Goal. Vision. CAE 2Y Program Eligibility and Summary

Size: px
Start display at page:

Download "Goal. Vision. CAE 2Y Program Eligibility and Summary"

Transcription

1 Goal National Centers of Academic Excellence in Information Assurance/Cyber Defense for Two-Year Education (CAE2Y) Program Criteria for Measurement Jointly Sponsored by the National Security Agency (NSA) and the Department of Homeland Security (DHS) The goal of the CAE IA/CD for Two-Year Education program is to proactively increase our understanding of robust IA/CD technology, policy and practices that will enable our Nation to effectively prevent and respond to a catastrophic cyber event. This program will contribute significantly to the advancement of state-of-the-art IA/CD knowledge and practice. Vision The vision for the CAE2Y program is to: 1. Provide programs that commit to excellence in the field of Information Assurance and Cyber Defense education at community and technical college and government training institutions. 2. Provide innovative, comprehensive and multidisciplinary education and training in the IA/CD field. 3. Strengthen the cybersecurity workforce by providing IA/CD education and training through degree and certification programs at community and technical colleges and government training centers. 4. Build an effective education pipeline model with K 12 schools to encourage students at an early age to enter IA/CD fields of study. 5. Provide the Nation with a pipeline of qualified students poised to become the future skilled technical workforce. 6. Continuously improve the quality of IA/CD programs, curriculum, faculty, students and other institutions. CAE 2Y Program Eligibility and Summary The CAE2Y Program is open to current regionally accredited two-year community colleges, technical schools, state or federally endorsed IA/Cybersecurity training centers or U.S. Government IA/Cybersecurity training centers. All institutions must hold current regional accreditation as outlined by the Department of Education (http://ope.ed.gov/accreditation). Overall CAE2Y requirements are: Demonstration of program outreach, student development, IA/CD Center establishment and maintenance, IA/CD faculty, and student curriculum path. Successful mapping of the institution s curriculum to the two-year core Knowledge Units (KUs). Completion of these requirements will recognize the institution with designation at the institution level as a NSA/DHS National Center of Academic Excellence for Information Assurance/Cyber Defense for Two-Year Education (CAE2Y). Institutions shall demonstrate that students can successfully complete the CAE2Y course of study and receive recognition on a transcript, diploma, etc. CAE 2Y Criteria Page 1 September 2013

2 Focus Area (Optional): 2014 NSA/DHS National CAE 2Y Criteria All CAEs have the option to apply for one or more CAE IA/CD Focus Area designations. The criteria include: Successful mapping of the institution s curriculum to all of the KUs identified in the Focus Area. Demonstration that a student can reasonably complete the necessary course of study to include all KUs identified in the Focus Area. The institution must provide student certificates to those that complete the FA course of study. The certificates must clearly identify the specific Focus Area achieved. Knowledge Units: The KU mapping will require the institution to address how it meets each Core and chosen Optional KU. An institution has many ways to demonstrate how a program meets/fulfills a KU. Some examples include: course syllabus, course outline, student assignments, lab assignment, modules in a course/collection of courses, and certifications (CCNA, CISSP, etc.). Required information will include: course syllabi, course outlines and justifications showing where and how the KUs are addressed in the curriculum. One course may fulfill the requirements of multiple KUs, and multiple courses may fulfill the requirements of a single KU. Program Evaluation: Institutions will be evaluated by CAE Program staff with assistance from Subject Matter Experts. The last phase of the criteria may be an on-site evaluation focused on course content, course relevance, laboratory facilities, and faculty involvement. CAE2Y Designation: Successful institutions will be designated as a NSA/DHS National Center of Academic Excellence for Information Assurance/Cyber Defense for Two-Year Education (CAE2Y). Due to the requirement to have all institutions designated by 2014, designation periods granted during this designation cycle will range from three to six years from the institution s application. This will allow a more distributed range of re-applications in the future. Subsequent cycles will revert to a five-year cycle. The initial designation period will be dependent upon timing of the application, with allowances for changes by the program office. Future criteria (including KUs and FAs) will continue to be reviewed annually and strengthened as appropriate to keep pace with the evolving nature of IA/CD. Designation as a CAE2Y does not carry a commitment of funding from NSA or DHS. CAE 2Y Criteria Page 2 September 2013

3 CAE2Y Program requirements: 2014 NSA/DHS National CAE 2Y Criteria 1. Outreach/Collaboration. The institution must demonstrate how IA/CD is extended beyond the normal boundaries of the Institution. Overall Point value: 16 points minimum/32 points maximum a. Shared Curriculum (e.g., IA/Cybersecurity teaching materials provided to technical schools, universities, community colleges, K-12 schools, etc.) or shared faculty (e.g., Faculty on IA/Cybersecurity curriculum development committee for more than one institution) b. Evidence that the program is providing students with access to IA/Cybersecurity practitioners (e.g., Guest lecturers working in IA/Cybersecurity industry, government, faculty exchange program with industry and/or government, etc.) c. Evidence of Articulation/Transfer agreements with 4 year institutions offering a concentration or IA/Cybersecurity degrees/areas of study/track or certificates d. Evidence of agreements with high schools to facilitate awareness and training for faculty/administration/students Point Value: 2 points per school/6 points maximum e. Sponsorship/participation in Cybersecurity/IA competitions Point Value: 2 points each/6 points maximum f. Community Outreach. Sponsor community events such as cybersecurity education for K-12, adult education centers, senior groups, camps, summer programs, state homeland security, first responders and industry (e.g., Schools in a target region are encouraged to participate in cybersecurity education events, like community computer diagnostic check-ups and IA awareness days) CAE 2Y Criteria Page 3 September 2013

4 2014 NSA/DHS National CAE 2Y Criteria 2. Center for IA/CD Education. The institution must have a formal organization for use as a resource for faculty and students. The Center should provide program guidance, general IA/CD information and promote collaboration and interaction with other students, faculty, and programs. The Center and website must be operational, dynamic and current. (For the purpose of this document, the word Center is used in a general sense). Overall Point Value: 14 points minimum/20 points maximum a. Show formal documentation of the designation of the IA/CD/Cybersecurity Center and provide a hyperlink to the Center. Point Value: 5 points required b. Demonstrate the Center website is operational, dynamic and current: contains up-to-date links to key IA/CD resources such as other academic institutions, government sites, conferences, workshops, cyber competitions, IA/CD news, center POCs, IA/CD courses, etc. The website must be easy to find and easily accessible. Demonstrate how current and potential students are informed of the website. Point Value: 5 points required c. Provide evidence that subscription-based IA/CD journals are available for student and faculty use on the website. Demonstrate that hyperlinks to key IA/CD websites are provided in course syllabus and/or professors webpage or provided to students during class instruction. /2 points required d. Demonstrate that physical and/or virtual IA/CD labs and equipment are available and used for hands-on learning (provide examples of student lab projects/exercises/case studies syllabus, links to assignments, etc.). /2 points required CAE 2Y Criteria Page 4 September 2013

5 2014 NSA/DHS National CAE 2Y Criteria 3. IA/CD Student Development. The program provides development opportunities for students that lead to a two year associate s degree or a certificate in an IA/CD discipline. Overall Point Value: 12 points minimum /31 points maximum a. Provide evidence of IA/Cybersecurity degrees/areas of study/track or certificates (e.g., List of IA/Cybersecurity Associates degrees and/or certificates in IA/Cybersecurity curriculum as listed on the institution s website or catalog) b. Demonstrate how the institution provides applied training to students (e.g., Courses containing hands-on or lab training) Point Value: 2 points per course/6 points maximum c. Provide evidence that students who participate sufficiently in the IA/CD curriculum (i.e., take and pass courses that satisfy all of the mandatory KU requirements) will receive a certificate, or a reference to completing the CAE2Y course of study on their transcript and/or degree. Provide evidence in the form of a letter, transcript notation, and/or degree (may be redacted) Point Value: 10 points/students are taking the CAE2Y curriculum path 5 points/students have an opportunity to take the IA/CD path d. Provide evidence that students who participate sufficiently in the IA/CD curriculum for a Focus Area (i.e., take and pass courses that satisfy all of the mandatory KU requirements for that Focus Area) will receive certificate, or a reference to a focus area on their transcript and/or degree (may be redacted). Point Value: 10 points/students are taking the IA/CD curriculum path 5 points/students have the opportunity to take the IA/CD path 4. IA/CD as a Multidisciplinary Science. The institution demonstrates that IA/CD is not treated as a separate discipline, but as a multidisciplinary science with elements of IA/CD knowledge incorporated into various disciplines. Overall Point Value: 10 points minimum/15 points maximum a. Evidence that IA/CD is taught as modules in existing non-ia courses and that nontechnical/non-ia students are being introduced to IA/CD (e.g., business courses teaching Information Security modules, health courses incorporating HIPAA regulations, etc.) b. Evidence that IA/CD programs (certificate and/or degree programs) require non-technical courses of study (e.g., ethics, policy, and business) c. Availability of non-credit/credit professional development courses in IA/CD (e.g., First responders, K-12 teachers) CAE 2Y Criteria Page 5 September 2013

6 2014 NSA/DHS National CAE 2Y Criteria 5. Practice of IA/Cybersecurity Encouraged Throughout the Institution: The academic program must demonstrate how the institution encourages the practice of IA, not merely that it teaches IA. Overall Point Value: 8 points minimum/20 points maximum a. Provide a link to the institution s IA security plan and/or policies b. Provide evidence of institution designated Information System Security Officer or equivalent. Provide name, position and job description for person or persons responsible for information security. c. Provide evidence of the implementation of the institution IA security plan to encourage IA awareness throughout the campus (e.g., Students, faculty and staff are required to take computer based training or on-line tutorials; a security banner statement present on institution computers; security related help screens are available; institution-wide seminars are held on the importance of IA, etc - 2pts awarded per item). Point Value: 2 points minimum (required)/10 points maximum 6. IA/CD Faculty. Faculty assigned specifically to teach and/or develop IA/CD courses/curriculum/modules. Overall Point Value: 11 points minimum/15 points maximum a. Identify, by name, faculty member with overall responsibility for the IA/Cybersecurity instructional program. Provide evidence, i.e., verification letter and/or job description. Provide link to biography or CV. b. Identify, by name, additional IA/Cybersecurity faculty members teaching IA/Cybersecurity courses within the department that sponsors IA/Cybersecurity programs. Provide link to biography or CV. Point Value: 1 point per faculty/5 points maximum c. Provide evidence in the form of curriculum vitae supporting the faculty member s qualifications to teach IA/Cybersecurity. At least one IA/Cybersecurity faculty member will be expected to be professionally certified with at least one of the IA/Cybersecurity certifications listed under DOD Directive 8570, such as CISSP, CISA, CISM, CEH, etc. (see attached DoD 8570 list). A minimum of 15 hrs of graduate coursework and/or appropriate experience in a related field could be considered in lieu of a professional certification. Note: Can be same individual as 5a/b. CAE 2Y Criteria Page 6 September 2013

Goal. Vision. CAE IA/CD Program Eligibility and Summary

Goal. Vision. CAE IA/CD Program Eligibility and Summary Goal Vision National Centers of Academic Excellence in Information Assurance/Cyber Defense (IA/CD) Education Program Criteria for Measurement Jointly Sponsored by the National Security Agency (NSA) and

More information

each standard. (You will be able to add/update this information just before formal submission after the Prepare for review button is selected.

each standard. (You will be able to add/update this information just before formal submission after the Prepare for review button is selected. National Centers of Academic Excellence for Information Assurance Education and Training Program for 2 Year Institutions (CAE-2Y) Criteria for Measurement July 2011 The National Security Agency (NSA) and

More information

Sabbatical Leave Application

Sabbatical Leave Application LOS RIOS COMMUNITY COLLEGE DISTRICT Sabbatical Leave Application Name Lance Parks College: CRC Present Assignment: CIS Type of Leave Requested: A. Type A One Semester: Fall Spring X Entire Year Will you

More information

CAE Program Updates and Support

CAE Program Updates and Support May 29, 2015 CAE Program Updates and Support National CyberWatch Center Prince George s Community College Room 129B 301 Largo Road Largo, MD 20774 www.nationalcyberwatch.org 2 Webinar Protocol :: Mute

More information

MEETING THE NATION S INFORMATION SECURITY CHALLENGES

MEETING THE NATION S INFORMATION SECURITY CHALLENGES MEETING THE NATION S INFORMATION SECURITY CHALLENGES TO ADDRESS SKILLS AND WORKFORCE SHORTAGES IN THE INFORMATION SECURITY INDUSTRY, THE NATIONAL SECURITY AGENCY AND THE DEPARTMENT OF HOMELAND SECURITY

More information

Cyber Security at NSU

Cyber Security at NSU Cyber Security at NSU Aurelia T. Williams, Ph.D. Chair, Department of Computer Science Associate Professor of Computer Science June 9, 2015 Background Undergraduate computer science degree program began

More information

Certifications and Standards in Academia. Dr. Jane LeClair, Chief Operating Officer National Cybersecurity Institute

Certifications and Standards in Academia. Dr. Jane LeClair, Chief Operating Officer National Cybersecurity Institute Certifications and Standards in Academia Dr. Jane LeClair, Chief Operating Officer National Cybersecurity Institute Accreditation What is it? Why is it important? How is it attained? The National Centers

More information

Meeting the CAE IA/CD Knowledge Units Requirements for the Polytechnic University of Puerto Rico

Meeting the CAE IA/CD Knowledge Units Requirements for the Polytechnic University of Puerto Rico Meeting the CAE IA/CD Knowledge Units Requirements for the Polytechnic University of Puerto Rico Diana M. Darabi, Master of Computer Science, IT Management and Information Assurance, Alfredo Cruz, PhD

More information

Protecting Energy s Infrastructure and Beyond: Cybersecurity for the Smart Grid

Protecting Energy s Infrastructure and Beyond: Cybersecurity for the Smart Grid Protecting Energy s Infrastructure and Beyond: Cybersecurity for the Smart Grid Which is it? Cyber Security ~or~ Cybersecurity? Dr. Ernie Lara President Presenters Estrella Mountain Community College Dr.

More information

In Response to Section 942 of the National Defense Authorization Act for Fiscal Year 2014 (Public Law 113-66) Terry Halvorsen DoD CIO

In Response to Section 942 of the National Defense Authorization Act for Fiscal Year 2014 (Public Law 113-66) Terry Halvorsen DoD CIO A Department of Defense Report on the National Security Agency and Department of Homeland Security Program for the National Centers of Academic Excellence in Information Assurance Education Matters In

More information

TURNING THE RISING TIDE OF CYBERSECURITY THREATS

TURNING THE RISING TIDE OF CYBERSECURITY THREATS TURNING THE RISING TIDE OF CYBERSECURITY THREATS With cyber attacks on the rise, there s a growing need for digital forensic professionals with the knowledge and skills to investigate technology crimes

More information

UNM Information Assurance Scholarship for Service (SFS) Program

UNM Information Assurance Scholarship for Service (SFS) Program UNM Information Assurance Scholarship for Service (SFS) Program What is Information Assurance? Committee on National Security Systems (CNSS) defines information assurance (IA): Measures that protect and

More information

Program Contact Information (name, title, telephone number, and email address)

Program Contact Information (name, title, telephone number, and email address) Name of Institution The Citadel Name of Proposed Center/Institute Center for Cybersecurity Education and Research Proposed Date of Implementation January 1, 2016 Site Department of Mathematics and Computer

More information

The following institutions are partners in the operation of CSEC:

The following institutions are partners in the operation of CSEC: 1. IA Partnerships: Extending IA beyond the normal boundaries of the College/Institution and bringing current IA practitioners into the IA Center. Provide evidence of partnerships in IA education with

More information

NSA/DHS Centers of Academic Excellence for Information Assurance/Cyber Defense

NSA/DHS Centers of Academic Excellence for Information Assurance/Cyber Defense NSA/DHS Centers of Academic Excellence for Information Assurance/Cyber Defense Cyber Investigations Data Management Systems Security Data Security Analysis Digital Forensics Health Care Security Industrial

More information

Programme Review. Bachelor of Science (Honours) in Computing in Information Security and Digital Forensics BN120. Department of Informatics

Programme Review. Bachelor of Science (Honours) in Computing in Information Security and Digital Forensics BN120. Department of Informatics Programme Review Bachelor of Science (Honours) in Computing in Information Security and Digital Forensics BN120 Department of Informatics Peer-review panel report 7 th June 2013 Table of contents Executive

More information

Cybersecurity Definitions and Academic Landscape

Cybersecurity Definitions and Academic Landscape Cybersecurity Definitions and Academic Landscape Balkrishnan Dasarathy, PhD Program Director, Information Assurance Graduate School University of Maryland University College (UMUC) Email: Balakrishnan.Dasarathy@umuc.edu

More information

2015 Webinar Series: NCL for the Classroom

2015 Webinar Series: NCL for the Classroom 2015 Webinar Series: NCL for the Classroom National CyberWatch Center Prince George s Community College Room 129B 301 Largo Road Largo, MD 20774 www.nationalcyberwatch.org Webinar Protocol :: Mute your

More information

Becoming a Cyber Professional: A Discussion with Recent Graduates

Becoming a Cyber Professional: A Discussion with Recent Graduates Becoming a Cyber Professional: A Discussion with Recent Graduates Date: November 6, 2014 MICHAEL ROCHA Education B.S. Administration, Concentration in Cyber Security California State University, San Bernardino

More information

NSA/DHS National Centers of Academic Excellence in Information Assurance/Cyber Defense 2014 List of Knowledge Units and Focus Areas

NSA/DHS National Centers of Academic Excellence in Information Assurance/Cyber Defense 2014 List of Knowledge Units and Focus Areas The CAE IA/CD academic requirements are based on meeting defined sets of Knowledge Units (KUs): 1. Core for 2 year programs - technical or applied emphasis 2. Core for 4 year + programs - technical or

More information

Strengthening the Nexus: Government-Business- University cooperation and collaboration on security, training and research

Strengthening the Nexus: Government-Business- University cooperation and collaboration on security, training and research Strengthening the Nexus: Government-Business- University cooperation and collaboration on security, training and research November 1, 2011 Susan C. Aldridge, PhD University of Maryland University College

More information

Becoming a Cyber Professional: A Discussion with Recent Graduates

Becoming a Cyber Professional: A Discussion with Recent Graduates Becoming a Cyber Professional: A Discussion with Recent Graduates Moderator: George L. Heron, LifeJourney USA Panelists: Danielle Santos, Assistant Program Manager, Cyber Formal Education, DHS Scott Wallace.

More information

Cincinnati State Technical and Community College. College Credit Plus

Cincinnati State Technical and Community College. College Credit Plus Cincinnati State Technical and Community College College Credit Plus Cincinnati State Background Cincinnati State sees the adoption of College Credit Plus as building on our successful high school dual

More information

Sustaining a Student Information Assurance Club

Sustaining a Student Information Assurance Club Sustaining a Student Information Assurance Club Jeffrey A. Livermore Mott Community College Flint, MI, USA Jeff.livermore@mcc.edu ABSTRACT: A number of schools that teach Information Assurance have formed

More information

Cybersecurity Workforce Training Partnership

Cybersecurity Workforce Training Partnership Cybersecurity Workforce Training Partnership NSA Cyber Command AACC @ Arundel Mills CAE-2Y NSA and DHS designated AACC as a National Center of Academic Excellence in Information Assurance 2-Year Education

More information

Introducing... FedVTE and FedCTE

Introducing... FedVTE and FedCTE Introducing... FedVTE and FedCTE Sponsored by: Cybersecurity Education and Workforce Development Program (CEWD) DHS National Cyber Security Division October, 2010 Agenda FedVTE and FedCTE overview & how

More information

https://www.iti.illinois.edu/sites/default/files/cybersecurity_image.jpg

https://www.iti.illinois.edu/sites/default/files/cybersecurity_image.jpg ABOUT THE ACADEMY The National Academy of Public Administration is an independent, nonprofit, and non-partisan organization established in 1967 and chartered by Congress in 1984. It provides expert advice

More information

Nettitude Ltd. (FHEQ) level 7] MSc Postgraduate Diploma Postgraduate Certificate. British Computer Society (BCS) Master s Degree in Computing

Nettitude Ltd. (FHEQ) level 7] MSc Postgraduate Diploma Postgraduate Certificate. British Computer Society (BCS) Master s Degree in Computing Faculty of Engineering and Informatics Programme Specification Programme title: MSc Cyber Security Academic Year: 2015/16 Degree Awarding Body: Partner(s), delivery organisation or support provider (if

More information

PROGRAMME SPECIFICATION POSTGRADUATE PROGRAMME

PROGRAMME SPECIFICATION POSTGRADUATE PROGRAMME PROGRAMME SPECIFICATION POSTGRADUATE PROGRAMME KEY FACTS Programme name Advanced Computer Science Award MSc School Mathematics, Computer Science and Engineering Department or equivalent Department of Computing

More information

Toward Curricular Guidance in the Cyber Sciences

Toward Curricular Guidance in the Cyber Sciences Toward Curricular Guidance in the Cyber Sciences 1 6 J U N E 2 0 1 5 2 0 1 5 C I S S E L A S V E G A S D A V I D G I B S O N, U S A I R F O R C E A C A D E M Y B E T H H A W T H O R N E, U N I O N C O

More information

The GW CyberCorps Program

The GW CyberCorps Program The GW CyberCorps Program www.seas.gwu.edu/cybercorps Introduction The need for educated personnel in the government s cyber security workforce is critical to the nation s security. As evidenced by remarks

More information

National Cyber Security Awareness Month. Week Five: Building the Next Generation of Cyber Professionals

National Cyber Security Awareness Month. Week Five: Building the Next Generation of Cyber Professionals National Cyber Security Awareness Month Week Five: Building the Next Generation of Cyber Professionals Webinar recording and evaluation survey This webinar is being recorded and will be made available

More information

UNIVERSITY OF BRADFORD School of Computing Informatics and Media Department of Computing Programme/course title: Computing

UNIVERSITY OF BRADFORD School of Computing Informatics and Media Department of Computing Programme/course title: Computing UNIVERSITY OF BRADFORD School of Computing Informatics and Media Department of Computing Programme/course title: Computing Awarding and teaching institution: Teaching institute: University of Bradford

More information

INNOVATION. Campus Box 154 P.O. Box 173364 Denver, CO 80217-3364 Website: http://cam.ucdenver.edu/ncmf

INNOVATION. Campus Box 154 P.O. Box 173364 Denver, CO 80217-3364 Website: http://cam.ucdenver.edu/ncmf EDUCATION RESEARCH INNOVATION Campus Box 154 P.O. Box 173364 Denver, CO 80217-3364 Website: http://cam.ucdenver.edu/ncmf Email: ncmf@ucdenver.edu Phone: 303.315.5850 Fax: 303.832.0483 JEFF M. SMITH, m.s.

More information

MASTER PROGRAM IN EVENT MANAGEMENT (One year) 1. Program Title Master in Business Administration with specialization in event management (One year)

MASTER PROGRAM IN EVENT MANAGEMENT (One year) 1. Program Title Master in Business Administration with specialization in event management (One year) MASTER PROGRAM IN EVENT MANAGEMENT (One year) 1. Program Title Master in Business Administration with specialization in event management (One year) 2. Program Aims and Objectives The education will help

More information

Information Systems Technology & Cybersecurity Programs

Information Systems Technology & Cybersecurity Programs Information Systems Technology & Cybersecurity Programs Stay close. Go far. Computer Studies Faculty Trudy Gift Professor, Information Systems Technology 240-500-2214 tgift@hagestowncc.edu Carrie Pifer

More information

ONLINE ONLINE. Master of Science in. Bachelor of Science in

ONLINE ONLINE. Master of Science in. Bachelor of Science in ONLINE Bachelor of Science in INFORMATION SYSTEMS ONLINE Master of Science in Management Information Systems Information Systems Online University of Alabama at Birmingham COLLAT School of Business Dear

More information

Unique Standards and Documentation Required for Accredited CLT/MLT Programs

Unique Standards and Documentation Required for Accredited CLT/MLT Programs Unique Standards and Documentation Required for Accredited CLT/MLT Programs Section III (CLT/MLT) Page 1 UNIQUE STANDARDS AND THE REQUIRED DOCUMENTATION Objectives Clinical Laboratory Technician/Medical

More information

Cybersecurity High School and Beyond

Cybersecurity High School and Beyond Cybersecurity High School and Beyond High School Career Fair and Expo March 29, 2014 Diane G. Miller, CCP Director, Operations Northrop Grumman Information Security Program Director, CyberPatriot Topics

More information

Tools and Resources to Build Your Cybersecurity Workforce

Tools and Resources to Build Your Cybersecurity Workforce Tools and Resources to Build Your Cybersecurity Workforce Benjamin Scribner Department of Homeland Security (DHS) National Cybersecurity Education & Awareness Branch (CE&A) November 2015 NICE Conference

More information

Department of Defense Information Assurance Scholarship Program. Sponsored by the. DoD Chief Information Officer

Department of Defense Information Assurance Scholarship Program. Sponsored by the. DoD Chief Information Officer Department of Defense Information Assurance Scholarship Program Sponsored by the DoD Chief Information Officer SOLICITATION FOR PROPOSALS From Universities Designated by the National Security Agency (NSA)

More information

MSc Corporate Real Estate & Facilities Management (Flexible Masters Programme) For students entering in 2005

MSc Corporate Real Estate & Facilities Management (Flexible Masters Programme) For students entering in 2005 1 MSc Corporate Real Estate & Facilities Management (Flexible Masters Programme) For students entering in 2005 Awarding Institution: Teaching Institution: Faculty of Economic and Social Sciences Date of

More information

UNIVERSITY OF TRIESTE UNIVERSITY OF UDINE ACADEMIC REGULATIONS MASTER DEGREE PROGRAMMEME IN PHYSICS. Master Degree Programme Section LM-17

UNIVERSITY OF TRIESTE UNIVERSITY OF UDINE ACADEMIC REGULATIONS MASTER DEGREE PROGRAMMEME IN PHYSICS. Master Degree Programme Section LM-17 UNIVERSITY OF TRIESTE UNIVERSITY OF UDINE ACADEMIC REGULATIONS MASTER DEGREE PROGRAMMEME IN PHYSICS Master Degree Programme Section LM-17 DM 270/2004, art.12 R.D.A. art. 5 1 Art. 1 General rules and objectives

More information

Hosted by Lunarline: School of Cyber Security

Hosted by Lunarline: School of Cyber Security Hosted by Lunarline: School of Cyber Security Please Fax Government Purchase Orders and SF 182s To (22) 315-33 Cybersecurity is one of the hottest issues for today s Federal and DOD Agencies and commercial

More information

DoD IA Training Products, Tools Integration, and Operationalization

DoD IA Training Products, Tools Integration, and Operationalization Defense Information Systems Agency A Combat Support Agency DoD IA Training Products, Tools Integration, and Operationalization Roger S. Greenwell, CISSP, CISA, CISM Technical Director / Capabilities Implementation

More information

The College of EMS Strategic Plan can be seen at the college s WEB site

The College of EMS Strategic Plan can be seen at the college s WEB site B2. PROGRAM EDUCATIONAL OBJECTIVES B2.1 Mission Statements The fundamental mission of UW-Platteville and the entire UW System is to serve the people of Wisconsin. This basic goal is expressed in detail

More information

University of Maryland University College: Master of Science in Digital Forensics and Cyber Investigation

University of Maryland University College: Master of Science in Digital Forensics and Cyber Investigation BOARD OF REGENTS SUMMARY OF ITEM FOR ACTION, INFORMATION OR DISCUSSION TOPIC: COMMITTEE: University of Maryland University College: Master of Science in Digital Forensics and Cyber Investigation Education

More information

Curriculum Vitae -Joel H. Bush

Curriculum Vitae -Joel H. Bush Curriculum Vitae -Joel H. Bush Joel H. Bush Email: jbush@rmcc.edu Home: 360 Polk 75 Mena, AR 71953 Cell: 479-216-4553 Rich Mountain Community College 1100 College Drive Mena, AR 71953 479-394-7622 X1356

More information

Cybersecurity Education

Cybersecurity Education Cybersecurity Education Issues & Approaches Derek A. Smith Director of Cybersecurity Initiatives at Excelsior College AFCEA November 18, 2014 Where we are now! Symantec: In a world of increased cybersecurity

More information

Baccalaureate Degree Completion Guidelines for Medical Laboratory Technicians/Clinical Laboratory Technicians

Baccalaureate Degree Completion Guidelines for Medical Laboratory Technicians/Clinical Laboratory Technicians Program Description Baccalaureate Degree Completion Guidelines for Medical Laboratory Technicians/Clinical Laboratory Technicians Department of Clinical Laboratory Sciences MCV Campus of Virginia Commonwealth

More information

Programme Specification and Curriculum Map for MSc Electronic Security and Digital Forensics

Programme Specification and Curriculum Map for MSc Electronic Security and Digital Forensics Programme Specification and Curriculum Map for MSc Electronic Security and Digital Forensics 1. Programme title Electronic Security & Digital Forensics 2. Awarding institution Middlesex University 3. Teaching

More information

CAE News WINTER 2015. Announcing the new CAE Community Website. CAE Community Website Webinar

CAE News WINTER 2015. Announcing the new CAE Community Website. CAE Community Website Webinar CAE News WINTER 2015 promote higher education reduce vulnerabilities grow cyber professionals Announcing the new CAE Community Website The National Security Agency (NSA) and Department of Homeland Security

More information

Wyoming Community College Commission Request for New, Pilot or Revised Degree or Certificate Program

Wyoming Community College Commission Request for New, Pilot or Revised Degree or Certificate Program Community Commission Request for New, Pilot or Revised Degree or Certificate Program A. : Laramie County Community B. Date submitted to WCCC: C. Program 1. Request for: X New Program Pilot Program Revised

More information

MSc Cyber Security UKPASS P052286. Course 1 Year Full-Time, 2-3 Years Part-Time

MSc Cyber Security UKPASS P052286. Course 1 Year Full-Time, 2-3 Years Part-Time MSc Cyber Security International Students Can Apply UKPASS P052286 Code: Course 1 Year Full-Time, 2-3 Years Part-Time Length: Start Dates: September 2015, January 2016, September 2016, January 2017 Department:Department

More information

University Guidelines for Certificate Programs

University Guidelines for Certificate Programs (Guidelines Based on Executive Order 806) Types of Certificate Programs San Diego State University offers two types of certificate programs: Academic certificate programs, and Professional certificate

More information

Programme Specification and Curriculum Map for MSc Electronic Security and Digital Forensics

Programme Specification and Curriculum Map for MSc Electronic Security and Digital Forensics Programme Specification and Curriculum Map for MSc Electronic Security and Digital Forensics 1. Programme title Electronic Security and Digital Forensics 2. Awarding institution Middlesex University 3.

More information

Arts, Humanities and Social Science Faculty

Arts, Humanities and Social Science Faculty Masters in Teaching and Learning For students entering Part 1 in 2011/2 Awarding Institution: Teaching Institution: Relevant QAA subject Benchmarking group(s): Faculty: Programme length: Date of specification:

More information

Wyoming Community College Commission Request for New, Pilot or Revised Degree or Certificate Program

Wyoming Community College Commission Request for New, Pilot or Revised Degree or Certificate Program Wyoming Community College Commission Request for New, Pilot or Revised Degree or Certificate Program A. College: Laramie County Community College B. Date submitted to WCCC: C. Program 1. Request for: X

More information

MSc Programme Intelligent Adaptive Systems (IAS)

MSc Programme Intelligent Adaptive Systems (IAS) Faculty of Mathematics, Informatics and Natural Sciences Department of Informatics UHH Fachbereich Informatik Vogt-Koelln-Str. 30 D-22527 Hamburg MSc Programme Intelligent Adaptive Systems (IAS) Web: http://www.master-intelligent-adaptive-systems.com/

More information

ROYAL HOLLOWAY University of London PROGRAMME SPECIFICATION

ROYAL HOLLOWAY University of London PROGRAMME SPECIFICATION ROYAL HOLLOWAY University of London PROGRAMME SPECIFICATION This document describes the Doctorate in Clinical Psychology. This specification is valid for new entrants and current students from September

More information

Centers of Academic Excellence in Cyber Security (CAE-C) Knowledge Units Review

Centers of Academic Excellence in Cyber Security (CAE-C) Knowledge Units Review Centers of Academic Excellence in Cyber Security (CAE-C) Knowledge Units Review Review Process The Knowledge Unit (KU) Review Calendar divides the entire CAE-C KU list into 12 months for the purposes of

More information

FedVTE Training Catalog SUMMER 2015. advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov

FedVTE Training Catalog SUMMER 2015. advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov FedVTE Training Catalog SUMMER 2015 advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov Access FedVTE online at: fedvte.usalearning.gov If you need any assistance please

More information

ISACA Tools Help Develop Cybersecurity Expertise

ISACA Tools Help Develop Cybersecurity Expertise Volume 21, 8 October 2014 ISACA Tools Help Develop Cybersecurity Expertise Nominate Qualified Candidates for the ISACA Board of Directors Tips for Solving Data Classification Challenges Earn CPE at Professional

More information

Building a Successful Cyber-security Program

Building a Successful Cyber-security Program Building a Successful Cyber-security Program David Dampier Distributed Analytics and Security Institute Mississippi Box 9627, HPC A129 Mississippi, MS 39762-9627 001-662-325-0779 dampier@dasi.msstate.edu

More information

(FHEQ) level 7] MSc Postgraduate Diploma Postgraduate Certificate. June 2015

(FHEQ) level 7] MSc Postgraduate Diploma Postgraduate Certificate. June 2015 Faculty of Engineering and Informatics Programme Specification Programme title: MSc Big Data Science and Technology (BDST) Academic Year: 2015/16 Degree Awarding Body: Partner(s), delivery organisation

More information

Programme Specification: BSc (Hons) Sound Engineering and Production

Programme Specification: BSc (Hons) Sound Engineering and Production Programme Specification: BSc (Hons) Engineering and Production Date of Publication to Students: September 2009 NOTE: This specification provides a concise summary of the main features of the course and

More information

Continuing Education Requirements

Continuing Education Requirements California Code of Regulations Title 16, Division 13.1, Article 10. Continuing Education Requirements 1397.60. Definitions. As used in this article: (a) Conference means a course consisting of multiple

More information

The Nursing and Midwifery Council

The Nursing and Midwifery Council MSc/PGDip Public Health Nursing For students entering in 2008 Awarding Institution: Teaching Institution: Faculty: Programme length: Date of specification: Programme Director: Board of Studies Accreditation:

More information

DISTANCE EDUCATION STANDARDS AND GUIDELINES

DISTANCE EDUCATION STANDARDS AND GUIDELINES DISTANCE EDUCATION STANDARDS AND GUIDELINES Distance Education in a National Context Distance education is becoming a standard practice in higher education. 1 According to a report issued by the National

More information

Joint Master in Information Security and Data Management (ISDM)

Joint Master in Information Security and Data Management (ISDM) PROJECT CONCEPT PAPER Joint Master in Information Security and Data Management (ISDM) First draft: Dr. Derar Eleyan, Palestine Technical University-Palestine. Key Action 2: Capacity Building in the Field

More information

All applications are submitted to the Higher Education Authority, which requests the HAC s expert opinion on the quality of the application.

All applications are submitted to the Higher Education Authority, which requests the HAC s expert opinion on the quality of the application. HUNGARIAN ACCREDITATION COMMITTEE (HAC) STANDARDS AND CRITERIA FOR MASTER PROGRAMS 1 AND EX POST ACCREDITATION OF INSTITUTIONS AND PROGRAMS The Hungarian accreditation system consists of ex ante and ex

More information

Strategy and Resources to Strengthen IT Programs. Academic Leadership Conference May 28, 2015

Strategy and Resources to Strengthen IT Programs. Academic Leadership Conference May 28, 2015 Strategy and Resources to Strengthen IT Programs Academic Leadership Conference May 28, 2015 Session Key Objectives Presentation Agenda 1. Gain insight into the career opportunity for students: the current

More information

Department of Homeland Security Federal Government Offerings, Products, and Services

Department of Homeland Security Federal Government Offerings, Products, and Services Department of Homeland Security Federal Government Offerings, Products, and Services The Department of Homeland Security (DHS) partners with the public and private sectors to improve the cybersecurity

More information

Programme Specification and Curriculum Map for MEng (Hons) Electronics Engineering

Programme Specification and Curriculum Map for MEng (Hons) Electronics Engineering Programme Specification and Curriculum Map for MEng (Hons) Electronics Engineering 1. Programme title MEng Hons Electronics Engineering 2. Awarding institution Middlesex University 3. Teaching institution

More information

BOARD OF TRUSTEES OF COMMUNITY-TECHNICAL COLLEGES AFT BARGAINING UNIT APPLICATION FOR PROMOTION TEACHING FACULTY Academic Year 2012-2013

BOARD OF TRUSTEES OF COMMUNITY-TECHNICAL COLLEGES AFT BARGAINING UNIT APPLICATION FOR PROMOTION TEACHING FACULTY Academic Year 2012-2013 BOARD OF TRUSTEES OF COMMUNITY-TECHNICAL COLLEGES AFT BARGAINING UNIT APPLICATION FOR PROMOTION TEACHING FACULTY Academic Year 2012-2013 This application must be submitted to the President no later than

More information

21. Evaluative Report of the Department

21. Evaluative Report of the Department 21. Evaluative Report of the Department 1. Name of the Department : School of Studies in Political Science 2. Year of establishment : 1994 3. Is the Department part of a School/Faculty of the university?

More information

Davis Applied Technology College Curriculum Development Policy and Procedures Training Division

Davis Applied Technology College Curriculum Development Policy and Procedures Training Division Davis Applied Technology College Curriculum Development Policy and Procedures Training Division Board Approval: 24 April 2008 1. Purpose 1.1. Curriculum development at the Davis Applied Technology College

More information

International University of Monaco. Executive Education

International University of Monaco. Executive Education d Creating value in your job and in your company IUM is an internationally renowned business school that has been developing high profile business programs for top managers and entrepreneurs for more than

More information

Master of Science in Information Assurance

Master of Science in Information Assurance 2004-2005 Catalog Addendum New Program Master of Science in Information Assurance This Walsh College Master of Science in Information Assurance degree combines theory with applied learning enabling security

More information

Undergraduate Transfer Credit Policy

Undergraduate Transfer Credit Policy Undergraduate Transfer Credit Policy I. GENERAL POLICY STATEMENT Mount Aloysius College will consider credits in transfer into associate and bachelor degree programs from coursework taken at regionally-accredited

More information

PROGRAMME SPECIFICATION

PROGRAMME SPECIFICATION PROGRAMME SPECIFICATION PROGRAMME SPECIFICATION Programme title: Final award (BSc, MA etc): (where stopping off points exist they should be detailed here and defined later in the document) Cohort(s) to

More information

STATEWIDE ARTICULATION

STATEWIDE ARTICULATION STATEWIDE ARTICULATION The Advanced Technical Credit Program consists of: 1. The ATC Standard Articulation Agreement, which outlines criteria for the recognition of statewide-articulated courses and award

More information

Proposed Education & Workforce Development Plan for FY2015. Education & Workforce Development Work Group Andrew Turner November 2014

Proposed Education & Workforce Development Plan for FY2015. Education & Workforce Development Work Group Andrew Turner November 2014 Proposed Education & Workforce Development Plan for FY2015 Education & Workforce Development Work Group Andrew Turner November 2014 Current Opportunities Significant state-wide opportunities for Cyber

More information

of Highly Effective Security Professionals By Sondra Schneider CEO Security University s0ndra@securityuniversity.net 203.357.7744

of Highly Effective Security Professionals By Sondra Schneider CEO Security University s0ndra@securityuniversity.net 203.357.7744 6 Skills of Highly Effective Security Professionals By Sondra Schneider CEO Security University s0ndra@securityuniversity.net 203.357.7744 Basic Principles The Basic Principles of InfoSecurity are Universal

More information

Programme Specification

Programme Specification School of Life and Medical Sciences Title of Programme: MSc Research in Clinical Psychology MSc Clinical Psychology Practice Programme Code: HHMCLP Programme Specification This programme specification

More information

Michigan State University, College of Nursing Certificate in College Teaching Program

Michigan State University, College of Nursing Certificate in College Teaching Program Michigan State University, College of Nursing Certificate in College Teaching Program The College of Nursing Certificate in College Teaching Program (CCTP) transforms the way graduate students are prepared

More information

Why compromise on the quality of your cyber security training? How APMG, CESG and QA accreditations ensure the highest possible training standards

Why compromise on the quality of your cyber security training? How APMG, CESG and QA accreditations ensure the highest possible training standards Why compromise on the quality of your cyber security training? How APMG, CESG and QA accreditations ensure the highest possible training standards Cyber Security CESG Certified Training // 2 Contents 3

More information

BOARD OF REGENTS EDUCATION AND STUDENT AFFAIRS COMMITTEE 5 STATE OF IOWA OCTOBER 21-22, 2015

BOARD OF REGENTS EDUCATION AND STUDENT AFFAIRS COMMITTEE 5 STATE OF IOWA OCTOBER 21-22, 2015 STATE OF IOWA OCTOBER 21-22, 2015 Contact: Diana Gonzalez REQUEST TO CREATE NEW CENTER AT IOWA STATE UNIVERSITY: CENTER FOR STATISTICS AND APPLICATION IN FORENSIC EVIDENCE (CSAFE) Action Requested: Consider

More information

INSTRUCTIONAL TECHNOLOGY

INSTRUCTIONAL TECHNOLOGY INSTRUCTIONAL TECHNOLOGY Department of Computer Science and Information Technology Program Contact Information Yefim Kats, Ph.D., Department Chair and Graduate Program Coordinator Program Offerings Master

More information

KU School of Education Graduate Student Handbook

KU School of Education Graduate Student Handbook KU School of Education Graduate Student Handbook 2011-2012 Graduate Student Responsibility All graduate students are responsible for informing themselves of requirements of the Graduate School as stated

More information

Access FedVTE online at: fedvte.usalearning.gov

Access FedVTE online at: fedvte.usalearning.gov FALL 2015 Access FedVTE online at: fedvte.usalearning.gov If you need any assistance please contact the FedVTE Help Desk her e or email the Help Desk at support@usalearning.net. To speak with a Help Desk

More information

UMUC FED Program. Online Open House July 22, 2015

UMUC FED Program. Online Open House July 22, 2015 UMUC FED Program Online Open House July 22, 2015 Corporate Learning Solutions Shelby Byrd Senior Account Manager Danielle Haynes Account Manager 1-855-CLS-5300 or cls@umuc.edu www.umuc.edu/fedgov 2 UMUC

More information

PH.D. IN BUSINESS ADMINISTRATION

PH.D. IN BUSINESS ADMINISTRATION PH.D. IN BUSINESS ADMINISTRATION Intellectual Discovery AND INNOVATION join a nationally ranked program that is accredited by AACSB International, placing the UTSA College of Business in the top five percent

More information

MSc in Computer and Information Security

MSc in Computer and Information Security MSc in Computer and Information Security Programme Specification Primary Purpose: Course management, monitoring and quality assurance. Secondary Purpose: Detailed information for students, staff and employers.

More information

PROGRAMME SPECIFICATION MSc Psychology

PROGRAMME SPECIFICATION MSc Psychology PROGRAMME SPECIFICATION MSc Psychology 1. Awarding institution/body University of Worcester 2. Teaching institution University of Worcester 3. Programme accredited by British Psychological Society 4. Final

More information

Programme Specification. MSc Accounting. Valid from: September 2014 Faculty of Business

Programme Specification. MSc Accounting. Valid from: September 2014 Faculty of Business Programme Specification MSc Accounting Valid from: September 2014 Faculty of Business 1 SECTION 1: GENERAL INFORMATION Awarding body: Teaching institution and location: Final award: Programme title: Interim

More information

Certification Requirements by Discipline. Allied Health Sciences

Certification Requirements by Discipline. Allied Health Sciences Certification Requirements by Discipline Allied Health Sciences The minimum degree requirement for instructors wishing to teach UConn ECE Allied Health courses can be met by either of the following options:

More information