Cyber Security at NSU
|
|
|
- Doris Hancock
- 10 years ago
- Views:
Transcription
1 Cyber Security at NSU Aurelia T. Williams, Ph.D. Chair, Department of Computer Science Associate Professor of Computer Science June 9, 2015
2 Background Undergraduate computer science degree program began in 1982 National accreditation was first earned in 1991 with continuous reaffirmation since that time (currently ABET) Information assurance (cyber security) initiatives began in 2003 MS in Computer Science was initiated in
3 Current Cyber Security Offerings BS in Computer Science, Information Assurance Emphasis MS in Computer Science, Information Assurance Emphasis MS in Cyber Security (Online Program Starting Fall 2015) 3
4 Variety of Course Offerings Fundamentals of Cyber Security Computer Security I Cryptography and Network Security Management of Information Security Digital Forensics Secure Operating Systems Network Fundamentals Computer and Network Forensics Human Aspects of Cyber Security Ethical Hacking and Penetration Testing Database Security Healthcare Information Security Advanced Topics in Cyber Security Cyber Security Capstone 6 credits 4
5 NSA/DHS Center of Academic Excellence The National Security Agency (NSA) and the Department of Homeland Security (DHS) jointly sponsor the National Centers of Academic Excellence (CAE) in Information Assurance (IA)/Cyber Defense (CD) The goal of these programs is to reduce vulnerability in our national information infrastructure by promoting higher education and research in Information Assurance/Cyber Defense (IA/CD) and producing a growing number of professionals with IA/CD expertise in various disciplines Initial designation in 2009; currently designated through 2020 Of the 147 universities certified under the new standards, NSU is 1 of 6 Virginia universities to receive this distinction and 1 of 3 HBCUs nationwide Required that Information Assurance courseware address a core (mandatory) set of IA/CD Knowledge Units (KUs) in addition to five other KUs 5
6 Cyber Security Grant Funding 6 6
7 New Grants NSU leads a $25M collaborative effort funded by the Department of Energy to develop a K-20 pipeline for the workforce; the project will pilot a workforce development program to produce wellqualified cyber security professionals in significant numbers to address the pressing cyber security workforce shortage Partners include other HBCUs and national energy laboratories. 7
8 New Grants (continued) NSU leads a $4.98M collaborative effort funded by the Department of Defense through a cooperative agreement managed by Air Force Research Laboratory (AFRL) to establish a Center of Excellence in Cyber Security with an emphasis in research The objective of the Center is to conduct basic research in developing a cloud-based, big-data-analytics-capable Cyber Analysis, Simulation and Experimentation Environment (CASE-V) to enhance situational awareness and decision support capabilities for cyber defense and cyber training Partners include ODU/Virginia Modeling, Analysis and Simulation Center and Tennessee State University 8
9 Other Recent External Funding DoD, IA Scholarship Program - $350K ARO, Building a Cloud Computing and Big Data Infrastructure for Cyber Security Research and Education - $498K ARO, Self-Protecting Security for Assured Information Sharing - $487K NSF, Scholarships for Service - $1.5M DoE, Massie Chair of Excellence in Information Assurance - $1.25M DoE, Addressing the Shortage and Quality of Cyber Security Workers through Relevant and Dynamic Training - $770K 9
10 NSU Cyber Security Capabilities and Facilities 10 10
11 Equipment and Software NSU has extensive cyber security capabilities: Information Assurance Research Education and Development Institute offers a mini classroom with 30 laptops and 20 workstations equipped with a wide range of cyber security tools. The classroom is used to teach computer hacking techniques and to practice for cyber security competitions. NSU has invested in NDG Netlab + virtual machine hosting equipment which gives us the capability to provide web based access virtual machine cyber security laboratory exercises. Currently, 40 lab exercises have been published on ethical hacking and security+. Digital forensic laboratory exercises will be published in the near future. A digital forensics laboratory is equipped with Encase, FTK and P2 Commander host forensic tools as well as mobile forensic offerings from Celldek, Cellebrite and Paraben. There are several Digital Forensic workstations equipped with a variety of the latest digital forensic software and a FRED Data center. Other forensic related equipment includes Digital Forensic Ultrakits, mobile devices, and smart phones. A Network laboratory is equipped with reconfigurable networks utilizing Cisco switches and PC based workstations. 11
12 Faculty NSU has ten faculty members actively involved in cyber security. These faculty members teach a range of cyber security courses, direct undergraduate and graduate student research, perform cyber security outreach and are active in pursuing and obtaining external funding. Faculty research includes Digital Forensics, Cloud Computing, Wireless Security, Wireless Sensor Networks, Big Data Analysis, Security Policy and Intelligent Intrusion Detection systems. 12
13 Partnering with Others NSU is well equipped to assist others with: Curriculum development Developing cyber security modules to be integrated within existing courses Developing Information Assurance/Cyber Security courses Developing Cyber Security certificate programs Developing complete IA/Cyber Security curricula Faculty/Staff Development Provide faculty/staff with basic cyber security skills Train faculty how to teach cyber security Research Initiatives 13
14 Cyber Security Strengths Summary Designated NSA/DHS Center of Academic Excellence in Cyber Defense Education through 2020 Extensive online cyber security laboratories and facilities and the capability of delivering programs worldwide Familiarity with the capabilities of online competitors Collaborations with national laboratories and other government agencies Well-qualified faculty Significant external funding 14
15 Thanks for your support as we advance this signature initiative! 15
Goal. Vision. CAE IA/CD Program Eligibility and Summary
Goal Vision National Centers of Academic Excellence in Information Assurance/Cyber Defense (IA/CD) Education Program Criteria for Measurement Jointly Sponsored by the National Security Agency (NSA) and
Goal. Vision. CAE 2Y Program Eligibility and Summary
Goal National Centers of Academic Excellence in Information Assurance/Cyber Defense for Two-Year Education (CAE2Y) Program Criteria for Measurement Jointly Sponsored by the National Security Agency (NSA)
NSA/DHS Centers of Academic Excellence for Information Assurance/Cyber Defense
NSA/DHS Centers of Academic Excellence for Information Assurance/Cyber Defense Cyber Investigations Data Management Systems Security Data Security Analysis Digital Forensics Health Care Security Industrial
Sabbatical Leave Application
LOS RIOS COMMUNITY COLLEGE DISTRICT Sabbatical Leave Application Name Lance Parks College: CRC Present Assignment: CIS Type of Leave Requested: A. Type A One Semester: Fall Spring X Entire Year Will you
NATIONAL INITIATIVE FOR CYBERSECURITY EDUCATION SAN DIEGO, CA
NATIONAL INITIATIVE FOR CYBERSECURITY EDUCATION SAN DIEGO, CA Dr. Aurelia T. Williams, NSU Ms. Kamilah Brown, CCSD Mr. Ronald Williams, DTC Mr. Tony Baylis, LLNL November 3, 2015 Who Are We? A collaborative
UNM Information Assurance Scholarship for Service (SFS) Program
UNM Information Assurance Scholarship for Service (SFS) Program What is Information Assurance? Committee on National Security Systems (CNSS) defines information assurance (IA): Measures that protect and
Cyber Innovation and Research Consortium
Cyber Innovation and Research Consortium Mission Conduct, coordinate and promote cyber and cyber security innovation, research, and policy 2 Focus Basic and Applied Research Education and Curriculum Outreach
Meeting the CAE IA/CD Knowledge Units Requirements for the Polytechnic University of Puerto Rico
Meeting the CAE IA/CD Knowledge Units Requirements for the Polytechnic University of Puerto Rico Diana M. Darabi, Master of Computer Science, IT Management and Information Assurance, Alfredo Cruz, PhD
Protecting Energy s Infrastructure and Beyond: Cybersecurity for the Smart Grid
Protecting Energy s Infrastructure and Beyond: Cybersecurity for the Smart Grid Which is it? Cyber Security ~or~ Cybersecurity? Dr. Ernie Lara President Presenters Estrella Mountain Community College Dr.
NSA/DHS National Centers of Academic Excellence in Information Assurance/Cyber Defense 2014 List of Knowledge Units and Focus Areas
The CAE IA/CD academic requirements are based on meeting defined sets of Knowledge Units (KUs): 1. Core for 2 year programs - technical or applied emphasis 2. Core for 4 year + programs - technical or
How To Become A Cybersecurity Consultant
Strengthening the Nexus: Government-Business- University cooperation and collaboration on security, training and research November 1, 2011 Susan C. Aldridge, PhD University of Maryland University College
Certifications and Standards in Academia. Dr. Jane LeClair, Chief Operating Officer National Cybersecurity Institute
Certifications and Standards in Academia Dr. Jane LeClair, Chief Operating Officer National Cybersecurity Institute Accreditation What is it? Why is it important? How is it attained? The National Centers
Becoming a Cyber Professional: A Discussion with Recent Graduates
Becoming a Cyber Professional: A Discussion with Recent Graduates Moderator: George L. Heron, LifeJourney USA Panelists: Danielle Santos, Assistant Program Manager, Cyber Formal Education, DHS Scott Wallace.
Center for Information. Security and Assurance (CISA) Charter. Mathematical, Computing, and Information Sciences (MCIS) Department
Center for Information Security and Assurance (CISA) Charter Mathematical, Computing, and Information Sciences (MCIS) Department This charter establishes the Center for Information Assurance within the
Toward Curricular Guidance in the Cyber Sciences
Toward Curricular Guidance in the Cyber Sciences 1 6 J U N E 2 0 1 5 2 0 1 5 C I S S E L A S V E G A S D A V I D G I B S O N, U S A I R F O R C E A C A D E M Y B E T H H A W T H O R N E, U N I O N C O
Technology Fee Proposal
Technology Fee Proposal Title: Virtual Environment for Information Security Education and Exploration Proposer: Joseph N. Wilson, Assistant Professor CISE Department Rm. E301 CSE Bldg. 42 Box 116120 Gainesville,
In Response to Section 942 of the National Defense Authorization Act for Fiscal Year 2014 (Public Law 113-66) Terry Halvorsen DoD CIO
A Department of Defense Report on the National Security Agency and Department of Homeland Security Program for the National Centers of Academic Excellence in Information Assurance Education Matters In
Interdisciplinary Program in Information Security and Assurance. By Kossi Edoh NC A&T State University Greensboro
Interdisciplinary Program in Information Security and Assurance By Kossi Edoh NC A&T State University Greensboro Information Assurance The protection of electronic information and infrastructures that
Cybersecurity Education
Cybersecurity Education Issues & Approaches Derek A. Smith Director of Cybersecurity Initiatives at Excelsior College AFCEA November 18, 2014 Where we are now! Symantec: In a world of increased cybersecurity
Program Contact Information (name, title, telephone number, and email address)
Name of Institution The Citadel Name of Proposed Center/Institute Center for Cybersecurity Education and Research Proposed Date of Implementation January 1, 2016 Site Department of Mathematics and Computer
CAE Program Updates and Support
May 29, 2015 CAE Program Updates and Support National CyberWatch Center Prince George s Community College Room 129B 301 Largo Road Largo, MD 20774 www.nationalcyberwatch.org 2 Webinar Protocol :: Mute
Centers of Academic Excellence in Cyber Security (CAE-C) Knowledge Units Review
Centers of Academic Excellence in Cyber Security (CAE-C) Knowledge Units Review Review Process The Knowledge Unit (KU) Review Calendar divides the entire CAE-C KU list into 12 months for the purposes of
Bellevue University Cybersecurity Programs & Courses
Undergraduate Course List Core Courses: CYBR 250 Introduction to Cyber Threats, Technologies and Security CIS 311 Network Security CIS 312 Securing Access Control CIS 411 Assessments and Audits CYBR 320
Cybersecurity education for the next generation Emerging best practices
Cybersecurity education for the next generation Emerging best practices Presented at the 2013 NIST/NICE Workshop Gaithersburg, Maryland Marisa S. Viveros Vice President, Cyber Security Innovation IBM Corporate
Department of Defense Information Assurance Scholarship Program. Sponsored by the. DoD Chief Information Officer
Department of Defense Information Assurance Scholarship Program Sponsored by the DoD Chief Information Officer SOLICITATION FOR PROPOSALS From Universities Designated by the National Security Agency (NSA)
The USNA Cyber Program
The USNA Cyber Program Turning Midshipmen into Cyber Warriors CAPT Paul Tortora, USN Director, Center for Cyber Security Studies Bottom Line Up Front All Midshipmen now take two Cyber Security Courses
Global Cyber Range (GCR) Empowering the Cybersecurity Professional (CyPro)
Global Cyber Range (GCR) Empowering the Cybersecurity Professional (CyPro) NICE Conference 2014 CYBERSECURITY RESILIENCE A THREE TIERED SOLUTION NIST Framework for Improving Critical Infrastructure Cybersecurity
Prairie View A&M University Computer Science Department 招 生 简 介
Prairie View A&M University Computer Science Department 招 生 简 介 Prairie View A&M University A member of Texas A&M University Systems Founded in 1876, the 2 nd oldest state institution of Texas, located
Dr. Dave Dampier Professor of Computer Science and Engineering
Dr. Dave Dampier Professor of Computer Science and Engineering Director, Distributed Analytics and Security Institute and the Center for Computer Security Research Mississippi State University CAE-2Y:
2015 Webinar Series: NCL for the Classroom
2015 Webinar Series: NCL for the Classroom National CyberWatch Center Prince George s Community College Room 129B 301 Largo Road Largo, MD 20774 www.nationalcyberwatch.org Webinar Protocol :: Mute your
Information Assurance Program at West Point
Information Assurance Program at West Point [email protected] John.Hill@usma usma.edu Scott.Lathrop@usma usma.edu Gregory.Conti@usma usma.edu USMA Information Assurance Program Institutional Support
Academic Program Review SUMMARY* Department under review: Computer Science. Date self-study received in Dean s office: November 21, 2013
Academic Program Review SUMMARY* Department under review: Computer Science Date self-study received in Dean s office: November 21, 2013 Date of external consultant s review: November 2013 Date APR received
Energy Symposium Meeting Notes
Energy Symposium Meeting Notes Purpose of the Energy Symposium Break-out Discussions Observations and Insights Overall Conclusion Next Steps Appendix Mike Ahern s Presentation Slides October 22,2012 508-831-6563
Cyber Security Research and Education Institute (CSI) The University of Texas at Dallas http://csi.utdallas.edu
Cyber Security Research and Education Institute (CSI) The University of Texas at Dallas http://csi.utdallas.edu January 2014 1/29/2014 1 Our History NSA/DHS Center for Excellence in Cyber Security Education
BEng/ BEng (Hons) Networked Systems Engineering, BSc/ BSc (Hons) Cyber Security and Networks BEng/ BEng (Hons) Digital Security, Forensics and
BEng/ BEng (Hons) Networked Systems Engineering, BSc/ BSc (Hons) Cyber Security and Networks BEng/ BEng (Hons) Digital Security, Forensics and Ethical Hacking Programme Structure The programmes are unique
What You Need to Know About Computer Science, B.S.A.T. Programs
Computer Science, B.S. Computer Science, B.S. Dr. Jie Wu, Chair Science Education and Research Center, Room 304 5-04-8450 Sally Kyvernitis, Faculty Advisor Science Education and Research Center, Room 330
MASTER OF SCIENCE IN INFORMATION ASSURANCE PROGRAM DEPARTMENT OF COMPUTER SCIENCE HAMPTON UNIVERSITY
MASTER OF SCIENCE IN INFORMATION ASSURANCE PROGRAM DEPARTMENT OF COMPUTER SCIENCE HAMPTON UNIVERSITY HTTP://SCIENCE.HAMPTONU.EDU/COMPSCI/ The Master of Science in Information Assurance focuses on providing
EMC Academic Alliance
EMC Academic Alliance Kim Yohannan, July 2015 1 EMC ACADEMIC ALLIANCE EDUCATING FUTURE IT PROFESSIONALS EMC plays an active role as a community partner by collaborating with colleges and universities around
Building a Successful Cyber-security Program
Building a Successful Cyber-security Program David Dampier Distributed Analytics and Security Institute Mississippi Box 9627, HPC A129 Mississippi, MS 39762-9627 001-662-325-0779 [email protected]
National Cyber Security Awareness Month. Week Five: Building the Next Generation of Cyber Professionals
National Cyber Security Awareness Month Week Five: Building the Next Generation of Cyber Professionals Webinar recording and evaluation survey This webinar is being recorded and will be made available
Cybersecurity Educational Standards
Cybersecurity Educational Standards Stephen Cooper, Stanford University Elizabeth Hawthorne, Union County College Lance C. Pérez, University of Nebraska - Lincoln Susanne Wetzel, Stevens Institute of Technology
Cybersecurity Definitions and Academic Landscape
Cybersecurity Definitions and Academic Landscape Balkrishnan Dasarathy, PhD Program Director, Information Assurance Graduate School University of Maryland University College (UMUC) Email: [email protected]
Computer Science at James Madison University
Computer Science at James Madison University Dr. Sharon Simmons Department Head for Computer Science Dr. Nathan Sprague and Dr. Chris Mayfield Faculty Members and CS Advisors February 14, 2015 1 WHAT IS
TEACHING COMPUTER SECURITY WITH A HANDS-ON COMPONENT
TEACHING COMPUTER SECURITY WITH A HANDS-ON COMPONENT Narayan Murthy Pace University, New York [email protected] Abstract To address national needs for computer security education, many universities have
Engineering Technology
http://continuinged.uml.edu Engineering Technology Part-Time Degrees in Mechanical Engineering Technology & Electronic Engineering Technology UMass Lowell s Engineering Technology B.S. degree programs
Minnesota State Community and Technical College Detroit Lakes Campus
Computer Network Security Minnesota State Community and Technical College Detroit Lakes Campus Overview Philosophy Note on 2 year Colleges Certifications Program Courses CCDC Program Numbers Faculty Future
National Initiative for Cyber Security Education
2014/PPWE/SEM2/007 Agenda Item: 5 National Initiative for Cyber Security Education Submitted by: United States Women Business and Smart Technology Seminar Beijing, China 23 May 2014 NICE OVERVIEW Women
UMUC FED Program. Online Open House July 22, 2015
UMUC FED Program Online Open House July 22, 2015 Corporate Learning Solutions Shelby Byrd Senior Account Manager Danielle Haynes Account Manager 1-855-CLS-5300 or [email protected] www.umuc.edu/fedgov 2 UMUC
CYBER SECURITY TRAINING SAFE AND SECURE
CYBER SECURITY TRAINING KEEPING YOU SAFE AND SECURE Experts in Cyber Security training. Hardly a day goes by without a cyber attack being reported. With this ever-increasing threat there is a growing need
The Case for Support: The Center for Cyber Security Studies at the U. S. Naval Academy
The Case for Support: The Center for Cyber Security Studies at the U. S. Naval Academy Computer and network security threats of the future are of concern today, and new strategies are required to ensure
Ph.D. Nova Southeastern University, Ft Lauderdale, FL, Information Systems, completed 24 credit hours, expected ABD in Spring 2012
Kevin Barton, M.S., CISSP Assistant Professor Computer Info Systems and Security School of Business and Leadership [email protected] Mobile Phone: 210-317-5703 Academic Background Ph.D. Nova Southeastern
Strategic Initiatives College of Science, August, 2004
College of Science Strategic Initiatives College of Science, August, 2004 MISSION: To graduate students who understand and appreciate the art of scholarship, who have an excellent grasp of the fundamental
Information Security Attack Tree Modeling for Enhancing Student Learning
Information Security Attack Tree Modeling for Enhancing Student Learning Jidé B. Odubiyi, Computer Science Department Bowie State University, Bowie, MD and Casey W. O Brien, Network Technology Department
in Information Security and Assurance
[DRAFT] A Model Curriculum for Programs of Study A Model Curriculum for Programs of Study in Information Security and Assurance in Information Security and Assurance v. 6.0 February 2013 [DRAFT] http://infosec.kennesaw.edu/infoseccurriculummodel.pdf
ONLINE ONLINE. Master of Science in. Bachelor of Science in
ONLINE Bachelor of Science in INFORMATION SYSTEMS ONLINE Master of Science in Management Information Systems Information Systems Online University of Alabama at Birmingham COLLAT School of Business Dear
Allegany College of Maryland. 239 Cisco Networking 2 * Offered Fall semester and
Cybersecurity comes to Allegany College of Maryland 107 Intro to Cybersecurity Offered fall and spring semesters. This course provides a broad overview of computer security, ethical issues and information
Cover/Signature Page Full Template
Cover/Signature Page Full Template Institution Submitting Request: Utah Valley University Proposed Title: Graduate Certificate in Cyber Security School or Division or Location: College of Technology &
Testimony of Eunice Santos. House Oversight and Government Affairs Committee Subcommittee on Information Technology
Testimony of Eunice Santos Before the House Oversight and Government Affairs Committee Subcommittee on Information Technology Federal Efforts to Improve Cybersecurity June 20 th, 2016 Chicago, Illinois
Just Say No to Teaching Ethical Hacking
Just Say No to Teaching Ethical Hacking Gail Finley Department of Computer Science and Information Technology University of the District of Columbia January 22, 2009 Hampton University 1 Institution Only
College Of. Technological Innovation COLLEGE OF TECHNOLOGICAL INNOVATION
College Of Technological Innovation COLLEGE OF TECHNOLOGICAL INNOVATION Contact Us 00971-2-5993111 (Abu Dhabi) 00971-4-4021111 (Dubai) 00971-4-4021408 (College of Technological Innovation) @Zayed_U www.facebook.com/zayeduniversity
AC 2010-1485: DEVELOPMENT AND IMPLEMENTATION OF A MASTERS PROGRAM IN COMPUTER INFORMATION TECHNOLOGY
AC 2010-1485: DEVELOPMENT AND IMPLEMENTATION OF A MASTERS PROGRAM IN COMPUTER INFORMATION TECHNOLOGY Hetal Jasani, Northern Kentucky University Hetal Jasani is an assistant professor in the Department
Reynaldo Anzaldua EDUCATION. University of Texas Pan American, Edinburg, TX BBA Business Management 1994 Minor: Computer Information Systems/CIS
Reynaldo Anzaldua EDUCATION University of Texas Pan American, Edinburg, TX BBA Business Management 1994 Minor: Computer Information Systems/CIS University of Texas Pan American, Edinburg, TX MBA/MIS GPA:
Cybersecurity education for the next generation. Advancing a collaborative approach
Cybersecurity education for the next generation Advancing a collaborative approach 2 Cybersecurity education for the next generation In a world of increasing information security threats, academic initiatives
Florida A&M University Revised New Degree Programs for Strategic Plan (Revision approved June 2013) 2010-2020
Florida A&M University Revised New Degree Programs for Strategic Plan (Revision approved June 2013) 2010-2020 Appendix B CIP Code School of Business and Industry 52.0801 BS Finance 52.1401 BS Marketing
POSTGRADUATE OPEN DAY
POSTGRADUATE OPEN DAY Monday 1 December 2014 Dr Ivor Spence SCHOOL OF ELECTRONICS, ELECTRICAL ENGINEERING AND COMPUTER SCIENCE Postgraduate Courses Overview MSc Courses MSc Software Development (Conversion)
INDIANAPOLIS, IN 2011 CATALOG Volume 78
TABLE OF CONTENTS CURRICULA 2 SCHOOL OF INFORMATION TECHNOLOGY 2 INFORMATION SYSTEMS AND CYBERSECURITY (RESIDENCE PROGRAM) 2 INFORMATION SYSTEMS AND CYBERSECURITY (ONLINE PROGRAM) 3 INFORMATION SYSTEMS
ONLINE MASTER OF BUSINESS ADMINISTRATION. Open for Business. Designed for You.
ONLINE MASTER OF BUSINESS ADMINISTRATION Open for Business. Designed for You. Our MBA is different. It s designed for you. Today s global workplace is ever-evolving and increasingly competitive. To succeed,
Educational Requirement Analysis for Information Security Professionals in Korea
Educational Requirement Analysis for Information Security Professionals in Korea Sehun Kim Dept. of Industrial Engineering, KAIST, 373-1, Kusong-dong, Yusong-gu, Taejon, 305-701, Korea [email protected]
Bachelor of Science in Computer Engineering (BSCoE) Essential Ideas
Mission Statement Bachelor of Science in Computer Engineering (BSCoE) Essential Ideas The mission statement for the Computer Engineering program as modified and adopted by the engineering faculty on July
S 2 ERC @ Virginia Tech Program Overview
S 2 ERC @ Virginia Tech Program Overview T. Charles Clancy, PhD Co-Director, NSF Security and Software Engineering Research Center Associate Professor, Electrical and Computer Engineering http://www.cyber.vt.edu/s2erc
Information Security & Intelligence
Information Security & Intelligence Why Choose Information Security & Intelligence? The ISI program is certified by NSA's Information Assurance Courseware Evaluation Program as a National Center of Academic
Cybersecurity Guidance for Industrial Automation in Oil and Gas Applications
Cybersecurity Guidance for Industrial Automation in Oil and Gas Applications February 17, 2015 Agenda Agenda Introductions Agenda Introductions Discussion of the current state of Cybersecurity for Controls
Proposed Education & Workforce Development Plan for FY2015. Education & Workforce Development Work Group Andrew Turner November 2014
Proposed Education & Workforce Development Plan for FY2015 Education & Workforce Development Work Group Andrew Turner November 2014 Current Opportunities Significant state-wide opportunities for Cyber
Cyber Security in the Nuclear Age. Dr. Jane LeClair, Chief Operating Officer National Cybersecurity Institute at Excelsior College Washington, D.C.
Cyber Security in the Nuclear Age Dr. Jane LeClair, Chief Operating Officer National Cybersecurity Institute at Excelsior College Washington, D.C. Overview 2 A Vested Interest Computers have provided the
DoD IA Training Products, Tools Integration, and Operationalization
Defense Information Systems Agency A Combat Support Agency DoD IA Training Products, Tools Integration, and Operationalization Roger S. Greenwell, CISSP, CISA, CISM Technical Director / Capabilities Implementation
Critical Controls for Cyber Security. www.infogistic.com
Critical Controls for Cyber Security www.infogistic.com Understanding Risk Asset Threat Vulnerability Managing Risks Systematic Approach for Managing Risks Identify, characterize threats Assess the vulnerability
Computer Network Engineering
226 Computer Network Engineering Computer Network Engineering Degrees, Certificates and Awards Associate in Science: Computer Network Engineering Certificate of Achievement: Computer Network Engineering
PROPOSAL TO ESTABLISH A SCHOOL OF CONSTRUCTION
PROPOSAL TO ESTABLISH A SCHOOL OF CONSTRUCTION Background: The proposed School of Construction is an outgrowth of discussions over more than two years between faculty in the Department of Building Construction
FedVTE Training Catalog SUMMER 2015. advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov
FedVTE Training Catalog SUMMER 2015 advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov Access FedVTE online at: fedvte.usalearning.gov If you need any assistance please
