1 American Public University System - A Multi-Disciplinary Approach to Cybersecurity Education Dr. Clay Wilson, CISSP Program Director, Cybersecurity Studies American Public University System
2 Overview About American Public University System (APUS) What is a Multi-Disciplinary Approach? What Problems does it help solve? Complex Malicious Code Cascade Failures for Infrastructures Hackers Bypass Defensive Technologies Problems require a Multi-Disciplinary Education Management and Coordination of Cybersecurity Technologies APUS Goal for Cybersecurity Education Summarized Admission Requirements Overview of the APUS Cybersecurity Program APUS Offers Undergrad Certificates APUS awarded National Certifications for Cybersecurity Education
3 About APUS Founded in 1991 as American Military University (AMU) by James P. Etter, USMC Fully-online; intended for military and working adults with focus on counter-terrorism, military intelligence In 2002 expanded to American Public University System, adding American Public University for public service courses, i.e. criminal justice and national security APUS accredited by the Higher Learning Commission, North Central Association
4 About APUS (con t) Today more than 100,000 students from all 50 states/dc and 100+ countries Approximately 53% active-duty all branches; 47% civilian or other military Recent Awards US News & World Report 2014 Online Rankings: APUS Undergraduate Programs Rated Among Best in Overall Quality First Three-Time Recipient of Sloan Consortium Effective Practice Award
5 About APUS (con t) Some of the Organizations that Partner with APUS -- Education Institutions of all Military Service Branches Department of Homeland Security FBI Lockheed Martin Center for Security Analysis - and many other universities and organizations
6 What is a Multi-Disciplinary Approach to Cybersecurity? Definition of Multi-Disciplinary cooperation and participation across different sectors to solve problems. Why is a Multi-Disciplinary approach to Cybersecurity now important? Sometimes, skill-centered specialists cultivate a traditional boundary around their expertise. This can be a restrictive way of finding solutions to a problem. Cybersecurity is being hit with newer types of problems that bypass traditional boundaries
7 What Problems does a Multi-Disciplinary Approach Help Solve? Problem #1 Cyberattacks are becoming more complex. Complexity shows in newer, advanced persistent threats that defeat increasingly sophisticated cybersecurity defensive technologies. Cybersecurity experts are always playing catch up after newer methods of cyberattack are discovered.
8 Complex Malicious Code Operates Undetected for Years Complex malicious code can reside and operate undetected inside computers for years before discovery. The STUXNET malicious code operated inside Iranian nuclear facilities for several years before it was eventually discovered. The new SNAKE malicious code, recently announced as a new discovery inside Ukrainian computers, may also have infected other computers worldwide and operated secretly for the past several years.
9 Cascade Failures May Connect Critical Infrastructures Problem #2 - Critical infrastructures are subject to complex cascade-failures due to vulnerabilities in other distantlyrelated infrastructures. During Sandy, the hospitals in New Jersey lost electricity when the local power utility flooded. When Hospital backup diesel generators ran out of fuel, filling stations had no electricity to pump fuel into delivery tankers.
10 Hackers Bypass Defensive Technology Attack Users Problem #3 - Hackers defeat sophisticated technical cybersecurity defenses by directly targeting the users instead of the computers. With Phishing attacks, users are tricked by attachments, or by false web sites, that enable hackers to steal personal secrets and passwords.
11 Problems Require a Multi-Disciplinary Education Problems of Complexity, Cascade Failures, and Targeted Users now require a multi-disciplinary approach to cybersecurity education. Leaders in all professions, all disciplines must develop a cybersecurity mindset. The ACM Education Board in 2013 acknowledged that a systemwide perspective has become an important part of cybersecurity education, and that education must be multi-disciplinary, to include many sectors.
12 Management and Coordination of Cybersecurity Technology Traditional cybersecurity education courses were initially designed to expand the technical skills of technology experts. Management and Coordination of technology must now be emphasized in Cybersecurity Education. Cybersecurity Education must now range across many sectors, not focus just on the development and operation of security technology.
13 APUS Goal for Cybersecurity Education Leaders in All Disciplines need Cybersecurity Education to help manage and coordinate technology for cybersecurity - Business Education Public Safety International Relations Environmental Science Space Studies Sports and Healthcare Transportation and Logistics Students may enroll in the APUS Cybersecurity Program with an IT certificate, or with a non-technical work background
14 APUS Admissions Requirements Students enrolling for Cybersecurity must meet one of these requirements --- Undergraduate degree in Information Technology or a related field or Undergraduate IT Certificate or FIVE years of work experience at the senior level in Criminal Justice, Emergency Management, Intelligence, Homeland Security or other non-technical background
15 APUS Cybersecurity Programs First half of the graduate cybersecurity program focuses on network security, information assurance, cybercrime, and digital forensics. Second half of grad program focuses on policies, practices, perspectives of different disciplines, including emergency management, homeland security, intelligence, law and ethics, risk management and cyber warfare. The capstone course is a multi-disciplinary group project where individual participants represent different sectors, agencies, and disciplines. Graduate certificates are available in: Cybercrime Digital Forensics Information Assurance Information Systems Security Undergraduate certificates also available in: Digital Forensics Information Assurance Homeland Security National Security Emergency Management
16 APUS Awarded National Certifications for Cybersecurity Education APUS received two National Training Standards certifications for Information Systems Security Professionals from the Committee on National Security Systems (CNSS) NSTISSI no and CNSSI no APUS is also applying for the CAE/IA/CD designation from DHA and NSA.
17 For Further Information Clay Wilson, Phd, CISSP Program Director, Cybersecurity Studies American Public University System Undergraduate programs Graduate programs
BOARD OF REGENTS SUMMARY OF ITEM FOR ACTION, INFORMATION, OR DISCUSSION TOPIC: University of Maryland Eastern Shore: Master of Science in Cybersecurity Engineering Technology COMMITTEE: Education Policy
Master of Arts CRIMINAL JUSTICE Master of Science HOMELAND SECURITY Graduate PROGRAMS M onmouth University s Criminal Justice and Homeland Security graduate programs are designed to provide students with
THE GRADUATE SCHOOL CAreer Forward Advance with a respected graduate degree from UMUC. www.umuc.edu/moveforward An advanced degree opens the door to CAreer advancement Professional credentials can help
A Human Capital Crisis in Cybersecurity Technical Proficiency Matters A White Paper of the CSIS Commission on Cybersecurity for the 44th Presidency cochairs Representative James R. Langevin Representative
A Rhode Island Academic Collaboration on Cybersecurity Technology and Policy (CCTP) Abstract The University of Rhode Island, Brown University, and the U.S. Naval War College, with the engagement of Bryant
Cyber Security Programs Online Degrees & Certificates computerforensics.champlain.edu Introduction Champlain College...gives students career skills for the 21st Century...and once again shows Champlain
Report on Cyber Security Education Project June 9, 2014 For Further Information: Dennis Egan: email@example.com Fred Roberts: firstname.lastname@example.org Table of Contents ` Executive Summary...
ICS-CERT Year in Review Industrial Control Systems Cyber Emergency Response Team 2013 National Cybersecurity and Communications Integration Center What s Inside Welcome 1 National Preparedness 2 Prevention
Online Bachelor s Degree Completion Program A Degree Completion Program for Working Adults Log in to a Distinguished Tradition. Since 1819. Proudly serving those who serve Norwich University has a proud
[DRAFT] A Model Curriculum for Programs of Study A Model Curriculum for Programs of Study in Information Security and Assurance in Information Security and Assurance v. 6.0 February 2013 [DRAFT] http://infosec.kennesaw.edu/infoseccurriculummodel.pdf
Testimony of Farnam Jahanian, Ph.D. Assistant Director Computer and Information Science and Engineering Directorate Before the Committee on Science, Space, and Technology Subcommittee on Technology and
Priority III: A National Cyberspace Security Awareness and Training Program Everyone who relies on part of cyberspace is encouraged to help secure the part of cyberspace that they can influence or control.
110101001101101101010011000 11011010100110110101001100 11011010011011010100110000 10100110110101001100010010 Protecting Information The Role of Community Colleges in Cybersecurity Education A Report from
Qatar National Cyber Security Strategy MAY 2014 i ii TABLE OF CONTENTS FOREWORD... v EXECUTIVE SUMMARY... vi 1. INTRODUCTION...1 2. THE IMPORTANCE OF CYBER SECURITY TO QATAR...3 2.1 Threats... 3 2.2 Challenges...
E N V I R O N M E N T A L S C A N CYBERSECURITY Los Angeles and Orange Counties J U N E 2 0 1 2 E N V I R O N M E N T A L S C A N CENTER OF EXCELLENCE Los Angeles and Orange Counties Audrey Reille, Director
and Mission Information technology is a dynamic discipline that addresses the use of computing and I n t r o d u c t i o n information technology in business, education, government, and other organizations.
Master of Science in Psychology Master of Science in Psychology at Southern New Hampshire University As the 21st century unfolds, the importance of behavior as a factor in addressing social issues is becoming
Building a Cybersecurity Workforce with Remote Labs Nancy Martin email@example.com Belle Woodward firstname.lastname@example.org Information Systems Technologies Southern Illinois University Carbondale, IL 62901, USA Abstract
Protecting Our Future Protecting Our Future Educating a Cybersecurity Workforce edited by Jane LeClair Copyright 2013 by Hudson Whitman/ Excelsior College Press All rights reserved. No part of this book
Discover DeVry University a Guide for Adult Learners Begin with the end in mind your career Now s an exciting time. You ve made the decision to go back to school to complete your college degree program
Journal of Homeland Security Education Paradigms for Cybersecurity Education in a Homeland Security Program GARY C. KESSLER Embry-Riddle Aeronautical University email@example.com JAMES RAMSAY Embry-Riddle
PELL CENTER REPORT for INTERNATIONAL RELATIONS and PUBLIC POLICY Joint Professional Military Education Institutions in an Age of Cyber Threat Francesca Spidalieri August 7, 2013 The United States military
Toward Curricular Guidelines for Cybersecurity Report of a Workshop on Cybersecurity Education and Training Andrew McGettrick Professor, University of Strathclyde Chair, Education Board Association for
GAO United States General Accounting Office May 2004 TECHNOLOGY ASSESSMENT Cybersecurity for Critical Infrastructure Protection GAO-04-321 May 2004 TECHNOLOGY ASSESSMENT Highlights of GAO-04-321, a report
PELL CENTER for INTERNATIONAL RELATIONS REPORT and PUBLIC POLICY Professionalizing Cybersecurity: A path to universal standards and status Francesca Spidalieri and Sean Kern August 2014 Executive Summary