Goal. Vision. CAE IA/CD Program Eligibility and Summary
|
|
|
- Shavonne Haynes
- 10 years ago
- Views:
Transcription
1 Goal Vision National Centers of Academic Excellence in Information Assurance/Cyber Defense (IA/CD) Education Program Criteria for Measurement Jointly Sponsored by the National Security Agency (NSA) and the Department of Homeland Security (DHS) The goal of the CAE IA/CD program is to reduce vulnerability in our national information infrastructure by promoting higher education and research in Information Assurance/Cyber Defense (IA/CD) and to produce a growing number of professionals with expertise in IA/CD disciplines. This program will contribute significantly to the advancement of state-of-the-art IA/CD knowledge and practice. The vision of the CAE IA/CD Program is to: 1. Provide programs that commit to excellence in the field of Information Assurance and Cyber Defense education at the graduate and undergraduate levels. 2. Provide the Nation with a pipeline of qualified students poised to become IA/CD professionals. 3. Continuously improve the quality of IA/CD programs, curriculum, faculty, students and other institutions. 4. Emphasize faculty efforts in improving IA/CD scholarship, professional development and instructional capabilities. 5. Foster and encourage further development of strong IA/CD focused education and research depth at U.S. institutions. CAE IA/CD Program Eligibility and Summary The CAE IA/CD Program is open to current regionally accredited four-year colleges and graduate-level universities. All institutions must hold current regional accreditation as outlined by the Department of Education ( Overall CAE IA/CD requirements are: Program Requirements - Demonstration of program outreach and collaboration, center for IA/CD education, a robust and active IA/CD academic program, IA/CD multidisciplinary efforts, practice of IA/CD at the institution level, and student and faculty IA/CD efforts; (Criteria below); Courseware requirements - A core (mandatory) set of IA/CD Knowledge Units (KUs) that all institutions must address in their curriculum; and choose five KUs from a set of additional KUs, to which institutions must map Completion of these requirements will designate the institution as a NSA/DHS National Center of Academic Excellence for Information Assurance/Cyber Defense (CAE IA/CD) Education. Institutions shall demonstrate that students can successfully complete the CAE IA/CD course of study and receive recognition on a transcript, diploma, etc. CAE IA/CD Criteria Page 1 September 2013
2 Focus Area (Optional) All CAEs have the option to apply for one or more CAE IA/CD Focus Area (FA) designations. The criteria include: Successful mapping of the institution s curriculum to all of the KUs identified in the FA. Demonstration that a student can reasonably complete the necessary course of study to include all KUs identified in the FA. The institution must provide student certificates to those that complete the FA course of study. The certificates must clearly identify the specific Focus Area achieved. Knowledge Units: The KU section will require the institution to address how it meets each Core and chosen Optional KU. An institution has many ways to demonstrate how a program meets/fulfills a KU. Some examples include: course syllabus, course outline, student assignments, lab assignment, modules in a course/collection of courses, and certifications (CCNA, CISSP, etc.). Required information will include: course syllabi, course outlines and justifications showing where and how the KUs are addressed in the curriculum. One course may fulfill the requirements of multiple KUs, and multiple courses may fulfill the requirements of a single KU. Program Evaluation: Institutions will be evaluated by CAE Program staff with assistance from Subject Matter Experts. The last phase of the criteria may be an on-site evaluation focused on course content, course relevance, laboratory facilities, and faculty involvement. CAE IA/CD Designation: Successful institutions will be designated as a National Center of Academic Excellence in Information Assurance/Cyber Defense (CAE IA/CD). Due to the requirement to have all current institutions designated by 2014, designation periods granted during this designation cycle will range from three to six years from the institution s application. This will allow a more distributed range of re-applications in the future. Subsequent cycles will revert to a five year cycle. The initial designation period will be dependent upon timing of the application, with allowances for changes by the program office. Future criteria (including KUs and FAs) will continue to be reviewed annually and strengthened as appropriate to keep pace with the evolving nature of IA/CD. Designation as a National CAE IA/CD does not carry a commitment of funding from NSA or DHS. CAE IA/CD Criteria Page 2 September 2013
3 CAE IA/CD Program requirements: 1. Outreach/Collaboration. The institution must demonstrate how IA/CD is extended beyond the normal boundaries of the Institution. Overall Point Value: 15 points minimum/25 points maximum a. Shared curriculum (e.g., IA/CD teaching materials provided to minority colleges/universities, two-year community colleges, technical schools, or K-12 schools) or shared faculty (e.g., Faculty on IA/CD curriculum development committee and/or teaching IA/CD at minority colleges and universities, two-year community colleges, technical schools, or K-12 schools.) Point Value: Up to 5 points/3 points required b. Reciprocity of credits (e.g., Accepting academic credit in IA/CD courses from minority institutions, two-year community colleges, or technical schools.). Evidence in the form of written agreements must demonstrate that IA/CD-related courses from the above types of schools are accepted for credit at the applying institution. Point Value: Up to 5 points/3 points required c. Sponsorship of or participation in Cyber Defense or Forensics Exercises and competitions within 3 years of submission. Sponsorship of state, regional, or national IA/CD curriculum workshops, colloquia, etc. (e.g., sponsorship of workshops for K-12, community colleges, technical schools, state homeland security, industry, etc.). Point Value: Up to 5 points d. CAE Collaboration. Partner in research/shared classes or shared events with other institutions. Institutions are encouraged to partner with other CAEs on cyber or IA/CD research/instruction. Point Value: Up to 5 points e. Community Outreach. Sponsorship of community events such as cybersecurity education for local schools, adult education centers, senior centers, etc. (e.g., schools in a target region are encouraged to participate in cybersecurity education events, like community computer diagnostic check-ups and IA/CD awareness days.) Point Value: Up to 5 points CAE IA/CD Criteria Page 3 September 2013
4 2. Center for IA/CD Education. The institution must have a formal organization for use as a resource for faculty and students. The Center should provide program guidance, general IA/CD information and promote collaboration and interaction with other students, faculty, and programs. (For the purpose of this document, the word Center is used in a general sense).the Center and the website must be operational, dynamic and current. Overall Point Value: 14 points minimum/20 points maximum a. Show formal documentation of the designation of the IA/CD/Cybersecurity Center and provide a hyperlink to the Center. Point Value: 5 points required b. Demonstrate the Center website is operational, dynamic and current: contains up-to-date links to key IA/CD resources such as other academic institutions, government sites, conferences, workshops, IA/CD news, center POCs, IA/CD courses, etc. The website must be easy to find and easily accessible. Demonstrate how students know about the website. Point Value: 5 points required c. Provide evidence that subscription-based, on-line IA/CD journals are available for student and faculty use.. Demonstrate that hyperlinks to key IA/CD.on-line resources are provided in course syllabus and/or professors webpage or provided to students during class instruction. Point Value: Up to 5 points/2 required d. Demonstrate that physical and/or virtual IA/CD labs and equipment are available and used for hands-on learning (provide examples of student lab projects/exercises/case studies syllabus, links to assignments, etc.). Point Value: Up to 5 points/2 required 3. A robust and active IA/CD academic program. Demonstrate how students successfully participate in the academic program requirements to meet the IA/CD curriculum. Overall Point Value: 5 points minimum/ 20 points maximum a. Provide evidence that students who participate sufficiently in the IA/CD curriculum (i.e., take and pass courses that satisfy all of the mandatory KU requirements and at least five of the optional KU requirements) will receive a certificate, or a reference to completing the CAE IA/CD course of study on their transcript and/or degree. Provide evidence in the form of a letter, transcript notation, and/or degree (student information may be redacted) Point Value: 10 points/students are taking the IA/CD curriculum path 5 points/students have an opportunity to take the IA/CD path b. Provide evidence that students who participate sufficiently in the IA/CD curriculum for a Focus Area (i.e., take and pass courses that satisfy all of the mandatory KU requirements for that Focus Area) will receive certificate, or a reference to a focus area on their transcript and/or degree (student information may be redacted). Point Value: 10 points/students are taking the IA/CD curriculum path 5 points/students have the opportunity to take the IA/CD path CAE IA/CD Criteria Page 4 September 2013
5 4. IA/CD is multidisciplinary within the institution. The institution must demonstrate that IA/CD is not treated as a separate discipline, but as a multidisciplinary science with the body of IA/CD knowledge incorporated into various disciplines. Overall Point Value: 7 points minimum/ 10 points maximum a. Evidence that IA/CD is taught as modules in existing non-ia/cd courses and that nontechnical/non-ia/cd students are being introduced to IA/CD. For example: IA topics such as security countermeasures are covered in courses for managers/leaders/non-technical students. Points: 1 point per course/2 courses required/up to 5 points. b. Non-IA courses encourage papers in IA topics or projects. Provide links to 5 to 10 best thesis, dissertation, or projects in IA within 3 years of application. Link to actual papers required not a subscription service. Points: 1 point per paper/only 2 papers per course/up to 5 points. 5. Practice of IA encouraged throughout the Institution. The academic program must demonstrate how it encourages the practice of IA, not merely that it teaches IA. Overall Point Value: 16 points minimum/20 points maximum a. Provide a link to the Institution IA security plan. (required) Points: 5 points required b. Provide name, position and job description for person or persons responsible for information security at the institution. Points: 5 points required c. Provide evidence of the implementation of the Institution s IA security plan that encourages IA awareness throughout the campus (e.g., Students, faculty and staff are required to take computer based training or on-line tutorials; a security banner statement is present on institution or department computers; security related help screens are available; students are provided with a guide on good security practices, etc. - 2pts awarded per item). Points: 6 points required/10 points maximum 6. Student-based IA/CD/Cybersecurity research. The institution must demonstrate how it encourages research in IA/CD. This criterion focuses on STUDENT-based research and is important because research fuels the relevancy and currency of IA curricula. Research should relate back to one or more KUs. Overall Point Value: 10 points minimum/30 points maximum a. Program with IA/CD focus has thesis, dissertation, student papers, or independent research project requirements. Focus areas include declared majors, declared minors, established certificates of study within a major that produce research papers/projects. Provide links to 5 to 10 best actual thesis, dissertation, student papers, or projects in IA within 3 years of application (student information may be redacted). Point Value: 1 point per paper or project/5 points required/10 points maximum b. List IA/CD courses that require research paper(s) or virtual/physical lab project(s). Provide IA course titles that require these papers/lab projects within 3 years of application. Provide link to course syllabus. Point Value: 1 point per course/3 points required/20 points maximum CAE IA/CD Criteria Page 5 September 2013
6 7. Number of IA/CD/Cybersecurity faculty and course load. The institution must demonstrate that IA/CD faculty consists of a sufficient number of full time IA/CD faculty members and additional faculty members (may be part-time, adjunct, visiting professor, etc.) teaching at least one IA/CD course. This criterion requires a link to a biography or curriculum vitae for each faculty member. Overall Point Value: 8 points minimum/16 points maximum a. Identify by name full-time employee or employees, as defined above, either faculty or member of the administration working in IA with overall responsibility for the IA Instructional Program. Provide evidence, i.e., letter of testimony or job description. Provide link to biography or CV. Point Value: 5 points required b. Identify by name additional full-time IA faculty members (not listed in 7.a.), teaching IA/CD courses within the department that sponsors IA/CD programs. Provide link to biography or CV. Point Value: 2 point each/6 points maximum c. Identify by name part-time, shared (inter departmental, other institution, etc.), adjunct (industry expert, etc.) teaching IA/CD courses within the department that sponsors IA/CD programs. Provide link to biography or CV. Point Value: 1 point each/5 points maximum CAE IA/CD Criteria Page 6 September 2013
7 8. Faculty active in current IA/CD/Cybersecurity practice and research. The institution must clearly demonstrate that the faculty is active in current IA/Cyber practice and research, contributes to IA literature, and are members of IA professional societies are subject matter experts or attend/present at professional IA conferences. Overall Point Value: 15 points minimum/37 points maximum a. Peer reviewed publications papers (electronic or traditional) on IA/CD/Cybersecurity as evidenced in refereed journals or conference proceedings within the past 3 years. Provide links to actual papers not subscription service. Point Value: 2 points per paper/8 points maximum b. Published books or chapters of books on IA/CD/Cybersecurity. Books/chapters must focus on IA and have been published within the last 5 years. Provide title, authors and date published. ID specific chapters if authoring a chapter of a book. Point Value: 5 points per book/1 point per chapter/10 points maximum c. Faculty is involved in writing grants and obtaining funding for IA education and/or research development or lab equipment. Provide synopsis of IA related grants, funding, equipment donations, or other funding to include date and approximate monetary value for the past 3 years. Point Value: 2 points per award/6 points maximum d. Faculty members are subject matter experts (IA/CD/Cybersecurity) for accrediting bodies and professional societies for IA/CD/Cybersecurity, (e.g., ACM, IEEE, regional accreditation, professional accreditation, etc.). Faculty members are active members in IA/CD/Cybersecurity organizations (e.g., ISSA, Cyberwatch, Infraguard, etc.) List involvement for the last 3 years. Point Value: 2 points per review/membership/6 points maximum e. Faculty members are engaged in and/or initiate student IA programs. Point Value: 1 points per program/3 points maximum f. Faculty presents IA/CD/Cybersecurity content at major Regional/National/International conferences and events. Provide synopsis of involvement for the last 3 years. Point Value: 1 point per conference/4 points maximum CAE IA/CD Knowledge Unit requirements: In addition to the above Program Requirements, institutions must also map their curriculum to the Knowledge Units. CAE IA/CD Criteria Page 7 September 2013
Goal. Vision. CAE 2Y Program Eligibility and Summary
Goal National Centers of Academic Excellence in Information Assurance/Cyber Defense for Two-Year Education (CAE2Y) Program Criteria for Measurement Jointly Sponsored by the National Security Agency (NSA)
Sabbatical Leave Application
LOS RIOS COMMUNITY COLLEGE DISTRICT Sabbatical Leave Application Name Lance Parks College: CRC Present Assignment: CIS Type of Leave Requested: A. Type A One Semester: Fall Spring X Entire Year Will you
Cyber Security at NSU
Cyber Security at NSU Aurelia T. Williams, Ph.D. Chair, Department of Computer Science Associate Professor of Computer Science June 9, 2015 Background Undergraduate computer science degree program began
Certifications and Standards in Academia. Dr. Jane LeClair, Chief Operating Officer National Cybersecurity Institute
Certifications and Standards in Academia Dr. Jane LeClair, Chief Operating Officer National Cybersecurity Institute Accreditation What is it? Why is it important? How is it attained? The National Centers
CAE Program Updates and Support
May 29, 2015 CAE Program Updates and Support National CyberWatch Center Prince George s Community College Room 129B 301 Largo Road Largo, MD 20774 www.nationalcyberwatch.org 2 Webinar Protocol :: Mute
Meeting the CAE IA/CD Knowledge Units Requirements for the Polytechnic University of Puerto Rico
Meeting the CAE IA/CD Knowledge Units Requirements for the Polytechnic University of Puerto Rico Diana M. Darabi, Master of Computer Science, IT Management and Information Assurance, Alfredo Cruz, PhD
Program Contact Information (name, title, telephone number, and email address)
Name of Institution The Citadel Name of Proposed Center/Institute Center for Cybersecurity Education and Research Proposed Date of Implementation January 1, 2016 Site Department of Mathematics and Computer
In Response to Section 942 of the National Defense Authorization Act for Fiscal Year 2014 (Public Law 113-66) Terry Halvorsen DoD CIO
A Department of Defense Report on the National Security Agency and Department of Homeland Security Program for the National Centers of Academic Excellence in Information Assurance Education Matters In
Protecting Energy s Infrastructure and Beyond: Cybersecurity for the Smart Grid
Protecting Energy s Infrastructure and Beyond: Cybersecurity for the Smart Grid Which is it? Cyber Security ~or~ Cybersecurity? Dr. Ernie Lara President Presenters Estrella Mountain Community College Dr.
NSA/DHS Centers of Academic Excellence for Information Assurance/Cyber Defense
NSA/DHS Centers of Academic Excellence for Information Assurance/Cyber Defense Cyber Investigations Data Management Systems Security Data Security Analysis Digital Forensics Health Care Security Industrial
MASTER OF SCIENCE IN HEALTH SCIENCE EDUCATION PROGRAM INFORMATION & ADMISSION REQUIRMENTS
MASTER OF SCIENCE IN HEALTH SCIENCE EDUCATION PROGRAM INFORMATION & ADMISSION REQUIRMENTS MScHSEd Program Information ; 2 PROGRAM DECSCRIPTION The Master of Science in Health Science Education Program
Guidelines for Massachusetts Early Educator Preparation Programs Participating in the Early Childhood Educator Scholarships Program.
Guidelines for Massachusetts Early Educator Preparation Programs Participating in the Early Childhood Educator Scholarships Program Background The Departments of Higher Education and Early Education and
College of Engineering and Applied Science Department of Computer Science
College of Engineering and Applied Science Department of Computer Science Guidelines for Doctor of Philosophy in Engineering Focus Area: Security Last Updated October 2012. I. INTRODUCTION The College
NSA/DHS National Centers of Academic Excellence in Information Assurance/Cyber Defense 2014 List of Knowledge Units and Focus Areas
The CAE IA/CD academic requirements are based on meeting defined sets of Knowledge Units (KUs): 1. Core for 2 year programs - technical or applied emphasis 2. Core for 4 year + programs - technical or
Tenure and Promotion Criteria and Procedures Department of Computer Science and Engineering University of South Carolina, Columbia, SC 29208
Tenure and Promotion Criteria and Procedures Department of Computer Science and Engineering University of South Carolina, Columbia, SC 29208 UCTP Approval: February 20, 2002 Recommendations of the tenured
https://www.iti.illinois.edu/sites/default/files/cybersecurity_image.jpg
ABOUT THE ACADEMY The National Academy of Public Administration is an independent, nonprofit, and non-partisan organization established in 1967 and chartered by Congress in 1984. It provides expert advice
UNM Information Assurance Scholarship for Service (SFS) Program
UNM Information Assurance Scholarship for Service (SFS) Program What is Information Assurance? Committee on National Security Systems (CNSS) defines information assurance (IA): Measures that protect and
GRADUATE PROGRAM REVIEW POLICY. Texas Southern University
GRADUATE PROGRAM REVIEW POLICY Texas Southern University The Purposes of Graduate Program Review Graduate program review at Texas Southern University exists to ensure that programs are functioning at the
College of Engineering and Applied Science Department of Computer Science
College of Engineering and Applied Science Department of Computer Science Guidelines for Doctor of Philosophy in Engineering Focus Area: Security Last Updated December 2014. I. INTRODUCTION The College
The GW CyberCorps Program
The GW CyberCorps Program www.seas.gwu.edu/cybercorps Introduction The need for educated personnel in the government s cyber security workforce is critical to the nation s security. As evidenced by remarks
TARLETON STATE UNIVERSITY COLLEGE OF GRADUATE STUDIES GRADUATE COUNCIL
TARLETON STATE UNIVERSITY COLLEGE OF GRADUATE STUDIES GRADUATE COUNCIL Purpose: To consider all matters relating to graduate programs at Tarleton State University and to recommend practices and procedures
SOCIOLOGY PHD PROGRAM. Student Learning Objectives
SOCIOLOGY PHD PROGRAM Student Learning Objectives 1. Ability to apply key sociological concepts and research methodologies in critiquing sociological scholarship and in developing and reporting individual
Nettitude Ltd. (FHEQ) level 7] MSc Postgraduate Diploma Postgraduate Certificate. British Computer Society (BCS) Master s Degree in Computing
Faculty of Engineering and Informatics Programme Specification Programme title: MSc Cyber Security Academic Year: 2015/16 Degree Awarding Body: Partner(s), delivery organisation or support provider (if
Toward Curricular Guidance in the Cyber Sciences
Toward Curricular Guidance in the Cyber Sciences 1 6 J U N E 2 0 1 5 2 0 1 5 C I S S E L A S V E G A S D A V I D G I B S O N, U S A I R F O R C E A C A D E M Y B E T H H A W T H O R N E, U N I O N C O
TENURE AND PROMOTION CRITERIA DEPARTMENT OF ELECTRICAL ENGINEERING
1. GENERAL TENURE AND PROMOTION CRITERIA DEPARTMENT OF ELECTRICAL ENGINEERING The evaluation of candidates for tenure, promotion, and annual evaluation is based upon: (i) teaching, (ii) scholarship, and
Department of Defense Information Assurance Scholarship Program. Sponsored by the. DoD Chief Information Officer
Department of Defense Information Assurance Scholarship Program Sponsored by the DoD Chief Information Officer SOLICITATION FOR PROPOSALS From Universities Designated by the National Security Agency (NSA)
INNOVATION. Campus Box 154 P.O. Box 173364 Denver, CO 80217-3364 Website: http://cam.ucdenver.edu/ncmf
EDUCATION RESEARCH INNOVATION Campus Box 154 P.O. Box 173364 Denver, CO 80217-3364 Website: http://cam.ucdenver.edu/ncmf Email: [email protected] Phone: 303.315.5850 Fax: 303.832.0483 JEFF M. SMITH, m.s.
M. CRITERIA FOR FACULTY EVALUATION
faculty evaluation/1 M. CRITERIA FOR FACULTY EVALUATION 1. General Criteria: The professional lives of college faculty members traditionally have been characterized by expectations in the broad categories
College of Human Environmental Sciences Strategic Plan for 2012-2015
College of Human Environmental Sciences Strategic Plan for 2012-2015 Revised Fall 2013 Mission: The College will be a well-recognized leader in preparing students to impact the lives of individuals and
SCHOOL OF NURSING FACULTY EVALUATION PROCEDURES AND CRITERIA FOR RETENTION, PROMOTION, TENURE, AND PERIODIC REVIEW
SCHOOL OF NURSING FACULTY EVALUATION PROCEDURES AND CRITERIA FOR RETENTION, PROMOTION, TENURE, AND PERIODIC REVIEW This document is to be used in conjunction with the UA Board of Regents policies, University
PH.D. IN BUSINESS ADMINISTRATION
PH.D. IN BUSINESS ADMINISTRATION Intellectual Discovery AND INNOVATION join a nationally ranked program that is accredited by AACSB International, placing the UTSA College of Business in the top five percent
Programme Review. Bachelor of Science (Honours) in Computing in Information Security and Digital Forensics BN120. Department of Informatics
Programme Review Bachelor of Science (Honours) in Computing in Information Security and Digital Forensics BN120 Department of Informatics Peer-review panel report 7 th June 2013 Table of contents Executive
The Graduate School STRATEGIC PLAN 2007-2016
The Graduate School STRATEGIC PLAN 2007-2016 Table of Contents Page 1. Introduction 4 2. The Graduate School s Mission, Vision and Core Values.. 5 3. Strategic Advantages. 6 4. Strategic Challenges.. 7
Strategic Plan 2012 2020
Department of Economics College of Arts and Sciences Texas Tech University Strategic Plan 2012 2020 Mission The Department of Economics is dedicated to excellence in teaching, research, and service. The
Rutgers, The State University of New Jersey School of Nursing Legacy CON Faculty
1 Rutgers, The State University of New Jersey School of Nursing Legacy CON Faculty Appointment, Reappointment, and Promotion of Clinical Track Faculty (Policy 60.5.10) Individuals whose status is qualified
National Cyber Security Awareness Month. Week Five: Building the Next Generation of Cyber Professionals
National Cyber Security Awareness Month Week Five: Building the Next Generation of Cyber Professionals Webinar recording and evaluation survey This webinar is being recorded and will be made available
CONTENT. King Abdullah II Faculty of Engineering
CONTENT About Mission, Vision & Goals Engineering Faculty Engineering Resources Bachelor Programs B. Sc. Program in Electronics Engineering B. Sc. Program in Computer Engineering B. Sc. Program in Communication
MASTER PROGRAM IN EVENT MANAGEMENT (One year) 1. Program Title Master in Business Administration with specialization in event management (One year)
MASTER PROGRAM IN EVENT MANAGEMENT (One year) 1. Program Title Master in Business Administration with specialization in event management (One year) 2. Program Aims and Objectives The education will help
GUIDELINES FOR CONDUCTING EVALUATIONS OF ACADEMIC PROGRAMS
GUIDELINES FOR CONDUCTING EVALUATIONS OF ACADEMIC PROGRAMS OFFICE OF THE PROVOST UNIVERSITY OF PITTSBURGH PITTSBURGH, PENNSYLVANIA 15260 JULY, 2002 Guidelines for Conducting Evaluations of Academic Programs
How To Get A Degree In Telecommunications In Mauritius
MSc Telecommunications Management 1. Introduction There is an increasing demand for telecommunications engineers who combine a Master s level of theoretical and operational understanding with the flexibility
The School of Education & Human Services The University of Michigan Flint Standards and Criteria for Promotion and Tenure
The School of Education & Human Services The University of Michigan Flint Standards and Criteria for Promotion and Tenure Introduction The primary mission of the University of Michigan Flint is to be the
Combined Bachelor s/master s Degree Program Sponsored by the Graduate School and the Honors Program
Combined Bachelor s/master s Degree Program Sponsored by the Graduate School and the Honors Program The Honors Program provides students with the opportunity to plan a curriculum leading to both the Bachelor's
2015 Webinar Series: NCL for the Classroom
2015 Webinar Series: NCL for the Classroom National CyberWatch Center Prince George s Community College Room 129B 301 Largo Road Largo, MD 20774 www.nationalcyberwatch.org Webinar Protocol :: Mute your
How To Become A Cybersecurity Consultant
Strengthening the Nexus: Government-Business- University cooperation and collaboration on security, training and research November 1, 2011 Susan C. Aldridge, PhD University of Maryland University College
Graduate Program Policies and Procedures
The University of British Columbia Department of Physics & Astronomy Graduate Program Policies and Procedures May 2007 Table of Contents 1 Introduction 4 2 Programs 4 3 Admissions 4 3.1 Eligibility 4 3.2
MARSHALL UNIVERSITY HONORS COLLEGE POLICY HANDBOOK
MARSHALL UNIVERSITY HONORS COLLEGE POLICY HANDBOOK PURPOSE This handbook offers basic information about the procedures and practices of the Honors College at Marshall University. The information presented
INTERDISCIPLINARY PROGRAMS: ESTABLISHMENT, ADMINISTRATIVE STRUCTURE, FACULTY APPOINTMENTS AND PROCESSES THE UNIVERSITY OF NORTH CAROLINA AT GREENSBORO
INTERDISCIPLINARY PROGRAMS: ESTABLISHMENT, ADMINISTRATIVE STRUCTURE, FACULTY APPOINTMENTS AND PROCESSES THE UNIVERSITY OF NORTH CAROLINA AT GREENSBORO Approved by the Provost, April 5, 2006 1 I. Mission
STANDARDS: MASTERS AND DOCTORAL DEGREE BY RESEARCH AREA 1: VISION, MISSION, EDUCATION GOALS AND LEARNING OUTCOMES
STANDARDS: MASTERS AND DOCTORAL DEGREE BY RESEARCH AREA 1: VISION, MISSION, EDUCATION GOALS AND LEARNING OUTCOMES The vision, mission education goals and learning outcomes of the HEP guide its research
Cybersecurity Education
Cybersecurity Education Issues & Approaches Derek A. Smith Director of Cybersecurity Initiatives at Excelsior College AFCEA November 18, 2014 Where we are now! Symantec: In a world of increased cybersecurity
QUALITY ENHANCEMENT PLAN 2004-2008
DEPARTMENT OF MATHEMATICS A. M. Haghighi, Ph. D. Professor and Head QUALITY ENHANCEMENT PLAN 2004-2008 COLLEGE OF ARTS AND SCIENCES PRAIRIE VIEW A&M UNIVERSITY A part of the Texas A&M University System
Evaluation of Undergraduate Academic Programs. Self-Study Guidelines
Evaluation of Undergraduate Academic Programs Self-Study Guidelines Office of the Provost Fall 2009 Purpose This guide is designed to support academic unit efforts to evaluate undergraduate academic programs
CyberSkills Management Support Initiative
CyberSkills Management Support Initiative GROWING THE PIPELINE FOR CYBERTALENT THROUGH VOLUNTEER OPPORTUNITIES November 6, 2014 November 6, 2014 Background In June 2012, Secretary Napolitano announced
EXECUTIVE SUMMARY. Information Literacy Program of the A.C. Buehler Library at Elmhmst College, Elmhurst, Illinois
ACRL Best Practices in Information Literacy Invitational Conference Application, 2002 Program and Institution: EXECUTIVE SUMMARY Information Literacy Program of the A.C. Buehler Library at Elmhmst College,
PROGRAMME SPECIFICATION UNDERGRADUATE PROGRAMMES. Programme name Mechanical Engineering with Foundation
PROGRAMME SPECIFICATION UNDERGRADUATE PROGRAMMES KEY FACTS Programme name Mechanical Engineering with Foundation Award BEng (Hons) School School of Engineering and Mathematical Science Department or equivalent
At a Glance A short portrait of the Technical University of Crete
At a Glance A short portrait of the Technical University of Crete Contact: Technical University of Crete Public & International Relations Department University Campus Akrotiri 731 00 Chania Crete Greece
Program Description. a. Campus(es) Offering Program: Indiana University-Bloomington
Program Description Doctor of Education (EdD) in Literacy, Culture, & Language Education to be offered by Indiana University, Bloomington (Date: 3-24-2014) Characteristics of the Program a. Campus(es)
Towards Achieving ABET s Substantial Equivalency Recognition in Department of Chemical Engineering at a non-us institution
Towards Achieving ABET s Substantial Equivalency Recognition in Department of Chemical Engineering at a non-us institution Majeed S. Jassim (speaker) Department of Chemical Engineering University of Bahrain
Cybersecurity Definitions and Academic Landscape
Cybersecurity Definitions and Academic Landscape Balkrishnan Dasarathy, PhD Program Director, Information Assurance Graduate School University of Maryland University College (UMUC) Email: [email protected]
Department of Bioengineering. Master s Student Handbook. Graduate Group in Bioengineering University of Pennsylvania
Department of Bioengineering Master s Student Handbook Graduate Group in Bioengineering University of Pennsylvania INTRODUCTION... 2 UNIVERSITY OF PENNSYLVANIA... 3 BIOENGINEERING OVERVIEW... 3 GOAL AND
EXECUTIVE EDUCATION MASTER DEGREE
EXECUTIVE EDUCATION MASTER DEGREE STRATEGIC BUSINESS UNIT MANAGEMENT INTERNATIONAL > DEGREE NETWORK ENHANCE YOUR LEADERSHIP SKILLS AND MANAGEMENT ACUMEN FOSTER A GENUINELY Entrepreneurial APPROACH TO MANAGEMENT
Template for Departmental Report for Northwest Commission on Colleges and Universities Self Study (The most critical information is in Italic)
Template for Departmental Report for Northwest Commission on Colleges and Universities Self Study (The most critical information is in Italic) Standard One: Mission and Goals, Planning and Effectiveness
Joint Master in Information Security and Data Management (ISDM)
PROJECT CONCEPT PAPER Joint Master in Information Security and Data Management (ISDM) First draft: Dr. Derar Eleyan, Palestine Technical University-Palestine. Key Action 2: Capacity Building in the Field
Graduate Studies in Animal Sciences
Graduate Studies in Animal Sciences January, 2015 Department of Animal Sciences College of Agriculture, Food Systems, and Natural Resources North Dakota State University Fargo, North Dakota 58108 Table
College of Medicine Promotion and Tenure Procedure FLORIDA ATLANTIC UNIVERSITY
College of Medicine Promotion and Tenure Procedure FLORIDA ATLANTIC UNIVERSITY Approved by majority vote of College Faculty March 25, 2014 Table of Contents Introduction... 1 Governance... 1 a. Membership...
Guide for BA/MA Five-year Combined Degree Students in Art History at Binghamton University
Guide for BA/MA Five-year Combined Degree Students in Art History at Binghamton University Admission The BA and MA combined-degree program admits qualified applicants who are enrolled as art history majors
PHYSICAL THERAPY PROGRAM STANDARDS FACULTY OF PHYSICAL THERAPY PROGRAM Revised 05/18/2016
PHYSICAL THERAPY PROGRAM STANDARDS FACULTY OF PHYSICAL THERAPY PROGRAM Revised 05/18/2016 The intent of this document is to provide clear guidelines for the evaluation of Physical Therapy faculty for reappointment,
KU School of Education Graduate Student Handbook
KU School of Education Graduate Student Handbook 2011-2012 Graduate Student Responsibility All graduate students are responsible for informing themselves of requirements of the Graduate School as stated
Genito-urinary Medicine
Specialty specific guidance on documents to be supplied in evidence for an application for entry onto the Specialist Register with a Certificate of Eligibility for Specialist Registration (CESR) Genito-urinary
Becoming a Cyber Professional: A Discussion with Recent Graduates
Becoming a Cyber Professional: A Discussion with Recent Graduates Moderator: George L. Heron, LifeJourney USA Panelists: Danielle Santos, Assistant Program Manager, Cyber Formal Education, DHS Scott Wallace.
Appendix D: Faculty Evaluation Form Second/Third Year Appointments
Appendix D: Faculty Evaluation Form Second/Third Year Appointments Introduction This form lists criteria dean/supervisors will use to evaluate whether or not expectations have been met in the second-year
Graduate Program Policies and Procedures
The University of British Columbia Department of Physics & Astronomy Graduate Program Policies and Procedures Sept 2011 Table of Contents 1. Introduction!... 4 2. Programs!... 4 3. Admissions!... 4 3.1.
The Duke Environmental Economics Doctoral Scholars (DEEDS) Program
The Duke Environmental Economics Doctoral Scholars (DEEDS) Program The Duke Environmental Economics Doctoral Scholars (DEEDS) program aims to foster dynamic intellectual exchange between Duke doctoral
How To Prepare For Graduate School
Graduate School Planning Ahead Overview Graduate school is a huge investment of your time and money. The key is to know what you want to get out of your education before you make the investment. To consider
PUBLIC AND COMMUNITY SERVICE GUIDELINES FOR EVALUATING FACULTY
NEW FACULTY APPOINTMENTS {approved by unanimous vote on 11/14/2008} In its appointment of tenure-track [Ordinary] faculty, the Department of Public and Community Service Studies is committed to the maintenance
CHAPTER TWO General Institutional Requirements
CHAPTER 2 GIRs CHAPTER TWO General Institutional Requirements Chapter 2 General Institutional Requirements A. MISSION 1) It has a mission statement, formally adopted by the governing board and made public,
UNIVERSITY OF ROCHESTER William E. Simon Graduate School of Business Administration. Proposal for a Clinical Faculty Track
Contents: UNIVERSITY OF ROCHESTER William E. Simon Graduate School of Business Administration Proposal for a Clinical Faculty Track 1. Rationale and Objectives of the Proposal 2. The Simon School Mission
INTERIM POLICIES AND PROCEDURES ON TECHNOLOGY-MEDIATED COURSES AND PROGRAMS
INTERIM POLICIES AND PROCEDURES ON TECHNOLOGY-MEDIATED COURSES AND PROGRAMS I. Rationale The primary purposes of instructional technology are to facilitate effective instruction and enhance student learning,
Fall Summer W e s t e r n C o n n e c t i c u t S t a t e U n i v e r s i t y
Summer 12 WCSU Online Policy Faculty Senate Distance Education Committee Please see http://library.wcsu.edu/wcsu/distanceed/wiki for a list of committee members and working documents. W e s t e r n C o
ONLINE MASTER OF SCIENCE IN MANAGEMENT INFORMATION SYSTEMS
ONLINE MASTER OF SCIENCE IN MANAGEMENT INFORMATION SYSTEMS ALL SYSTEMS GO! THIS IS HOW YOU PUT TECHNOLOGY TO WORK Management Information Systems addresses the intricate relationship among people, data,
University Of Alaska Anchorage College Of Health Department Of Human Services. Criteria and Guidelines For Faculty Evaluation
University Of Alaska Anchorage College Of Health Department Of Human Services Criteria and Guidelines For Faculty Evaluation This document is to be used in conjunction with the UNAC and UAFT Collective
Department of Child & Family Development Promotion and Tenure Guidelines November 2004
A. Contributions to Teaching Department of Child & Family Development Promotion and Tenure Guidelines November 2004 The Standard Teaching communicates knowledge to students and develops in them the desire
