239 Cisco Networking 2 * Offered Fall semester and

Allegany College of Maryland. 239 Cisco Networking 2 * Offered Fall semester and Cybersecurity comes to Allegany College of Maryland 107 Intro to Cybersecurity Offered fall and spring semesters. This course provides a broad overview of computer security, ethical issues and information

More information

CYBER SECURITY TRAINING SAFE AND SECURE

CYBER SECURITY TRAINING SAFE AND SECURE CYBER SECURITY TRAINING KEEPING YOU SAFE AND SECURE Experts in Cyber Security training. Hardly a day goes by without a cyber attack being reported. With this ever-increasing threat there is a growing need

More information

Certifications and Standards in Academia. Dr. Jane LeClair, Chief Operating Officer National Cybersecurity Institute

Certifications and Standards in Academia. Dr. Jane LeClair, Chief Operating Officer National Cybersecurity Institute Certifications and Standards in Academia Dr. Jane LeClair, Chief Operating Officer National Cybersecurity Institute Accreditation What is it? Why is it important? How is it attained? The National Centers

More information

Hackers are here. Where are you?

Hackers are here. Where are you? 1 2 What is EC-Council Certified Security Analyst Licensed Penetration Tester Program You are an ethical hacker. Your last name is Pwned. You dream about enumeration and you can scan networks in your sleep.

More information

UNM Information Assurance Scholarship for Service (SFS) Program

UNM Information Assurance Scholarship for Service (SFS) Program UNM Information Assurance Scholarship for Service (SFS) Program What is Information Assurance? Committee on National Security Systems (CNSS) defines information assurance (IA): Measures that protect and

More information

International MBA. Compete Globally with an International MBA

International MBA. Compete Globally with an International MBA International MBA Compete Globally with an International MBA With an online International MBA from SNHU, you are preparing yourself to compete in the increasingly global 21st-century business world. Specially

More information

Hosted by Lunarline: School of Cyber Security

Hosted by Lunarline: School of Cyber Security Hosted by Lunarline: School of Cyber Security Please Fax Government Purchase Orders and SF 182s To (22) 315-33 Cybersecurity is one of the hottest issues for today s Federal and DOD Agencies and commercial

More information

Cisco Networking Academy: Delaware Profile

Cisco Networking Academy: Delaware Profile Cisco Networking Academy: Delaware Profile Educating the Architects of the Networked Economy Now in its second decade, Cisco Networking Academy has provided more than two million students worldwide with

More information

National Initiative for Cyber Security Education

National Initiative for Cyber Security Education 2014/PPWE/SEM2/007 Agenda Item: 5 National Initiative for Cyber Security Education Submitted by: United States Women Business and Smart Technology Seminar Beijing, China 23 May 2014 NICE OVERVIEW Women

More information

CyberSkills Management Support Initiative

CyberSkills Management Support Initiative CyberSkills Management Support Initiative GROWING THE PIPELINE FOR CYBERTALENT THROUGH VOLUNTEER OPPORTUNITIES November 6, 2014 November 6, 2014 Background In June 2012, Secretary Napolitano announced

More information

SOUTH DAKOTA BOARD OF REGENTS. Committee on Academic and Student Affairs

SOUTH DAKOTA BOARD OF REGENTS. Committee on Academic and Student Affairs SOUTH DAKOTA BOARD OF REGENTS Committee on Academic and Student Affairs AGENDA ITEM: III A(3) DATE: April 3-4, 2013 ****************************************************************************** SUBJECT:

More information

The Comprehensive National Cybersecurity Initiative

The Comprehensive National Cybersecurity Initiative The Comprehensive National Cybersecurity Initiative President Obama has identified cybersecurity as one of the most serious economic and national security challenges we face as a nation, but one that we

More information

Strengthening the Nexus: Government-Business- University cooperation and collaboration on security, training and research

Strengthening the Nexus: Government-Business- University cooperation and collaboration on security, training and research Strengthening the Nexus: Government-Business- University cooperation and collaboration on security, training and research November 1, 2011 Susan C. Aldridge, PhD University of Maryland University College

More information

ONLINE ONLINE. Master of Science in. Bachelor of Science in

ONLINE ONLINE. Master of Science in. Bachelor of Science in ONLINE Bachelor of Science in INFORMATION SYSTEMS ONLINE Master of Science in Management Information Systems Information Systems Online University of Alabama at Birmingham COLLAT School of Business Dear

More information

2012 Information Technology Workforce Assessment for Cybersecurity (ITWAC) Summary Report

2012 Information Technology Workforce Assessment for Cybersecurity (ITWAC) Summary Report 2012 Information Technology Workforce Assessment for Cybersecurity (ITWAC) Summary Report March 14, 2013 TABLE OF CONTENTS List of Tables... iii List of Figures... iv Executive Summary... v 1. INTRODUCTION...

More information

SANS CyberTalent VetSuccess Immersion Academy. VetSuccess

SANS CyberTalent VetSuccess Immersion Academy. VetSuccess SANS CyberTalent VetSuccess Immersion Academy P I L O T R E P O R T 2 0 1 5 VetSuccess For more than 25 years, SANS has been the leader in training and developing cybersecurity professionals. Like many

More information

Strategic Plan September 2012

Strategic Plan September 2012 Strategic Plan September 2012 NIST NICE Component Leads Overall Lead Ernest L. McDuffie, Ph.D. Lead for the National Initiative for Cybersecurity Education (NICE) United States Department of Commerce (DoC)

More information

National Cyber Security Awareness Month. Week Five: Building the Next Generation of Cyber Professionals

National Cyber Security Awareness Month. Week Five: Building the Next Generation of Cyber Professionals National Cyber Security Awareness Month Week Five: Building the Next Generation of Cyber Professionals Webinar recording and evaluation survey This webinar is being recorded and will be made available

More information

INFORMATION SYSTEMS ENGINEERING & MANAGEMENT SKILLS THE MARKET NEEDS NOW TECHNICAL & MANAGEMENT 717.901.5101. online.harrisburgu.

INFORMATION SYSTEMS ENGINEERING & MANAGEMENT SKILLS THE MARKET NEEDS NOW TECHNICAL & MANAGEMENT 717.901.5101. online.harrisburgu. INFORMATION SYSTEMS ENGINEERING & MANAGEMENT TECHNICAL & MANAGEMENT SKILLS THE MARKET NEEDS NOW As information technology evolves, information systems using that technology become increasingly complex.

More information

The National Cybersecurity Workforce Framework. 2015 Delaware Cyber Security Workshop September 29, 2015

The National Cybersecurity Workforce Framework. 2015 Delaware Cyber Security Workshop September 29, 2015 The National Cybersecurity Workforce Framework 2015 Delaware Cyber Security Workshop September 29, 2015 Bill Newhouse NICE Program Office at the National Institute of Standards and Technology NICE is a

More information

NICE and Framework Overview

NICE and Framework Overview NICE and Framework Overview Bill Newhouse NIST NICE Leadership Team Computer Security Division Information Technology Lab National Institute of Standards and Technology TABLE OF CONTENTS Introduction to

More information

Achieving Cybersecurity Excellence Through Evolution of the Nation's Cyber Workforce

Achieving Cybersecurity Excellence Through Evolution of the Nation's Cyber Workforce Achieving Cybersecurity Excellence Through Evolution of the Nation's Cyber Workforce Benjamin Scribner Department of (DHS) National Cybersecurity Education & Awareness Branch (CE&A) October 2014 Mid-South

More information

Hackers are here. Where are you?

Hackers are here. Where are you? 1 2 What is EC-Council Certified Security Analyst Licensed Penetration Tester Program You are an ethical hacker. Your last name is Pwned. You dream about enumeration and you can scan networks in your sleep.

More information

Cyber threats are growing.

Cyber threats are growing. Cyber threats are growing. So are your career opportunities. Put the future of your cybersecurity career in the hands of a respected online education leader. Everything you need to succeed. Excelsior College

More information

BIOTECHNOLOGY. Bouvé College of Health Sciences College of Science. Networked for Success. Networked for Industry. Networked for Life.

BIOTECHNOLOGY. Bouvé College of Health Sciences College of Science. Networked for Success. Networked for Industry. Networked for Life. MASTER OF SCIENCE BIOTECHNOLOGY Networked for Success. Networked for Industry. Networked for Life. Bouvé College of Health Sciences College of Science Northeastern s Biotechnology Masters program synthesizes

More information

EC-Council Certified Security Analyst (ECSA)

EC-Council Certified Security Analyst (ECSA) EC-Council Certified Security Analyst (ECSA) v8 Eğitim Tipi ve Süresi: 5 Days VILT 5 Day VILT EC-Council Certified Security Analyst (ECSA) v8 Learn penetration testing methodologies while preparing for

More information

ONLINE MASTER OF BUSINESS ADMINISTRATION. Open for Business. Designed for You.

ONLINE MASTER OF BUSINESS ADMINISTRATION. Open for Business. Designed for You. ONLINE MASTER OF BUSINESS ADMINISTRATION Open for Business. Designed for You. Our MBA is different. It s designed for you. Today s global workplace is ever-evolving and increasingly competitive. To succeed,

More information

NICE 2015 Conference

NICE 2015 Conference NICE 2015 Conference Mission: Impossible? How to Advance the Skills of the Cyber Workforce When You ve Got Quality and Speed but Aren t Cheap November 4, 2015 Presenters: Allison Frankoski, Program Director

More information

State University System Florida Board of Governors Request to Establish Market Tuition Rates Regulation 7.001(15)

State University System Florida Board of Governors Request to Establish Market Tuition Rates Regulation 7.001(15) University: University of South Florida Proposed Market Tuition Program: Master s of Science in Cyber Security University Board of Trustees approval date: Date Proposed Implementation Date (month/year):

More information

University of Maryland University College. American Military University. Henley-Putnam University

University of Maryland University College. American Military University. Henley-Putnam University A P R I L 2 0 1 1 Table of Contents 2-3 UMUC: Training Tomorrow s Cybersecurity Leaders Today University of Maryland University College 4-5 Preparing Those Who Protect the Public American Military University

More information

Shaping the Future of Cybersecurity Education

Shaping the Future of Cybersecurity Education Shaping the Future of Cybersecurity Education Is N.I.C.E. NATIONAL INITIATIVE FOR CYBERSECURITY EDUCATION (NICE) February 2011 THEPRESENT Comprehensive National Cybersecurity Initiative Training the existing

More information

National Initiative for Cybersecurity Careers and Studies (NICCS) Cybersecurity Training and Education Catalog Training Provider Instruction Guide

National Initiative for Cybersecurity Careers and Studies (NICCS) Cybersecurity Training and Education Catalog Training Provider Instruction Guide National Initiative for Cybersecurity Careers and Studies (NICCS) Cybersecurity Training and Education Catalog Training Provider Instruction Guide Overview During this presentation, you will: Learn about

More information

Understanding the Skills Gap

Understanding the Skills Gap Understanding the Skills Gap Despite a large pool of unemployed workers, employers continue to struggle to find skilled talent to fill the growing number of job openings in the country. American Society

More information

The GW CyberCorps Program

The GW CyberCorps Program The GW CyberCorps Program www.seas.gwu.edu/cybercorps Introduction The need for educated personnel in the government s cyber security workforce is critical to the nation s security. As evidenced by remarks

More information

Lecturer/Senior Lecturer in Library and Information Science. Professor Claire Warwick, Head of Department

Lecturer/Senior Lecturer in Library and Information Science. Professor Claire Warwick, Head of Department UCL Department of Information Studies Job Title: Department: Responsible to: Post: Lecturer/Senior Lecturer in Library and Information Science Department of Information Studies Professor Claire Warwick,

More information

AC 2010-1485: DEVELOPMENT AND IMPLEMENTATION OF A MASTERS PROGRAM IN COMPUTER INFORMATION TECHNOLOGY

AC 2010-1485: DEVELOPMENT AND IMPLEMENTATION OF A MASTERS PROGRAM IN COMPUTER INFORMATION TECHNOLOGY AC 2010-1485: DEVELOPMENT AND IMPLEMENTATION OF A MASTERS PROGRAM IN COMPUTER INFORMATION TECHNOLOGY Hetal Jasani, Northern Kentucky University Hetal Jasani is an assistant professor in the Department

More information

The BSIS at UNC. Connecting People, Information, and Technology

The BSIS at UNC. Connecting People, Information, and Technology The BSIS at UNC Connecting People, Information, and Technology Why a Bachelor of Science in Information Science (BSIS)? The School of Information and Library Science (SILS) at the University of North Carolina

More information

How to use the National Cybersecurity Workforce Framework. Your Implementation Guide

How to use the National Cybersecurity Workforce Framework. Your Implementation Guide How to use the National Cybersecurity Workforce Framework Your Implementation Guide A NATIONAL PROBLEM The Nation needs greater cybersecurity awareness. The US workforce lacks cybersecurity experts. Many

More information

Tools and Resources to Build Your Cybersecurity Workforce

Tools and Resources to Build Your Cybersecurity Workforce Tools and Resources to Build Your Cybersecurity Workforce Benjamin Scribner Department of Homeland Security (DHS) National Cybersecurity Education & Awareness Branch (CE&A) November 2015 NICE Conference

More information

Goal. Vision. CAE IA/CD Program Eligibility and Summary

Goal. Vision. CAE IA/CD Program Eligibility and Summary Goal Vision National Centers of Academic Excellence in Information Assurance/Cyber Defense (IA/CD) Education Program Criteria for Measurement Jointly Sponsored by the National Security Agency (NSA) and

More information

ICT and Networking Courses Prepare and Inspire Future Innovators

ICT and Networking Courses Prepare and Inspire Future Innovators Corporate Social Responsibility Impact Profile Cisco Networking Academy TM ICT and Networking Courses Prepare and Inspire Future Innovators Today, 2 billion things are connected over the Internet. Experts

More information

Protecting Energy s Infrastructure and Beyond: Cybersecurity for the Smart Grid

Protecting Energy s Infrastructure and Beyond: Cybersecurity for the Smart Grid Protecting Energy s Infrastructure and Beyond: Cybersecurity for the Smart Grid Which is it? Cyber Security ~or~ Cybersecurity? Dr. Ernie Lara President Presenters Estrella Mountain Community College Dr.

More information

A Multi-Tier Approach to Cyber Security Education, Training, and Awareness in the Undergraduate Curriculum (CSETA)

A Multi-Tier Approach to Cyber Security Education, Training, and Awareness in the Undergraduate Curriculum (CSETA) Paper ID #9796 A Multi-Tier Approach to Cyber Security Education, Training, and Awareness in the Undergraduate Curriculum (CSETA) Dr. Nikunja Swain P.E., South Carolina State University Dr. Swain is currently

More information

UMD Department of Mechanical and Industrial Engineering

UMD Department of Mechanical and Industrial Engineering UMD Department of Mechanical and Industrial Engineering Indices and Standards for Tenure and Promotion to Professor as Required by Section 7.12 of the Board of Regents Policy on Faculty Tenure (June 10,

More information

Program Proposal for the. Computer Information Systems Option. Computer Information Systems Department (CIS) College of Business Administration (CBA)

Program Proposal for the. Computer Information Systems Option. Computer Information Systems Department (CIS) College of Business Administration (CBA) Program Proposal for the Computer Information Systems Option Computer Information Systems Department (CIS) College of Business Administration (CBA) Final proposal for the Computer Information Systems Option

More information

SECURITY AND RESILIENCE STUDIES

SECURITY AND RESILIENCE STUDIES MASTER OF SCIENCE SECURITY AND RESILIENCE STUDIES Networked for Success. Networked for Industry. Networked for Life. College of Social Sciences and Humanities The number of job postings requiring graduate-level

More information

IIT SCHOOL OF APPLIED HANDS ON. HIGH VALUE. TECHNOLOGY LIVE AND ONLINE COURSES

IIT SCHOOL OF APPLIED HANDS ON. HIGH VALUE. TECHNOLOGY LIVE AND ONLINE COURSES G R A D U A T E P R O G R A M S IIT SCHOOL OF APPLIED TECHNOLOGY HANDS ON. HIGH VALUE. LIVE AND ONLINE COURSES At IIT School of Applied Technology (SAT) our focus is on the future. Our distinctive programs

More information

MASTER OF SCIENCE IN INFORMATION ASSURANCE PROGRAM DEPARTMENT OF COMPUTER SCIENCE HAMPTON UNIVERSITY

MASTER OF SCIENCE IN INFORMATION ASSURANCE PROGRAM DEPARTMENT OF COMPUTER SCIENCE HAMPTON UNIVERSITY MASTER OF SCIENCE IN INFORMATION ASSURANCE PROGRAM DEPARTMENT OF COMPUTER SCIENCE HAMPTON UNIVERSITY HTTP://SCIENCE.HAMPTONU.EDU/COMPSCI/ The Master of Science in Information Assurance focuses on providing

More information

Online Master of Business Administration (MBA)

Online Master of Business Administration (MBA) Online Master of Business Administration (MBA) Dear Prospective Student, Thank you for contacting the University of Maryland s Robert H. Smith School of Business. By requesting this brochure you ve taken

More information

DELAWARE STATE UNIVERSITY

DELAWARE STATE UNIVERSITY DELAWARE STATE UNIVERSITY TITLE III: STRENGTHENING HISTORICALLY BLACK COLLEGES AND UNIVERSITIES PROGRAM FUNDED ACTIVITIES HBCU (HISTORICALLY BLACK COLLEGES AND UNIVERSITIES PROGRAM) FUNDED: 2007 2012 1

More information

Is an Executive MBA right for you?

Is an Executive MBA right for you? Is an Executive MBA right for you? A GUIDE TO THE EXECUTIVE MBA achieve goals busy schedule support classroom contribution cost peer network the new MBA What is an Executive MBA? The Executive MBA is a

More information

Online Master of Business Administration (MBA)

Online Master of Business Administration (MBA) Online Master of Business Administration (MBA) Dear Prospective Student, Thank you for contacting the University of Maryland s Robert H. Smith School of Business. By requesting this brochure you ve taken

More information

OUTLINE FOR AN INTERDISCPLINARY CERTIFICATE PROGRAM

OUTLINE FOR AN INTERDISCPLINARY CERTIFICATE PROGRAM OUTLINE FOR AN INTERDISCPLINARY CERTIFICATE PROGRAM I. Basic Information 1. Institution: University of Georgia Date: September 28, 2015 2. School/College: Franklin College of Arts and Sciences 3. Department/Division:

More information

Testimony of Eunice Santos. House Oversight and Government Affairs Committee Subcommittee on Information Technology

Testimony of Eunice Santos. House Oversight and Government Affairs Committee Subcommittee on Information Technology Testimony of Eunice Santos Before the House Oversight and Government Affairs Committee Subcommittee on Information Technology Federal Efforts to Improve Cybersecurity June 20 th, 2016 Chicago, Illinois

More information

Abstract. Introduction

Abstract. Introduction Abstract The Professional Science Masters (PSM) is a nationally recognized two-year degree that is funded by the Alfred P. Sloan Foundation and is designed to allow students to pursue advanced training

More information

STUDENT LEARNING ASSESSMENT REPORT MS Cybersecurity

STUDENT LEARNING ASSESSMENT REPORT MS Cybersecurity STUDENT LEARNING ASSESSMENT REPORT MS Cybersecurity SUBMITTED BY: DIANE MURPHY DATE: OCTOBER 15, 2014 BRIEFLY DESCRIBE WHERE AND HOW ARE DATA AND DOCUMENTS USED TO GENERATE THIS REPORT BEING STORED: BLACKBOARD

More information

The Case for Support: The Center for Cyber Security Studies at the U. S. Naval Academy

The Case for Support: The Center for Cyber Security Studies at the U. S. Naval Academy The Case for Support: The Center for Cyber Security Studies at the U. S. Naval Academy Computer and network security threats of the future are of concern today, and new strategies are required to ensure

More information

Sabbatical Leave Application

Sabbatical Leave Application LOS RIOS COMMUNITY COLLEGE DISTRICT Sabbatical Leave Application Name Lance Parks College: CRC Present Assignment: CIS Type of Leave Requested: A. Type A One Semester: Fall Spring X Entire Year Will you

More information

Goal. Vision. CAE 2Y Program Eligibility and Summary

Goal. Vision. CAE 2Y Program Eligibility and Summary Goal National Centers of Academic Excellence in Information Assurance/Cyber Defense for Two-Year Education (CAE2Y) Program Criteria for Measurement Jointly Sponsored by the National Security Agency (NSA)

More information

CyberNEXS Global Services

CyberNEXS Global Services CyberNEXS Global Services CYBERSECURITY A cyber training, exercising, competition and certification product for maximizing the cyber skills of your workforce The Cyber Network EXercise System CyberNEXS

More information

Cybersecurity: A Shared Responsibility and Department of Homeland Security Priority

Cybersecurity: A Shared Responsibility and Department of Homeland Security Priority Cybersecurity: A Shared Responsibility and Department of Homeland Security Priority A Presentation to the National Cyberwatch Center November 20, 2015 Webinar Protocol :: Mute your phone/mic when not talking

More information

Becoming a Cyber Professional: A Discussion with Recent Graduates

Becoming a Cyber Professional: A Discussion with Recent Graduates Becoming a Cyber Professional: A Discussion with Recent Graduates Moderator: George L. Heron, LifeJourney USA Panelists: Danielle Santos, Assistant Program Manager, Cyber Formal Education, DHS Scott Wallace.

More information

INNOVATION. Campus Box 154 P.O. Box 173364 Denver, CO 80217-3364 Website: http://cam.ucdenver.edu/ncmf

INNOVATION. Campus Box 154 P.O. Box 173364 Denver, CO 80217-3364 Website: http://cam.ucdenver.edu/ncmf EDUCATION RESEARCH INNOVATION Campus Box 154 P.O. Box 173364 Denver, CO 80217-3364 Website: http://cam.ucdenver.edu/ncmf Email: ncmf@ucdenver.edu Phone: 303.315.5850 Fax: 303.832.0483 JEFF M. SMITH, m.s.

More information

ISACA S CYBERSECURITY NEXUS (CSX) October 2015

ISACA S CYBERSECURITY NEXUS (CSX) October 2015 ISACA S CYBERSECURITY NEXUS (CSX) October 2015 DO2 EXECUTIVE OVERVIEW Will you be a Cyber defender? ISACA launched the Cybersecurity Nexus (CSX) program earlier this year. CSX, developed in collaboration

More information

Forensic Science. Three Certificate Programs in. Certificates in: Death Investigation Forensic Toxicology. Forensic Science

Forensic Science. Three Certificate Programs in. Certificates in: Death Investigation Forensic Toxicology. Forensic Science Three Certificate Programs in Forensic Science Giving you investigative skills to broaden the scope of your job opportunities Certificates in: Death Investigation Forensic Toxicology Forensic Science Sponsored

More information

University of Maine B.S. In Cybersecurity Version 2.0

University of Maine B.S. In Cybersecurity Version 2.0 University of Maine B.S. In Cybersecurity Version 2.0 Prof. George Markowsky School of Computing & Information Science University of Maine April 27, 2015 Contents 1 Background 8 1.1 Evidence of Program

More information

Wyoming Community College Commission Request for New, Pilot or Revised Degree or Certificate Program

Wyoming Community College Commission Request for New, Pilot or Revised Degree or Certificate Program Community Commission Request for New, Pilot or Revised Degree or Certificate Program A. : Laramie County Community B. Date submitted to WCCC: C. Program 1. Request for: X New Program Pilot Program Revised

More information

Information Security & Intelligence

Information Security & Intelligence Information Security & Intelligence Why Choose Information Security & Intelligence? The ISI program is certified by NSA's Information Assurance Courseware Evaluation Program as a National Center of Academic

More information

Energy for Learning: From Education to Employment

Energy for Learning: From Education to Employment Energy for Learning: From Education to Employment Chevron invested more than $100 million in education over the last three years in the U.S. and has pledged an additional $30 million through 2015 to support

More information

Cyber Security in the Nuclear Age. Dr. Jane LeClair, Chief Operating Officer National Cybersecurity Institute at Excelsior College Washington, D.C.

Cyber Security in the Nuclear Age. Dr. Jane LeClair, Chief Operating Officer National Cybersecurity Institute at Excelsior College Washington, D.C. Cyber Security in the Nuclear Age Dr. Jane LeClair, Chief Operating Officer National Cybersecurity Institute at Excelsior College Washington, D.C. Overview 2 A Vested Interest Computers have provided the

More information

UTCS CyberSecurity. Educating Cyber Professionals. Dr. Bill Young Department of Computer Sciences University of Texas at Austin. Spring Semester, 2015

UTCS CyberSecurity. Educating Cyber Professionals. Dr. Bill Young Department of Computer Sciences University of Texas at Austin. Spring Semester, 2015 UTCS CyberSecurity Educating Cyber Professionals Dr. Bill Young Department of Computer Sciences University of Texas at Austin Spring Semester, 2015 Slideset 1: 1 From the Headlines U.S. Not Ready for Cyberwar

More information

TOPSECRETPROTECTION.COM (TSP)

TOPSECRETPROTECTION.COM (TSP) TOPSECRETPROTECTION.COM (TSP) OVERVIEW OF CYBER SECURITY-INFORMATION SYSTEMS SECURITY PROGRAM MANAGEMENT TRAINING COURSE CYBER SECURITY-ISSPM PROFESSIONAL CERTIFICATION Introduction To TSP TSP has over

More information

Virtual Learning Tools in Cyber Security Education

Virtual Learning Tools in Cyber Security Education Virtual Learning Tools in Cyber Security Education Dr. Sherly Abraham Faculty Program Director IT and Cybersecurity Dr. Lifang Shih Associate Dean School of Business & Technology, Excelsior College Overview

More information

Someone s sitting in the shade today because someone planted a tree a long time ago. Warren Buffett. Ed Skoudis Mike Qaissaunee.

Someone s sitting in the shade today because someone planted a tree a long time ago. Warren Buffett. Ed Skoudis Mike Qaissaunee. New Jersey Cyber Aces Academy at Brookdale: A Collaborative Public/Private Model to Secure the Nation A project funded through NSF SFS Grant DUE#1331170 Ed Skoudis Mike Qaissaunee April 30, 2014 Someone

More information

Introduction to NICE Cybersecurity Workforce Framework

Introduction to NICE Cybersecurity Workforce Framework Introduction to NICE Cybersecurity Workforce Framework Jane Homeyer, Ph.D., Deputy ADNI/HC for Skills and Human Capital Data, ODNI Margaret Maxson, Director, National Cybersecurity Education Strategy,

More information

An Accelerated Pathway to Careers in Cybersecurity for Transitioning Veterans. NICE Annual Conference November 2015

An Accelerated Pathway to Careers in Cybersecurity for Transitioning Veterans. NICE Annual Conference November 2015 An Accelerated Pathway to Careers in Cybersecurity for Transitioning Veterans NICE Annual Conference November 2015 Panelists David Brown, Director of CyberTalent at the SANS Institute, a new business unit

More information

The 2007-08 Humanities Departmental Survey. Art History. Table AH1: Faculty Members by Carnegie Classification and Highest Degree Offered 9

The 2007-08 Humanities Departmental Survey. Art History. Table AH1: Faculty Members by Carnegie Classification and Highest Degree Offered 9 Art History In this section, we will provide an overview of Art History departments. First we will examine the total number of faculty and students. Then we will examine faculty hiring and recruiting and

More information

Software Applications Development Bachelor s Degree Program

Software Applications Development Bachelor s Degree Program Education for the future. The six schools of study at the ITT Technical Institutes 3 (School of Information Technology, School of Electronics Technology, School of Drafting and Design, School of Business,

More information

[STAFF WORKING DRAFT]

[STAFF WORKING DRAFT] S:\LEGCNSL\LEXA\DOR\OI\PARTIAL\CyberWD..xml [STAFF WORKING DRAFT] JULY, 0 SECTION. TABLE OF CONTENTS. The table of contents of this Act is as follows: Sec.. Table of contents. Sec.. Definitions. TITLE

More information

15 USC 7404. NB: This unofficial compilation of the U.S. Code is current as of Jan. 4, 2012 (see http://www.law.cornell.edu/uscode/uscprint.html).

15 USC 7404. NB: This unofficial compilation of the U.S. Code is current as of Jan. 4, 2012 (see http://www.law.cornell.edu/uscode/uscprint.html). TITLE 15 - COMMERCE AND TRADE CHAPTER 100 - CYBER SECURITY RESEARCH AND DEVELOPMENT 7404. National Science Foundation computer and network security programs (a) Computer and network security capacity building

More information

Science and Math Teacher Initiative

Science and Math Teacher Initiative Science and Math Teacher Initiative (CalTeach) Program Highlights Report OVERVIEW The University of California Science and Math Teacher Initiative known as CalTeach is making a strong contribution to the

More information

CONSTRUCTION. School of Technology &

CONSTRUCTION. School of Technology & CONSTRUCTION MANAGEMENT School of Technology & Professional Studies Construction Management: Drexel Graduates Build the World The U.S. Department of Labor s Bureau of Labor Statistics reports that 6.9

More information

The Education and Training subcommittee is charged with making recommendations regarding methods the State of Maryland can use to increase cyber

The Education and Training subcommittee is charged with making recommendations regarding methods the State of Maryland can use to increase cyber The Education and Training subcommittee is charged with making recommendations regarding methods the State of Maryland can use to increase cyber innovation by promoting workforce training, education, and

More information

National Initiative for Cybersecurity Education

National Initiative for Cybersecurity Education THE NICE VISION National Initiative for Cybersecurity Education a national campaign to promote cybersecurity awareness and digital literacy from our boardrooms to our classrooms, and to build a digital

More information

Operationally Focused CYBER Training Framework

Operationally Focused CYBER Training Framework Operationally Focused CYBER Training Framework Deputy Director, Field Security Operations 9 May 2012 Agenda DISA Cyber Workforce Training Vision Basic Tenets Role-based Educational/Assessment implementation

More information

Information Systems Technology & Cybersecurity Programs

Information Systems Technology & Cybersecurity Programs Information Systems Technology & Cybersecurity Programs Stay close. Go far. Computer Studies Faculty Trudy Gift Professor, Information Systems Technology 240-500-2214 tgift@hagestowncc.edu Carrie Pifer

More information

Sunnie Chung. Cleveland State University

Sunnie Chung. Cleveland State University Sunnie Chung Cleveland State University They are very new technologies to Computer Science in rise of Web Service on Internet (IoT) They were fast developed and fast evolving Research and Developments

More information

AC 2012-5259: THE DEVELOPMENT OF AN INTERDISCIPLINARY BACH- ELOR S DEGREE COMPLETION PROGRAM IN THE STEM FIELDS

AC 2012-5259: THE DEVELOPMENT OF AN INTERDISCIPLINARY BACH- ELOR S DEGREE COMPLETION PROGRAM IN THE STEM FIELDS AC 2012-5259: THE DEVELOPMENT OF AN INTERDISCIPLINARY BACH- ELOR S DEGREE COMPLETION PROGRAM IN THE STEM FIELDS Dr. Sara Hooshangi, George Washington University c American Society for Engineering Education,

More information

SUSTAINABLE SOLUTIONS PAPER PROPOSAL. Derek A. Smith. Walden University

SUSTAINABLE SOLUTIONS PAPER PROPOSAL. Derek A. Smith. Walden University [SUSTAINABLE SOLUTIONS PAPER PROPOSAL] 1 Running head: [SUSTAINABLE SOLUTIONS PAPER PROPOSAL] SUSTAINABLE SOLUTIONS PAPER PROPOSAL Derek A. Smith Walden University Author Note This paper was prepared for

More information

Becoming a Cyber Professional: A Discussion with Recent Graduates

Becoming a Cyber Professional: A Discussion with Recent Graduates Becoming a Cyber Professional: A Discussion with Recent Graduates Date: November 6, 2014 MICHAEL ROCHA Education B.S. Administration, Concentration in Cyber Security California State University, San Bernardino

More information