Toward Curricular Guidance in the Cyber Sciences
|
|
|
- Claribel Allison
- 10 years ago
- Views:
Transcription
1 Toward Curricular Guidance in the Cyber Sciences 1 6 J U N E C I S S E L A S V E G A S D A V I D G I B S O N, U S A I R F O R C E A C A D E M Y B E T H H A W T H O R N E, U N I O N C O U N T Y C O L L E G E S C O T T B U C K, I N T E L S U E F I T Z G E R A L D, M E T R O P O L I T A N S T A T E U N I V E R S I T Y S T E V E N L I N G A F E L T, I B M w w w. c y b e r e d u c a t i o n p r o j e c t. o r g
2 Outline CEP history, goals, and organization What are the cyber sciences? Why cyber sciences accreditation? Learning Outcomes approach and progress Support from NSF, ACM and IEEE Questions and feedback How can you help?
3 The Cyber Education Project Who are we? Academia, Industry, Government, Professional Societies What is the goal of the CEP? The goal of the CEP is to develop curriculum guidelines for the cyber sciences and to make the case for accreditation of undergraduate cyber sciences programs. How is the CEP organized? Committees: Learning Outcomes, Accreditation, Stakeholder, and Steering Committee Industry Advisory Board How did we get here? ABET Jul 2014, NICE Nov 2014, SIGCSE Mar 2015, ISEW May 2015, CISSE Jun 2015, ABET Jul 2015,
4 What is Cyber Sciences?
5
6 Why Cyber Sciences Accreditation? NSA s Center of Academic Excellence programs have worked well increasing the number of information assurance and cyber operations programs Some undergraduate cyber programs currently seek accreditation under ABET s Computing Accreditation Commission (CS, IS and IT programs) The CEP sees a need for accreditation of programs like info assurance, cyber security, cyber operations, and digital forensics which have a different focus than traditional CS, EE, CompE, IS, and IT programs
7 Accreditation Committee Goal Goal: Develop and submit to ABET proposed undergraduate accreditation criteria for selected disciplines within the Cyber Sciences umbrella Target dates: Fall 2015-Spring 2016: draft accreditation criteria Summer 2016: provide ABET with draft accreditation criteria for review by summer 2016 Academic year 2017/18: conduct pilot cyber science program accreditation visits
8 Accreditation Committee Sources of Information: Learning Outcomes Committee Existing ABET Criteria Existing curricula and other bodies of knowledge Stakeholders and/or Subject Matter Experts Committee Collaboration Logistics: Google drive shared folder for documents Google discussion group Conference calls Face-to-face meetings and workshops
9 Accreditation Activities and Timeline
10 LO Committee Membership Co-chair: David Hoot Gibson, US Air Force Academy Co-chair: Elizabeth Beth Hawthorne, Union County College, ACM Education Board 35-member Learning Outcomes Working Group Online Forum: cyberedproject Google Group To join the group, send to Meetings: SIGCSE (March 2015) CISSE (June 2015), ABET (July 2015)
11 Role of Learning Outcomes Committee Develop learning outcomes which characterize the knowledge, skills, and abilities gained by students in undergraduate cyber sciences programs. Build upon previous works to define related bodies of knowledge and seek diverse perspectives to build an interdisciplinary set of learning outcomes which broadly define cyber sciences education at the undergraduate level.
12 Learning Outcomes Process (1 of 2) Survey and review of relevant published works Reviewed and ranked 47 published works, adding new works Survey Monkey - Conducting a series of workshops NICE, ISEW, CISSE, others Compile and evaluate existing lists of relevant learning outcomes and workforce competencies Work led by Beth Hawthorne is ongoing Use existing knowledge area and skill competency taxonomies, propose a draft cyber sciences taxonomy Work led by Hoot Gibson is ongoing
13 Learning Outcomes Process (2 of 2) Conduct a gap analysis of the draft taxonomy and outcomes Refine and augment learning outcomes and taxonomy Vet learning outcomes with academia, industry, and government Create curricular guidance endorsed by one or more professional societies, e.g., ACM, IEEE, AIS Inform program criteria for accreditation, e.g., ABET
14 Learning Outcome Target Programs Level of target programs Schools developing 4-year undergraduate programs Bachelor degrees Schools developing 2-year lower division, undergraduate programs Associate degrees Possible range of target programs (notional) secure systems engineering secure software engineering computer and network security cyber operations information assurance cyber law enforcement cyber policy, governance, and law others
15 Sources of Learning Outcomes ACM/IEEE CS2013 IAS Knowledge Area ACM/IEEE IT2008 IAS Knowledge Area ACM IT2014 Associate-degree Competency Model ITiCSE Towards Information Assurance Guidelines NSA/DHS CAE in Info Assurance/Cyber Defense NSA CAE in Cyber Operations US Military Academy Cyber Ed WG Draft BoK Workforce-based Competencies US DHS NICE Cybersecurity Workforce Framework US Dept of Labor Cybersecurity Competency Model US Dept of Energy Essential Body of Knowledge US DHS 2008 IT Security Essential Body of Knowledge
16 Learning Outcomes Working Group Meeting The LOWG will meet from 3:00 to 5:00 pm today in the Marbella Room
17 CEP Industry Advisory Board Mission of the Cyber Science Industry Advisory Board is to be a resource for the CEP steering committee through offering an industry view in the development of a Cyber Sciences program. Role of Industry Advisory Boards is to: Review the learning outcomes document developed by the CEP LOC and categorize them as of low, medium, or high importance for personnel in cyber related positions. Additionally the CEP looks to the Industry Partners to provide guidance in: Insight into job titles and descriptions relating to cyber security; Develop a list of the education, training, and experience desired and/or required for personnel hired into cyber security and related positions; Provide awareness of industry specific cyber security related skills most important to industry.
18 Professional Societies ACM, IEEE, and IEEE-CS are engaged with the Cyber Education Project ACM Education Board is sponsoring a delegation to produce an undergraduate curricular volume (similar to CS2013) IEEE-CS and AIS will be asked to form a joint task force with ACM
19 CEP Funding Travel funding for CEP leaders and key workers has been provided by the National Science Foundation We gratefully acknowledge that funding for this work was provided in part by the National Science Foundation under grant number DGE ACM will support its delegation as needed Other partnering professional societies will be asked to do the same
20 Questions and Feedback
21 CEP Leadership Steering Committee Andrew Phillips, Chair U.S. Naval Academy Melissa Dark, Research Outreach Purdue University Jean Blair U.S. Military Academy Allen Parrish, Communications The University of Alabama Chris Inglis, Chief of Staff U.S. Naval Academy Stakeholder Committee Sue Fitzgerald, Co-Chair Metropolitan State University Diana Burley, Co-Chair George Washington University Learning Outcomes Committee David Gibson, Co-chair U.S. Air Force Academy Elizabeth Hawthorne, Co-chair Union County College Accreditation Committee Raymond Greenlaw, Co-chair U.S. Naval Academy Steven Lingafelt, Co-chair IBM Industry Advisory Board Scott, Buck, Chair Intel Corporation
22 Getting Involved Visit These slides will be available at this site Join the CEP Learning Outcomes Working Group Talk to anyone on the previous slide
In Response to Section 942 of the National Defense Authorization Act for Fiscal Year 2014 (Public Law 113-66) Terry Halvorsen DoD CIO
A Department of Defense Report on the National Security Agency and Department of Homeland Security Program for the National Centers of Academic Excellence in Information Assurance Education Matters In
Cybersecurity Educational Standards
Cybersecurity Educational Standards Stephen Cooper, Stanford University Elizabeth Hawthorne, Union County College Lance C. Pérez, University of Nebraska - Lincoln Susanne Wetzel, Stevens Institute of Technology
Cyber Security at NSU
Cyber Security at NSU Aurelia T. Williams, Ph.D. Chair, Department of Computer Science Associate Professor of Computer Science June 9, 2015 Background Undergraduate computer science degree program began
NICE and Framework Overview
NICE and Framework Overview Bill Newhouse NIST NICE Leadership Team Computer Security Division Information Technology Lab National Institute of Standards and Technology TABLE OF CONTENTS Introduction to
Cyber Education: A Multi-Level, Multi-Discipline Approach
Cyber Education: A Multi-Level, Multi-Discipline Approach Edward Sobiesk, Jean Blair, Gregory Conti, Michael Lanham, and Howard Taylor United States Military Academy West Point, New York 10996 USA edward.sobiesk,
National Initiative for Cyber Security Education
2014/PPWE/SEM2/007 Agenda Item: 5 National Initiative for Cyber Security Education Submitted by: United States Women Business and Smart Technology Seminar Beijing, China 23 May 2014 NICE OVERVIEW Women
How to use the National Cybersecurity Workforce Framework. Your Implementation Guide
How to use the National Cybersecurity Workforce Framework Your Implementation Guide A NATIONAL PROBLEM The Nation needs greater cybersecurity awareness. The US workforce lacks cybersecurity experts. Many
National Cyber Security Awareness Month. Week Five: Building the Next Generation of Cyber Professionals
National Cyber Security Awareness Month Week Five: Building the Next Generation of Cyber Professionals Webinar recording and evaluation survey This webinar is being recorded and will be made available
Developing and Enhancing Cyber Security Capabilities in the Region. Khaled Gamo Technology Advisor Ministry of communication and informatics
Developing and Enhancing Cyber Security Capabilities in the Region Khaled Gamo Technology Advisor Ministry of communication and informatics 1 Content 1 2 3 Cyber Security Strategy and Key Requirement Efforts
Sabbatical Leave Application
LOS RIOS COMMUNITY COLLEGE DISTRICT Sabbatical Leave Application Name Lance Parks College: CRC Present Assignment: CIS Type of Leave Requested: A. Type A One Semester: Fall Spring X Entire Year Will you
Introduction to NICE Cybersecurity Workforce Framework
Introduction to NICE Cybersecurity Workforce Framework Jane Homeyer, Ph.D., Deputy ADNI/HC for Skills and Human Capital Data, ODNI Margaret Maxson, Director, National Cybersecurity Education Strategy,
UNM Information Assurance Scholarship for Service (SFS) Program
UNM Information Assurance Scholarship for Service (SFS) Program What is Information Assurance? Committee on National Security Systems (CNSS) defines information assurance (IA): Measures that protect and
Strategic Progress Update July 2014 March 2015
Strategic Progress Update July 2014 March 2015 Presented to the SUS Board of Governors By Sri Sridharan, FC 2 Managing Director and Chief Operating Officer March 18, 2015 Mission / Goals 1. Position Florida
Certifications and Standards in Academia. Dr. Jane LeClair, Chief Operating Officer National Cybersecurity Institute
Certifications and Standards in Academia Dr. Jane LeClair, Chief Operating Officer National Cybersecurity Institute Accreditation What is it? Why is it important? How is it attained? The National Centers
This report describes the preliminary findings from the first year of a twoyear. pilot study conducted between Union County College (UCC) and Stevens
Introduction Building an Educational Pathway in Cybersecurity between Union County College and Stevens Institute of Technology by PIs, Drs. Wetzel, Hawthorne and Roemer This report describes the preliminary
Goal. Vision. CAE IA/CD Program Eligibility and Summary
Goal Vision National Centers of Academic Excellence in Information Assurance/Cyber Defense (IA/CD) Education Program Criteria for Measurement Jointly Sponsored by the National Security Agency (NSA) and
The National Cybersecurity Workforce Framework. 2015 Delaware Cyber Security Workshop September 29, 2015
The National Cybersecurity Workforce Framework 2015 Delaware Cyber Security Workshop September 29, 2015 Bill Newhouse NICE Program Office at the National Institute of Standards and Technology NICE is a
Goal. Vision. CAE 2Y Program Eligibility and Summary
Goal National Centers of Academic Excellence in Information Assurance/Cyber Defense for Two-Year Education (CAE2Y) Program Criteria for Measurement Jointly Sponsored by the National Security Agency (NSA)
Program Contact Information (name, title, telephone number, and email address)
Name of Institution The Citadel Name of Proposed Center/Institute Center for Cybersecurity Education and Research Proposed Date of Implementation January 1, 2016 Site Department of Mathematics and Computer
SECURE AND TRUSTWORTHY CYBERSPACE (SaTC)
SECURE AND TRUSTWORTHY CYBERSPACE (SaTC) Overview The Secure and Trustworthy Cyberspace (SaTC) investment is aimed at building a cybersecure society and providing a strong competitive edge in the Nation
ACM Education Board. Please note that the Motions passed on this call and Action Items appear both in the notes and at the end.
ACM Education Board Conference Call, Thursday 9 th August, 2007 Participants: Andrew McGettrick, Chair Boots Cassel Gordon Davies Dan Garcia John Impagliazzo Jane Prey Eric Roberts Heikki Topi ACM Representatives:
The Systems Engineering Body of Knowledge and Graduate Reference Curriculum
The Systems Engineering Body of Knowledge and Graduate Reference Curriculum David Olwell Naval Postgraduate School 777 Dyer Road (SE/OL BU220K) Monterey, CA 93943 [email protected] Alice Squires Stevens
Program Logistics for: Cyber Security Defense Certificate
Program Logistics for: Cyber Security Defense Certificate Naval Postgraduate School Center for Information Systems Security Studies and Research (CISR) Monterey, CA 93943 [email protected] Overview This document
NASCIO 2014 State IT Recognition Awards
NASCIO 2014 State IT Recognition Awards Project: California Cybersecurity Task Force Category: Cybersecurity Initiatives Project Initiation Date: September, 2012 Project Completion Date: May 2013 Carlos
EDUCATION DEGREES University of California Ph.D. Information & Computer Science 1990
Bonnie E. Melhart Associate Provost and Dean of University Programs TCU Box 297024 Fort Worth, Texas 76129 [email protected] Office phone: 817.257.5570 Home phone: 817-341-2560 Mobile phone: 817-726-4635
COMPSCIDEPTINST 1520 15 Dec 2012. 1. Purpose. This instruction updates the Computer Science Department s Assessment Plan.
COMPSCIDEPTINST 1520 15 Dec 2012 Computer Science Department Instruction 1520 From: Chair, Computer Science Department Subj: ASSESSMENT PLAN Encl: (1) Long-Range Assessment Plan 1. Purpose. This instruction
Cybersecurity High School and Beyond
Cybersecurity High School and Beyond High School Career Fair and Expo March 29, 2014 Diane G. Miller, CCP Director, Operations Northrop Grumman Information Security Program Director, CyberPatriot Topics
Becoming a Cyber Professional: A Discussion with Recent Graduates
Becoming a Cyber Professional: A Discussion with Recent Graduates Moderator: George L. Heron, LifeJourney USA Panelists: Danielle Santos, Assistant Program Manager, Cyber Formal Education, DHS Scott Wallace.
Purdue University Department of Computer Science West Lafayette, IN Strategic Plan 2010-2015
Purdue University Department of Computer Science West Lafayette, IN Strategic Plan 2010-2015 Final Version 5.0: May 3, 2010 Computer science is a discipline that involves the understanding and design of
ABET Systems Engineering Accreditation
ABET Systems Engineering Accreditation By: Armand Ash, Ph.D. [email protected] 1 ABET Systems engineering programs at universities in the United States are currently being evaluated using ABET s general
A Rhode Island Academic Collaboration. Cybersecurity Technology and Policy (CCTP)
A Rhode Island Academic Collaboration on Cybersecurity Technology and Policy (CCTP) Abstract The University of Rhode Island, Brown University, and the U.S. Naval War College, with the engagement of Bryant
Call for Proposal for Local Hosting National Women in Cybersecurity Conference 2016
Call for Proposal for Local Hosting National Women in Cybersecurity Conference 2016 Project Background The Women in Cybersecurity (WiCyS) Initiative was launched with the help of a National Science Foundation
Proposed Education & Workforce Development Plan for FY2015. Education & Workforce Development Work Group Andrew Turner November 2014
Proposed Education & Workforce Development Plan for FY2015 Education & Workforce Development Work Group Andrew Turner November 2014 Current Opportunities Significant state-wide opportunities for Cyber
Federal Reserve System Secure Payments Task Force
2015 Federal Reserve System. Materials are not to be used without Federal Reserve consent. Federal Reserve System Secure Payments Task Force Teleconference June 4, 2015 Secure Payments Task Force Anti-Trust
OUTLINE FOR AN INTERDISCPLINARY CERTIFICATE PROGRAM
OUTLINE FOR AN INTERDISCPLINARY CERTIFICATE PROGRAM I. Basic Information 1. Institution: University of Georgia Date: September 28, 2015 2. School/College: Franklin College of Arts and Sciences 3. Department/Division:
COMMISSION OF VALENCIA COLLEGE SCHOOL OF PUBLIC SAFETY
December 17, 2014 TO: FROM: RE: THE DISTRICT BOARD OF TRUSTEES OF VALENCIA COLLEGE SANFORD C. SHUGART President COMMISSION OF VALENCIA COLLEGE SCHOOL OF PUBLIC SAFETY Valencia College desires to implement
Centers of Academic Excellence in Cyber Security (CAE-C) Knowledge Units Review
Centers of Academic Excellence in Cyber Security (CAE-C) Knowledge Units Review Review Process The Knowledge Unit (KU) Review Calendar divides the entire CAE-C KU list into 12 months for the purposes of
SECURE POWER SYSTEMS PROFESSIONALS (SPSP) PROJECT PHASE 3, FINAL REPORT: RECRUITING, SELECTING, AND DEVELOPING SECURE POWER SYSTEMS PROFESSIONALS
1 SECURE POWER SYSTEMS PROFESSIONALS (SPSP) PROJECT PHASE 3, FINAL REPORT: RECRUITING, SELECTING, AND DEVELOPING SECURE POWER SYSTEMS PROFESSIONALS Synopsis SPSP Project Overview Phase I Summary Phase
NICE Cybersecurity Workforce Framework Tutorial
NICE Cybersecurity Workforce Framework Tutorial Jane Homeyer, Ph.D., Deputy ADNI/HC for Skills and Human Capital Data, ODNI Margaret Maxson, Director, National Cybersecurity Education Strategy, DHS Outline
Academic Unit Action Plan: SOCIAL WORK
Academic Unit Action Plan: SOCIAL WORK Academic Unit Name School of Social Work_(Orillia) 2012 2017 Lakehead University Academic Plan Priorities Academic Unit Goals for the Period 2012 2017 Action(s) Designed
Department of Electrical Engineering and Computer Science (EECS) Bylaws for Program Structure
Department of Electrical Engineering and Computer Science (EECS) Bylaws for Program Structure I. Mission and Objectives: The mission of the University of Kansas Department of Electrical Engineering and
Indiana University-Purdue University Fort Wayne (IPFW)
Program Summary Task Force: Thank you for the time and effort you put forth in your report. Through the USAP process, we are working to create a culture of continuous improvement; setting specific and
DEPARTMENT OF ACCOUNTANCY ASSESSMENT PLAN FOR MASTER OF SCIENCE IN TAXATION (M.S.T.) DEGREE
DEPARTMENT OF ACCOUNTANCY ASSESSMENT PLAN FOR MASTER OF SCIENCE IN TAXATION (M.S.T.) DEGREE I. Department Mission II. Program Learning Goals and Objectives III. Methods to Evaluate Effectiveness In support
ABET Accreditation. Michael K. J. Milligan, PhD, PE, CAE. Executive Director Chief Executive Officer April 2015. Copyright 2015 by ABET
ABET Accreditation Michael K. J. Milligan, PhD, PE, CAE Executive Director Chief Executive Officer April 2015 2 Topics Introduction to ABET The Accreditation Process ABET Criteria Training Philosophy The
Cybersecurity in K-12 Formal Education
Cybersecurity in K-12 Formal Education Jan Cuny and Jim Hamos, National Science Foundation WWW.CSRC.NIST.GOV/NICE/ 10/10/2011 NICE Strategic Plan: Formal Education (Goal 2) Broaden the pool of skilled
National Initiative for Cybersecurity Education
ISACA National Capital Area Chapter March 25, 2014 National Initiative for Cybersecurity Education Montana Williams, Branch Chief Benjamin Scribner, Program Director Department of Homeland Security (DHS)
University of Illinois Department of Computer Science Goals, Objectives, and Assessments January 2009
University of Illinois Department of Computer Science Goals, Objectives, and Assessments January 2009 Introduction The University of Illinois Computer Science Department is among the oldest CS departments
ACADEMIC AFFAIRS COUNCIL ******************************************************************************
ACADEMIC AFFAIRS COUNCIL AGENDA ITEM: 5.Q DATE: April 1, 2015 ****************************************************************************** SUBJECT: Articulation Agreement DSU & NSA Board of Regents Policy
ASSESSMENT PLAN FOR MASTER OF SCIENCE IN TAXATION (M.S.T.) DEGREE OCTOBER 2012
ASSESSMENT PLAN FOR MASTER OF SCIENCE IN TAXATION (M.S.T.) DEGREE OCTOBER 2012 DEPARTMENT OF ACCOUNTANCY ASSESSMENT PLAN FOR MASTER OF SCIENCE IN TAXATION (M.S.T.) DEGREE I. Department Mission II. Program
CURRICULUM VITAE Herbert L. Dershem
CURRICULUM VITAE Visiting Professor of Computer Science United States Air Force Academy USAF Academy, CO 80840 Phone: (719) 472-3590 Education: B.S. University of Dayton, 1965 M.S. (Computer Science) Purdue
Protecting Energy s Infrastructure and Beyond: Cybersecurity for the Smart Grid
Protecting Energy s Infrastructure and Beyond: Cybersecurity for the Smart Grid Which is it? Cyber Security ~or~ Cybersecurity? Dr. Ernie Lara President Presenters Estrella Mountain Community College Dr.
March 18, 2015. Overview of BHEF
Statement of Dr. Brian K. Fitzgerald, Chief Executive Officer, Business-Higher Education Forum Before the Subcommittee on Labor, Health and Human Services, Education, and Related Agencies, Committee on
CURRICULUM VITAE. Amardeep Kahlon +1 (512) 223-2069 Email: [email protected]
CURRICULUM VITAE Amardeep Kahlon +1 (512) 223-2069 Email: [email protected] EDUCATION HISTORY Doctor of Philosophy Higher Education Administration University of Texas at Austin Major area of research
CAE Program Updates and Support
May 29, 2015 CAE Program Updates and Support National CyberWatch Center Prince George s Community College Room 129B 301 Largo Road Largo, MD 20774 www.nationalcyberwatch.org 2 Webinar Protocol :: Mute
Department of Defense Information Assurance Scholarship Program. Sponsored by the. DoD Chief Information Officer
Department of Defense Information Assurance Scholarship Program Sponsored by the DoD Chief Information Officer SOLICITATION FOR PROPOSALS From Universities Designated by the National Security Agency (NSA)
Security Education for the new Generation
Security Education for the new Generation SESSION SESSION ID: ID: MASH-W02 Wednesday, Feb 26, 9:20 AM @ WEST 3018 Jacob West Chief Technology Officer HP Enterprise Security Products Matt Bishop Professor
Graduate Program Review of EE and CS
Graduate Program Review of EE and CS The site visit for the Graduate Program Review of Electrical Engineering and Computer Science took place on April 3-4. It included meetings with many constituencies
STEM Skills for All: Designing Data Science Programs through Business and Higher Education Collaboration. SENCER 2015 Summer Institute
STEM Skills for All: Designing Data Science Programs through Business and Higher Education Collaboration SENCER 2015 Summer Institute Worcester Polytechnic Institute 2015 BHEF Overview The session will
California State University, Stanislaus GENERAL EDUCATION: ASSESSMENT CHRONOLOGY
California State University, Stanislaus GENERAL EDUCATION: ASSESSMENT CHRONOLOGY The General Education Program has taken the following steps toward assessment of the quality of General Education. 1997/1998
Operationally Focused CYBER Training Framework
Operationally Focused CYBER Training Framework Deputy Director, Field Security Operations 9 May 2012 Agenda DISA Cyber Workforce Training Vision Basic Tenets Role-based Educational/Assessment implementation
NATIONAL INITIATIVE FOR CYBERSECURITY EDUCATION SAN DIEGO, CA
NATIONAL INITIATIVE FOR CYBERSECURITY EDUCATION SAN DIEGO, CA Dr. Aurelia T. Williams, NSU Ms. Kamilah Brown, CCSD Mr. Ronald Williams, DTC Mr. Tony Baylis, LLNL November 3, 2015 Who Are We? A collaborative
California Counties Information Security Programs A look into the progress and future plans across counties
CCISDA California Counties Information Services Directors Association California Counties Information Security Programs A look into the progress and future plans across counties 2010 Progress Report April
How To Become A Cybersecurity Consultant
Strengthening the Nexus: Government-Business- University cooperation and collaboration on security, training and research November 1, 2011 Susan C. Aldridge, PhD University of Maryland University College
DESIGNING WEB LABS FOR TEACHING SECURITY CONCEPTS ABSTRACT
DESIGNING WEB LABS FOR TEACHING SECURITY CONCEPTS ABSTRACT Security education is critical in today s cyber threat environment. Many schools have investigated different approaches to teaching fundamental
Ph.D. Nova Southeastern University, Ft Lauderdale, FL, Information Systems, completed 24 credit hours, expected ABD in Spring 2012
Kevin Barton, M.S., CISSP Assistant Professor Computer Info Systems and Security School of Business and Leadership [email protected] Mobile Phone: 210-317-5703 Academic Background Ph.D. Nova Southeastern
UMUC FED Program. Online Open House July 22, 2015
UMUC FED Program Online Open House July 22, 2015 Corporate Learning Solutions Shelby Byrd Senior Account Manager Danielle Haynes Account Manager 1-855-CLS-5300 or [email protected] www.umuc.edu/fedgov 2 UMUC
Cybersecurity Definitions and Academic Landscape
Cybersecurity Definitions and Academic Landscape Balkrishnan Dasarathy, PhD Program Director, Information Assurance Graduate School University of Maryland University College (UMUC) Email: [email protected]
in Information Security and Assurance
[DRAFT] A Model Curriculum for Programs of Study A Model Curriculum for Programs of Study in Information Security and Assurance in Information Security and Assurance v. 6.0 February 2013 [DRAFT] http://infosec.kennesaw.edu/infoseccurriculummodel.pdf
ADMINISTRATIVE COMMITTEES AND COUNCILS
Administrative and Faculty Governance Committee/Council Charges Proposed Revisions ADMINISTRATIVE COMMITTEES AND COUNCILS EXECUTIVE COMMITTEE: Serves as the executive leadership and collaborates with the
Homeland Security Education: The Current State. The Naval Postgraduate School, Center for Homeland Defense and Security
Homeland Security Education: The Current State and The Naval Postgraduate School, Center for Homeland Defense and Security Dr. Stan Supinski Director, Partnership Programs 1 Homeland Security Education
NSA/DHS Centers of Academic Excellence for Information Assurance/Cyber Defense
NSA/DHS Centers of Academic Excellence for Information Assurance/Cyber Defense Cyber Investigations Data Management Systems Security Data Security Analysis Digital Forensics Health Care Security Industrial
CURRICULUM VITAE EXPERIENCE
CURRICULUM VITAE Claude Turner, Ph.D. Associate Professor Department of Computer Science Norfolk State University 700 Park Ave Norfolk, VA 23504 E-Mail: [email protected] Phone: (757) 823-8311 RESEARCH INTERESTS
Software Assurance Competency Model
Software Assurance Competency Model Thomas Hilburn, Embry-Riddle Aeronautical University Mark Ardis, Stevens Institute of Technology Glenn Johnson, (ISC) 2 Andrew Kornecki, Embry-Riddle Aeronautical University
