Graduate Program in Information Security

Size: px
Start display at page:

Download "Graduate Program in Information Security"

Transcription

1 LOCAL PARTNER: of University at Albany P.O. Box 308 CH-8501 Frauenfeld/Switzerland Phone Mail Webside Graduate Program in Information Security International Graduate Certificate Program in Information Security This may interest you. If so, read on Is your knowledge of current data protection all it should be? Our Graduate Certificate Program in Information Security qualifies you to counter data attacks and cyber crime successfully. Our highquality training offers the best conditions to survive in a rapidly growing segment of the digital economy. The Graduate Certificate Program in Information Security is a program developed by the State University of New York, Albany (SUNY), and is arousing great interest internationally. The partnership between SUNY and gsem combines the strengths of business schools and expertise from different continents to provide continuing training to executives in today s global and technologydominated economy. The opportunity to participate in an in-service US high school program and to discuss complex issues with fellow students from different origins and professional backgrounds offers students a practice-focused education that cannot be acquired in any other way. The program structure of the State University of New York at Albany reflects the needs of the European market. Participants on the Graduate Certificate Program in Information Security graduate from course modules of study in Switzerland and at the Business School of the State University of New York at Albany. Graduates of the program will be awarded a Graduate Certificate in Information Security of the State University of New York at Albany. In addition, transfer credits will be awarded, which can count when applying for further programs. Studying at the State University of New York at Albany SUNY The University at Albany is part of the State University of New York - SUNY. SUNY has 64 campuses with 450,000 students enrolled, making it the largest university network in the US. The University at Albany, founded in 1844, is the oldest of SUNY s campuses, with more than 15,000 students, making it one of the four so-called SUNY University Centers. The nine schools and colleges of the University at Albany include the College of Nanoscale Science and Engineering, which is a world leader in nanotechnology and microtechnology, and the School of Business, accredited by the AACSB. According to the current ranking by US News & World Report, the School of Business is one of the top 100 business schools in the USA, and even took first place when it comes to procuring their MBA graduates appropriate positions. The School of Business is especially proud of its new main building, which was inaugurated in September 2013, and meets the highest standards in every respect.

2 Network and control systems Network operation and control systems in the energy sector are being increasingly automated. They build on two-way communication and are connected to the Internet or other computer networks. Whilst technological progress has enabled groundbreaking modernization of the network, this has become more vulnerable to cyber attacks due to increasing interconnectivity, write the two US Congressman Edward J. Markey and Henry A. Waxman in their report Electric Grid Vulnerability published in Their report makes it clear that this vulnerability brings a real risk; in the US, the power grid is still exposed to a variety of cyber attacks daily, which in serious cases could result in to extensive power outages. Such threats are not limited to the energy sector alone. According to a study published by the Ponemon Institute in collaboration with IBM in May 2014, criminal activities are the main reason for loss of data, giving rise to costs for companies in Germany, for example, of an average $ 4.74 million per incident. The bulk of the costs incurred are due to the resultant loss of image and dwindling customer loyalty. At the same time, the study points out that these costs can be significantly reduced if companies arm themselves promptly with an incident response and crisis management plan and well thought out business continuity management. And here it is not only technicians, but also senior executives who need to be involved, as it is also a question of dealing with strategic challenges. A study program not just for IT experts and developers The sharp rise in demand for experts in IT security has brought about a significant shortage of skilled workers and has led Prof. Dr. Sanjay Goel of the University at Albany to develop a Graduate Certificate in Information Security Program (GCIS). This course teaches you skills that allow you to protect your own company successfully against cybercrime and hacking. It is important to know that the GCIS program provides not only technical understanding, but especially business skills. It is therefore oriented not solely towards IT professionals or software developers, but representatives of all sectors which are increasingly dependent on complex IT systems, such as the energy sector, the financial sector, industry, telecommunications, health care, or consultancy. This also means no previous training as a computer scientist is required to be included in the GCIS program. This further training offers just as much added value for engineers, lawyers, financial experts, management consultants, psychologists or sociologists who deal with data security in the course of their work. The Living Case; a proven practice test tool The centerpiece of the GCIS program is the Living Case. This is a real and highly topical case study conducted jointly with a well-known company. Together with the lecturer, the contracting company prepares a specific problem relevant to the subject matter and expects realistic and feasible solutions from students, who are divided into consulting teams for this purpose. Students are thus able to transfer the knowledge conveyed in the classroom into practice and apply it immediately. As they develop their solutions within a few days and have to make a written and oral presentation to the client at the end, they quickly realize which tools prove themselves in a working environment characterized by time pressure and high expectations. Interested? Then call us Please contact us for a personal consultation. Just make an appointment on +41 (0) or info@gsem.ch.

3 Program structure The GCIS program has a modular structure and is taken as an in-service course for professionals. It includes two one-week modules, which will be completed at the gsem in Switzerland, a two-week module at the University at Albany in the US and a thesis. Successful graduates will be credited by the University at Albany with 15 US credits, which are creditable on registration to other programs of the University at Albany - such as the MBA program. The program covers the following individual modules: Module Content Language Venue Days US Credits 1 Introduction to Information and Cyber Security English Switzerland Information Security Risk Assessment English Switzerland Security Implementation and Incident Response English USA Security Policies including Psychology of Information Security English USA Thesis English - 3 Switzerland (gsem) Introduction to Information and Cyber Security: This module focuses on the vulnerability of computer networks and technologies to protect networks, servers and data. Here, the basic elements of symmetric and asymmetric cryptography are described as well as secure e-commerce, secure transmission, authentication, digital signatures and public key infrastructure (PKI). In addition, controversial issues such as Privacy and Piracy, media piracy and the role of state monitoring bodies are discussed. Information Security Risk Assessment: The module introduces you to the subject of information security and risk analysis. At the beginning you will become familiar with the basic definitions and nomenclature in the field of risk analysis. Then you will learn about different concepts of risk analysis. The module also includes exercises on risk analysis, based on current cases of law enforcement agencies and companies. Another focus is on the risk matrix with which quantitative and qualitative risks can be analyzed and which helps you to make a structured record of various threats. The aim of the module is to train you in practical risk analysis by making the different concepts tangible through examples and case studies. It is expected that you do not accept apparent facts on face value, but scrutinize them critically. Thesis Together with your thesis supervisor, you will define a subject in Information Systems or Operations Management and write a thesis. USA (University at Albany) Security Implementation and Incident Response: The module shows you, first, how to guarantee the security of wired and wireless networks, servers and databases, and then how to deal with security incidents in the IT sector. Classifying, processing and analyzing security incidents are discussed in particular, but also gathering of evidence, recovering and follow-up after a security incident has occurred. Security Policies Including Psychology of Information Security: This module will introduce you to the different information security strategies available. This is based on a consideration of sociological and psychological processes, where on the one hand the psychology of the attacker and the motivation and techniques of cybercriminals and hackers are explored, and on the other hand, the importance of the user for the success of security systems will be discussed. You will learn about the basic perceptual, cognitive and motivational processes involved. Then you will discuss the entire lifecycle of security strategies and the specific characteristics of individual security areas. Using various examples, you will learn the interrelationships between real problem situations.

4 People (Program Director) Prof. Goel occupies the Chair of Information Technology Management at the Business School of the University at Albany. As a successful researcher, he has published over 50 articles in academic journals and conference proceedings. He is an internationally recognized expert in Information Security and Cyber Warfare, who has spoken on these topics at events organized by NATO and the OSCE. In addition, Prof. Goel officiates as Director of Research at the New York State Center for Information Forensics and Assurance and represents the University at Albany in the Capital Region Cyber Crime Partnership. He is one of the most important members of the global network of volunteer experts who have come together to form Project Grey Goose, under which they investigate security incidents related to cyber warfare. He is also a driving force behind the annual International ICST Conference on Digital Forensics & Cyber Crime. Prof. Dr. Salvatore Belardo is Professor Emeritus in Management Science and Information Systems at the University at Albany and was Visiting Professor at the Copenhagen School of Business, the University of Passau, the University of El Salvador (Argentina) and the DUXX Graduate School of Business Leadership in Monterrey (Mexico). Prof. Belardo has been published in various academic journals and is considered one of the leading authors in the field of Decision Support Systems. His global consulting activities include mandates for General Electric, ABB, the Swiss National Bank and Orel Füssli. The US Coast Guard, the New York State Banking Department, the New York State Department of Taxation and Finance, the New York State Department of Transportation and the US Department of State also number among his clients. Prof. Dr. Kevin J. Williams is Vice-Provost and Dean of Graduate Studies at the University at Albany. He holds a PhD in psychology from the University of South Carolina and has worked in various positions in the Department of Psychology of the University at Albany since Prof. Williams has published numerous articles in academic journals, dealing mainly with questions of industrial and organizational psychology. Figures & Facts Graduate Certificate in Information Security by the University at Albany Duration: 20 days, completion in 1-2 years Program Tuition fee in CHF: or per single module, including teaching materials, catering during breaks and lunch. Structure: In-service modular modules can also be booked separately Language of instruction: English The gsem - Swiss American Graduate School of Business & Energy Management gsem is the first Swiss provider of in-service management further training courses with a special focus on energy. It is aimed at industry, trade and service companies, companies in the energy sector as well as public authorities and investors. The Business School closes the gap between the traditional training and further training institutions and a modern established private business school. It works closely with US universities, which guarantees the highest competence of lecturers and widely recognized certificates and diplomas. The management team has many years of experience in managing an international business school and is familiar with the continuing education needs of executives.

5 Timetable first block Time Day 1 Day 2 Day 3 Day 4 Day Session 1 Session 6 Session 11 Session 16 Session 21 Welcome / Lesson I Lesson III Lesson V Lesson VII Lesson IX Break Break Break Break Break Session 2 Session 7 Session 12 Session 17 Session 22 Lesson II Lesson IV Lesson VI Lesson VIII Individual Examination Break Break Break Break Break Session 3 Session 8 Session 13 Session 18 Session 23 Living Case Hearing Living Case Company Speaker/Lecturer II: Roger Halbheer Head of Group Security Speaker/Lecturer III Thomas Koch ADV Consulting, Director, Cyber Security Speaker/Lecturer IV Rainer Kessler Group Project Manager Group Living Case Solution Break Break Break Break Break Session 4 Session 9 Session 14 Session 19 Session 24 Speaker/Lecturer I: Stefan Blobelt Senior Consultant, Lecturer Robert H. Smith - University of Maryland Speaker/Lecturer II: Roger Halbheer Head of Group Security Speaker/Lecturer III Thomas Koch ADV Consulting, Director, Cyber Security Speaker/Lecturer IV Rainer Kessler Group Project Manager Group Living Case Solution Break Break Break Break Break Session 5 Session 10 Session 15 Session 20 Session 25 (open end) Speaker/Lecturer I: Part 2, Q & A Assessment Living Case - Prof. Dr. S. Goel - Prof. W. Fumagalli - Living Case Customer Fare well

(Instructor-led; 3 Days)

(Instructor-led; 3 Days) Information Security Manager: Architecture, Planning, and Governance (Instructor-led; 3 Days) Module I. Information Security Governance A. Introduction to Information Security Governance B. Overview of

More information

Risk in deregulated electricity markets

Risk in deregulated electricity markets Risk in deregulated electricity markets Workshop, March 23-24, 2006, ETH Zurich, Switzerland Speakers Göran Andersson, Jörg Doege, Martin Eschle, Massimo Filippini, Juri Hinz (Chair), Hans-Jakob Lüthi,

More information

Certified Cyber Security Analyst VS-1160

Certified Cyber Security Analyst VS-1160 VS-1160 Certified Cyber Security Analyst Certification Code VS-1160 Vskills certification for Cyber Security Analyst assesses the candidate as per the company s need for cyber security and forensics. The

More information

Introduction to Cyber Security / Information Security

Introduction to Cyber Security / Information Security Introduction to Cyber Security / Information Security Syllabus for Introduction to Cyber Security / Information Security program * for students of University of Pune is given below. The program will be

More information

The University of North Carolina at Pembroke

The University of North Carolina at Pembroke The University of North Carolina at Pembroke Crisis Action Plan [Updated April 18, 2007] I. PURPOSE A crisis action plan provides policies and procedures for the coordination of communications within the

More information

Bellevue University Cybersecurity Programs & Courses

Bellevue University Cybersecurity Programs & Courses Undergraduate Course List Core Courses: CYBR 250 Introduction to Cyber Threats, Technologies and Security CIS 311 Network Security CIS 312 Securing Access Control CIS 411 Assessments and Audits CYBR 320

More information

---Information Technology (IT) Specialist (GS-2210) IT Security Competency Model---

---Information Technology (IT) Specialist (GS-2210) IT Security Competency Model--- ---Information Technology (IT) Specialist (GS-2210) IT Security Model--- TECHNICAL COMPETENCIES Computer Forensics Knowledge of tools and techniques pertaining to legal evidence used in the analysis of

More information

CYBER-ATLAS A COMPLETE CYBER RISK MANAGEMENT SOLUTION

CYBER-ATLAS A COMPLETE CYBER RISK MANAGEMENT SOLUTION CYBER-ATLAS A COMPLETE CYBER RISK MANAGEMENT SOLUTION CYBER-ATLAS A COMPLETE CYBER RISK MANAGEMENT SOLUTION In the ever-evolving technological landscape which we all inhabit, our lives are dominated by

More information

Seminar on Ethical Hacking and Cyber Crime Get comprehensive Know-how in just one week! Introduced by your trusted security partner.

Seminar on Ethical Hacking and Cyber Crime Get comprehensive Know-how in just one week! Introduced by your trusted security partner. Seminar on Ethical Hacking and Cyber Crime Get comprehensive Know-how in just one week! Introduced by your trusted security partner. Education in information security made in Switzerland. Education Services

More information

MS Information Security (MSIS)

MS Information Security (MSIS) MS Information Security (MSIS) Riphah Institute of Systems Engineering (RISE) Riphah International University, Islamabad, Pakistan 1. Program Overview: The program aims to develop core competencies in

More information

Part-time MSc in Cyber Security from Northumbria University. masters.qa.com

Part-time MSc in Cyber Security from Northumbria University. masters.qa.com Part-time MSc in Cyber Security from Northumbria University masters.qa.com Thank you for your interest in Northumbria University s part-time MSc in Cyber Security programme, delivered in Central London

More information

CYBER SECURITY, INTELLIGENCE AND AWARENESS COURSE PARK HOTEL THE HAGUE THE HAGUE, NETHERLANDS 26-30OCTOBER 2015

CYBER SECURITY, INTELLIGENCE AND AWARENESS COURSE PARK HOTEL THE HAGUE THE HAGUE, NETHERLANDS 26-30OCTOBER 2015 BACKGROUND CYBER SECURITY, INTELLIGENCE AND AWARENESS COURSE PARK HOTEL THE HAGUE THE HAGUE, NETHERLANDS 26-30OCTOBER 2015 On 26-30 October 2015 Lowlands Solutions Netherlands (LSN) will be presenting

More information

Certified Cyber Security Analyst VS-1160

Certified Cyber Security Analyst VS-1160 VS-1160 Certified Cyber Security Analyst Certification Code VS-1160 Vskills certification for Cyber Security Analyst assesses the candidate as per the company s need for cyber security and forensics. The

More information

Mastering Business Operations in the Global Economy. Executive MBA of the ETH Zurich

Mastering Business Operations in the Global Economy. Executive MBA of the ETH Zurich E i d g e n ö s s i s c h e Te c h n i s c h e H o c h s c h u l e Z ü r i c h S w i s s F e d e r a l I n s t i t u t e o f Te c h n o l o g y Z u r i c h Mastering Business Operations in the Global Economy

More information

RARITAN VALLEY COMMUNITY COLLEGE COURSE OUTLINE. CISY-274 Privacy, Ethics & Computer Forensics

RARITAN VALLEY COMMUNITY COLLEGE COURSE OUTLINE. CISY-274 Privacy, Ethics & Computer Forensics RARITAN VALLEY COMMUNITY COLLEGE COURSE OUTLINE CISY-274 Privacy, Ethics & Computer Forensics I. Basic Course Information A. Course Number & Title: CISY-274 - Privacy, Ethics, & Computer Forensics B. New

More information

Department of Information Systems and Cyber Security

Department of Information Systems and Cyber Security The University of Texas at San Antonio 1 Department of Information Systems and Cyber Security All graduate programs in Information Systems and Cyber Security are accredited by AACSB International The Association

More information

National Chiayi University Department of Education, Coursework Guidelines for Master s and Doctoral Students

National Chiayi University Department of Education, Coursework Guidelines for Master s and Doctoral Students National Chiayi University Department of Education, Coursework Guidelines for Master s and Doctoral Students 1. Classes The graduate institute of this department offers master s degree and doctoral degree

More information

Digital Identity & Authentication Directions Biometric Applications Who is doing what? Academia, Industry, Government

Digital Identity & Authentication Directions Biometric Applications Who is doing what? Academia, Industry, Government Digital Identity & Authentication Directions Biometric Applications Who is doing what? Academia, Industry, Government Briefing W. Frisch 1 Outline Digital Identity Management Identity Theft Management

More information

CONSULTING IMAGE PLACEHOLDER

CONSULTING IMAGE PLACEHOLDER CONSULTING IMAGE PLACEHOLDER KUDELSKI SECURITY CONSULTING SERVICES CYBERCRIME MACHINE LEARNING ECOSYSTEM & INTRUSION DETECTION: CYBERCRIME OR REALITY? ECOSYSTEM COSTS BENEFITS BIG BOSS Criminal Organization

More information

Nine recommendations for alternative funds battling cyber crime. kpmg.ca/cybersecurity

Nine recommendations for alternative funds battling cyber crime. kpmg.ca/cybersecurity Nine recommendations for alternative funds battling cyber crime kpmg.ca/cybersecurity Cyber criminals steal user names and passwords and use it to conduct financial trading activity illicitly. Hackers

More information

CS 464/564 Networked Systems Security SYLLABUS

CS 464/564 Networked Systems Security SYLLABUS CS 464/564 Networked Systems Security SYLLABUS College: College of Science Department: Department of Computer Science Syllabus Title: CS 464/564 Networked Systems Security Call Number: 1. Meet the Professor

More information

at Cologne Business School

at Cologne Business School www.cbs.de/en MBA and EMBA Programmes at Cologne Business School Academic excellence Cologne Business School Who we are The Hallmarks of a CBS Education CBS offrers students a rigorous and forward-minded

More information

Master of Science in Information Systems & Security Management. Courses Descriptions

Master of Science in Information Systems & Security Management. Courses Descriptions Master of Science in Information Systems & Security Management Security Related Courses Courses Descriptions ISSM 530. Information Security. 1 st Semester. Lect. 3, 3 credits. This is an introductory course

More information

Linux Technologies QUARTER 1 DESKTOP APPLICATIONS - ESSENTIALS QUARTER 2 NETWORKING AND OPERATING SYSTEMS ESSENTIALS. Module 1 - Office Applications

Linux Technologies QUARTER 1 DESKTOP APPLICATIONS - ESSENTIALS QUARTER 2 NETWORKING AND OPERATING SYSTEMS ESSENTIALS. Module 1 - Office Applications NETWORK ENGINEERING TRACK Linux Technologies QUARTER 1 DESKTOP APPLICATIONS - ESSENTIALS Module 1 - Office Applications This subject enables users to acquire the necessary knowledge and skills to use Office

More information

Faculty of Organizational Sciences

Faculty of Organizational Sciences Faculty of Organizational Sciences Management EC TS: 60/ L anguage of instruc tion: serbian/ degree: Specialis t Specialized academic study program in Management is the continuation of Master s studies

More information

Monfort College of Business Semester Course Syllabus (2015-2016) COURSE PREFIX/TITLE: BACS 382 TCP/IP Network Security Sem. Hrs. 3 Ed.

Monfort College of Business Semester Course Syllabus (2015-2016) COURSE PREFIX/TITLE: BACS 382 TCP/IP Network Security Sem. Hrs. 3 Ed. Monfort College of Business Semester Course Syllabus (2015-2016) COURSE PREFIX/TITLE: BACS 382 TCP/IP Network Security Sem. Hrs. 3 Ed. Cap: 40 CATALOG DESCRIPTION: Prerequisite: BACS 380 or consent of

More information

Certificate in Cyber Security

Certificate in Cyber Security Certificate in Cyber Security Offered as a partnership between Cape Peninsula University of Technology (CPUT), French South African Institute of Technology (F SATI), CS Interactive Training and Boshoff

More information

CYBER SECURITY INFORMATION SHARING & COLLABORATION

CYBER SECURITY INFORMATION SHARING & COLLABORATION Corporate Information Security CYBER SECURITY INFORMATION SHARING & COLLABORATION David N. Saul Senior Vice President & Chief Scientist 28 June 2013 Discussion Flow The Evolving Threat Environment Drivers

More information

future data and infrastructure

future data and infrastructure White Paper Smart Grid Security: Preparing for the Standards-Based Future without Neglecting the Needs of Today Are you prepared for future data and infrastructure security challenges? Steve Chasko Principal

More information

Security+ P a g e 1 of 5. 5-Day Instructor Led Course

Security+ P a g e 1 of 5. 5-Day Instructor Led Course P a g e 1 of 5 Security+ 5-Day Instructor Led Course Overview This course is the primary course you will need to take if your job responsibilities include securing network services, devices, and traffic

More information

A Joint Double Degree Programme focusing on the energy sector offered by:

A Joint Double Degree Programme focusing on the energy sector offered by: A Joint Double Degree Programme focusing on the energy sector offered by: University of Groningen Business School University of Groningen The Netherlands Robert H. Smith School of Business University of

More information

Aftermath of a Data Breach Study

Aftermath of a Data Breach Study Aftermath of a Data Breach Study Sponsored by Experian Data Breach Resolution Independently conducted by Ponemon Institute LLC Publication Date: January 2012 Ponemon Institute Research Report Aftermath

More information

MODULES FOR TRAINING PROGRAMMES ON CYBER SECURITY

MODULES FOR TRAINING PROGRAMMES ON CYBER SECURITY MODULES FOR TRAINING PROGRAMMES ON CYBER SECURITY 1) Awareness Programme on Cyber Security for Users of Computer Awareness Programme on Cyber Security for Users of Computer 1 day To make the users of computers

More information

RARITAN VALLEY COMMUNITY COLLEGE COURSE OUTLINE. CISY 229 Information Security Fundamentals

RARITAN VALLEY COMMUNITY COLLEGE COURSE OUTLINE. CISY 229 Information Security Fundamentals RARITAN VALLEY COMMUNITY COLLEGE COURSE OUTLINE CISY 229 Information Security Fundamentals I. Basic Course Information A. Course Number & Title: CISY-229 Information Security Fundamentals B. New or Modified

More information

TURNING THE RISING TIDE OF CYBERSECURITY THREATS

TURNING THE RISING TIDE OF CYBERSECURITY THREATS TURNING THE RISING TIDE OF CYBERSECURITY THREATS With cyber attacks on the rise, there s a growing need for digital forensic professionals with the knowledge and skills to investigate technology crimes

More information

Cyber Learning Solutions

Cyber Learning Solutions Cyber Learning Solutions 2014 Extended Course Catalog Raytheon Cyber Solutions Inc. (RCSI) cyber-training@list.app.ray.com www.raytheon.com 1 Raytheon Cyber Learning Solutions 2014 Catalog CONTENTS The

More information

Faculty of Humanities and Social Sciences Department of Health Sciences and Health Policy. Master in Health Sciences

Faculty of Humanities and Social Sciences Department of Health Sciences and Health Policy. Master in Health Sciences Faculty of Humanities and Social Sciences Department of Health Sciences and Health Policy Master in Health Sciences Dear Student After a successful start in 2013, the Master in Health Sciences Program

More information

Appendix A: Gap Analysis Spreadsheet. Competency and Skill List. Critical Thinking

Appendix A: Gap Analysis Spreadsheet. Competency and Skill List. Critical Thinking Appendix A: Gap Analysis Spreadsheet Competency and Skill List Competency Critical Thinking Data Collection & Examination Communication & Collaboration Technical Exploitation Information Security Computing

More information

Table of Contents. Introduction. Audience. At Course Completion

Table of Contents. Introduction. Audience. At Course Completion Table of Contents Introduction Audience At Course Completion Prerequisites Certified Professional Exams Student Materials Course Outline Introduction This four-day, instructor-led course provides students

More information

IEEI EXECUTIVE SEMINARS

IEEI EXECUTIVE SEMINARS IEEI EXECUTIVE SEMINARS BUSINESS DEVELOPMENT IN THE NETWORKED DIGITAL INDUSTRY 4 5 NOVEMBER 2009 MARRIOT HOTEL CAIRO PROMOTED BY INFORMATION TECHNOLOGY INDUSTRY DEVELOPMENT AGENCY Business Development

More information

Solving data residency and privacy compliance challenges Delivering business agility, regulatory compliance and risk reduction

Solving data residency and privacy compliance challenges Delivering business agility, regulatory compliance and risk reduction Solving data residency and privacy compliance challenges Delivering business agility, regulatory compliance and risk reduction Introduction In today s dynamic business environment, corporation s intangible

More information

GFSU Certified Cyber Crime Investigator GFSU-CCCI. Training Partner. Important dates for all batches

GFSU Certified Cyber Crime Investigator GFSU-CCCI. Training Partner. Important dates for all batches GFSU Certified Cyber Crime Investigator GFSU-CCCI 1. Internet Fundamentals 2. Cyber Crime Essentials 3. Cyber Investigation Essentials 4. Digital Evidence in Computer Devices 5. Cyber Forensics Essentials

More information

Cyber- Attacks: The New Frontier for Fraudsters. Daniel Wanjohi, Technology Security Specialist

Cyber- Attacks: The New Frontier for Fraudsters. Daniel Wanjohi, Technology Security Specialist Cyber- Attacks: The New Frontier for Fraudsters Daniel Wanjohi, Technology Security Specialist What is it All about The Cyber Security Agenda ; Protecting computers, networks, programs and data from unintended

More information

Strategic Plan On-Demand Services April 2, 2015

Strategic Plan On-Demand Services April 2, 2015 Strategic Plan On-Demand Services April 2, 2015 1 GDCS eliminates the fears and delays that accompany trying to run an organization in an unsecured environment, and ensures that our customers focus on

More information

Post-Class Quiz: Business Continuity & Disaster Recovery Planning Domain

Post-Class Quiz: Business Continuity & Disaster Recovery Planning Domain 1. What is the most common planned performance duration for a continuity of operations plan (COOP)? A. 30 days B. 60 days C. 90 days D. It depends on the severity of a disaster. 2. What is the business

More information

MSc Cyber Security UKPASS P052286. Course 1 Year Full-Time, 2-3 Years Part-Time

MSc Cyber Security UKPASS P052286. Course 1 Year Full-Time, 2-3 Years Part-Time MSc Cyber Security International Students Can Apply UKPASS P052286 Code: Course 1 Year Full-Time, 2-3 Years Part-Time Length: Start Dates: September 2015, January 2016, September 2016, January 2017 Department:Department

More information

Cyber Security. BDS PhantomWorks. Boeing Energy. Copyright 2011 Boeing. All rights reserved.

Cyber Security. BDS PhantomWorks. Boeing Energy. Copyright 2011 Boeing. All rights reserved. Cyber Security Automation of energy systems provides attack surfaces that previously did not exist Cyber attacks have matured from teenage hackers to organized crime to nation states Centralized control

More information

Services. Cybersecurity. Capgemini & Sogeti. Guiding enterprises and government through digital transformation while keeping them secure

Services. Cybersecurity. Capgemini & Sogeti. Guiding enterprises and government through digital transformation while keeping them secure Home Secure digital transformation SMACT Advise, Protect & Monitor Why Capgemini & Sogeti? In safe hands Capgemini & Sogeti Cybersecurity Services Guiding enterprises and government through digital transformation

More information

University of Maryland Cybersecurity Center (MC 2 )

University of Maryland Cybersecurity Center (MC 2 ) University of Maryland Cybersecurity Center (MC 2 ) Responding to the Needs of the State, the Nation, and the Global Community Pat Prof. Michael Hicks Director www.cyber.umd.edu/ Cybersecurity Challenge

More information

ICT Barriers, High Tech Crime, and Police

ICT Barriers, High Tech Crime, and Police ICT Barriers, High Tech Crime, and Police Mitchell F. Rice, Ph.D. Fellow, National Academy of Public Administration (Washington, DC) Professor of Political Science Mail Stop 4348 Texas A&M University College

More information

Information Security and Cryptography

Information Security and Cryptography Information Security and Cryptography Fundamentals and Applications June 1-3, 2015 Zurich, Switzerland Lecturers: David Basin, ETH Zurich Ueli Maurer, ETH Zurich ATG www.infsec.ch Program Starting 09:00

More information

Vendor Risk Management Financial Organizations

Vendor Risk Management Financial Organizations Webinar Series Vendor Risk Management Financial Organizations Bob Justus Chief Security Officer Allgress Randy Potts Managing Consultant FishNet Security Bob Justus Chief Security Officer, Allgress Current

More information

CISA TIMETABLE (4 DAYS)

CISA TIMETABLE (4 DAYS) CISA TIMETABLE (4 DAYS) ISACA-CISA Day 1 9.00 9.30 Welcome, Introductions, Coffee 9.30 11.00 About the CISA Exam Domain 1 - The Process of Auditing Information Systems Auditing Types of Audits Audit Methodology

More information

Ursuline College Accelerated Program URSULINE COLLEGE

Ursuline College Accelerated Program URSULINE COLLEGE Ursuline College Accelerated Program CRITICAL INFORMATION! DO NOT SKIP THIS LINK BELOW... BEFORE PROCEEDING TO READ THE UCAP MODULE, YOU ARE EXPECTED TO READ AND ADHERE TO ALL UCAP POLICY INFORMATION CONTAINED

More information

CYBERSECURITY: Is Your Business Ready?

CYBERSECURITY: Is Your Business Ready? CYBERSECURITY: Is Your Business Ready? Cybersecurity: Is your business ready? Cyber risk is just like any other corporate risk and it must be managed from the top. An organization will spend time monitoring

More information

Research Topics in the National Cyber Security Research Agenda

Research Topics in the National Cyber Security Research Agenda Research Topics in the National Cyber Security Research Agenda Trust and Security for our Digital Life About this document: This document summarizes the research topics as identified in the National Cyber

More information

InfoSec Academy Application & Secure Code Track

InfoSec Academy Application & Secure Code Track Fundamental Courses Foundational Courses InfoSec Academy Specialized Courses Advanced Courses Certification Preparation Courses Certified Information Systems Security Professional (CISSP) Texas Security

More information

Val-EdTM. Valiant Technologies Education & Training Services. 2-day Workshop on Business Continuity & Disaster Recovery Planning

Val-EdTM. Valiant Technologies Education & Training Services. 2-day Workshop on Business Continuity & Disaster Recovery Planning Val-EdTM Valiant Technologies Education & Training Services 2-day Workshop on Business Continuity & Disaster Recovery Planning All Trademarks and Copyrights recognized Page 1 of 8 Welcome to Valiant Technologies.

More information

CYBER SECURITY SPECIALIZATION. Dr. Andreas Peter Services, Cyber Security, and Safety Group

CYBER SECURITY SPECIALIZATION. Dr. Andreas Peter Services, Cyber Security, and Safety Group 1 CYBER SECURITY SPECIALIZATION Dr. Andreas Peter Services, Cyber Security, and Safety Group 2 CYBER SECURITY Why Cyber Security? Our world increasingly becomes digital and connected Cyber Security is

More information

ISM530 Enterprise Cybersecurity

ISM530 Enterprise Cybersecurity ISM530 Enterprise Cybersecurity Credit Hours: 3 Contact Hours: This is a 3-credit course, offered in accelerated format. This means that 16 weeks of material is covered in 8 weeks. The exact number of

More information

DOCTORAL HANDBOOK IN MUSIC EDUCATION

DOCTORAL HANDBOOK IN MUSIC EDUCATION DOCTORAL HANDBOOK IN MUSIC EDUCATION Admission Standards To be admitted to the doctoral program in music education, an applicant must have a master s degree in music education or a total of 30 credits

More information

Responsible Use of Technology and Information Resources

Responsible Use of Technology and Information Resources Responsible Use of Technology and Information Resources Introduction: The policies and guidelines outlined in this document apply to the entire Wagner College community: students, faculty, staff, alumni

More information

MBA AND EMBA PROGRAMMES AT COLOGNE BUSINESS SCHOOL

MBA AND EMBA PROGRAMMES AT COLOGNE BUSINESS SCHOOL WWW.CBS.DE/EN MBA AND EMBA PROGRAMMES AT COLOGNE BUSINESS SCHOOL ACADEMIC EXCELLENCE COLOGNE BUSINESS SCHOOL WHO WE ARE COLOGNE BUSINESS SCHOOL Since opening its doors in 1993, the Cologne Business School

More information

Department of Bioinformatics and Computational Biology College of Science Student Handbook

Department of Bioinformatics and Computational Biology College of Science Student Handbook Department of Bioinformatics and Computational Biology College of Science Student Handbook Introduction This handbook describes policies and procedures for the Certificate, M.S., and Ph.D. Bioinformatics

More information

Federal Bureau of Investigation s Integrity and Compliance Program

Federal Bureau of Investigation s Integrity and Compliance Program Evaluation and Inspection Division Federal Bureau of Investigation s Integrity and Compliance Program November 2011 I-2012-001 EXECUTIVE DIGEST In June 2007, the Federal Bureau of Investigation (FBI) established

More information

CYBERBOK Cyber Crime Security Essential Body of Knowledge: A Competency and Functional Framework for Cyber Crime Management

CYBERBOK Cyber Crime Security Essential Body of Knowledge: A Competency and Functional Framework for Cyber Crime Management CYBERBOK Security Essential Body of Knowledge: A Competency and Functional Framework for Security Workforce Development aligned with ISO 31000* risk management principles and guidelines. *Note : ISO 31000

More information

OCCUPATIONAL GROUP: Information Technology. CLASS FAMILY: Security CLASS FAMILY DESCRIPTION:

OCCUPATIONAL GROUP: Information Technology. CLASS FAMILY: Security CLASS FAMILY DESCRIPTION: OCCUPATIONAL GROUP: Information Technology CLASS FAMILY: Security CLASS FAMILY DESCRIPTION: This family of positions provides security and monitoring for the transmission of information in voice, data,

More information

TUSKEGEE CYBER SECURITY PATH FORWARD

TUSKEGEE CYBER SECURITY PATH FORWARD TUSKEGEE CYBER SECURITY PATH FORWARD Preface Tuskegee University is very aware of the ever-escalating cybersecurity threat, which consumes continually more of our societies resources to counter these threats,

More information

CONTENT. King Hussein Faculty of Computing Sciences

CONTENT. King Hussein Faculty of Computing Sciences CONTENT About Mission, Vision & Goals Computing Sciences Faculty Computing Sciences Resources Bachelors Degree Programs B. Sc. Program in Computer Science B. Sc. Program in Software Engineering B. Sc.

More information

Preface to the Fourth Edition

Preface to the Fourth Edition The frequency of new editions of this book is indicative of the rapid and tremendous changes in the fields of computer and information sciences. First published in 1995, the book has rapidly gone through

More information

PROVISIONAL ACADEMIC REGULATIONS KAUNAS UNIVERSITY OF TECHNOLOGY CHAPTER I. GENERAL PROVISIONS CHAPTER II. SCIENCE AND STUDIES GOVERNANCE

PROVISIONAL ACADEMIC REGULATIONS KAUNAS UNIVERSITY OF TECHNOLOGY CHAPTER I. GENERAL PROVISIONS CHAPTER II. SCIENCE AND STUDIES GOVERNANCE ANNEX 22 APPROVED By the decision of Senate of Kaunas University of Technology as of June 20 2012, No. V3-S-48 PROVISIONAL ACADEMIC REGULATIONS KAUNAS UNIVERSITY OF TECHNOLOGY CHAPTER I. GENERAL PROVISIONS

More information

An Evaluation of Privacy and Security Issues at a Small University

An Evaluation of Privacy and Security Issues at a Small University An Evaluation of Privacy and Security Issues at a Small University Abstract by Michael North Carolina Agricultural and Technical State University mejones@ncat.edu Colleges and universities process large

More information

SOUTHERN WEST VIRGINIA COMMUNITY AND TECHNICAL COLLEGE BOARD OF GOVERNORS MEETING OF APRIL 16, 2013. Post-audit Review of Occupational Programs

SOUTHERN WEST VIRGINIA COMMUNITY AND TECHNICAL COLLEGE BOARD OF GOVERNORS MEETING OF APRIL 16, 2013. Post-audit Review of Occupational Programs SOUTHERN WEST VIRGINIA COMMUNITY AND TECHNICAL COLLEGE BOARD OF GOVERNORS MEETING OF APRIL 16, 2013 ITEM: RECOMMENDED RESOLUTION: STAFF MEMBER: Post-audit Review of Occupational Programs RESOLVED, That

More information

C HFI C HFI. EC-Council. EC-Council. Computer Hacking Forensic Investigator. Computer. Computer. Hacking Forensic INVESTIGATOR

C HFI C HFI. EC-Council. EC-Council. Computer Hacking Forensic Investigator. Computer. Computer. Hacking Forensic INVESTIGATOR Page: 1 TM C HFI Computer C HFI Computer Hacking Forensic INVESTIGATOR Hacking Forensic INVESTIGATOR TM v8 v8 Page: 2 Be the leader. Deserve a place in the CHFI certified elite class. Earn cutting edge

More information

ITM 641: Information Security Policies Syllabus Sanjay Goel School of Business University at Albany, State University of New York

ITM 641: Information Security Policies Syllabus Sanjay Goel School of Business University at Albany, State University of New York INSTRUCTOR INFORMATION Name: Sanjay Goel Email: goel@albany.edu Phone: (518) 442-4925 Office Location: BA 310b, University at Albany Office Hours: TBD CLASS INFORMATION Time: N/A Location: Online Dates:

More information

The Case for Support: The Center for Cyber Security Studies at the U. S. Naval Academy

The Case for Support: The Center for Cyber Security Studies at the U. S. Naval Academy The Case for Support: The Center for Cyber Security Studies at the U. S. Naval Academy Computer and network security threats of the future are of concern today, and new strategies are required to ensure

More information

F:\COMP\SCIENCE\CYBER SECURITY RESEARCH AND DEVELOPMENT ACT.XML

F:\COMP\SCIENCE\CYBER SECURITY RESEARCH AND DEVELOPMENT ACT.XML [ UPDATE COMP VERSION: This file reflects the execution of the amendments made by PL 113-283. Note that this version has been designed for review purposes just prior to publishing and replacing the source

More information

CYBER SECURITY TRAINING SAFE AND SECURE

CYBER SECURITY TRAINING SAFE AND SECURE CYBER SECURITY TRAINING KEEPING YOU SAFE AND SECURE Experts in Cyber Security training. Hardly a day goes by without a cyber attack being reported. With this ever-increasing threat there is a growing need

More information

Computer Security Courses/Programs

Computer Security Courses/Programs Minneapolis, MN. Computer Security Courses/Programs Developed at Metropolitan State University Jigang Liu Department of Information and Computer Sciences College of Arts and Sciences Metropolitan State

More information

Programme on Strategic Human Resource Management

Programme on Strategic Human Resource Management Management Development Programme Programme on Strategic Human Resource Management in Dubai from Mar 2012 Jul 2012 Strategic Human Resource Management Programme (A 12 days intensive programme spread over

More information

CSCI 454/554 Computer and Network Security. Instructor: Dr. Kun Sun

CSCI 454/554 Computer and Network Security. Instructor: Dr. Kun Sun CSCI 454/554 Computer and Network Security Instructor: Dr. Kun Sun About Instructor Dr. Kun Sun, Assistant Professor of Computer Science http://www.cs.wm.edu/~ksun/ Phone: (757) 221-3457 Email: ksun@wm.edu

More information

CAS Digital Innovation and Business Transformation

CAS Digital Innovation and Business Transformation CAS Digital Innovation and Business Transformation Empowering you to master digital transformation The Digital Age is here. The Net Generation has arrived. Meet the future. We are pleased to present to

More information

RUAG Cyber Security. More security for your data

RUAG Cyber Security. More security for your data RUAG Cyber Security More security for your data More security in cyberspace The RUAG Cyber Security Portfolio offers greater protection for your data through inspection, event analysis and decision-making

More information

Master in International Business

Master in International Business Master in International Business Offered jointly with Introduction Welcome to Barcelona Welcome to UPF Barcelona, located in the Northeastern coast of Spain, is one of Europe s most cosmopolitan cities

More information

Microsoft Technologies

Microsoft Technologies NETWORK ENGINEERING TRACK Microsoft Technologies QUARTER 1 DESKTOP APPLICATIONS - ESSENTIALS Module 1 - Office Applications This subject enables users to acquire the necessary knowledge and skills to use

More information

How To Be A Baccalaureate Prepared Nurse

How To Be A Baccalaureate Prepared Nurse 1 Statement of Understanding Thank you for your interest in becoming a part of the Carroll College Nursing Program. The decision to apply to the nursing program is one that you have already spent time

More information

Symantec Cyber Security Services: A Recipe for Disaster

Symantec Cyber Security Services: A Recipe for Disaster When On-The-Job Training Is a Recipe for Disaster How security simulation prepares IT staff for APTs, breaches and data leakages Contents Sometimes On-The-Job Training Is a Lousy Idea... 2 On-The-Job Training

More information

2015 APPLICATION FOR AABS MEMBERSHIP APPLICATION FORM: Please complete this form and return to Mamodise via email info@aabschools.

2015 APPLICATION FOR AABS MEMBERSHIP APPLICATION FORM: Please complete this form and return to Mamodise via email info@aabschools. 2015 APPLICATION FOR AABS MEMBERSHIP APPLICATION FORM: Please complete this form and return to Mamodise via email info@aabschools.com Membership Type (Please mark one option) Full AABS Membership Pipeline

More information

Time Is Not On Our Side!

Time Is Not On Our Side! An audit sets the baseline. Restricting The next steps Authenticating help prevent, Tracking detect, and User Access? respond. It is rare for a few days to pass without news of a security breach affecting

More information

Curriculum for the PhD Program Management at the University of Innsbruck School of Management

Curriculum for the PhD Program Management at the University of Innsbruck School of Management The English version of the curriculum for the PhD Program Management is not legally binding and is for informational purposes only. The legal basis is regulated in the curriculum published in the University

More information

Cyber Security. A professional qualification awarded in association with University of Manchester Business School

Cyber Security. A professional qualification awarded in association with University of Manchester Business School ICA Advanced Certificate in Cyber Security A professional qualification awarded in association with University of Manchester Business School An Introduction to the ICA Advanced Certificate In Cyber Security

More information

Design of a University Portal with Biometric Lecture Attendance Monitoring System

Design of a University Portal with Biometric Lecture Attendance Monitoring System Scholars Journal of Engineering and Technology (SJET) Sch. J. Eng. Tech., 2014; 2(6B):847-856 Scholars Academic and Scientific Publisher (An International Publisher for Academic and Scientific Resources)

More information

Introduction to Cybersecurity Overview. October 2014

Introduction to Cybersecurity Overview. October 2014 Introduction to Cybersecurity Overview October 2014 Introduces the importance of cybersecurity and current trends Eight modules with presentations and panel discussions that feature industry experts Activities,

More information

The International MBA in Corporate Security Management (IMBASM) Distance Learning

The International MBA in Corporate Security Management (IMBASM) Distance Learning MEDITERRANEAN INSTITUTE FOR SCIENTIFIC RESEARCH The International MBA in Corporate Security Management (IMBASM) Distance Learning Module Content Modules: Aims and Objectives Mandatory Modules SS247M1:

More information

Network Security Policy

Network Security Policy Network Security Policy Policy Contents I. POLICY STATEMENT II. REASON FOR POLICY III. SCOPE IV. AUDIENCE V. POLICY TEXT VI. PROCEDURES VII. RELATED INFORMATION VIII. DEFINITIONS IX. FREQUENTLY ASKED QUESTIONS

More information

Doctoral Programs. the globally networked management school

Doctoral Programs. the globally networked management school Doctoral Programs the globally networked management school Accreditation Accreditation is the review of the quality of higher education institutions and programs. Why is accreditation important? It is

More information

MSc Cyber Security. identity. hacker. virus. network. information

MSc Cyber Security. identity. hacker. virus. network. information identity MSc Cyber Security hacker virus QA is the foremost provider of education in the UK. We work with individuals at all stages of their careers, from our award-winning apprenticeship programmes, through

More information

Panel on Emerging Cyber Security Technologies. Robert F. Brammer, Ph.D., VP and CTO. Northrop Grumman Information Systems.

Panel on Emerging Cyber Security Technologies. Robert F. Brammer, Ph.D., VP and CTO. Northrop Grumman Information Systems. Panel on Emerging Cyber Security Technologies Robert F. Brammer, Ph.D., VP and CTO Northrop Grumman Information Systems Panel Moderator 27 May 2010 Panel on Emerging Cyber Security Technologies Robert

More information

Security + Certification (ITSY 1076) Syllabus

Security + Certification (ITSY 1076) Syllabus Security + Certification (ITSY 1076) Syllabus Course: ITSY 1076 Security+ 40 hours Course Description: This course is targeted toward an Information Technology (IT) professional who has networking and

More information

Rogers Insurance Client Presentation

Rogers Insurance Client Presentation Rogers Insurance Client Presentation Network Security and Privacy Breach Insurance Presented by Matthew Davies Director Professional, Media & Cyber Liability Chubb Insurance Company of Canada mdavies@chubb.com

More information