A Computer Science Course in Cyber Security and Forensics for a Multidisciplinary Audience
|
|
- Philip Owens
- 8 years ago
- Views:
Transcription
1 A Computer Science Course in Cyber Security and Forensics for a Multidisciplinary Audience Wendy A. Lawrence-Fowler Department of Computer Science The University of Texas-Pan American Edinburg, Texas wfowler@utpa.edu Abstract The preparation of a graduate level cyber security and forensics course in a computer science department that addresses theory, policy, and application for a multidisciplinary student audience can be daunting when the majority of students in the class do not have a computer science background. The course takes a holistic approach to broaden knowledge and deepen understanding of the domain of cyber security using cross disciplinary teams to gain understanding and experience taking theory to practice and practice to theory. A framework of understanding is built through the examination of the body of scholarly conceptual and technical works and hands on experience with hardware and software platforms and networks. Computer Science provides the theoretical underpinnings and technical details, methods, and tools to examine security concepts; Forensic Science provides the approach to critical analysis of digital evidence; and Behavioral Analysis provided a way to synthesize knowledge and scientific method to gain some understanding of criminal behavior as well as the breadth and economic impact of cybercrime. This approach resulted in students who gained technical proficiency and perspective and experience working with people with divergent backgrounds, abilities and knowledge sets. Keywords cyber security, forensics, multidisciplinary learning, security education, information security training I. INTRODUCTION In the era of information, security is a common topic of discussion in public and private, large and small organizations. While information security is not a new field, the increasing number of security breaches and threats to personal, organizational, and national safety have created a focus on cyber security. This has created an increased demand for qualified security professionals in both the private and the public sector. Emerging fields of study and practice in cyber security computer forensics, network security, software security, and critical infrastructure protection are increasingly important areas of interest [1]. The U.S. government has recognized that securing cyberspace is an extraordinarily difficult challenge that requires a coordinated and focused effort from our entire society the federal government, state and local governments, the private sector and the American people [2]. In addition to the National Initiative for Cybersecurity (NICE) at NIST, the U.S. Intelligence Community established the Intelligence Community Center of Excellence in National Security Studies Program (IC CAE) in 2005 to strategically meet the nation s demand for a competitive, knowledgeable and ethnically diverse pipeline of professionals to meet the United States National Security Imperatives in the 21 st Century. In 2007, The University of Texas Pan American, a Hispanic Serving Institution, established an Intelligence Community Center of Academic Excellence (IC CAE) with funding from the Office of the Director of National Intelligence (ODNI). The purpose of the Center is to prepare students for careers in intelligence and security through advanced interdisciplinary studies using an approach that assures that the next generation of Intelligence Community professionals is prepared with the appropriate skills and breadth of knowledge to be leaders in the national security challenges in the global economy of the 21 st century. Recognizing the breadth of knowledge required to lead security initiatives and recognizing that solutions to the current challenges in security demand the integration of human and technical resources, the UTPA IC CAE uses a multidisciplinary approach to achieve substantial synergies in combining knowledge from different disciplines to IC challenges in information assurance and analysis, risk assessment, management, leadership, and technology. Housed in the College of Social and Behavioral Sciences, the IC CAE leads the discourse on national security across the campus and identifies specific needs associated with bridging seemingly disparate disciplines. The UPTA IC CAE created and manages an interdisciplinary Global Securities Studies and Leadership Program (GSSL) that involves significant outreach activities to expand the potential workforce pipeline and educate the general community about national security. Like the other MSI based Centers of Excellence, the UTPA GSSL program includes significant outreach efforts to attract individuals to the pipeline for security professionals. However, unlike many of the centers, the GSSL program introduced new courses, /13/$ IEEE
2 new degree programs and a certificate program in Global Security Studies and Analysis to the UTPA curriculum. The GSSL programs also differ from programs offered by NSA Centers of Academic Excellence in Cyber Operations that tend to be deeply technical in a substantial number of topics. As of 2008, the GSSL program coordinates an undergraduate minor, a graduate certificate and a Master s degree in Interdisciplinary Studies (MAIS). With the exception of the new courses, the program design consists almost entirely of existing UTPA courses, taught by current faculty in established departments. Its near-universal reach across the university curriculum is ambitious because it articulates skill and knowledge sets that reside in many of UTPA s departments. This paper discusses the challenges of delivering a Computer Science course in Cyber Security and Forensics as a part of the technical competency course sequence for the GSSL MAIS. The original course is designed as a masters level course in computer science that addresses theory, policy, and application. This course is modified to provide a computer science perspective on theory, policy and application to simultaneously meet the needs of a diverse multidisciplinary audience in three graduate programs: Computer Science, Information Technology, and Global Security Studies. II. THE GLOBAL SECURITY STUDIES PROGRAM A. Overview of Master s of Interdisciplinary Studies(MAIS) The MAIS degree prepares students for careers in Intelligence and National Security through focus on advanced research, effective cross-discipline team communication, and critical analysis. Given that jobs in government or private industry often require multidisciplinary cooperation, the GSSL MAIS prepares students to work with people from different backgrounds, abilities, and knowledge bases. This approach assures that students have the opportunity to gain the perspective of and proficiency in multiple disciplines, preparing them for careers in national security. The Intelligence Community has defined and organized 5 Primary Critical Skill Sets/Competencies based on categories of security employment that people will specialize in: 1) Information Technology Specialists, 2) Political/Economic Specialists, 3) Language Specialists, 4) Threat Specialists, and 5) Scientific/Technical Specialists [3]. The GSSL programs engage students and faculty in each of these five Primary Critical Skill Sets. In addition to the primary skill sets, a number of IC defined Specific General Competencies for Intelligence Professionals areas are addressed in the program including analysis, analytical reasoning, critical thinking, communications (oral and written), research, developing rational conclusions and deriving alternative solutions from ambiguity and limited data sets[3]. B. MAIS Curriculum The GSSL MAIS consists of 36 semester hours of study, including a 12 hour core sequence, a 15 hour concentration in interdisciplinary studies and a 9 hour technical competency sequence. Through the core sequence the students learn how skill sets relate to the global context of intelligence and security work. The core courses address the competency skill areas including advanced research, problem solving, critical thinking, technical writing, and leadership. The core courses consist of Global Security, Open Source Research, Interdisciplinary Research and Analysis, and a practicum in Global Studies Security Studies. The interdisciplinary course sequence addresses critical competencies required to understand the globalization of communication, societies, cultures, governments, businesses, and technology. The required courses include Culture and Communication, International Management, Cross Cultural Psychology, Statistics and a graduate level elective. The technology competency sequence provides students with the essentials of information technology and computer systems with a focus in information security. The course sequence consists of Information Security, Principles of Information Technology Systems, and Cyber Security and Forensics [3, 4]. The first course in the technology series is offered by the faculty in the Department of Computer Information Systems located in the College of Business. The second two courses are taught by faculty in the Department of Computer Science in the College of Engineering and Computer Science. All three of these courses existed in their respective departments with intended audiences other than the participants in the GSSL program prior to their identification as the technical competency sequence. III. CYBER SECURITY AND FORENSICS COURSE Using a variety of learning resources, the Cyber Security and Forensics course addresses a broad set of topics in cyber security and cyber forensics. The goal is to assure that students gain an understanding of the breadth and depth of what cyber security and cyber forensics mean in abstract terms and in the context of real systems. Through reading, lecture, discussion, and thought experiments [5] students learn about the underlying formalisms and technologies that address challenges and potential threats to confidentiality, integrity, and availability. Students learn aspects of cybercrime and ways in which to uncover, protect, exploit, and document digital evidence. Students are exposed to different types of tools, techniques, and procedures, as well as policy and legal issues. The use of a hands-on-laboratory component reinforces formalisms and technologies introduced in lecture and discussion. Augmenting lecture and discussion based thought experiments, the labs support understanding through direct experience in applying knowledge in new situations [6,7,8]. Students develop skills in the reduction of theory to practice and abstraction of practice to theory. A Blackboard instance of the course is used to manage learning resources, support communication, and the sharing of knowledge and perspectives on the discipline. Rather than assigning a textbook, the course uses a set of scholarly and technical works from academic, industrial, and government sources. Students have access to a variety of open source tools, commercial hardware and software products and a laboratory in which they are free to experiment.
3 A. Learning Objectives Upon completion of the course, students are expected to (1) understand the basic theory and concepts of cyber security and privacy including policies, models, and mechanisms; (2) understand ethics, legal issues, and human factors associated with cyber security and forensics; (3) understand security vulnerabilities and be able to describe threats and risks; (4) be able to explain best practices in giving access to systems and networks and implement proper authentication techniques; (5) be familiar with cryptographic techniques, asymmetric key algorithms, and create certificates; (6) describe the requirements for a cyber forensic investigation and demonstrate an understanding of tools, techniques and procedures; and (7) be conversant in current security related issues in the fields of cyber security and cyber forensics. B. Course Topics The course begins with an overview of the security problem followed by an introduction of fundamental tools and techniques for addressing security. After providing a broad introduction to security, the course focus shifts to forensics. Course topics include: Confidentiality, integrity and access policies (policy and metapolicy) Information flow and content (encoding and entropy) Cryptography and ciphers Network security Malicious logic, vulnerability analysis Strategic planning for security Law and legal issues Volatile and persistent data First responder activities Hacking: ethical and not The discussion on strategic planning for security includes a presentation of requirements to create a security organization. This discussion, intentionally placed two thirds of the way through the semester, presents a scaffolding that provides a real-world context and supports the creation of connections between security topics. This discussion illustrates the real world application of all that has been covered to date and creates an opportunity to shift the course focus from security to forensics. C. Laboratory Component The laboratory component of the course gives students practical experience with the concepts introduced in lecture and discussion. Each lab is designed so that students gain experience working with real world tools and real world problems. A broad array of commercial hardware and software, and open source tools are provided to develop solutions for problem based challenges involving confidentiality, integrity, access, and trust. Students identify and disable network attacks. They find hidden information, and they conduct forensic investigations using a systematic approach to evidence identification, preservation, analysis, documentation, and presentation following acceptable legal procedures and laws of evidence[6]. Lab exercises are completed by interdisciplinary teams to encourage transfer of understanding and perspective across the spectrum of divergent bodies of knowledge held by course students and to address varying levels of comfort and skill in using technology. Lab exercises are designed to be completed in real world settings on either personal computers or in the Computer Sciences Advanced Studies Lab. While connected to the campus network for internet access, the Advanced Studies Lab is reconfigurable as need be for this course and the networking courses that share the facilities. Lab exercises assigned during the course include: Controlling access to files and folders with special access to network shared folders in Windows and Unix/Linux environments Mining cache, cookies, and history for traces of activity and hidden value Mining programs and files: Registry tracks Network security: Identifying and disabling network attacks with Security Onion, Squil, Sqert, and Snorby Securing networks with software and hardware firewalls Public faces Social media and the flow of information Imaging and analyzing storage devices with EnCase Imaging and analyzing storage devices and capturing volatile data with open source tools Steganography Two additional lab exercises are available for students that are interested in testing their programming abilities. The first exercise involves creating a covert channel to pass one bit of data. The second exercise involves implementing a robust queue. They are given Bishop and Elliott s 2011 paper on robust programming as a resource for this exercise [9]. D. AssessmentTechniques Used Formative and summative evaluations are given to both make adjustments to content delivery and to assess student learning. Students are given weekly assignments that include a set of readings and at minimum one deliverable. Deliverables vary by week, but in general consist of one or more of the following: 1) short responses to issue specific questions used to measure understanding of the lecture and reading assignments, 2) lab results along with self-assessment of success, and suggestions on improving the lab, 3) short essays on how a reading relates to past, current, or future experiences in global information security, 4) contribution to a course glossary by adding terms and definitions to build a broad and common lexicon for security, 5) identification of a resource and explanation of its value, 6) a reaction paper on a particular
4 assigned reading. Every class begins with a background knowledge probe to assess student familiarity with terms and concepts. Thought exercises introduced during lectures provide a means to gather input on how well students comprehend the content of discussion and lecture. These experiments require higher order thinking: analysis, synthesis, and evaluation, providing the instructor with information about students learning and a self-assessment tool for students. All laboratory exercises include a request for feedback on the activity and most include a required opinion either on the tools, process, or the lab s value add to the learning experience. A relatively casual atmosphere in lab leads to conversation and additional opportunities to gather feedback about content delivery and student learning. Two larger learning exercises serve as exams. The first exercise serves as a midterm. Students are given three questions: two questions that require students to research specific security models not previously presented in lecture and discuss their application. A third question serves as a thought exercise requiring critical thinking and synthesis. The second large exercise serves as a final. Students choose one of two challenges. In the first challenge students must build a forensic tool kit from existing open source resources and write a comprehensive user s guide on when, why and how to use each tool in acquisition, analysis and presentation during a forensic investigation. In challenge two, students read Cliff Stoll s book The Cuckoo s Egg and write a 7 to 10 page response to one of three prompts. Each of the prompts requires analysis, synthesis, critical and creative thinking. IV. DISCUSSION Computers, the Internet, , wireless technology toys, and social networks are pervasive and a ubiquitous part of everyday life. The growth in digital details that are created, captured, and stored in more places than most people realize is exponential as is the growth rate of crimes in which cyber technology is the instrument of, the target of, or by its nature, the location where evidence is stored or recorded. The number of security breaches and threats to personal, organizational, and national safety and the increasing costs of security breaches have create a focus on cyber security[10,11,12] and a demand for qualified security professionals in both the private and the public sector[2,3]. Academic institutions respond by offering new undergraduate and graduate courses in cyber security [13] and forensics [6]. A. Background The course that was chosen for the GSSL MAIS technology sequence to address cybersecurity was originally designed for graduate students in a computer science master s program. Students were expected to be familiar with networks, operating systems, data structures, programming languages, software application programming and hardware. The course takes a breadth first approach to introducing the fundamentals of computer security and forensics. Balancing lecture content with hands-on laboratory exercises, students have the opportunity to experience theoretical concepts and their implementation. Reflective learning exercises are designed to empower students to link prior knowledge with new knowledge and develop a deep understanding of the complexity of cyber security and forensics theory and practice. B. Challenges It is a challenging task to offer this graduate level Computer Science Security and Forensics course to graduate students in programs outside of computer science. Traditionally at UTPA, the course is an elective in the Master s of Computer Science and the Master s of Science in Information Technology (MSIT) programs. The course is taken after students have completed an advanced networking course. However, with the inclusion of this course in the GSSL MAIS, the demographic profile of students taking the course changes radically. Less than 3% of the students have undergraduate degrees in computer science and are pursuing a Master s degree in Computer Science. The remaining 97% of the students program affiliations are split between the MSIT and the MAIS. Of this group, only 8% have formal undergraduate training in information technology. The new demographic includes students who have undergraduate degrees in accounting, computer science, criminal justice, early childhood education, economics, graphic design, information technology, political science, psychology, and sociology. The majority of MAIS students move directly from their undergraduate education to the graduate program. The majority of MSIT students are currently working as professionals in information technology and have extensive experience in either networking or management information technology systems. On occasion the class includes a Chief Security Officer from a banking institution or local government agency. A prerequisite course, Principles of Information Technology Systems, provides leveling preparation for the concepts introduced in the class. However, 40% of the class has either not taken the leveling course or are completing it concurrently. Recognizing that the essential body of knowledge for the domains of security and forensics are broadly distributed and include deep subdomains, the first challenge is to modify the course. A set of topics are defined using the IC CAE documents, the five Primary Critical Skill Sets [3], and the UTPA GSSL program goals and curriculum. An approach to the topics is developed that recognizes that security issues do not rest solely in the domains of Computer Science and Information Technology[14]. Competency in mathematics presents a second challenge. Given the nontechnical nature of most students backgrounds, competency in mathematics clusters at the level of college algebra. This means that when using theoretical constructs to introduce security concepts such as confidentiality, integrity, and information theory, additional techniques must be implemented to facilitate the learning or building up of the formal concepts. Metaphors provide excellent support in understanding concept proofs. For example, a love triangle is useful in explaining a trusted relationship. A coin is used to demonstrate encoding. Translating the concepts into examples
5 from everyday life allows students to transfer existing knowledge. The diversity in students program of study demands the establishment of a common vocabulary in security and forensics to support effective communication and to facilitate sharing of perspectives and knowledge across the disciplines. To address this third challenge, students use a forum to provide profiles, including their backgrounds and expertise. They create a wiki, submitting terms and definitions, to build a common lexicon. A second wiki serves as a repository for students contributed resource materials. These wikis create a framework for growing the Essential Body of Knowledge (EBT) [15] and support peer to peer learning where knowledge is transferred and created in a learning community. The diversity of academic training, perspectives and experience means that students are exposed to the breadth of knowledge that professionals should know to be conversant in the field. Students, at minimum, know the key concepts and terms to perform their work functions in security and they gain, at least, a basic familiarity with all of the key terms and concepts in the EBT [15]. Thought exercises are used throughout the lectures to provide an opportunity for students to think independently, discuss their thoughts in pairs, and share their ideas with the class. This think-pair-share approach also serves as the basis for work outside of class. Students reflect on concepts and present their thoughts on forums or in the form of short essays. These reflections serve as the basis for conversation and the opportunity to elaborate on ideas. This approach increases personal communication that is necessary to process, organize and retain ideas[16]. The approach takes advantage of the students diverse knowledge base to expand individual perspectives on security and forensics topics. There is also a great diversity among the students skill levels in the use and the understanding of computing environments. Labs, originally designed to expose students to the concepts introduced in lecture and discussion are found to be too complex. The labs are modified so that students with minimal background in computing are able to complete the exercises and gain conceptual insight. In addition, early in the semester students are intentionally directed into interdisciplinary teams. Each team has at least one individual with a strong background in information technology or networking. The multi-disciplinary nature of the lab teams is leveraged to assure exposure to alternative viewpoints and process design. Due to the lack of programming skills among students in the course, two additional labs are available for deeper investigation by those individuals that are interested: (1) programming a covert channel and (2) programming a nonrobust queue [9]. Among other challenges include faculty competency across the breadth of the course topics. Fortunately, there is strong interest and investment in information security at the institutional level. Taking advantage of the human capital resources in Privacy and Security and in the UTPA Division of Information Technology, subdomain experts in network security and forensic investigation provide lectures and lab instruction and guidance. The University s Chief Security Officer, along with recognized security experts from the health industry and intelligence community, discuss strategic planning for security. C. Observations and Course Outcomes As a collective, the mix of learning activities complements the course learning objectives. Aside from the lectures, classroom and lab based activities are modified to reinforce collaborative learning. The intent in building a common lexicon and resource base is to allow students to discover the breadth and depth of issues related to cyber security and forensics. They have the opportunity to both review and build on each other s work. It is evident in the questions and comments in the forums and the contributions to the wikis that students are expanding their knowledge base. Periodically in lecture, thought exercises are used to gain a feeling for student understanding. These typically involve a specific problem to solve that requires the application of a new concept. Using the think-pair-share approach allows the students in the different programs another opportunity to learn how individuals with different backgrounds might approach the same problem. Essays on readings often contain not only reflections on course content, but also reflections on classroom think-pairshare and lab discussions. In addition, student essays on content and its projection on their lives often include commentary on how their views or knowledge have changed. Labs that proved too difficult to complete without a prerequisite computer science background are reworked such that they are too difficult for one person to complete working alone, but are easily completed when individuals work in teams. The casual lab environment and multidisciplinary teams expose students to different approaches to solve problems and they are encouraged to investigate, compare and evaluate multiple approaches. On many occasions student teams define competitions for themselves to develop the most efficient or effective solutions or processes. Students often stay well past the end of the lab to do self-initiated benchmarking or complete peer reviews. There are a number of times throughout the semester that discussions lead to one or more members of the class taking responsibility for peer teaching. For example, a student who served as a data analyst in a combat zone shared his direct experiences with encryption and ciphers. On another occasion, one GSSL student who serves as the Chief Security Officer for a bank explained security policies and processes for internet transactions, a second student in the MSIT program explained a possible underlying implementation, and a third student from Computer Science provided an alternative approach. And on yet another occasion a GSSL and a MSIT student worked outside of class to implement and subsequently demonstrate to the class a virus that would bypass the firewalls set up during a lab exercise. The students in the MAIS program tend to be very high verbal, while the students in the MSIT and MSCS programs tend to be computationally stronger. It is apparent from essays, presentations and final challenge submissions that the writing and course discussions throughout the semester help to improve students verbal and written communication skills as
6 well as their awareness. While this is evidenced as the course progresses, this improvement is most apparent in the choices made for the final learning challenge. Even though the class is fairly evenly split between GSSL and technology based graduate students and the MSIT and MSCS students are focused on the forensics toolkit project, in the end, the majority of the students choose to complete the challenge in which they read a book and respond to a prompt. In all of the responses, students thoroughly address the technological issues discussed in the book as well as provide critical analysis of the strengths and failings of the human systems. Finally, based on the responses collected from the university s standard Student Evaluation of Teaching Form, students appreciate the opportunity not only to take on responsibility for their own learning, but are more fully engaged when presented with the challenge. The opportunity for collaborative learning empowers students to learn. The exposure to multiple perspectives on the same concepts through active and meaningful interaction is received well. They indicate an appreciation of the exposure to a wide range of experts from the field and the juxtaposition of policy and implementation in theory and practice. Students indicate that they feel the information learned in the class is important, the mix of activities are beneficial to learning and the overall quality of the course is very good to excellent. V. CONCLUSION This paper describes a Computer Science course in Cyber Security and Cyber Forensics offered at UTPA. The challenges of offering this course to a multidisciplinary audience lead to changes that leverage the diverse student knowledge base. During the course students learn, practice and gain understanding of concepts and develop the technical and leadership skills required of cyber security professionals. Hands-on lab exercises facilitate understanding of difficult concepts and procedures. Using both commercial and open source tools provides a rich environment. Using interdisciplinary teams facilitates the exchange of knowledge and understanding. Students see how complex the issues in cyber security and forensics are. Students gain an appreciation for true multidisciplinary nature of the field. ACKNOWLEDGMENT I would like to recognize Jennifer Garcia Avila for guiding us through EnCase, Ramon Herrera for providing expertise in network security Joe Voje for providing a strategic view for security, Dr. John Abraham for access to resource materials, Jeremy Miller in implementing many of the hands-on-labs and the UTPA IC CAE for coordinating the 2012 Cyber Security Symposium. REFERENCES [1] Stinikova, Elena and Ray Hunt. Engging students through refelctive practice assessment within a software security lifecycle June Proceedings of the 16 th Colloquium for Information Systems Security Education, Lake Buena Vista, FL. p [2] Bush, George. Forward to The National Strategy to Secure Cyberspace, [3] Office of the Director of National Intelligence. United State of America. United States Intelligence Community Centers of Academic Excellence (IC CAE) in National Security Studies, Guidance and Procedures, Program Plan for Fiscal Years April [4] UTPA IGKNU GSSL website: igknu_home/igknu_gssl/gssl_grad_deg. Accessed: 20 December, [5] Young, William D. Developng a blended computer security course June Proceedings of the 16 th Colloquium for Information Systems Security Education. Lake Buena Vista, FL. p [6] Chi, Hongmei, Edward L. Jones, Christy Chatmon and Deidre Evans. Design and implementaiton of digital forensics labs November Proceedings of the 12 IASTED International Conference on Computers and Advanced Technology in Education. St. Thomas, US Virgin Isalnds. CATE.pdf Accessed: 22 December [7] Eckert, Ben. Real-world security lab environment June Proceedings of the 16 th Colloquium for Information Systems Security Education. Lake Buena Vista, FL. p [8] Fulton, Steven and Dino Schweitzer. A concept focused security lab environment June Proceedings of the 15 th Colloquium for Information Systems Security Education. Fairborn. Ohio. p [9] Bishop, Matt and Chip Elliot. Robust Programming by Example June Proceedings of the 7 th World Conference on Information Security Education. Lucerne, Switzerland. p [10] Mecuri, R Analyzing security costs. Communication of the ACM. Vol. 46, no 6, pp [11] Information security & data breach report, June 2012 update, June Navigant. InfoSec_Data_Breach_Report_Navigant.pdf Accessed: July [12] Armerding, Taylor, The 15 Worst data security breaches of the 21st century. CSO Security and Risk, February Accessed: February 2012 [13] Rigby, Steven Teaching cybersecurity at the seams June Proceedings of the 15 th Coloquium for Information Systsems Security. Fairborn Ohio. p [14] Nance, Kara L. and Brian Hay. A breadth-first approach to computer security. 2-4 June Proceedings of the 12 th Colloquium for Information Systems Security Education. Dallas, TX. p [15] Roth-Perreault, Ellen and Brenda Oldfield. Strengthening the security workforce: a competency and functional framework for information technology security professionals. 4-7 June Proceedings of the 11 th Colloquium for Infomration Systems Security Education. Boston, MA. p [16] Pimm, D. (1987). Speaking mathematically: Communication in mathematics classrooms. New York. Routledge & Kegan Paul.
MASTER OF SCIENCE IN INFORMATION ASSURANCE PROGRAM DEPARTMENT OF COMPUTER SCIENCE HAMPTON UNIVERSITY
MASTER OF SCIENCE IN INFORMATION ASSURANCE PROGRAM DEPARTMENT OF COMPUTER SCIENCE HAMPTON UNIVERSITY HTTP://SCIENCE.HAMPTONU.EDU/COMPSCI/ The Master of Science in Information Assurance focuses on providing
More informationBS Environmental Science (2013-2014)
BS Environmental Science (2013-2014) Program Information Point of Contact Brian M. Morgan (brian.morgan@marshall.edu) Support for University and College Missions Marshall University is a multi-campus public
More informationCriteria for Accrediting Computer Science Programs Effective for Evaluations during the 2004-2005 Accreditation Cycle
Criteria for Accrediting Computer Science Programs Effective for Evaluations during the 2004-2005 Accreditation Cycle I. Objectives and Assessments The program has documented, measurable objectives, including
More informationCapacity Building in Cyber Security Literacy: An Inter-disciplinary Approach
Capacity Building in Cyber Security Literacy: An Inter-disciplinary Approach This material is based upon work supported by the National Science Foundation under Grant No. 1516724 Project Organization University
More informationTitle of Course: Cyberlaw New Course: 10/25/02
Department: Accounting and Management Information Systems Course No. IU300 Title of Course: Cyberlaw New Course: 10/25/02 I. Catalog Description and Credit Hours of Course: Provides a foundation in law
More informationCourse Bachelor of Information Technology majoring in Network Security or Data Infrastructure Engineering
Course Bachelor of Information Technology majoring in Network Security or Data Infrastructure Engineering Course Number HE20524 Location Meadowbank OVERVIEW OF SUBJECT REQUIREMENTS Note: This document
More informationDESIGNING WEB LABS FOR TEACHING SECURITY CONCEPTS ABSTRACT
DESIGNING WEB LABS FOR TEACHING SECURITY CONCEPTS ABSTRACT Security education is critical in today s cyber threat environment. Many schools have investigated different approaches to teaching fundamental
More informationArkansas Teaching Standards
Arkansas Teaching Standards The Arkansas Department of Education has adopted the 2011 Model Core Teaching Standards developed by Interstate Teacher Assessment and Support Consortium (InTASC) to replace
More informationTOOL KIT for RESIDENT EDUCATOR and MENT OR MOVES
Get to Know My RE Observe Collect Evidence Mentor Moments Reflect Review Respond Tailor Support Provide Provide specific feedback specific Feedback What does my RE need? Practice Habits Of Mind Share Data
More informationDepartment of Information Systems and Cyber Security
The University of Texas at San Antonio 1 Department of Information Systems and Cyber Security All graduate programs in Information Systems and Cyber Security are accredited by AACSB International The Association
More informationNew Program Development on Networking Information Technology
atmae white paper July 2014 New Program Development on Networking Information Technology Developing the 21st Century Workforce Dr. Xiaobing Hou Dr. Karen Tracey Dr. Shuju Wu Central Connecticut State University
More informationMEETING THE NATION S INFORMATION SECURITY CHALLENGES
MEETING THE NATION S INFORMATION SECURITY CHALLENGES TO ADDRESS SKILLS AND WORKFORCE SHORTAGES IN THE INFORMATION SECURITY INDUSTRY, THE NATIONAL SECURITY AGENCY AND THE DEPARTMENT OF HOMELAND SECURITY
More informationSection Two: Ohio Standards for the Teaching Profession
12 Section Two: Ohio Standards for the Teaching Profession 1 Teachers understand student learning and development and respect the diversity of the students they teach. Teachers display knowledge of how
More informationCybersecurity Education
Cybersecurity Education Issues & Approaches Derek A. Smith Director of Cybersecurity Initiatives at Excelsior College AFCEA November 18, 2014 Where we are now! Symantec: In a world of increased cybersecurity
More informationCYBER SECURITY TRAINING SAFE AND SECURE
CYBER SECURITY TRAINING KEEPING YOU SAFE AND SECURE Experts in Cyber Security training. Hardly a day goes by without a cyber attack being reported. With this ever-increasing threat there is a growing need
More informationMS In Forensic Computing (MSFC) Saint Joseph s College. (33 Credits, including a Practicum/Internship)
MS In Forensic Computing (MSFC) Saint Joseph s College (33 Credits, including a Practicum/Internship) The MS in Forensic Computing will be an interdisciplinary degree integrating curriculum from three
More informationBachelor of Information Technology
Bachelor of Information Technology Detailed Course Requirements The 2016 Monash University Handbook will be available from October 2015. This document contains interim 2016 course requirements information.
More informationSoftware Engineering Transfer Degree
www.capspace.org (01/17/2015) Software Engineering Transfer Degree This program of study is designed for associate-degree students intending to transfer into baccalaureate programs awarding software engineering
More informationDiscover our Programs of
Discover our Programs of Study UNSW Canberra Postgraduate Coursework Guide 2015 Never Stand Still Student Administrative Services Contents Introduction 1 Admission Criteria...2 Recognition of Prior Learning
More informationDepartment of Communication Studies M.A. Program Annual Report 2010-2011
Department of Communication Studies M.A. Program Annual Report 2010-2011 This report documents the Department of Communication Studies efforts in assessing student learning outcomes in its graduate Masters
More informationTEACHING COMPUTER SECURITY WITH A HANDS-ON COMPONENT
TEACHING COMPUTER SECURITY WITH A HANDS-ON COMPONENT Narayan Murthy Pace University, New York nmurthy@pace.edu Abstract To address national needs for computer security education, many universities have
More informationComputer Forensics and Security Management (MSCFSM)
Computer Forensics and Security Management (MSCFSM) View PDF of Computer Forensics and Security Management Admissions Checklist Prospective students should use this checklist to obtain specific admissions
More informationCourse Specification
LEEDS BECKETT UNIVERSITY Course Specification MSc Sport and Exercise Science 2016-17 (SEMSC) Our courses undergo a process of review periodically, in addition to annual review and enhancement. Course Specifications
More informationPROGRAMME SPECIFICATION POSTGRADUATE PROGRAMME
PROGRAMME SPECIFICATION POSTGRADUATE PROGRAMME KEY FACTS Programme name Advanced Computer Science Award MSc School Mathematics, Computer Science and Engineering Department or equivalent Department of Computing
More informationMS Information Security (MSIS)
MS Information Security (MSIS) Riphah Institute of Systems Engineering (RISE) Riphah International University, Islamabad, Pakistan 1. Program Overview: The program aims to develop core competencies in
More informationGraduate Program Goals Statements School of Social Work College of Education and Human Development
Graduate Program Goals Statements School of Social Work College of Education and Human Development December 12, 2014 Program Youth Development Leadership (MEd) Master of Social Work (MSW) Doctorate in
More informationProject Title: General Education Immersion Concentration in Mobile Computing for Non-Computing Majors: The First Course
Project Title: General Education Immersion Concentration in Mobile Computing for Non-Computing Majors: The First Course Applicant(s): Name Minseok Kwon Telephone 475-4524 College/Dept. GCCIS/Computer Science
More informationTextbooks: Matt Bishop, Introduction to Computer Security, Addison-Wesley, November 5, 2004, ISBN 0-321-24744-2.
CSET 4850 Computer Network Security (4 semester credit hours) CSET Elective IT Elective Current Catalog Description: Theory and practice of network security. Topics include firewalls, Windows, UNIX and
More informationRARITAN VALLEY COMMUNITY COLLEGE COURSE OUTLINE. CISY 275 UNIX and Linux Security Management
RARITAN VALLEY COMMUNITY COLLEGE COURSE OUTLINE CISY 275 UNIX and Linux Security Management I. Basic Course Information A. Course Number & Title: CISY-275 - UNIX and Linux Security Management B. Date of
More informationFaculty of Organizational Sciences
Faculty of Organizational Sciences Management EC TS: 60/ L anguage of instruc tion: Serbian/ degree: M A S TER The Master s degree study program of Management is the continuation of undergraduate studies
More informationRARITAN VALLEY COMMUNITY COLLEGE COURSE OUTLINE. CISY 276 Windows Security Management
RARITAN VALLEY COMMUNITY COLLEGE COURSE OUTLINE CISY 276 Windows Security Management I. Basic Course Information A. Course Number & Title: CISY-276 Windows Security Management B. Date of Revision: Spring
More informationContents The College of Information Science and Technology 2011-2012 Undergraduate Course Descriptions
Contents The College of Information Science and Technology 2011-2012 Undergraduate Course Descriptions Information Science & Systems Courses INFO 101 - Introduction to Information Technology Introduces
More informationINFS2608 ENTERPRISE DATABASE MANAGEMENT
Business School School of Information Systems, Technology and Management INFS2608 ENTERPRISE DATABASE MANAGEMENT Course Outline Semester 1, 2015 Part A: Course-Specific Information Please consult Part
More informationDesign and Implementation of Digital Forensics Labs:
Design and Implementation of Digital Forensics Labs: A Case Study for Teaching Digital Forensics to Undergraduate Students Hongmei Chi, Christy Chatmon, Edward Jones, and Deidre Evans Computer and Information
More informationAC 2010-1485: DEVELOPMENT AND IMPLEMENTATION OF A MASTERS PROGRAM IN COMPUTER INFORMATION TECHNOLOGY
AC 2010-1485: DEVELOPMENT AND IMPLEMENTATION OF A MASTERS PROGRAM IN COMPUTER INFORMATION TECHNOLOGY Hetal Jasani, Northern Kentucky University Hetal Jasani is an assistant professor in the Department
More informationMaster of Fine Arts (MFA) in Communications Design
Program Summary Design plays a central and formative role in shaping communities, technology and business. Never have designers been expected to cultivate such a diverse set of skills and knowledge. MFA
More informationTeaching Requirements through Interdisciplinary Projects
Teaching Requirements through Interdisciplinary Projects Deepti Suri, Eric Durant Department of Electrical Engineering and Computer Science Milwaukee School of Engineering 1025 North Broadway Milwaukee,
More informationDoctor of Philosophy in Informatics
Doctor of Philosophy in Informatics 2014 Handbook Indiana University established the School of Informatics and Computing as a place where innovative multidisciplinary programs could thrive, a program where
More informationCommunity and Leadership Development
# 100 INTRODUCTION TO COMMUNITY AND LEADERSHIP DEVELOPMENT. (1) The course explores how communities of place and interest influence our lives and how these different types of communities are related to
More informationNettitude Ltd. (FHEQ) level 7] MSc Postgraduate Diploma Postgraduate Certificate. British Computer Society (BCS) Master s Degree in Computing
Faculty of Engineering and Informatics Programme Specification Programme title: MSc Cyber Security Academic Year: 2015/16 Degree Awarding Body: Partner(s), delivery organisation or support provider (if
More informationMSc Cyber Security. identity. hacker. virus. network. information
identity MSc Cyber Security hacker virus QA is the foremost provider of education in the UK. We work with individuals at all stages of their careers, from our award-winning apprenticeship programmes, through
More informationOne LAR Course Credits: 3. Page 4
Course Descriptions Year 1 30 credits Course Title: Calculus I Course Code: COS 101 This course introduces higher mathematics by examining the fundamental principles of calculus-- functions, graphs, limits,
More informationSTAGE 1 COMPETENCY STANDARD FOR ENGINEERING ASSOCIATE
STAGE 1 STANDARD FOR ENGINEERING ASSOCIATE ROLE DESCRIPTION THE MATURE ENGINEERING ASSOCIATE The following characterises the senior practice role that the mature, Engineering Associate may be expected
More informationComputer Science & Information Security (BS) Program Learning Assessment. 2011 2015 Assessment Period
Mathematics & Computer Science Department 524 West 59 th Street New York, NY 10019 Douglas E. Salane, Chairperson Tel. (212) 237 8920 dsalane@jjay.cuny.edu Computer Science & Information Security (BS)
More informationMajor prerequisites by topic: Basic concepts in operating systems, computer networks, and database systems. Intermediate programming.
Elective course in Computer Science University of Macau Faculty of Science and Technology Department of Computer and Information Science SFTW498 Information Security Syllabus 2nd Semester 2011/2012 Part
More informationTHE UNIVERSITY OF HONG KONG FACULTY OF BUSINESS AND ECONOMICS
THE UNIVERSITY OF HONG KONG FACULTY OF BUSINESS AND ECONOMICS School of Business BUS10066 Marketing On the Commercial Internet MKTG3524 Internet Marketing 2015-2016, Semester 2 COURSE SYLLABUS I. Information
More informationCRITICAL AND CREATIVE THINKING RUBRIC GRADUATE PROGRAMS
CRITICAL AND CREATIVE THINKING RUBRIC GRADUATE PROGRAMS Adapted from the AACU LEAP rubrics, the Bases of Competence skills, Ontario Council of Academic Vice-Presidents Graduate Degree Level Expectations,
More informationMSc in Computer and Information Security
MSc in Computer and Information Security Programme Specification Primary Purpose: Course management, monitoring and quality assurance. Secondary Purpose: Detailed information for students, staff and employers.
More informationDIGITAL FORENSICS SPECIALIZATION IN BACHELOR OF SCIENCE IN COMPUTING SCIENCE PROGRAM
DIGITAL FORENSICS SPECIALIZATION IN BACHELOR OF SCIENCE IN COMPUTING SCIENCE PROGRAM Proposed Program Title: Bachelor of Science in Computing Science- Specialization in Digital Forensics Specialization
More informationCS Standards Crosswalk: CSTA K-12 Computer Science Standards and Oracle Java Programming (2014)
CS Standards Crosswalk: CSTA K-12 Computer Science Standards and Oracle Java Programming (2014) CSTA Website Oracle Website Oracle Contact http://csta.acm.org/curriculum/sub/k12standards.html https://academy.oracle.com/oa-web-introcs-curriculum.html
More informationSTAGE 1 COMPETENCY STANDARD FOR PROFESSIONAL ENGINEER
STAGE 1 STANDARD FOR PROFESSIONAL ENGINEER ROLE DESCRIPTION - THE MATURE, PROFESSIONAL ENGINEER The following characterises the senior practice role that the mature, Professional Engineer may be expected
More informationIT 101 Introduction to Information Technology
Applied Information Technology Department Course Syllabus IT 101 Introduction to Information Technology Catalog Description Introduces students to the fundamental concepts in information technology (IT)
More informationComputer Science Curriculum Revision
Computer Science Curriculum Revision Background Undergraduate programs in computing-related disciplines began to emerge in the 1960s. At that time there were only three kinds of computing-related programs:
More information1) Chemical Engg. PEOs & POs Programme Educational Objectives
1) Chemical Engg. PEOs & POs Programme Educational Objectives The Programme has the following educational objectives: To prepare students for successful practice in diverse fields of chemical engineering
More informationMaster of Science in Information Systems & Security Management. Courses Descriptions
Master of Science in Information Systems & Security Management Security Related Courses Courses Descriptions ISSM 530. Information Security. 1 st Semester. Lect. 3, 3 credits. This is an introductory course
More informationRARITAN VALLEY COMMUNITY COLLEGE COURSE OUTLINE. CISY-274 Privacy, Ethics & Computer Forensics
RARITAN VALLEY COMMUNITY COLLEGE COURSE OUTLINE CISY-274 Privacy, Ethics & Computer Forensics I. Basic Course Information A. Course Number & Title: CISY-274 - Privacy, Ethics, & Computer Forensics B. New
More informationCybersecurity AAS Program
Cybersecurity AAS Program New Program Proposal State Submission Steve Buchholz, Dean of Accreditation and Advancement July 2015 TABLE OF CONTENTS Executive Summary... 2 Identification and Description of
More informationCS 464/564 Networked Systems Security SYLLABUS
CS 464/564 Networked Systems Security SYLLABUS College: College of Science Department: Department of Computer Science Syllabus Title: CS 464/564 Networked Systems Security Call Number: 1. Meet the Professor
More informationRARITAN VALLEY COMMUNITY COLLEGE COURSE OUTLINE. CISY 229 Information Security Fundamentals
RARITAN VALLEY COMMUNITY COLLEGE COURSE OUTLINE CISY 229 Information Security Fundamentals I. Basic Course Information A. Course Number & Title: CISY-229 Information Security Fundamentals B. New or Modified
More informationPanel on Emerging Cyber Security Technologies. Robert F. Brammer, Ph.D., VP and CTO. Northrop Grumman Information Systems.
Panel on Emerging Cyber Security Technologies Robert F. Brammer, Ph.D., VP and CTO Northrop Grumman Information Systems Panel Moderator 27 May 2010 Panel on Emerging Cyber Security Technologies Robert
More informationCybersecurity education for the next generation Emerging best practices
Cybersecurity education for the next generation Emerging best practices Presented at the 2013 NIST/NICE Workshop Gaithersburg, Maryland Marisa S. Viveros Vice President, Cyber Security Innovation IBM Corporate
More informationUSING INFORMATION ASSURANCE CURRICULUM STANDARDS AS A BASIS FOR A GRADUATE DEGREE
USING INFORMATION ASSURANCE CURRICULUM STANDARDS AS A BASIS FOR A GRADUATE DEGREE N. Paul Schembari, Mike Jochen East Stroudsburg University of Pennsylvania {nschembari, mjochen}@esu.edu ABSTRACT We describe
More informationPlease consult the Department of Engineering about the Computer Engineering Emphasis.
COMPUTER SCIENCE Computer science is a dynamically growing discipline. ABOUT THE PROGRAM The Department of Computer Science is committed to providing students with a program that includes the basic fundamentals
More informationCourse Specification. MSc Audio Engineering 2016-17 (MSADE) www.leedsbeckett.ac.uk LEEDS BECKETT UNIVERSITY
LEEDS BECKETT UNIVERSITY Course Specification MSc Audio Engineering 2016-17 (MSADE) Our courses undergo a process of review periodically, in addition to annual review and enhancement. Course Specifications
More informationGEORGIA STANDARDS FOR THE APPROVAL OF PROFESSIONAL EDUCATION UNITS AND EDUCATOR PREPARATION PROGRAMS
GEORGIA STANDARDS FOR THE APPROVAL OF PROFESSIONAL EDUCATION UNITS AND EDUCATOR PREPARATION PROGRAMS (Effective 9/01/08) Kelly Henson Executive Secretary Table of Contents Standard 1: Candidate Knowledge,
More informationLearning Outcomes Assessment for Building Construction Management
Learning Outcomes Assessment for Building Construction Management Building Construction Management Learning Outcomes 1. The student is prepared to assume an entry level professional constructor s role
More informationApply today: strayer.edu/apply SCHOOL OF INFORMATION SYSTEMS AND TECHNOLOGY MASTER OF SCIENCE IN INFORMATION SYSTEMS RECOGNIZED MARKETABLE FLEXIBLE
RECOGNIZED PROVEN RESPECTED MARKETABLE FLEXIBLE Fernanda Tapia Student SCHOOL OF INFORMATION SYSTEMS AND TECHNOLOGY MASTER OF SCIENCE IN INFORMATION SYSTEMS Apply today: strayer.edu/apply FLEXIBLE / AFFORDABLE
More informationSchool of Management and Information Systems
School of Management and Information Systems Business and Management Systems Information Science and Technology 176 Business and Management Systems Business and Management Systems Bachelor of Science Business
More informationCertified Cyber Security Analyst VS-1160
VS-1160 Certified Cyber Security Analyst Certification Code VS-1160 Vskills certification for Cyber Security Analyst assesses the candidate as per the company s need for cyber security and forensics. The
More informationUnion County College Faculty Curriculum Committee. New Course Proposal Form
Union County College Faculty Curriculum Committee New Course Proposal Form To all faculty members seeking to introduce a new course proposal to the Curriculum Committee, please make sure to complete the
More informationUrsuline College Accelerated Program URSULINE COLLEGE
Ursuline College Accelerated Program CRITICAL INFORMATION! DO NOT SKIP THIS LINK BELOW... BEFORE PROCEEDING TO READ THE UCAP MODULE, YOU ARE EXPECTED TO READ AND ADHERE TO ALL UCAP POLICY INFORMATION CONTAINED
More informationCyber Learning Solutions
Cyber Learning Solutions 2014 Extended Course Catalog Raytheon Cyber Solutions Inc. (RCSI) cyber-training@list.app.ray.com www.raytheon.com 1 Raytheon Cyber Learning Solutions 2014 Catalog CONTENTS The
More informationInformation Systems Security Certificate Program
Information Technologies Programs Information Systems Security Certificate Program Accelerate Your Career extension.uci.edu/infosec University of California, Irvine Extension s professional certificate
More informationLearning Goals and Assessment Methods: Undergraduate Academic Programs (Non-Accredited)
September 2012 and s: Undergraduate Academic Programs (Non-Accredited) Accounting 1) The knowledge and tools needed to obtain meaningful employment and have successful careers directly or indirectly involving
More informationStrategic Plan 2013 2017
Plan 0 07 Mapping the Library for the Global Network University NYU DIVISION OF LIBRARIES Our Mission New York University Libraries is a global organization that advances learning, research, and scholarly
More informationLuna Community College Criminal Justice Program Associate of Arts Degree 2012 2015
Luna Community College Criminal Justice Program Associate of Arts Degree 2012 2015 Curriculum Profile Content Page Program Goals 2 Approvals 3 Degree / Certificate Requirements 4 & 5 Course Descriptions
More informationUSF Graduate Catalog 2014 2015 SECTION 23. http://www.grad.usf.edu/
SECTION 23 COLLEGE OF GRADUATE STUDIES (ADMINISTERED BY THE OFFICE OF GRADUATE STUDIES) 616 Section 23 College of Graduate Studies Changes to Note The following curricular changes for the Office of Graduate
More informationUSF Graduate Catalog 2015 2016 SECTION 18. http://www.grad.usf.edu/
SECTION 18 COLLEGE OF GRADUATE STUDIES (ADMINISTERED BY THE OFFICE OF GRADUATE STUDIES) 616 Section 18 College of Graduate Studies Changes to Note The following curricular changes for the Office of Graduate
More informationDescription of the program
Study program Faculty Cycle Business Informatics Contemporary Sciences and Technologies Undergraduate ECTS 180 Offered in Tetovo and Skopje Description of the program The three-year curricula (Bachelor
More informationMaster of Science in Information Technology (MS-IT)
Master of Science in Information Technology (MS-IT) Program Objectives The primary aim of the program is to allow IT professionals an opportunity for professional upgrading or an extension of their qualifications
More informationC HFI C HFI. EC-Council. EC-Council. Computer Hacking Forensic Investigator. Computer. Computer. Hacking Forensic INVESTIGATOR
Page: 1 TM C HFI Computer C HFI Computer Hacking Forensic INVESTIGATOR Hacking Forensic INVESTIGATOR TM v8 v8 Page: 2 Be the leader. Deserve a place in the CHFI certified elite class. Earn cutting edge
More informationIs the General Education program purpose congruent with the overall mission of the institution?
Where do we start? MODELS OF GENERAL EDUCATION The best General Education Program is not based simply on choosing specific goals or finding the perfect model. The best program is one that is aligned with
More informationCommunity and Leadership Development
100 INTRODUCTION TO COMMUNITY AND LEADERSHIP DEVELOPMENT. (1) The course explores how communities of place and interest influence our lives and how these different types of communities are related to the
More informationTURNING THE RISING TIDE OF CYBERSECURITY THREATS
TURNING THE RISING TIDE OF CYBERSECURITY THREATS With cyber attacks on the rise, there s a growing need for digital forensic professionals with the knowledge and skills to investigate technology crimes
More informationLOUGHBOROUGH UNIVERSITY
LOUGHBOROUGH UNIVERSITY Programme Specification Computer Science Please note: This specification provides a concise summary of the main features of the programme and the learning outcomes that a typical
More informationDepartment/Academic Unit: Economics Degree Program: MA
Department/Academic Unit: Economics Degree Program: MA Degree Level Expectations, Learning Outcomes, Indicators of Achievement and the Program Requirements that Support the Learning Outcomes Expectations
More informationBOARD OF HIGHER EDUCATION REQUEST FOR COMMITTEE AND BOARD ACTION
BOARD OF HIGHER EDUCATION REQUEST FOR COMMITTEE AND BOARD ACTION COMMITTEE: Academic Affairs NO.: AAC 12-26 COMMITTEE DATE: February 28, 2012 BOARD DATE: March 6, 2012 APPLICATION OF ENDICOTT COLLEGE TO
More informationGeorgia Perimeter College Faculty Senate Course Change
Page 1 of 6 Georgia Perimeter College Faculty Senate Course Change Number: 48-Mar-13 Date submitted: 3/26/2013 Date approved: Title of Proposal: Change Co-Requisites for PSYC 2210 Initiator and Place of
More informationINSIGHTS AND RESOURCES FOR THE CYBERSECURITY PROFESSIONAL
INSIGHTS AND RESOURCES FOR THE CYBERSECURITY PROFESSIONAL BY 2 In enterprise IT, there is a single point where everything that matters in information, technology and business converges: Cybersecurity Nexus
More information1. Programme title and designation Advanced Software Engineering
PROGRAMME APPROVAL FORM SECTION 1 THE PROGRAMME SPECIFICATION 1. Programme title and designation Advanced Software Engineering 2. Final award Award Title Credit Value MSc Advanced Software Engineering
More informationPROGRAMME SPECIFICATION
PROGRAMME SPECIFICATION Course record information Name and level of final award: Name and level of intermediate awards: The BSc (Hons) Computer Science is a B.Sc. BSc (Hons) Computer Science with Industrial
More informationOnline Computer Science Degree Programs. Bachelor s and Associate s Degree Programs for Computer Science
Online Computer Science Degree Programs EDIT Online computer science degree programs are typically offered as blended programs, due to the internship requirements for this field. Blended programs will
More informationCertifications and Standards in Academia. Dr. Jane LeClair, Chief Operating Officer National Cybersecurity Institute
Certifications and Standards in Academia Dr. Jane LeClair, Chief Operating Officer National Cybersecurity Institute Accreditation What is it? Why is it important? How is it attained? The National Centers
More informationAlignment of State Standards and Teacher Preparation Program Standards
Alignment of State Standards and Teacher Preparation Program Standards Hilda Medrano Jaime Curts The University of Texas Pan American (UTPA), at the most southern tip of South Texas is located about 20
More informationTitle: Enhancing Student Learning in Introduction to Sport Management. Author: Angela Lumpkin, Health, Sport, and Exercise Sciences
Title: Enhancing Student Learning in Introduction to Sport Management Author: Angela Lumpkin, Health, Sport, and Exercise Sciences Summary: In order to enhance and document students learning, a sports
More informationASU College of Education Course Syllabus ED 4972, ED 4973, ED 4974, ED 4975 or EDG 5660 Clinical Teaching
ASU College of Education Course Syllabus ED 4972, ED 4973, ED 4974, ED 4975 or EDG 5660 Clinical Teaching Course: ED 4972, ED 4973, ED 4974, ED 4975 or EDG 5660 Credit: 9 Semester Credit Hours (Undergraduate),
More informationSECURE AND TRUSTWORTHY CYBERSPACE (SaTC)
SECURE AND TRUSTWORTHY CYBERSPACE (SaTC) Overview The Secure and Trustworthy Cyberspace (SaTC) investment is aimed at building a cybersecure society and providing a strong competitive edge in the Nation
More informationProgram Assessment Annual Report for 2007 2008 IUPUC Division of Science Psychology Degree Program
Assessment Annual Report for 2007 2008 IUPUC Science What (N = NASAD standards) or out of class)? we provide to demonstrate what on results of PUL 1: Core communication and Quantitative Skills the ability
More informationGuidelines for Massachusetts Early Educator Preparation Programs Participating in the Early Childhood Educator Scholarships Program.
Guidelines for Massachusetts Early Educator Preparation Programs Participating in the Early Childhood Educator Scholarships Program Background The Departments of Higher Education and Early Education and
More informationPriority III: A National Cyberspace Security Awareness and Training Program
Priority III: A National Cyberspace Security Awareness and Training Program Everyone who relies on part of cyberspace is encouraged to help secure the part of cyberspace that they can influence or control.
More information