PROPOSAL FOR X NEW INSTRUCTIONAL PROGRAM SUBSTANTIAL EXPANSION/MAJOR MODIFICATION COOPERATIVE DEGREE PROGRAM

Size: px
Start display at page:

Download "PROPOSAL FOR X NEW INSTRUCTIONAL PROGRAM SUBSTANTIAL EXPANSION/MAJOR MODIFICATION COOPERATIVE DEGREE PROGRAM"

Transcription

1 PROPOSAL FOR X NEW INSTRUCTIONAL PROGRAM SUBSTANTIAL EXPANSION/MAJOR MODIFICATION COOPERATIVE DEGREE PROGRAM (For each proposed program, attach a separate cover page. For example, two cover pages would accompany a proposal for a degree program and a certificate program.) Baltimore City Community College Institution Submitting Proposal 6/9/2014 Projected Implementation Date Certificate Cyber Security and Assurance Award to be offered Title ofproposed Program Suggested REGIS Code Suggested CIP Code Department of Business and Technology Dr. Eyinnaya Bob Iweha Department ofproposed Program N arne ofdepartment Head Chima Ugah Contact Name Contact Address Contact Phone Number Signature and Date President/ChiefExecutive Approval Date Date Endorsed/ Approved by Governing Board

2 Page 2 of2 A. Centrality to institutional mission statement and planning priorities: The new cettificate program in Cyber Security and Assurance is in line with BCCC institutional mission as a dynamic institution ofhigher education that is responsive to the changing needs of its stakeholders and community at large. Protecting corporate and individual data from identity theft is critical to the survival ofthose whose data may be compromised. Industrial espionage is on a consistent rise across the globe through organized hacking and systems' access denial. The rise in cyber-crimes has outpaced the knowledge base needed to provide the required counter measures, and educational institutions must provide adequate training to fill the void. Protecting computer data and networks is a mission-critical process in planning and implementing IT security infrastructure by addressing multiple vulnerabilities, and has evolved into full cuniculum across the nation. The Cyber Security and Assurance Program will: 1. Provide outstanding Cyber Security-related education to the citizens of Baltimore and the State ofmaryland; 2. Provide activities in collaboration with Computer Infmmation Systems, Computer Aided Design/Drafting, and Electronics courses that should enhance interests in those courses; 3. Introduce Cyber Security concepts to underserved and disadvantaged 11th and 12th graders in the Baltimore City Public School System (BCPSS) thereby improving their math problem-solving sldlls through hands-on robotics exercises; 4. Create a career pathway from Baltimore City Community College's Cyber Security to University ofmaryland and John's Hopkins University Cyber Security and related Bachelor's Degree; 5. Partner with industries to provide internship and job opportunities for Baltimore City Community College's Cyber Security graduates. Maryland is the epicenter for cyber security in the United States. Local universities Sl;LCh as Johns Hopkins University, University of Maryland-Baltimore County, Capitol College and UMUC are offering courses and programs in Cyber Security and are interested in mticulating similar courses with BCCC. Fmther, there have been frequent inquiries about a Cyber Security program at BCCC from external stakeholders. It is important to note that the State ofmaryland has designated BCCC and Johns Hopkins as the Cyber Security educational center for Baltimore City. BCCC is a member of Cyber Watch Consortium headquartered at Prince George's Community College B. Adequacy of curriculum design and delivery to related learning outcomes consistent with Regulation.10 of this chapter: 1. Provide a list of courses with title, semester credit hours and course descriptions, along with a description ofprogram requirements. 2. Describe the educational objectives and intended student learning outcomes.

3 Page 3 of3 Cyber Security and Assurance Certificate* Catalog Description The Cyber Security and Assurance Program at BCCC emphasizes on the need to build a wall between our infmmation and those that want to exploit it. The recurring events such as virus and wmm attacks and the success of criminal attackers illustrate the weaknesses in current infmmation technologies and the need to heightened security ofthese systems. Students will gain practical experience in understanding the threats and dangers, security assessments and analysis to a wide range of different businesses, and the steps that need to be taken to mitigate these vulnerabilities by using state-of-the-art technology. The progi am prepares students for vendor-specific or commercially available security certification. * Cyber Security and Assurance students may have summer internship opportunities at industries or Morgan State University School of Engineering. ** Depending on a student's BCCC college Math placement scores (through the Accuplacer Te~t) and the Cyber Security and Assurance Coordinator's evaluation of the student's Math placement scores, a Cyber Security student has to place into a higher level Math course such as MAT 107.

4 Page 4 of4 ~ - 7 ~ :4a :~ B.vogva~ [pe~rvpigg,muj~gjl}es ~pvl<slie~~ _,,,, Program Name: Cyber Security and Assurance (A.A.S.) (MHEC #: ) Division: BSTEM Program Coordinator: Chima Ugah Department: Business and Technology Coordinator Extension: Information Security Ethics Computer Forensics Operating Systems and Network a. Examine of ethical issues in information technology as well as an understanding of how ethical theory can be applied to a discussion and analysis of those issues. b. Examine a cluster ofinformation technology issues within the framework of ethical theory, and develop rational, coherent, consistent, and systematic approach to addressing moral issues in information technology. c. Make recommendations on "risk management" by conducting fundamental information security assessment and developing policies for identifying and prioritizing threats and assets, and the procedures for identifying what controls are in place to protect corporate assets from threats. d. Implement ethical and information security policies and procedures for an organization or a corporate entity. e. Implement security maintenance procedure that requires ongoing technical and administrative evaluation that an organization must perform to maintain the security ofits information "u,,t.,,n'l a. Conduct the appropriate computer investigation procedures that include examining a computer crime, taking a systematic approach in assessing a case and securing evidence. b. Demonstrate the knowledge of operating systems file structure that includes Windows, DOS, Macintosh, and UNIX/Linux. c. Follow the computer forensics analysis and methodology, and use digital intelligence computer forensics tools. d. Use a systematic approach to conduct computer network forensics. e. Utilize appropriate methodology to investigate crimes and violations. f. Conduct the mobile phones and PDAs computer forensic investigations. g. Write reports and generate report findings with forensic software tools. h. Write reports and generate report findings with forensic software tools. a. Design security measures into physical and network topology that includes wireless and virtual machines security

5 Page 5 ofs )Jji "" lw J!ffi!V W''i' \11 ;: B>z;;"'& N~<*WE'~"'~~i1h-"'fi1;,ffFf~~A!lJ?J#~» 7?1!l~*fA:fff!W:~~\of~M :~?lm;'rf~ir~~?::;rtrpw41j!!jw(!\i!? 7'? ;:s::;/!ffi;!j:&jjtfff:jxj~ '0 (, " ";,?! e~z;ox- «8%, ', /, fq~og'~a'llli:d"~itn~ilf~ tg:~~,~~m~s,~q!ir J!e~t ',, -;; P "'* 7xpdilj);}'lli\'" 0 #%"'J?JJ.,;:".lf!f~'"' "'y;q~!fj';,;l "'"'y"'p ; 0 0{i!/";;;"' "'! "" '1 Program Name: Cyber Security and Assurance (A.A.S.) (MHEC #: ) Division: BSTEM IDepartment: Business and Technology Program Coordinator: Chima U gah Coordinator Extension: I Date Submitted: b. Use different approach to operating systems hardening c. Secure the network through authentication and encryption d. Implement file, account-based, directory, , and shared resource security. e. Implement firewalls and boarder security. f. Implement Web, remote-access, and VPN security. g. Maintain the network security through monitoring and auditing. Cyber Security a. Demonstrate the knowledge of the evolution of computing, Implementation communications, and social network from mainframe computers to client-server to World Wide Web; from Brick-and Mortar to E-Commerce to E-business transformation; and from personal communication to social networking. b. Secure Web-enabled application deployment and social network c. Mitigate risk when connecting to the Internet. d. Mitigate Web-site risks, threats, and vulnerabilities. e. Mitigate Web application vulnerability. f. Secure end-point device communication. g. Secure personal and business communication. Ethical Hacldng a. Describe the basics of ethical hacking aspects such as the phases ofthe hacking cycle and the different types ofhacker attacks. b. Use hacking tools and document their functionality. c. Use security testing and monitoring methodologies to practice their knowledge with the various penetration testing tools. d. Explain the basic concepts oftcp /IP protocol stack.,0 4 e. Identify physical security attacks and vulnerability, and fix them f. Use Web tools for footprinting to find out how a corporate network is designed. g. Enumerate operating systems targets by discovering logon accounts and passwords, and gaining access to network resources. Business Continuity and a. Develop a risk management plan. Disaster Recovery b. Perform risk assessment and identify assets and activities to be protected. c. Plan risk mitigation throughout the organization. d. Mitigate risk with a business impact analysis. e. Mitigate risk with a business continuity plan. f. Mitigate risk with a disaster recovery plan. g. Mitigate risk with a computer incident response team plan.

6 Page 6 of6 Listed below is the course description. BCAP 104: Introduction to Operating Systems: DOS/Windows Students are introduced to the Disk Operating System (DOS), the Windows Operating environment, and the UNIX Operating System. Students leam some ofthe most important topics ofthe command line, including DOS sessions, displaying directories, working with files and using directories and subdirectories. The windows features presented include working on the Windows desktop, file, document and folder management, Windows Explorer, modifying the desktop environment, customizing toolbars and folders, using Help troubleshooter, customizing the computer using the Control Panel, search for information with Intemet Explorer, and setting up a computer to use offline files. Students also acquire an introduction to creating and manipulating directories and files using UNIX operating systems. CISS 105: Introduction to UNIX operating System (3 credits) A basic overview ofthe UNIX operating system is provided. Topics include file managing, text file utilities, text-editing with vi, shell programming, ways to communicate including electronic mail, and various UNIX utilities. CISS 201: Systems Analysis and design (3 credits) Programmers are given an overview ofthe role ofthe analyst in the development of an entire system and on-the-project team. Topics include use ofsystem flow charts, decision tables, and process flow charts to promote standards for documentation. Techniques for project management used by the analyst are included along with CASE tools. ITNT 235: Networking with TCPIIP (3 credits) Students are introduced to computer communications protocols. Principles such as architecture, layering, multiplexing, address mapping, and routing are discussed along with such topics as intemet protocols and subnet and super-net extensions. This course prepares students for the professional world of computer communications. ITSA 125: Security Fundamentals, Principles and Ethics (3 credits) Security Fundamentals, Principals and Ethics provides a broad view ofthe entire field of infmmation security with a structured methodology that can be used to implement information security in an organization that has little or no formal information security procedure in place; a study of ethics and moral philosophy as a means for providing a framework for ethically grounded decision making in the information age. ITSA 233: Ethical Hacking (3 credits) Ethical Hacking engages students in an interactive environment where they willleam how to scan, test, hack and secure information systems. Students will gain practical experience with es.sential security systems with a plethora of offensive security topics ranging from how perimeter defenses work to scanning and attacking simulated network. A wide variety oftools, viruses, and mal ware is presented, providing a complete understanding oftactics and tools used by hackers.

7 Page 7 of7 ITSA 242: Computers Forensic and Investigation (3 credits) Computer Forensics and Investigation provides the knowledge ofa "digital detective" in the investigative and evidence-gathering protocols related to computer crimes in hardware and software systems. The course covers the required knowledge, skills, and experience to acquire digital evidence, conduct complex and data-intensive forensic examinations involving multiple computer operating systems and file types to reporting findings. ITSA 245: Cyber Security Implementation (3 credits) Cyber Security Implementation teaches students how to develop an overall security program necessary to protect data and secure mobile users as infmmation migrates from mainframe computers and application servers to Web-enabled applications. It covers computing, communications, and social networldng; and pt'esents methods to secure systems against the risks, threats, and vulnerability associated with Web-enabled applications' accessibility through the Internet. ITSA 255: Information System Security (3 credits) Systems administrators are provided with knowledge ofthe approaches intruders use to gain access to the system. Concepts ofvulnerability ofthe system exploited by the intruder through threats ofinterruption, interception, modification, and fabrication are discussed. The use of frrewalls and other preventive approaches to the security ofa UNIX-based network environment are examined in detail. Cyber Watch/BCCC Curriculum Mapping CyberWatch CW160 Security+ CW110 Ethics in the Information Age CW130 Microcomputer Operating Systems CW225 Hardening the Infrastructure CW235 Network Defense & Countermeasures Computer Forensics I Disaster Recovery & Risk Management BCCC ITNT235- Networking with TCP/IP ITSA255- Information Systems Security ITSA 125- Security Fundamentals, Principles and Ethics BCAP104- Introduction to Operating Systems ITSA245- Cyber Security Implementation N/A ITSA242- Computer Forensics & Investigation ITSA270- Business Continuity & Disaster Recovery Students entering into the cyber security program will have completed all remedial courses or obtained appropriate ACCUPLACER scores. Describe the educational objectives and intended student learning outcomes A student who completes the Cyber Security and Assurance program will be able to: 1. Follow a structured model in Security Systems Development Life Cycle (SDLC) 2. Detect attack methodology and combat hackers from inu usion or other suspicious attempts at connection to gain unauthorized access to a computer and its resources 3. Protect data and respond to threats that occur over the Internet

8 Page 8 of8 4. Design and implement risk analysis, security policies, and damage assessment 5. Plan, implement and audit operating systems' security in a networked, multi-platform and cross platform environment 6. Provide contingency operations that include administrative planning process for incident response, disaster recovery, and business continuity planning within information security All BCCC students must meet the College's Computer Literacy requirement in order to receive a degree or a certificate. All first-time full- and part-time degree and certificate seeking students are required to complete the PRE-100 course within the first six credits 4. Identify any specialized accreditation or graduate ce1iification requirements for this program and its students. BCCC is cunently accredited by the Middle States Commission on Higher Education (MSCHE). BCCC will apply for MSCHE approval ofthe Cyber Security and Assurance Program once it has secured MHEC approval. 5. Ifcontracting with another institution or non-collegiate organization, provide a copy ofthe written contract. Not applicable at this time. C. Critical and compelling regional or statewide need as identified in the State Plan: 1. Demonstrate demand and need for the program in terms ofmeeting present and future needs ofthe region and the State in general based on one or more ofthe following: o The need for the advancement and evolution ofknowledge; o Societal needs, including expanding educational opportunities and choices for minority and educationally disadvantaged students at institutions ofhigher education; o The need to strengthen and expand the capacity ofhistorically black institutions to provide high quality and unique educational programs. Cyber Security Industry Analysis Cyber Security is a technology that is in high demand in the private, governmental, and military sectors. The Federal government and the State of Maryland are pro-active in protecting national and state data. The recent "Cyber Maryland" publication states that President Barak Obama pledged to make securing the country's most vital computer networks a top economic and national security priority. There is a greater need for knowledge base to improve the safety of information networks that power the government and the U.S. economy. The State ofmaryland is the national epicenter offederal cyber security activities and the home to: The National Security Agency The Intelligent Advanced Research Projects Activity

9 Page 9 of9 The National Institute of Standards Defense Information Systems Agency headquarters U.S. Cyber Command headquarters Department of Defense expansions ofthe intelligence and communications responsibilities at Fort Meade and at Aberdeen Proving Ground through the BRAC initiatives. Maryland is the base for our nation's effmt to defend and protect U.S. information networks. Cyber Security Local/Neighboring States Project Concentration Currently, there are not enough Cyber security technicians in Maryland, Virginia, Delaware, New Jersey, or New York [6, 7] where high-tech industry and minority populations are highly concentrated. To address the demand for Cyber Security technicians in Maryland, Baltimore City Community College (BCCC) proposes the Cyber Security and Assurance Curriculum model that, through Cyber Security instruction for the highly technical workplace, will scale nationally to increase the number oftechnicians, especially African Americans, with proficient skills in Cyber Security, computer and information technology, as well as manufacturing. Job opportunities available to persons who complete AAS degree in Cyber security Today's in-demand Cyber Security career paths include but not limited to the following areas: Information Technology Application Development NetworkAdministration Web Development 2. Provide evidence that the perceived need is consistent with the Maryland State Plan for Postsecondary Education (pdf). The 2009 Maryland State Plan for Postsecondary Education calls for Quality and Effectiveness; Access and Affordability; Diversity; A Student-Centered Learning System; and Economic Growth and Vitality. This proposed program fits all ofthese goals. This proposed program provides valuable skills and knowledge in one ofthe fastest-growing employment sectors in the region. Baltimore City Community College offers ready access and affordability to a diverse population of learners empowering them to go out and fulfill the workforce needs as well as becoming lifelong learners. The program follows a student-centered and learning-centered approach. Most ofthe Core courses are handson and intemship opportunities will be provided. The Cyber security and assurance program at Baltimore Community College is working closely with the Baltimore City Public Schools Morgan state University, University ofmaryland Baltimore City, John's Hopkins University and local Businesses to provide career pathways. D. Quantifiable & reliable evidence and documentation of market supply & demand in the region and State:

10 Page 10 oflo There is a growing need for cyber security careers pmiicularly within this geographic location. The U.S. Bureau of Labor Statistics projects a 48 percent increase in jobs for computer softwme engineers and 55 percent growth in jobs for network system and data communications analysts by Computer software engineers, network systems and data communication analysts, and network and computer systems administrators are projected to go up between 40 and 50%, and computer information systems managers are projected to grow by 23%. Projections for Maryland mimic this trend. Much ofthis demand is fueled by the growing IT industry, which is particularly strong in MD, DC, and VA because ofthe large federal infrastructure including intelligence and Department of Defense govermnent agencies and related contractors. There is anticipated much increase through BRAC movements to Ft. Meade and the Aberdeen Proving Ground. State of Maryland has more room for a robust higher education system that trains the next generation of cyber security expe1is with innovative cuniculum to address the shmiage ofthe nation's technically advanced workforce. The Baltimore Development Corporation (BDC) has created a formal strategy for the attraction and retention of cyber security companies. This strategy includes the development and maturation oftwo cyber pipelines- one for workforce and one for businesses. A Baltimore City cyber security workforce pipeline would ensure that local firms have access to qualified talent. Baltimore City Community College along with Johns Hopkins University has been designated by State of Maryland to form the backbone ofthe workforce educational system. E. Reasonableness of program duplication: There are variations ofthe cuniculum being offered at the State institutions and BCCC curriculum program will enhance and design to fill the void of difference with other colleges. School Program Name Certificate Degree #of #of Certs. Associate/ Awarded Bachelor 2012 Degrees Awarded 2012 Anne Arundel fuformation & Cyber Yes & with AAS 6 4 Corum. Col. Security (Cert.); various Cybercrime (Degree) vendors certifications Capitol College Computer and Yes AAS, 2 5 Network Security BS, fuformation MS Assurance (Bachelors and Masters) Community College fuformation Security Yes Yes 1 4 of Baltimore County (Cert.); fufonnation Systems Security (Degree) Garrett College Cyber Security (Cert.) Yes N/A 0

11 Page 11 ofll School Program Name Certificate Degree #of #of Certs. Associate/ Awarded Bachelor 2012 Degrees Awarded 2012 Harford Community Information Systems Yes AAS 0 9 College Security Montgomery College Cybersecurity Yes AAS 0 6 Prince Georges Information Security Yes & with AAS 5 6 Comm. Col. various vendor certifications Source: MHEC (May, 20 13). Trends in Degrees and Cettificates By Program, Maryland Higher Education Institutions, F. Relevance to Historically Black Institutions (HBis) National Science Foundation (NSF) data revealed that in 2000, only 7.5% of engineering/science technicians were African Americans [1 0]. This percentage is considerably lower than the 12.2% national population of African Americans [11]. To increase the number of African American technicians, more African Americans must be trained in emerging technologies such as cyber security, and the undergraduate engineering enrollment/retention/success rate for African American students at community colleges and fouryear institutions must be significantly increased. Baltimore City community College has articulation agreement with Morgan State and Coppin State Universities. It is hoped that students from this program will definitely contribute to these historically Black Institutions when they transfer to them. G. If proposing a distance education program, please provide evidence of the Principles of Good Practice (as outlined in COMAR 13B C). N/A H. Adequacy of faculty resources (as outlined in COMAR 13B ). A new position is created for a faculty in Cyber security. This individual should have Masters' degree in Cyber Security and Assurance or in related discipline Information Technology Security. Other support faculty members are: Prof. Chima Ugah, MS, MBA Business and Technology Phone: Associate Prof. Wan en Turner, MSc Computer Information Systems Phone: Robert Smith, M.S.., Adjunct Faculty Computer Information Systems Phone:

12 Page 12 of12 I. Adequacy of library resources (as outlined in CO MAR 13B ). Baltimore City Community College has an excellent electronic database sufficient to run the program. The print collection will be expanded as needed. However, special collection for Cyber security collections may be necessary. The students at Baltimore City Community College have access to the University of Maryland Library system through the UMB BioPark. J. Adequacy of physical facilities, infrastructure and instructional equipment (as outlined in COMAR 13B ) Baltimore City Community College has adequate physical facilities and infrastructure to initiate the program. The college has adequate spaces for classrooms, staff and faculty offices, and laboratories for the program. The program will have minimal impact on the use of existing campus space and facilities. Provision has been made to acquire laboratory equipment. However, BCCC will pay for the new equipment and facility modifications. There will be need for acquisition ofstate-of-the-mi technology to deliver instructions properly. Also, CISCO lab for credit courses will be required to accommodate shared credit/non-credit CISCO courses to be moved from BCED to Cyber Security Program. The table below summarizes the needs. Item Description Units Cost One Full-time faculty Specialized in IT Security 15TAU $60, member courses Fringes Hands-on Cyber Lab ITSA242, ITSA245, I1NT $54, LSB 307 &ITNT265 $2, each Renovation/Fixtures Wiring, a Smmi station, a 25 desks. 25 chairs $65, LSB 307 smart board and 25 work stations Software Acquisition $45, Faculty Training Professional development 2 faculty members $15, Total Startup Cost $239, K. Adequacy of financial resources with documentation (as outlined in COMAR l3b ) The proposed Cyber security and Assurance program is expected to generate revenue in excess of expenses from the third year.

13 Page 13 of13 FINANCE DATA TABLE 1: RESOURCES: Resource Categories Yearl Year2 Year3 Year4 YearS 1. Reallocated Funds $0 $0 $0 $0 $0 2. Tuition/Fee Revenue $44,790 $64,960 $77,270 $97,440 $122,060 (c + g below) a. Number off/t Students b. Annual Tuition/Fee Rate $2,462 $2,462 $2,462 $2,462 $2,462 c. Total FIT Revenue (ax b) $36,930 $49,240 $61,550 $73,860 $98,480 d. Number ofp/t Students e. Credit Hour Rate $131 $131 $131 $131 $131 f. Annual Credit Hour Rate g. Total PIT Revenue $7,860 $15,720 $15,720 $23,580 $23,580 (dxexf) 3 ~ Grants, Contracts & Other $0 $0 $0 $0 $0 External Sources 4. Other Sources-State aid based on $83,252 $118,934 $142,721 $178,401 $225,974 students FTE TOTAL (Add 1-4) $44,790 $64,960 $77,270 $97,440 $122, Reallocated Funds No funds will be reallocated from existing programs. 2. Tuition and Fee Revenue We assumed that tuition and fees will be constant in the next five years. In-state tuition rate is cunently $88 per credit and a total fee of$43(consisting of consolidated fees of $12, registration fee of $20 and facilities capital fee of $11) for a total of $131 pre credit was used in calculating the revenue; with 24 credit per year for full-time students and 12 credit per year for part-time students. 3. Grants and Contracts The college will look for/and apply for grant when opportunity presents itself. 4. Other Sources No additional sources of funding are expected at this time.

14 Page 14 of14 5. Total Year: The Cyber security and assurance program at Baltimore City Community College is expected to generate revenue from the third year of its inception. TABLE 2: EXPENDITURES: Expenditure Categories Yearl Year2 Year3 Year4 YearS 1. Faculty (b + c below) $86,634 $88,367 $90,134 $91,938 $93,776 a. #FTE b. Total Salary $60,000 $61,200 $62,424 $63,673 $64,946. c. Total Benefits $26,634 $27,167 $27,710 $28,265 $28, Admin. Staff (b + c below) $0. $0 $0 $0 $0 a. #FTE $0 $0 $0 $0 $0 b. Total Salary $0 $0 $0 $0 $0 c. Total Benefits $0 $0 $0 $0 $0 3. Support Staff (b + c below) $0 $0 $0 $0 $0 a. #FTE $0 $0 $0 $0 $0 b. Total Salary $0 $0 $0 $0 $0 c. Total Benefits $0 $0 $0 $0 $0 4. Equipment $54,600 $15,000 $15,000 $15,000 $10, Library $800 $800 $800 $800 $ New or Renovated Space $65,000 $20,000 $22,000 $24,000 $26, Other Expenses,Lab supply $45,000 $20,000. $15,000 $10,000 $10,000 TOTAL (Add 1-7) $252,034 $139,167 $134,934 $137,738 $138,576 NARRATIVE FOR EXPENDITURES 1. Faculty(# FTE, Salary; and Benefits) One new faculty member is required for this proposed program. The faculty member is required to teach all the core courses in the program. He/she will also serve as the program coordinator. A 2% Cost Of

15 Page 15 of15 Living Adjustment is factored into the salary in the subsequent years after the first year. He/she is expected to teach 15Teaching Assignment Unit equivalent to 15 credits per semester for a total of 30 credits a year. 2. Administrative Staff(# FTE, Salary, and Benefits) There will be no need for an additional administrative staff. The existing department and School administrative staffwill be sufficient to run the program. 3. Support Staff(# FTE, Salary, and Benefits) The existing suppmt staff in the school ofbstem will be sufficient to administer the program. 4. Equipment Funds will be needed to provide basic laboratory equipment for startup of the labs. $54,600 will be needed to purchase desktop computers (see table L4 below). 5. Library A minimal fund is needed to purchase Cyber Security textbook. 6. New and/or Renovated Space There will be need to renovate and configure existing laboratory room space to serve as dedicated lab for the program. Room 307 in the Life Sciences Building has been identified for this purpose: 7. Other Expenses Funding is available through professional development funds for two faculty to benefit from. These PD funds will enable the faculty members to attend conferences and be trained in the use of new soft wares as needed. 8. Total Year We project that the program will be self-sustaining from the third year ofits inception. L. Adequacy of provisions for evaluation of program (as outlined in COMAR 13B ). Baltimore City Community College has a compreh~nsive course and program evaluation process. Each course syllabus has a set of written student learning outcomes. The course learning outcomes are assessed through embedded questions on tests, assignments and pmifolio that address specific course outcomes. Data is collected and analyzed and results are used to improve course curriculum and pedagogy. Each course is assessed in four semester cycle. Program assessment takes place in a five year cycle. Data regarding program enrollment, retention and graduation rates, are collected by the Institutional, Advancement, Marketing, and Research in conjunction with the program coordinator. The data are analyzed against program outcomes and results are used to improve the program. Every faculty is evaluated each year. The evaluation process includes an assessment of faculty teaching, student evaluation of faculty, community service, college wide and department service. In order to receive high evaluation, a faculty member must demonstrate effective teaching above all. There is also provision for administration to set out an improvement plan for faculty

16 Page 16 of16 members who have not done well in the area ofteaching. M. Consistency with the State's minority student achievement goals (as outlined in COMAR 13B and in the State Plan for Postsecondary Education). Baltimore Community College mission is compatible with the State of Maryland.minority achievement goals. The college provides assessable and affordable education to the inner city dwellers and it's environ. Cunently, Baltimore City Community College is well positioned to provide affordable education to inner city dwellers with over 88% African American students. The rich cultural diversity of Baltimore Community College is epitomized by the various countries ofthe world represented in its student population. This proposed degree and certificate program will enhance science, Technology, Engineering and Mathematics assess to the African American thus bridging the technological divide among the. undenepresented. This program will also provide the student with opportunity to be integrated into the workforce as well as transfer to a four institutions or university. Through the college's web site, Institutional Advancement, Marketing and Research, and college catalogue Baltimore City Community college provides increased visibility of its programs to the world. N. Relationship to low productivity programs identified by the Commission: References: Cyber security and assurance has no relationship with any low productivity program at the college. 1. Legislation: (109th Congress), 2. S [109th]: National Defense Authorization Act for Fiscal Year 2006, govtrack. us/ congress/bill.xpd?bill= s Maryland Department of Business and Economic Development, "Base Realignment and Closure Study Assesses Impact on Maryland's Resources," (February 9, 2007). /www.choosemaryland.org/newsandevents/pressreleases/page html 3. Downtown Partnership, " Downtown Development Report: Downtown Baltimore Real Estate Overview," (June 2006). 4. US Census Bureau, Race and Ethnicity, M0202. Percent ofthe Total Population Who Are Black or African American Alone: 2005, 5. Conrad, Cecilia A., Final Report, African Americans and High-Tech Jobs: Trends and Disparities in 25 Cities, Joint Center Board of Governors, 2006.

17 BALTIMORE CITY COMMUNITY COLLEGE Response to the June 2, 2014 Request Notice Check No Item i: Evidence of Agreements: BCCC and JHU as Cyber Security Educational Centers for Baltimore The existing evidence of Intent is demonstrated through the Cyber Maryland publication dated September 26, 2011, that was accessed on October 7, 2011, per the attachment. Since this time, Baltimore City Community College has experienced administrative turnovers that have prevented finalizing the collaborate effort between John Hopkins University and BCCC. Under the direction of the Interim President of the College and Interim Vice President of Academic Affaits, the opportunity to finalize the working agreements between John Hopkins University and BCCC has been strengthened through the following partnerships. These partnerships were not possible prior to recent progress made within Academic Affairs. 1. Signing of the Cyber Pathways Across Maryland Consortium by President Anderson (see attachmej:jt) 2. Letter of Endorsement from the Year Up Baltimore Initiative (see attachment) 3. L<itter of partnership between BCCC'S Basic and Continuing Education division and Academic Affairs division that establishes pathways that recognizes previous learning. Item ii -Alignment with Current State Plan The Maryland Ready 2013"2017 State Plan for Postsecondary Education calls for six goals applicable to postsecondary programs and institutions across Maryland. Those goals are (a) quality and effectiveness, (b) access, affordability, and competition, (c) diversity, (c) Innovation, (d) economic growth and vitality, and (e) data use and distribution. The Cyber Security and Assurance Certificate aligns with the six goals In the following manner. The program's quality and effectiveness shows forth through the selected course offerings that provide a succinct set of critical skills identified by the region's employers and the April 2013 study published by the State of Maryland Integrated Worl<force Plan. The effectiveness Is evidenced by the efficient course sequencing that spreads content over a three-semester period. The strongest student effectiveness Is demonstrated by a seven credit hour summer session. Students are exposed to higher education through a manageable course demand coupled with the Pre 100 Student Success course. Managing six credit courses compared to a 12 or 15 credit schedule demonstrates effective planning and student development. If students start with the fall or spring semester, the.course load shifts by two credits from seven to nine credits per semester. Baltimore City Community College continues striving to provide the most accessible options for students in the Baltimore City and surrounding areas while remaining ranked as the most affordable postsecondary Institution in Maryland. BCCC tuition remains at $88 per credit for In-county and out-of-county students. This will clearly support local employers seeking to resklll workers at an affordable rate while retaining an affordable institution with access to city and county residents throughout Maryland. The State's diversity and Innovation goal for is also met through the outreach efforts achieved between the Baltimore Year Up and BCCC's partnering and endorsement. No other Maryland community college has the unique opportunity to combine its forces of academic programming, student support services, and externshlps as demonstrated by the most recent and highest certificate graduation rate In a given year. The 2014 BCCC graduation Included 97 Baltimore Year Up students that completed the course work aligned with the IT Basic Sl<llls Certificate. Adding the Cyber Security and Assurance Certificate only strengthens the Year Up students' marketable skills set and l<nowledge. More Importantly, the combined academic and life skills development further ensures progress toward degree meeting the Governor's 56% completion goal. The second Innovative opportunity specific to BCCC's Cyber Security and Assurance Certificate Is the pathway directly from 1

18 BALTIMORE CITY COMMUNITY COLLEGE Response to the Junl'l4,,4014 Request Notice Check No the BCED non-credit division to the credit division. The pathway under development meets the Plan's awarding credit of learning objective. The students are within the same operational system; therefore, easily transitions to a credit bearing program of study. Furthermore, the non-credit curricula speak to content specific skills whereas the credit certificate provides broader systems-level knowledge. Generating defined pathways between the two divisions solidifies the State Higher Education Plan's intent to rethink how a student Interested In a cyber-security career can earn his or her certificate and degree. The economic growth and vitality goal will be met by BCCC's partnered approach and pathways, which impact the learner and employer within a potential one-year period. Structuring the program's sequencing, pathways, and alignment with growing Industries further position's BCCC's student and Incumbent workers to secure and or advance his or employment status. This leads to preparing the region's,learners for a STEM related certificate and potential associate degree resulting from the certificate's structure and defined pathways. Accountability and data use have become a driving force associated with BCCC's student performance monitoring and academic decision making evidenced by annual assessment reports per program. A major contribution to this success has been the Implementation of the College's assessment database and reporting system known as Xltracs. The first year's effort focused on priming the data base and was followed by the second year of faculty training and program-level reporting. The system will be framed to pull performance data specific to the certificate's total credit hours and student performance. Generated reports will be shared among program coordinators, administrators, and faculty for analysis from a number of perspectives allowing collective academic change recommendation over the first three-year period. The system provides a three-year trend, which also aligns with making necessary academic changes In a timely manner. Such data practices further support the Middle States criteria for evidence. Item iii - Projected Employment Demands According to the April 2013 State of Maryland Integrated Workforce Plan, The Maryland Department of Labor, Licensing, and Regulation (DLLR) reported that future employment projections Indicate that just over 40% of all jobs In future Maryland's economy Will fall Into the "middle-skill" category. Currently, the middle-skill demand makes up the largest segment of jobs In the Maryland economy. The report further stated that there Is a deepening skills gap among our current workforce, and that Maryland will see grave shortages In critical occupations. Consistently throughout the DLLR publications, projected demand In middle-skill occupations Included the computer support specialist positions, which consists of occupational titles that align with BCCC's Cyber Security and Assurance certification proposal. The Integrated Workforce Plan projected continued State growth as Indicated In Table 1. Table 1: DLLR Emplo ment Projections Occupational Title Employment Openings Computer Support Specialists Network and Computer Systems Architects and Administrators Change Replacement Total 15,635 18,415 2,780 4,105 6,885 9, ,095 The Baltimore Region has seen strong growth In the IT sector in past decade resulting from the Baltimore Washington corridor, which Is one of the strongest IT markets In the country. The sector employs an approximate base of 68,000 worl<ers and added 18,600 jobs between 2002 and 2012 according to the Baltimore Regional Talent Development (BRTD} Pipeline Study The report also stated that the IT sector is projected to add 2,695 1,690 4,285 2

19 Lll.i l 7--~-:-.p.:; %...;;::::: -n-7 &. BALTIMORE CITY COMMUNITY COLLEGE Response to the Jllne 2, 2014 Request Notice Check No around 7,800 new jobs between 2012 and Baltimore City Community College and Its resldent.s are poised to significantly contribute the region's new future demands. The 2012M2020 hiring trends' report indicated that 2,272 IT Sector Employment opportunities within the Tech support exist. Further employment demand will occur through increased movement toward certifications held by an Individual. The *2013 (ISC/ Global Information Security Workforce Study reported that slightly more than 46 percent of survey respondents indicated that their organizations required certification. The report further disclosed that government-defense regulations are the driving force for certification; 47 percent of private sector employers viewed certification as an indicator of competency. Additional labor market findings revealed that the Certified Information Systems Security Practitioner (CISSP) is one of the highest-demand certifications for cybersecurlty professional, and students are able to complete course worl< to prepare for the CISSP through a community college program of study (BRTD Pipeline Study, 2013), of which BCCC graduates of the Cyber Security and Assurance Certificate qualify to take CISSP certification exam. During the next eight years, the sector Is expected to create approximately 4,500 new job opportunities for Baltimore Region workers, with an additional 8,000 jobs being created as a result of turnover and advancement within the Industry. Most new jobs created In this sector will be llnl<ed to the computer systems design and related services industry, where an expected 3,519 new jobs will be created. Again, the sector's stability Is attributable In part to the number of federal government agencies located In the Baltimore City region, Including Fort Meade, the National Security Agency, and the Social Security Administration, and the Aberdeen Proving Ground (BRTD Pipeline Study, 2013). *(IOS 2 ) was founded In 1989 as a not-for-profit global operating organization dedicated to providing education, certification, and peer-networking opportunities for information security professionals throughout their careers. The cited study was a Frost & Sullivan Market Study in partnership with Booz, Allen, and Hamilton and prepared by Michael Suby, Global Program Director. Retrieved from https:llwww.lsc2cares.org/uploadedfi/es!wwwlsc2caresorg!content/2013-/s02-giobal-lnformatlon-securlty Workforce-Study.pdf Item lv: Reasonableness of Program Duplication There are variations of the certificate curriculum being offered by four out of the 15 Maryland Community Colleges as outline In Table 2. The BCCC curriculum content, sequencing, and partnered pathways uniquely fills the program offering void for the Baltimore City residents and.employers. The closest proximity for earning a certification from a State community college Is Anne Arundel Community College at 40 miles from BCCC and as far away as Garrett College that is 285 miles from BCCC Liberty Heights campus. Table 2: Program Profiles that Include Related Cyber Security Certificate Comparison Maryland Community Colleges Related Certificate Program Name Anne Arundel Cyber Forensics, Networl< Security, Cyber Technology and Cyber Crime Garrett College Cyber Security Hagerstown Cyber Security-Network Security; Cyber Security-Advanced Networl< Montgomery College Cybersecurity Security; and Cyber Security- CISCO CCNA Prep 3

20 BALTIMORE CITY COMMUNITY COLLEGE Response to the ~une 2, 2014 Request Notice Check No Table 3: Program Profiles that do not Include a Related Cyber Security Certificate Maryland Community Colleges Allegheny Frederick Carroll Harford Baltimore County Howard Cecil Prince Georges College of S. Maryland Wor-Wic Chesapeake Source: Retrieved on 6~16~2014 from unlversities/index.asp Item v- Evidence and Discussion on Stackable Curricula Baltimore City Community College Is uniquely positioned to align with the Baltimore Year Up P~ofesslonal Training Corps Initiative. Year Up Is a one~year program that provides urban young adults ages wlth combined technical, professional skills, college credits, and Internship experiences with a corporation or the federal government. Additionally, the program Is housed by Baltimore City Community College and students have complete access to academic support systems and services. Ninety seven students earned the IT Basic Skills certificate this past academic year ( ). Providing the Cyber Certificate option for incoming fall2014 students will only strengthen the student's skills sets required by the local firms and government agencies, and expand career pathways within the information technology industries. A second unique opportunity for structuring the stackable options results from the joint collaboration between the Coileges' Academic Affairs and the Basic and Continuing Education divisions. Two years ago, under previous leadership, the progress toward developing articulation agreements was halted. The divisions, both under new leadership, are positioned to officially align faculty, curricula, and resources associated with the Cyber Security and Assurance Certificate. Table 4 illustrates the stackability and options potentially available for Incoming students whether part of the Year Up initiative, Basic Continuing Education (BCED) programs of study, general population seeking entry~level credentlallng, or employers seeking to res I<ill their current workforce. Additionally, displaced workers seeking federal Workforce Investment Act dollars easily qualify for the Cyber Security and Assurance certificate with Its one-year sequencing over three semesters. 4

Cybersecurity AAS Program

Cybersecurity AAS Program Cybersecurity AAS Program New Program Proposal State Submission Steve Buchholz, Dean of Accreditation and Advancement July 2015 TABLE OF CONTENTS Executive Summary... 2 Identification and Description of

More information

Wyoming Community College Commission Request for New, Pilot or Revised Degree or Certificate Program

Wyoming Community College Commission Request for New, Pilot or Revised Degree or Certificate Program Wyoming Community College Commission Request for New, Pilot or Revised Degree or Certificate Program A. College: Laramie County Community College B. Date submitted to WCCC: C. Program 1. Request for: X

More information

Coppin State University: Doctor of Nurse Practice

Coppin State University: Doctor of Nurse Practice BOARD OF REGENTS SUMMARY OF ITEM FOR ACTION, INFORMATION OR DISCUSSION TOPIC: COMMITTEE: Coppin State University: Doctor of Nurse Practice Education Policy DATE OF COMMITTEE MEETING: March 24, 2010 SUMMARY:

More information

Information Systems Technology & Cybersecurity Programs

Information Systems Technology & Cybersecurity Programs Information Systems Technology & Cybersecurity Programs Stay close. Go far. Computer Studies Faculty Trudy Gift Professor, Information Systems Technology 240-500-2214 tgift@hagestowncc.edu Carrie Pifer

More information

Wyoming Community College Commission Request for New, Pilot or Revised Degree or Certificate Program

Wyoming Community College Commission Request for New, Pilot or Revised Degree or Certificate Program Community Commission Request for New, Pilot or Revised Degree or Certificate Program A. : Laramie County Community B. Date submitted to WCCC: C. Program 1. Request for: X New Program Pilot Program Revised

More information

Computer Network Engineering

Computer Network Engineering 226 Computer Network Engineering Computer Network Engineering Degrees, Certificates and Awards Associate in Science: Computer Network Engineering Certificate of Achievement: Computer Network Engineering

More information

Principles of Information Assurance Syllabus

Principles of Information Assurance Syllabus Course Number: Pre-requisite: Career Cluster/Pathway: Career Major: Locations: Length: 8130 (OHLAP Approved) Fundamentals of Technology or equivalent industry certifications and/or work experience. Information

More information

Cyber threats are growing.

Cyber threats are growing. Cyber threats are growing. So are your career opportunities. Put the future of your cybersecurity career in the hands of a respected online education leader. Everything you need to succeed. Excelsior College

More information

Academic Programs INFORMATION TECHNOLOGY

Academic Programs INFORMATION TECHNOLOGY Academic Programs INFORMATION TECHNOLOGY INFORMATION TECHNOLOGY The Information Systems programs at Tidewater Community College cover the essential areas of study in information systems technology. The

More information

Cover/Signature Page Full Template

Cover/Signature Page Full Template Cover/Signature Page Full Template Institution Submitting Request: Utah Valley University Proposed Title: Graduate Certificate in Cyber Security School or Division or Location: College of Technology &

More information

College and Career Readiness and College Completion Act of 2013 Effective July 1, 2013

College and Career Readiness and College Completion Act of 2013 Effective July 1, 2013 College and Career Readiness and College Completion Act of 2013 Effective July 1, 2013 Regional Meetings May 2013 Bernard J. Sadusky, Ed.D. Executive Director K-12 REQUIREMENTS 2014-2015 school year: Beginning

More information

Information Systems Security Certificate Program

Information Systems Security Certificate Program Information Technologies Programs Information Systems Security Certificate Program Accelerate Your Career extension.uci.edu/infosec University of California, Irvine Extension s professional certificate

More information

Track 2: Introductory Track PREREQUISITE: BASIC COMPUTER EXPERIENCE

Track 2: Introductory Track PREREQUISITE: BASIC COMPUTER EXPERIENCE Anne Arundel Community College Tracks Anne Arundel Community College s computer technologies courses have been organized into 10 suggested tracks. The tracks are arranged to ensure that students have the

More information

UNIVERSITY SYSTEM OF MARYLAND INSTITUTION PROPOSAL FOR. Substantial Expansion/Major Modification. Cooperative Degree Program

UNIVERSITY SYSTEM OF MARYLAND INSTITUTION PROPOSAL FOR. Substantial Expansion/Major Modification. Cooperative Degree Program UNIVERSITY SYSTEM OF MARYLAND INSTITUTION PROPOSAL FOR New Instructional Program X Substantial Expansion/Major Modification Cooperative Degree Program Within Existing Resources, or Requiring New Resources

More information

Chapter 2 Planning, Resource Allocation, and Institutional Renewal

Chapter 2 Planning, Resource Allocation, and Institutional Renewal Chapter 2 Planning, Resource Allocation, and Institutional Renewal An institution conducts ongoing planning and resource allocation based on its mission and utilizes the results of its assessment activities

More information

TITLE 135 PROCEDURAL RULE WEST VIRGINIA COUNCIL FOR COMMUNITY AND TECHNICAL COLLEGE EDUCATION

TITLE 135 PROCEDURAL RULE WEST VIRGINIA COUNCIL FOR COMMUNITY AND TECHNICAL COLLEGE EDUCATION TITLE 135 PROCEDURAL RULE WEST VIRGINIA COUNCIL FOR COMMUNITY AND TECHNICAL COLLEGE EDUCATION SERIES 11 DEGREE DESIGNATION, GENERAL EDUCATION REQUIREMENTS, NEW PROGRAM APPROVAL, AND DISCONTINUANCE OF EXISTING

More information

Protecting Energy s Infrastructure and Beyond: Cybersecurity for the Smart Grid

Protecting Energy s Infrastructure and Beyond: Cybersecurity for the Smart Grid Protecting Energy s Infrastructure and Beyond: Cybersecurity for the Smart Grid Which is it? Cyber Security ~or~ Cybersecurity? Dr. Ernie Lara President Presenters Estrella Mountain Community College Dr.

More information

Associate s Degree Program

Associate s Degree Program Information Technology-Computer Network Systems Associate s Degree Program The ITT Technical Institutes offer a variety of career-focused curricula. This sheet helps describe the Associate s Degree program

More information

AGENDA ITEM SUMMARY. SUBJECT: Report on Programs Reviewed from January 1, 2013 to March 31, 2013

AGENDA ITEM SUMMARY. SUBJECT: Report on Programs Reviewed from January 1, 2013 to March 31, 2013 Martin O Malley Governor Anthony G. Brown Lt. Governor Anwer Hasan Chairperson Danette G. Howard Secretary AGENDA ITEM SUMMARY SUBJECT: Report on Programs Reviewed from January 1, 2013 to March 31, 2013

More information

[STAFF WORKING DRAFT]

[STAFF WORKING DRAFT] S:\LEGCNSL\LEXA\DOR\OI\PARTIAL\CyberWD..xml [STAFF WORKING DRAFT] JULY, 0 SECTION. TABLE OF CONTENTS. The table of contents of this Act is as follows: Sec.. Table of contents. Sec.. Definitions. TITLE

More information

Maryland Community College Affordability and Funding

Maryland Community College Affordability and Funding Maryland Community College Affordability and Funding Presentation to the House Ways and Means Committee Department of Legislative Services Office of Policy Analysis Annapolis, Maryland November 2, 2005

More information

State University System Florida Board of Governors Request to Establish Market Tuition Rates Regulation 7.001(15)

State University System Florida Board of Governors Request to Establish Market Tuition Rates Regulation 7.001(15) University: University of South Florida Proposed Market Tuition Program: Master s of Science in Cyber Security University Board of Trustees approval date: Date Proposed Implementation Date (month/year):

More information

Cisco Network Specialist CCNA

Cisco Network Specialist CCNA Web Development I CIST 1510 3 Scripting Technologies CIST 1520 3 Web Graphics I CIST 1530 3 Information Security Fundamentals CIST 1601 3 PHP Programming I CIST 2351 4 Web Technologies CIST 2510 3 Web

More information

Computer Information Technology

Computer Information Technology Computer Information Technology Business and Social Sciences Division, Room A44, (847) 543-04 The Computer Information Technology degree programs provide five specialty options with a common core of general

More information

students to complete their degree online. During the preliminary stage of included Art, Business, Computer Science, English, Government, History, and

students to complete their degree online. During the preliminary stage of included Art, Business, Computer Science, English, Government, History, and Texas Woman s University College of Arts and Sciences Bachelor of General Studies Program Undergraduate Program Review May 2012 I. PROGRAM REVIEW AND MISSION A. History Texas Woman s University has a proud

More information

BUSINESS EDUCATION and COMPUTER SCIENCE

BUSINESS EDUCATION and COMPUTER SCIENCE BUSINESS EDUCATION and COMPUTER SCIENCE MISSION The Office of Business Education supports schools in the development, implementation, and assessment of new courses and career completer programs, instructional

More information

Computer Network Engineering

Computer Network Engineering 208 Computer Network Engineering Degrees, Certificates and Awards Associate in Science: Certificate of Achievement: Skills Competency Award: Cisco Networking Associate Program Description The field of

More information

POLICY ISSUES IN BRIEF

POLICY ISSUES IN BRIEF ISSUES AND SOLUTIONS for Career and Technical Education in Virginia 2015 Educators and business representatives from across Virginia, along with 10 organizations representing Career and Technical Education

More information

AGENDA ITEM V J PROGRESS REPORT ON CONDITIONALLY APPROVED PROGRAMS BOSSIER PARISH COMMUNITY COLLEGE A.A.S. PROGRAMS IN CYBER TECHNOLOGY

AGENDA ITEM V J PROGRESS REPORT ON CONDITIONALLY APPROVED PROGRAMS BOSSIER PARISH COMMUNITY COLLEGE A.A.S. PROGRAMS IN CYBER TECHNOLOGY AGENDA ITEM V J PROGRESS REPORT ON CONDITIONALLY APPROVED PROGRAMS BOSSIER PARISH COMMUNITY COLLEGE A.A.S. PROGRAMS IN CYBER TECHNOLOGY AGENDA ITEM V J PROGRESS REPORT ON CONDITIONALLY APPROVED PROGRAMS

More information

BOARD OF HIGHER EDUCATION REQUEST FOR COMMITTEE AND BOARD ACTION

BOARD OF HIGHER EDUCATION REQUEST FOR COMMITTEE AND BOARD ACTION BOARD OF HIGHER EDUCATION REQUEST FOR COMMITTEE AND BOARD ACTION COMMITTEE: Academic Affairs NO: AAC 14-02 COMMITTEE DATE: October 22, 2013 BOARD DATE: October 29, 2013 APPLICATION OF SPRINGFIELD TECHNICAL

More information

INDIANAPOLIS, IN 2011 CATALOG Volume 78

INDIANAPOLIS, IN 2011 CATALOG Volume 78 TABLE OF CONTENTS CURRICULA 2 SCHOOL OF INFORMATION TECHNOLOGY 2 INFORMATION SYSTEMS AND CYBERSECURITY (RESIDENCE PROGRAM) 2 INFORMATION SYSTEMS AND CYBERSECURITY (ONLINE PROGRAM) 3 INFORMATION SYSTEMS

More information

u Date UNIVERSITY SYSTEM OF MARYLAND INSTITUTION PROPOSAL FOR

u Date UNIVERSITY SYSTEM OF MARYLAND INSTITUTION PROPOSAL FOR UNIVERSITY SYSTEM OF MARYLAND INSTITUTION PROPOSAL FOR X New Instructional Program Substantial Expansion/Major Modification Cooperative Degree Program X Within Existing Resources, or Requiring New Resources

More information

COMPUTER SCIENCE & INFORMATION TECHNOLOGY

COMPUTER SCIENCE & INFORMATION TECHNOLOGY ST. JOHNS RIVER STATE COLLEGE COMPUTER SCIENCE & INFORMATION TECHNOLOGY Computer Information Technology Computer Network Engineering Technology Computer Programming and Analysis Computer Programmer Computer

More information

Strengthening the Nexus: Government-Business- University cooperation and collaboration on security, training and research

Strengthening the Nexus: Government-Business- University cooperation and collaboration on security, training and research Strengthening the Nexus: Government-Business- University cooperation and collaboration on security, training and research November 1, 2011 Susan C. Aldridge, PhD University of Maryland University College

More information

Cyber Defense Operations Graduate Certificate

Cyber Defense Operations Graduate Certificate The SANS Technology Institute makes shorter groups of courses available to students who are unable to commit to a full master s degree program. These certificate programs will augment your skills, provide

More information

PROPOSAL FOR NEW INSTRUCTIONAL PROGRAM UNIVERSITY OF MARYLAND AT COLLEGE PARK, MARYLAND Change in Five Year Integrated Program

PROPOSAL FOR NEW INSTRUCTIONAL PROGRAM UNIVERSITY OF MARYLAND AT COLLEGE PARK, MARYLAND Change in Five Year Integrated Program Copied from http://www.provost.umd.edu/pcc_documents/pcc_proposal.htm PROPOSAL FOR NEW INSTRUCTIONAL PROGRAM UNIVERSITY OF MARYLAND AT COLLEGE PARK, MARYLAND Change in Five Year Integrated Program I. OVERVIEW

More information

167 th Air Wing Fast Track Cyber Program Blue Ridge Community and Technical College

167 th Air Wing Fast Track Cyber Program Blue Ridge Community and Technical College 167 th Air Wing Fast Track Cyber Program Blue Ridge Community and Technical College Information Security Certificate: Designed to introduce students to programming, security basics, network monitoring,

More information

Department of Urban Affairs, Social Science, and Social Work

Department of Urban Affairs, Social Science, and Social Work BA in Security Studies Curriculum Proposal Submitted by: Administration of Justice Program Department of Urban Affairs, Social Science, and Social Work A. The type of review requested 1. New program B.

More information

Computer Security and Investigations

Computer Security and Investigations Computer Security and Investigations Program Locations: Program Code: Coordinator: Credential: Peterborough CSI Blair Brown Ontario College Advanced Diploma Start Dates: September 06, 2016 January 09,

More information

BOARD OF GOVERNORS STATE UNIVERSITY SYSTEM OF FLORIDA NEW DOCTORAL DEGREE PROPOSAL STAFF ANALYSIS

BOARD OF GOVERNORS STATE UNIVERSITY SYSTEM OF FLORIDA NEW DOCTORAL DEGREE PROPOSAL STAFF ANALYSIS BOARD OF GOVERRS STATE UNIVERSITY SYSTEM OF FLORIDA NEW DOCTORAL DEGREE PROPOSAL STAFF ANALYSIS Program: Doctor of Social Work CIP Code: 51.1503 Institution: Florida Atlantic University Proposed Implementation

More information

University of Baltimore: Master of Science in Nonprofit Management and Social Entrepreneurship

University of Baltimore: Master of Science in Nonprofit Management and Social Entrepreneurship BOARD OF REGENTS SUMMARY OF ITEM FOR ACTION, INFORMATION OR DISCUSSION TOPIC: University of Baltimore: Master of Science in Nonprofit Management and Social Entrepreneurship COMMITTEE: Education Policy

More information

BOARD OF GOVERNORS STATE UNIVERSITY SYSTEM OF FLORIDA NEW DOCTORAL DEGREE PROPOSAL STAFF ANALYSIS

BOARD OF GOVERNORS STATE UNIVERSITY SYSTEM OF FLORIDA NEW DOCTORAL DEGREE PROPOSAL STAFF ANALYSIS BOARD OF GOVERNORS STATE UNIVERSITY SYSTEM OF FLORIDA NEW DOCTORAL DEGREE PROPOSAL STAFF ANALYSIS Program: Ph.D. in International Crime and Justice CIP Code: 43.0104 Institution: Florida International

More information

Allegany College of Maryland. 239 Cisco Networking 2 * Offered Fall semester and

Allegany College of Maryland. 239 Cisco Networking 2 * Offered Fall semester and Cybersecurity comes to Allegany College of Maryland 107 Intro to Cybersecurity Offered fall and spring semesters. This course provides a broad overview of computer security, ethical issues and information

More information

167 th Air Wing Fast Track Cyber Security Blue Ridge Community and Technical College

167 th Air Wing Fast Track Cyber Security Blue Ridge Community and Technical College 167 th Air Wing Fast Track Cyber Security Blue Ridge Community and Technical College Information Security Certificate: Designed to introduce students to programming, security basics, network monitoring,

More information

Morgan State University Cisco Regional Academy Update 09/25/06

Morgan State University Cisco Regional Academy Update 09/25/06 Morgan State University Cisco Regional Academy Update 09/25/06 The Cisco Networking Academy Program World-wide Program launched the Cisco Networking Academy Program about 10 years ago by Cisco Systems,

More information

An Accelerated Pathway to Careers in Cybersecurity for Transitioning Veterans. NICE Annual Conference November 2015

An Accelerated Pathway to Careers in Cybersecurity for Transitioning Veterans. NICE Annual Conference November 2015 An Accelerated Pathway to Careers in Cybersecurity for Transitioning Veterans NICE Annual Conference November 2015 Panelists David Brown, Director of CyberTalent at the SANS Institute, a new business unit

More information

ACADEMIC AFFAIRS COUNCIL ******************************************************************************

ACADEMIC AFFAIRS COUNCIL ****************************************************************************** ACADEMIC AFFAIRS COUNCIL AGENDA ITEM: 4.D.3 DATE: November 13, 2008 ****************************************************************************** SUBJECT: Intent to Plan DSU BS in Network & System Administration

More information

Computer Information Systems

Computer Information Systems Computer Information Systems Technology 93 Computer Information Systems Location: Patterson Campus - Bldg. E Program Information The Computer Information Systems department at is progressive and innovative

More information

2015 MACC Legislative Agenda Adopted by MACC Board of Directors October 29, 2014

2015 MACC Legislative Agenda Adopted by MACC Board of Directors October 29, 2014 2015 MACC Legislative Agenda Adopted by MACC Board of Directors October 29, 2014 Background Information It is apparent that Maryland is not rebounding from the recession as quickly as previously predicted.

More information

NEW UNITS OF INSTRUCTION, PUBLIC SERVICE, AND RESEARCH AT PUBLIC UNIVERSITIES

NEW UNITS OF INSTRUCTION, PUBLIC SERVICE, AND RESEARCH AT PUBLIC UNIVERSITIES Item #10 April 1, 2008 NEW UNITS OF INSTRUCTION, PUBLIC SERVICE, AND RESEARCH AT PUBLIC UNIVERSITIES Submitted for: Action. Summary: This item requests approval of seven degree programs and one center

More information

Chapter Three: Challenges and Opportunities

Chapter Three: Challenges and Opportunities Chapter Three: Challenges and Opportunities The preparation of Orange County Community College s Periodic Review Report occurs at a time when the College and New York State are experiencing an economic

More information

MARSHALL COMMUNITY AND TECHNICAL COLLEGE

MARSHALL COMMUNITY AND TECHNICAL COLLEGE MARSHALL COMMUNITY AND TECHNICAL COLLEGE POLICY # 4.00 - Program Approval SECTION 4.1. GENERAL 4.1.a. This policy defines the process for obtaining approval of new academic programs and discontinuance

More information

Course Bachelor of Information Technology majoring in Network Security or Data Infrastructure Engineering

Course Bachelor of Information Technology majoring in Network Security or Data Infrastructure Engineering Course Bachelor of Information Technology majoring in Network Security or Data Infrastructure Engineering Course Number HE20524 Location Meadowbank OVERVIEW OF SUBJECT REQUIREMENTS Note: This document

More information

MARYLAND 2011 For a strong economy, the skills gap must be closed.

MARYLAND 2011 For a strong economy, the skills gap must be closed. For a strong economy, the skills gap must be closed. 67% 45% 22% By 22, jobs requiring a career certificate or college degree Skills gap Too few students make it through college. MEMBER Maryland adults

More information

Bellevue University Cybersecurity Programs & Courses

Bellevue University Cybersecurity Programs & Courses Undergraduate Course List Core Courses: CYBR 250 Introduction to Cyber Threats, Technologies and Security CIS 311 Network Security CIS 312 Securing Access Control CIS 411 Assessments and Audits CYBR 320

More information

Software Applications Development Bachelor s Degree Program

Software Applications Development Bachelor s Degree Program Education for the future. The six schools of study at the ITT Technical Institutes 3 (School of Information Technology, School of Electronics Technology, School of Drafting and Design, School of Business,

More information

Cover/Signature Page Full Template

Cover/Signature Page Full Template Cover/Signature Page Full Template Institution Submitting Request: Utah Valley University Proposed Title: Certificate of Completion in Construction Management School or Division or Location: College of

More information

Cisco Networking Academy. Filling critical needs Certification and standards alignment Academy courses and content

Cisco Networking Academy. Filling critical needs Certification and standards alignment Academy courses and content Cisco Networking Academy Filling critical needs Certification and standards alignment Academy courses and content What is networking? Gathering and presenting data Analyzing and creating conclusions Creating

More information

MHEC Program Inventory for CyberSecurity and Related Programs 6/16/2011

MHEC Program Inventory for CyberSecurity and Related Programs 6/16/2011 100304 INFO SYS TECH:SIMULATION & DIGITAL ENTER Hagerstown Community College Lower Division Certificate 100304 COMPUTER GAMING AND SIMULATION Montgomery College-All Campuses Associate Degree 100304 Count

More information

FORMAL PROPOSAL FOR A NEW DEGREE PROGRAM and DISTANCE LEARNING DELIVERY (Program is New and Institution Currently Offers Distance Learning Programs)

FORMAL PROPOSAL FOR A NEW DEGREE PROGRAM and DISTANCE LEARNING DELIVERY (Program is New and Institution Currently Offers Distance Learning Programs) FORMAL PROPOSAL FOR A NEW DEGREE PROGRAM and DISTANCE LEARNING DELIVERY (Program is New and Institution Currently Offers Distance Learning Programs) Form 3A Institution: Georgia Southwestern State University

More information

FY 2009 Master s Degrees Programs at Predominantly Black Institutions Abstracts

FY 2009 Master s Degrees Programs at Predominantly Black Institutions Abstracts FY 2009 Master s Degrees Programs at Predominantly Black Institutions Abstracts PR Award Number P382D090001 Long Island University Director's Name: Dr. Edward Donahue New York Phone Number: (718) 488-1664

More information

At Meeting No. 487 held on 26 January 2015, the Graduate Council approved the attached proposal that is now submitted to the Faculty Senate.

At Meeting No. 487 held on 26 January 2015, the Graduate Council approved the attached proposal that is now submitted to the Faculty Senate. THE GRADUATE SCHOOL - UNIVERSITY OF RHODE ISLAND NEW PROGRAM REPORT FROM THE GRADUATE COUNCIL TO THE FACULTY SENATE CURRICULAR REPORT #2014-15-8A; 26 January 2015 At Meeting No. 487 held on 26 January

More information

Intent to Plan for Master of Science in Nursing

Intent to Plan for Master of Science in Nursing Shepherd University Board of Governors October 12, 2006 Agenda Item No. 6 Intent to Plan for Master of Science in Nursing Board of Governors approval is sought to plan a Master of Science in Nursing (MSN)

More information

Middle Class Economics: Cybersecurity Updated August 7, 2015

Middle Class Economics: Cybersecurity Updated August 7, 2015 Middle Class Economics: Cybersecurity Updated August 7, 2015 The President's 2016 Budget is designed to bring middle class economics into the 21st Century. This Budget shows what we can do if we invest

More information

Information Technology Division

Information Technology Division 151 xxx Introduction to IT Division The Higher Colleges of Technology offers one of UAEÕ s largest selections of Information Technology programs. Students study Diploma, Higher Diploma and Bachelor Degree

More information

University of Maryland University College: Bachelor of Science in Health Services Management

University of Maryland University College: Bachelor of Science in Health Services Management BOARD OF REGENTS SUMMARY OF ITEM FOR ACTION, INFORMATION OR DISCUSSION TOPIC: University of Maryland University College: Bachelor of Science in Health Services Management COMMITTEE: Education Policy and

More information

CYBER SECURITY TRAINING SAFE AND SECURE

CYBER SECURITY TRAINING SAFE AND SECURE CYBER SECURITY TRAINING KEEPING YOU SAFE AND SECURE Experts in Cyber Security training. Hardly a day goes by without a cyber attack being reported. With this ever-increasing threat there is a growing need

More information

POSITION SPECIFICATION. President. Northern Virginia Community College. Preamble

POSITION SPECIFICATION. President. Northern Virginia Community College. Preamble POSITION SPECIFICATION President Northern Virginia Community College Preamble The Virginia Community College System provides programs and courses of instruction, through the associate degree level, encompassing

More information

CONNECTING CAREER AND TECHNICAL EDUCATION WITH THE COLLEGE AND CAREER READINESS AGENDA

CONNECTING CAREER AND TECHNICAL EDUCATION WITH THE COLLEGE AND CAREER READINESS AGENDA Introduction Policymakers and educators around the nation are wrestling with an important challenge how to raise expectations for high school achievement, while increasing relevance and engagement in learning

More information

Kerry Kidwell-Slak and Kate Phelps Assistant Directors, Professional Practice UMBC Shriver Center

Kerry Kidwell-Slak and Kate Phelps Assistant Directors, Professional Practice UMBC Shriver Center Kerry Kidwell-Slak and Kate Phelps Assistant Directors, Professional Practice UMBC Shriver Center } Science: Biology, Chemistry, Biochemistry, Environmental, Physics, Psychology, Atmospheric Sciences

More information

Staff Analysis Checklist Request to Offer a New Degree Program. Board of Governors, State University System of Florida

Staff Analysis Checklist Request to Offer a New Degree Program. Board of Governors, State University System of Florida Staff Analysis Checklist Request to Offer a New Degree Program Board of Governors, State University System of Florida University Submitting Proposal Initial Review Date Proposed Implementation Term Last

More information

MSc Cyber Security UKPASS P052286. Course 1 Year Full-Time, 2-3 Years Part-Time

MSc Cyber Security UKPASS P052286. Course 1 Year Full-Time, 2-3 Years Part-Time MSc Cyber Security International Students Can Apply UKPASS P052286 Code: Course 1 Year Full-Time, 2-3 Years Part-Time Length: Start Dates: September 2015, January 2016, September 2016, January 2017 Department:Department

More information

BOARD OF TRUSTEES MINNESOTA STATE COLLEGES AND UNIVERSITIES BOARD ACTION. Fiscal Years 2010-2011 Biennial Operating Budget

BOARD OF TRUSTEES MINNESOTA STATE COLLEGES AND UNIVERSITIES BOARD ACTION. Fiscal Years 2010-2011 Biennial Operating Budget BOARD OF TRUSTEES MINNESOTA STATE COLLEGES AND UNIVERSITIES BOARD ACTION Fiscal Years 2010-2011 Biennial Operating Budget BACKGROUND Every other year, as part of the state s operating budget process, the

More information

Program Award Credits Articulation Agreements

Program Award Credits Articulation Agreements Program Award Credits Articulation Agreements Computer Science Transfer Associate of Science Degree, A.S. 60 University of Maryland University College B..S. in Computer Science University System of Maryland

More information

EDUCATION FOR THE FUTURE. www.itt-tech.edu

EDUCATION FOR THE FUTURE. www.itt-tech.edu EDUCATION FOR THE FUTURE www.itt-tech.edu THE MISSION OF THE ITT TECHNICAL INSTITUTE The THE ITT MISSION Technical of ITT Educational Institute is Services, an institution Inc., and ITT of Technical higher

More information

Cybersecurity Industry Brief

Cybersecurity Industry Brief 13 Cybersecurity Industry Sector Trends report_layout 1 7/23/13 11:49 AM Page 1 Cybersecurity Industry Brief 13 Cybersecurity Industry Sector Trends report_layout 1 7/23/13 11:49 AM Page 1 About the Montgomery

More information

Deploying Firewalls Throughout Your Organization

Deploying Firewalls Throughout Your Organization Deploying Firewalls Throughout Your Organization Avoiding break-ins requires firewall filtering at multiple external and internal network perimeters. Firewalls have long provided the first line of defense

More information

Department of Legislative Services Maryland General Assembly 2013 Session

Department of Legislative Services Maryland General Assembly 2013 Session Senate Bill 153 Department of Legislative Services Maryland General Assembly 2013 Session FISCAL AND POLICY NOTE Revised (Senator Currie) Education, Health, and Environmental Affairs SB 153 Appropriations

More information

NGA Paper. Act and Adjust: A Call to Action for Governors. for cybersecurity;

NGA Paper. Act and Adjust: A Call to Action for Governors. for cybersecurity; NGA Paper Act and Adjust: A Call to Action for Governors for Cybersecurity challenges facing the nation. Although implementing policies and practices that will make state systems and data more secure will

More information

Managing IT Security with Penetration Testing

Managing IT Security with Penetration Testing Managing IT Security with Penetration Testing Introduction Adequately protecting an organization s information assets is a business imperative one that requires a comprehensive, structured approach to

More information

For more information, please contact Anne Arundel Community College s Center for Workforce Solutions at 410-777-2732.

For more information, please contact Anne Arundel Community College s Center for Workforce Solutions at 410-777-2732. Anne Arundel Community College is an academic partner in the Pathways to Cybersecurity Careers Consortium in the State of Maryland. The Pathways to Cybersecurity Consortium consists of workforce, academic,

More information

Brandman University. School of CCNA

Brandman University. School of CCNA Information Technology Certifications CCNA The Cisco CCNA Training Package (ICND: Parts 1 and 2) includes expert instructor-led training modules with customized presentations, practice exam simulators

More information

Board of Governors, State University System of Florida

Board of Governors, State University System of Florida Board of Governors, State University System of Florida Request to Offer a New Degree Program (Please do not revise this proposal format without prior approval from Board staff) University Submitting Proposal

More information

BACCALAUREATE AND MASTER S DEGREES LETTER OF INTENT

BACCALAUREATE AND MASTER S DEGREES LETTER OF INTENT BACCALAUREATE AND MASTER S DEGREES Institution: Fort Valley State University NEW PROPOSAL FORMS (Submit One Copy) LETTER OF INTENT Institutional Contact (President or Vice President for Academic Affairs):

More information

Networking and Information Security

Networking and Information Security Networking and Information Security College of Engineering & Information Sciences Careers That Fit You Build a career around your interests and talents Do you like figuring out how things work? Solving

More information

MEETING THE NATION S INFORMATION SECURITY CHALLENGES

MEETING THE NATION S INFORMATION SECURITY CHALLENGES MEETING THE NATION S INFORMATION SECURITY CHALLENGES TO ADDRESS SKILLS AND WORKFORCE SHORTAGES IN THE INFORMATION SECURITY INDUSTRY, THE NATIONAL SECURITY AGENCY AND THE DEPARTMENT OF HOMELAND SECURITY

More information

Computer Information Technology

Computer Information Technology Contact: Computer Information Technology Department 617-228-2370 itcareers@bhcc.mass.edu bhcc.mass.edu/citprograms Bunker Hill Community College Charlestown Campus, Room B101E 250 New Rutherford Avenue

More information

Access FedVTE online at: fedvte.usalearning.gov

Access FedVTE online at: fedvte.usalearning.gov FALL 2015 Access FedVTE online at: fedvte.usalearning.gov If you need any assistance please contact the FedVTE Help Desk her e or email the Help Desk at support@usalearning.net. To speak with a Help Desk

More information

FedVTE Training Catalog SPRING 2015. advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov

FedVTE Training Catalog SPRING 2015. advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov FedVTE Training Catalog SPRING 2015 advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov If you need any assistance please contact the FedVTE Help Desk here or email the

More information

Network Engineering Technology

Network Engineering Technology Network Engineering Technology Network Engineering Technology with Specializations in: Cisco Routing and Switching Microsoft Systems Administration Cyber Security and Digital Forensics Associate in Science

More information

Cisco Security Optimization Service

Cisco Security Optimization Service Cisco Security Optimization Service Proactively strengthen your network to better respond to evolving security threats and planned and unplanned events. Service Overview Optimize Your Network for Borderless

More information

Apply today: strayer.edu/apply SCHOOL OF INFORMATION SYSTEMS AND TECHNOLOGY MASTER OF SCIENCE IN INFORMATION SYSTEMS RECOGNIZED MARKETABLE FLEXIBLE

Apply today: strayer.edu/apply SCHOOL OF INFORMATION SYSTEMS AND TECHNOLOGY MASTER OF SCIENCE IN INFORMATION SYSTEMS RECOGNIZED MARKETABLE FLEXIBLE RECOGNIZED PROVEN RESPECTED MARKETABLE FLEXIBLE Fernanda Tapia Student SCHOOL OF INFORMATION SYSTEMS AND TECHNOLOGY MASTER OF SCIENCE IN INFORMATION SYSTEMS Apply today: strayer.edu/apply FLEXIBLE / AFFORDABLE

More information

Information Technology

Information Technology your MISD guide to careers in Information Technology Computer Support Specialist Geographer Communications Analyst Multimedia Producer Data Analysts Administrator Computer Analyst Web Developer Software

More information

FORMAL PROPOSAL FOR A NEW DEGREE PROGRAM and DISTANCE LEARNING DELIVERY (Program is New and Institution Currently Offers Distance Learning Programs)

FORMAL PROPOSAL FOR A NEW DEGREE PROGRAM and DISTANCE LEARNING DELIVERY (Program is New and Institution Currently Offers Distance Learning Programs) FORMAL PROPOSAL FOR A NEW DEGREE PROGRAM and DISTANCE LEARNING DELIVERY (Program is New and Institution Currently Offers Distance Learning Programs) Institution: Approval by President or Vice President

More information

Apply today: strayer.edu/apply SCHOOL OF INFORMATION SYSTEMS AND TECHNOLOGY BACHELOR OF SCIENCE IN INFORMATION TECHNOLOGY RECOGNIZED MARKETABLE

Apply today: strayer.edu/apply SCHOOL OF INFORMATION SYSTEMS AND TECHNOLOGY BACHELOR OF SCIENCE IN INFORMATION TECHNOLOGY RECOGNIZED MARKETABLE RECOGNIZED PROVEN RESPECTED MARKETABLE FLEXIBLE Bryan Rolle Student SCHOOL OF INFORMATION SYSTEMS AND TECHNOLOGY BACHELOR OF SCIENCE IN INFORMATION TECHNOLOGY Apply today: strayer.edu/apply FLEXIBLE /

More information

ENROLLMENT PROJECTIONS MARYLAND PUBLIC COLLEGES AND UNIVERSITIES. June 2013 (Updated 7/19/2013)

ENROLLMENT PROJECTIONS MARYLAND PUBLIC COLLEGES AND UNIVERSITIES. June 2013 (Updated 7/19/2013) ENROLLMENT PROJECTIONS 2013 2022 MARYLAND PUBLIC COLLEGES AND UNIVERSITIES June 2013 (Updated 7/19/2013) MARYLAND HIGHER EDUCATION COMMISSION 6 North Liberty Street 10 th Floor Baltimore, MD 21201 Maryland

More information