Cybersecurity Education
|
|
- Merry Bradley
- 8 years ago
- Views:
Transcription
1 Cybersecurity Education Issues & Approaches Derek A. Smith Director of Cybersecurity Initiatives at Excelsior College AFCEA November 18, 2014
2 Where we are now! Symantec: In a world of increased cybersecurity attacks, an estimated 300,000 cybersecurity jobs are vacant in the United States
3 Where we are now! Rand Corporation: The nationwide shortage of cybersecurity professionals -- particularly for positions within the federal government -- creates risks for national and homeland security, according to a June study by Rand Corporation.
4 Where we are now! ISC2: The reasons for an inability to bridge the need for additional information security workers are fueled by three factors: business conditions, executives not fully understanding the need, and an inability to locate appropriate information security professionals (ISC2)
5
6 Where we are now! Contributing factor: Competing budget priorities, a narrow pipeline of prospects, training shortfalls, ambiguous skill-set requirements and a tug of war between the public and private sectors all add complexity to the process FCW Magazine
7 While billions of dollars are being spent on new technologies to secure cyberspace, it is the people with the right knowledge, skills, and abilities to implement those technologies who will determine success
8 Understanding the trends Four common trends that drive the need for cyber education: information security is increasing in relevance is increasing in attention and demand from students, private industry and government agencies more domains to secure and more ways to attack. focus more on the practices (not just general security)
9 Straining to address the needs and trends finding qualified instructors and professors struggling for resources with competing subject critical lack of equipment, laboratories and opportunities for students to get hands-on experience dynamic curriculum
10 Different approaches, common ground Common themes: Cybersecurity must evolve into a formal discipline in the curriculum similar to other existing disciplines. Programs must teach a combination of theory and practice. Cybersecurity should be taught in an integrated fashion, with all students learning basic principles. Independent study and student interest groups are a key teaching tool. Government and industry collaboration is extremely important. Providing strong faculty development opportunities is a must.
11 Program Components Technology Technology specific items Skills development (hands-on) Theory and research Critical Thinking Analysis and decision making Problem solving Finding unique solutions Information Literacy not just technology literacy Research process Interpersonal skills Team work Communications capabilities Writing, presentations
12 Cyber Security Content Areas (Examples at all training / education levels) Systems maintenance, patches, upgrades Content security Data assurance Physical security User education Detection (hacks, probes, etc.) Deterrence (fire walls, honey pots, etc.) Forensics (evidence gathering, preservation) Policy development Forward planning and professional development Preparation for certification Security budgeting & public communications Research all areas
13 "One of the first things at the high level is actually defining what it is you want this person to do because it's not as broad as it's sometimes made out to be when you just say 'cybersecurity career field,'" Howard Schmidt, formerly White House cybersecurity coordinator.
14 The Workforce Framework lists and defines 32 specialty areas of cybersecurity work and provides a description of each. Each of the types of work is placed into one of seven overall categories. The Workforce Framework also identifies common tasks and knowledge, skills, and abilities (KSA's) associated with each specialty area. The Workforce Framework will be used as guidance to the federal government, will be made available to the private, public, and academic sectors for describing cybersecurity work and workforces, and related education, training, and professional development. NICE Framework The National Initiative for Cybersecurity Education (NICE) developed the National Cybersecurity Workforce Framework (the Workforce Framework) to define the cybersecurity workforce and provide a common taxonomy and lexicon by which to classify and categorize workers.
15 Linking efforts at all levels Seven different tenets for cybersecurity education 1. Holistic 2. Interdisciplinary 3. Diverse programs 4. Business-focused 5. Hands-on 6. Research-oriented 7. Common language and science
16 Meeting the demands of tomorrow Increase awareness and expertise Treat security education as a global issue Approach security comprehensively, linking technical to non technical fields Seek innovative ways to fund labs and pursue real-world projects Advance a science of security
17 How We Approach It: Heavy doses of theory & fundamental principles Softer skills: writing, communications, problem solving, critical thinking, team work Some levels include lots of hands-on Different approaches depending on level Intro. level typically more skills based (also a mixed set of students and student backgrounds) Intermediate some hands-on but includes softer skills (theory, critical thinking, problem solving, communications, team work) Advanced managerial or research
18 Student Expectations Mind set preparation Understanding what the professional does Detailed analysis Constant monitoring Responsibility issues Want it immediately Expecting hands-on work in most programs Employment expectations High-paying jobs In some areas a security clearance is an issue
19 Faculty Preparation Full-time vs. part-time/professional faculty Backgrounds vary Technically adept but don t teach well Good teachers but don t know technology Teaching ability: preparation & in the classroom Keeping up with the changing technology New theories, problems, tools, techniques Developing specialization areas (may go out-ofdate ) Balancing: hands-on, theory, KSA's, softer skills Up to date on technology, law, business needs, costs/benefits
20 Sample Programs Capitol College Doctor of Science in information assurance (DSc) Master of Science in information assurance (MSIA) The Bachelor of Science in cyber and information security (BSCIS) Computer and Network Security(Certificate) Digital Forensics and Incident Handling (Graduate Certificate) Information Assurance Administration (Graduate Certificate) Network Protection (Graduate Certificate) Secure Cloud Computing (Graduate Certificate) Secure Mobile Technology (Graduate Certificate) Secure Software Development (Graduate Certificate) Security Management (Graduate Certificate)
21 Sample Programs University of Maryland, University College MASTER OF SCIENCE IN CYBERSECURITY MASTER OF SCIENCE IN CYBERSECURITY POLICY MASTER OF SCIENCE IN DIGITAL FORENSICS AND CYBER INVESTIGATION MASTER OF SCIENCE IN INFORMATION TECHNOLOGY: INFORMATION ASSURANCE BACHELOR OF SCIENCE IN CYBERSECURITY BACHELOR OF SCIENCE IN COMPUTER NETWORKS AND SECURITY BACHELOR OF SCIENCE IN SOFTWARE DEVELOPMENT AND SECURITY CYBERSECURITY POLICY CYBERSECURITY TECHNOLOGY DIGITAL FORENSICS AND CYBER INVESTIGATION FOUNDATIONS OF CYBERSECURITY INFORMATION ASSURANCE
22 Sample Programs Prince George s Community College Cybersecurity Assoc. of Applied Science Cybersecurity Certificate Cybersecurity Management, Certificate
23 Sample Programs Excelsior College Five Cybersecurity Programs Certified to Meet the NSA s Committee on National Security Systems (CNSS) Training Standards Master of Business Administration in Cybersecurity Management Master of Science in Cybersecurity Bachelor of Science in Cyber Operations Bachelor of Science in Information Technology [Without Concentration] Bachelor of Science in Information Technology (Cybersecurity) Undergraduate Cybersecurity Certificate Graduate Cybersecurity Management Certificate
24 Questions? Derek A. Smith Director, National Cyber Security Institute Excelsior College
MEETING THE NATION S INFORMATION SECURITY CHALLENGES
MEETING THE NATION S INFORMATION SECURITY CHALLENGES TO ADDRESS SKILLS AND WORKFORCE SHORTAGES IN THE INFORMATION SECURITY INDUSTRY, THE NATIONAL SECURITY AGENCY AND THE DEPARTMENT OF HOMELAND SECURITY
More informationTURNING THE RISING TIDE OF CYBERSECURITY THREATS
TURNING THE RISING TIDE OF CYBERSECURITY THREATS With cyber attacks on the rise, there s a growing need for digital forensic professionals with the knowledge and skills to investigate technology crimes
More informationCybersecurity education for the next generation Emerging best practices
Cybersecurity education for the next generation Emerging best practices Presented at the 2013 NIST/NICE Workshop Gaithersburg, Maryland Marisa S. Viveros Vice President, Cyber Security Innovation IBM Corporate
More informationCyber Security at NSU
Cyber Security at NSU Aurelia T. Williams, Ph.D. Chair, Department of Computer Science Associate Professor of Computer Science June 9, 2015 Background Undergraduate computer science degree program began
More informationCybersecurity education for the next generation. Advancing a collaborative approach
Cybersecurity education for the next generation Advancing a collaborative approach 2 Cybersecurity education for the next generation In a world of increasing information security threats, academic initiatives
More informationNational Initiative for Cybersecurity Careers and Studies (NICCS) Webinar
National Initiative for Cybersecurity Careers and Studies (NICCS) Webinar April 25, 2013 Welcome to the NICCS Webinar! Thank you for joining us today. During this presentation, you will: Learn about the
More informationCapacity Building in Cyber Security Literacy: An Inter-disciplinary Approach
Capacity Building in Cyber Security Literacy: An Inter-disciplinary Approach This material is based upon work supported by the National Science Foundation under Grant No. 1516724 Project Organization University
More informationCybersecurity Definitions and Academic Landscape
Cybersecurity Definitions and Academic Landscape Balkrishnan Dasarathy, PhD Program Director, Information Assurance Graduate School University of Maryland University College (UMUC) Email: Balakrishnan.Dasarathy@umuc.edu
More informationAllegany College of Maryland. 239 Cisco Networking 2 * Offered Fall semester and
Cybersecurity comes to Allegany College of Maryland 107 Intro to Cybersecurity Offered fall and spring semesters. This course provides a broad overview of computer security, ethical issues and information
More informationCYBER SECURITY TRAINING SAFE AND SECURE
CYBER SECURITY TRAINING KEEPING YOU SAFE AND SECURE Experts in Cyber Security training. Hardly a day goes by without a cyber attack being reported. With this ever-increasing threat there is a growing need
More informationCertifications and Standards in Academia. Dr. Jane LeClair, Chief Operating Officer National Cybersecurity Institute
Certifications and Standards in Academia Dr. Jane LeClair, Chief Operating Officer National Cybersecurity Institute Accreditation What is it? Why is it important? How is it attained? The National Centers
More informationHackers are here. Where are you?
1 2 What is EC-Council Certified Security Analyst Licensed Penetration Tester Program You are an ethical hacker. Your last name is Pwned. You dream about enumeration and you can scan networks in your sleep.
More informationUNM Information Assurance Scholarship for Service (SFS) Program
UNM Information Assurance Scholarship for Service (SFS) Program What is Information Assurance? Committee on National Security Systems (CNSS) defines information assurance (IA): Measures that protect and
More informationInternational MBA. Compete Globally with an International MBA
International MBA Compete Globally with an International MBA With an online International MBA from SNHU, you are preparing yourself to compete in the increasingly global 21st-century business world. Specially
More informationHosted by Lunarline: School of Cyber Security
Hosted by Lunarline: School of Cyber Security Please Fax Government Purchase Orders and SF 182s To (22) 315-33 Cybersecurity is one of the hottest issues for today s Federal and DOD Agencies and commercial
More informationNational Initiative for Cyber Security Education
2014/PPWE/SEM2/007 Agenda Item: 5 National Initiative for Cyber Security Education Submitted by: United States Women Business and Smart Technology Seminar Beijing, China 23 May 2014 NICE OVERVIEW Women
More informationCisco Networking Academy: Delaware Profile
Cisco Networking Academy: Delaware Profile Educating the Architects of the Networked Economy Now in its second decade, Cisco Networking Academy has provided more than two million students worldwide with
More informationCyberSkills Management Support Initiative
CyberSkills Management Support Initiative GROWING THE PIPELINE FOR CYBERTALENT THROUGH VOLUNTEER OPPORTUNITIES November 6, 2014 November 6, 2014 Background In June 2012, Secretary Napolitano announced
More informationSOUTH DAKOTA BOARD OF REGENTS. Committee on Academic and Student Affairs
SOUTH DAKOTA BOARD OF REGENTS Committee on Academic and Student Affairs AGENDA ITEM: III A(3) DATE: April 3-4, 2013 ****************************************************************************** SUBJECT:
More informationThe Comprehensive National Cybersecurity Initiative
The Comprehensive National Cybersecurity Initiative President Obama has identified cybersecurity as one of the most serious economic and national security challenges we face as a nation, but one that we
More informationONLINE ONLINE. Master of Science in. Bachelor of Science in
ONLINE Bachelor of Science in INFORMATION SYSTEMS ONLINE Master of Science in Management Information Systems Information Systems Online University of Alabama at Birmingham COLLAT School of Business Dear
More information2012 Information Technology Workforce Assessment for Cybersecurity (ITWAC) Summary Report
2012 Information Technology Workforce Assessment for Cybersecurity (ITWAC) Summary Report March 14, 2013 TABLE OF CONTENTS List of Tables... iii List of Figures... iv Executive Summary... v 1. INTRODUCTION...
More informationStrategic Plan September 2012
Strategic Plan September 2012 NIST NICE Component Leads Overall Lead Ernest L. McDuffie, Ph.D. Lead for the National Initiative for Cybersecurity Education (NICE) United States Department of Commerce (DoC)
More informationHow To Become A Cybersecurity Consultant
Strengthening the Nexus: Government-Business- University cooperation and collaboration on security, training and research November 1, 2011 Susan C. Aldridge, PhD University of Maryland University College
More informationSANS CyberTalent VetSuccess Immersion Academy. VetSuccess
SANS CyberTalent VetSuccess Immersion Academy P I L O T R E P O R T 2 0 1 5 VetSuccess For more than 25 years, SANS has been the leader in training and developing cybersecurity professionals. Like many
More informationThe National Cybersecurity Workforce Framework. 2015 Delaware Cyber Security Workshop September 29, 2015
The National Cybersecurity Workforce Framework 2015 Delaware Cyber Security Workshop September 29, 2015 Bill Newhouse NICE Program Office at the National Institute of Standards and Technology NICE is a
More informationNational Cyber Security Awareness Month. Week Five: Building the Next Generation of Cyber Professionals
National Cyber Security Awareness Month Week Five: Building the Next Generation of Cyber Professionals Webinar recording and evaluation survey This webinar is being recorded and will be made available
More informationINFORMATION SYSTEMS ENGINEERING & MANAGEMENT SKILLS THE MARKET NEEDS NOW TECHNICAL & MANAGEMENT 717.901.5101. online.harrisburgu.
INFORMATION SYSTEMS ENGINEERING & MANAGEMENT TECHNICAL & MANAGEMENT SKILLS THE MARKET NEEDS NOW As information technology evolves, information systems using that technology become increasingly complex.
More informationNICE and Framework Overview
NICE and Framework Overview Bill Newhouse NIST NICE Leadership Team Computer Security Division Information Technology Lab National Institute of Standards and Technology TABLE OF CONTENTS Introduction to
More informationUniversity of Maryland University College. American Military University. Henley-Putnam University
A P R I L 2 0 1 1 Table of Contents 2-3 UMUC: Training Tomorrow s Cybersecurity Leaders Today University of Maryland University College 4-5 Preparing Those Who Protect the Public American Military University
More informationAchieving Cybersecurity Excellence Through Evolution of the Nation's Cyber Workforce
Achieving Cybersecurity Excellence Through Evolution of the Nation's Cyber Workforce Benjamin Scribner Department of (DHS) National Cybersecurity Education & Awareness Branch (CE&A) October 2014 Mid-South
More informationHackers are here. Where are you?
1 2 What is EC-Council Certified Security Analyst Licensed Penetration Tester Program You are an ethical hacker. Your last name is Pwned. You dream about enumeration and you can scan networks in your sleep.
More informationCyber threats are growing.
Cyber threats are growing. So are your career opportunities. Put the future of your cybersecurity career in the hands of a respected online education leader. Everything you need to succeed. Excelsior College
More informationONLINE MASTER OF BUSINESS ADMINISTRATION. Open for Business. Designed for You.
ONLINE MASTER OF BUSINESS ADMINISTRATION Open for Business. Designed for You. Our MBA is different. It s designed for you. Today s global workplace is ever-evolving and increasingly competitive. To succeed,
More informationEC-Council Certified Security Analyst (ECSA)
EC-Council Certified Security Analyst (ECSA) v8 Eğitim Tipi ve Süresi: 5 Days VILT 5 Day VILT EC-Council Certified Security Analyst (ECSA) v8 Learn penetration testing methodologies while preparing for
More informationBIOTECHNOLOGY. Bouvé College of Health Sciences College of Science. Networked for Success. Networked for Industry. Networked for Life.
MASTER OF SCIENCE BIOTECHNOLOGY Networked for Success. Networked for Industry. Networked for Life. Bouvé College of Health Sciences College of Science Northeastern s Biotechnology Masters program synthesizes
More informationState University System Florida Board of Governors Request to Establish Market Tuition Rates Regulation 7.001(15)
University: University of South Florida Proposed Market Tuition Program: Master s of Science in Cyber Security University Board of Trustees approval date: Date Proposed Implementation Date (month/year):
More informationNICE 2015 Conference
NICE 2015 Conference Mission: Impossible? How to Advance the Skills of the Cyber Workforce When You ve Got Quality and Speed but Aren t Cheap November 4, 2015 Presenters: Allison Frankoski, Program Director
More informationShaping the Future of Cybersecurity Education
Shaping the Future of Cybersecurity Education Is N.I.C.E. NATIONAL INITIATIVE FOR CYBERSECURITY EDUCATION (NICE) February 2011 THEPRESENT Comprehensive National Cybersecurity Initiative Training the existing
More informationLecturer/Senior Lecturer in Library and Information Science. Professor Claire Warwick, Head of Department
UCL Department of Information Studies Job Title: Department: Responsible to: Post: Lecturer/Senior Lecturer in Library and Information Science Department of Information Studies Professor Claire Warwick,
More informationNational Initiative for Cybersecurity Careers and Studies (NICCS) Cybersecurity Training and Education Catalog Training Provider Instruction Guide
National Initiative for Cybersecurity Careers and Studies (NICCS) Cybersecurity Training and Education Catalog Training Provider Instruction Guide Overview During this presentation, you will: Learn about
More informationThe GW CyberCorps Program
The GW CyberCorps Program www.seas.gwu.edu/cybercorps Introduction The need for educated personnel in the government s cyber security workforce is critical to the nation s security. As evidenced by remarks
More informationUnderstanding the Skills Gap
Understanding the Skills Gap Despite a large pool of unemployed workers, employers continue to struggle to find skilled talent to fill the growing number of job openings in the country. American Society
More informationAC 2010-1485: DEVELOPMENT AND IMPLEMENTATION OF A MASTERS PROGRAM IN COMPUTER INFORMATION TECHNOLOGY
AC 2010-1485: DEVELOPMENT AND IMPLEMENTATION OF A MASTERS PROGRAM IN COMPUTER INFORMATION TECHNOLOGY Hetal Jasani, Northern Kentucky University Hetal Jasani is an assistant professor in the Department
More informationThe BSIS at UNC. Connecting People, Information, and Technology
The BSIS at UNC Connecting People, Information, and Technology Why a Bachelor of Science in Information Science (BSIS)? The School of Information and Library Science (SILS) at the University of North Carolina
More informationHow to use the National Cybersecurity Workforce Framework. Your Implementation Guide
How to use the National Cybersecurity Workforce Framework Your Implementation Guide A NATIONAL PROBLEM The Nation needs greater cybersecurity awareness. The US workforce lacks cybersecurity experts. Many
More informationICT and Networking Courses Prepare and Inspire Future Innovators
Corporate Social Responsibility Impact Profile Cisco Networking Academy TM ICT and Networking Courses Prepare and Inspire Future Innovators Today, 2 billion things are connected over the Internet. Experts
More informationGoal. Vision. CAE IA/CD Program Eligibility and Summary
Goal Vision National Centers of Academic Excellence in Information Assurance/Cyber Defense (IA/CD) Education Program Criteria for Measurement Jointly Sponsored by the National Security Agency (NSA) and
More informationProtecting Energy s Infrastructure and Beyond: Cybersecurity for the Smart Grid
Protecting Energy s Infrastructure and Beyond: Cybersecurity for the Smart Grid Which is it? Cyber Security ~or~ Cybersecurity? Dr. Ernie Lara President Presenters Estrella Mountain Community College Dr.
More informationA Multi-Tier Approach to Cyber Security Education, Training, and Awareness in the Undergraduate Curriculum (CSETA)
Paper ID #9796 A Multi-Tier Approach to Cyber Security Education, Training, and Awareness in the Undergraduate Curriculum (CSETA) Dr. Nikunja Swain P.E., South Carolina State University Dr. Swain is currently
More informationUMD Department of Mechanical and Industrial Engineering
UMD Department of Mechanical and Industrial Engineering Indices and Standards for Tenure and Promotion to Professor as Required by Section 7.12 of the Board of Regents Policy on Faculty Tenure (June 10,
More informationIIT SCHOOL OF APPLIED HANDS ON. HIGH VALUE. TECHNOLOGY LIVE AND ONLINE COURSES
G R A D U A T E P R O G R A M S IIT SCHOOL OF APPLIED TECHNOLOGY HANDS ON. HIGH VALUE. LIVE AND ONLINE COURSES At IIT School of Applied Technology (SAT) our focus is on the future. Our distinctive programs
More informationSECURITY AND RESILIENCE STUDIES
MASTER OF SCIENCE SECURITY AND RESILIENCE STUDIES Networked for Success. Networked for Industry. Networked for Life. College of Social Sciences and Humanities The number of job postings requiring graduate-level
More informationProgram Proposal for the. Computer Information Systems Option. Computer Information Systems Department (CIS) College of Business Administration (CBA)
Program Proposal for the Computer Information Systems Option Computer Information Systems Department (CIS) College of Business Administration (CBA) Final proposal for the Computer Information Systems Option
More informationOnline Master of Business Administration (MBA)
Online Master of Business Administration (MBA) Dear Prospective Student, Thank you for contacting the University of Maryland s Robert H. Smith School of Business. By requesting this brochure you ve taken
More informationMASTER OF SCIENCE IN INFORMATION ASSURANCE PROGRAM DEPARTMENT OF COMPUTER SCIENCE HAMPTON UNIVERSITY
MASTER OF SCIENCE IN INFORMATION ASSURANCE PROGRAM DEPARTMENT OF COMPUTER SCIENCE HAMPTON UNIVERSITY HTTP://SCIENCE.HAMPTONU.EDU/COMPSCI/ The Master of Science in Information Assurance focuses on providing
More informationAbstract. Introduction
Abstract The Professional Science Masters (PSM) is a nationally recognized two-year degree that is funded by the Alfred P. Sloan Foundation and is designed to allow students to pursue advanced training
More informationOnline Master of Business Administration (MBA)
Online Master of Business Administration (MBA) Dear Prospective Student, Thank you for contacting the University of Maryland s Robert H. Smith School of Business. By requesting this brochure you ve taken
More informationIs an Executive MBA right for you?
Is an Executive MBA right for you? A GUIDE TO THE EXECUTIVE MBA achieve goals busy schedule support classroom contribution cost peer network the new MBA What is an Executive MBA? The Executive MBA is a
More informationThe Case for Support: The Center for Cyber Security Studies at the U. S. Naval Academy
The Case for Support: The Center for Cyber Security Studies at the U. S. Naval Academy Computer and network security threats of the future are of concern today, and new strategies are required to ensure
More informationSTUDENT LEARNING ASSESSMENT REPORT MS Cybersecurity
STUDENT LEARNING ASSESSMENT REPORT MS Cybersecurity SUBMITTED BY: DIANE MURPHY DATE: OCTOBER 15, 2014 BRIEFLY DESCRIBE WHERE AND HOW ARE DATA AND DOCUMENTS USED TO GENERATE THIS REPORT BEING STORED: BLACKBOARD
More informationSabbatical Leave Application
LOS RIOS COMMUNITY COLLEGE DISTRICT Sabbatical Leave Application Name Lance Parks College: CRC Present Assignment: CIS Type of Leave Requested: A. Type A One Semester: Fall Spring X Entire Year Will you
More informationOUTLINE FOR AN INTERDISCPLINARY CERTIFICATE PROGRAM
OUTLINE FOR AN INTERDISCPLINARY CERTIFICATE PROGRAM I. Basic Information 1. Institution: University of Georgia Date: September 28, 2015 2. School/College: Franklin College of Arts and Sciences 3. Department/Division:
More informationDELAWARE STATE UNIVERSITY
DELAWARE STATE UNIVERSITY TITLE III: STRENGTHENING HISTORICALLY BLACK COLLEGES AND UNIVERSITIES PROGRAM FUNDED ACTIVITIES HBCU (HISTORICALLY BLACK COLLEGES AND UNIVERSITIES PROGRAM) FUNDED: 2007 2012 1
More informationCyberNEXS Global Services
CyberNEXS Global Services CYBERSECURITY A cyber training, exercising, competition and certification product for maximizing the cyber skills of your workforce The Cyber Network EXercise System CyberNEXS
More informationGoal. Vision. CAE 2Y Program Eligibility and Summary
Goal National Centers of Academic Excellence in Information Assurance/Cyber Defense for Two-Year Education (CAE2Y) Program Criteria for Measurement Jointly Sponsored by the National Security Agency (NSA)
More informationCybersecurity: A Shared Responsibility and Department of Homeland Security Priority
Cybersecurity: A Shared Responsibility and Department of Homeland Security Priority A Presentation to the National Cyberwatch Center November 20, 2015 Webinar Protocol :: Mute your phone/mic when not talking
More informationBecoming a Cyber Professional: A Discussion with Recent Graduates
Becoming a Cyber Professional: A Discussion with Recent Graduates Moderator: George L. Heron, LifeJourney USA Panelists: Danielle Santos, Assistant Program Manager, Cyber Formal Education, DHS Scott Wallace.
More informationINNOVATION. Campus Box 154 P.O. Box 173364 Denver, CO 80217-3364 Website: http://cam.ucdenver.edu/ncmf
EDUCATION RESEARCH INNOVATION Campus Box 154 P.O. Box 173364 Denver, CO 80217-3364 Website: http://cam.ucdenver.edu/ncmf Email: ncmf@ucdenver.edu Phone: 303.315.5850 Fax: 303.832.0483 JEFF M. SMITH, m.s.
More informationISACA S CYBERSECURITY NEXUS (CSX) October 2015
ISACA S CYBERSECURITY NEXUS (CSX) October 2015 DO2 EXECUTIVE OVERVIEW Will you be a Cyber defender? ISACA launched the Cybersecurity Nexus (CSX) program earlier this year. CSX, developed in collaboration
More informationUniversity of Maine B.S. In Cybersecurity Version 2.0
University of Maine B.S. In Cybersecurity Version 2.0 Prof. George Markowsky School of Computing & Information Science University of Maine April 27, 2015 Contents 1 Background 8 1.1 Evidence of Program
More informationWyoming Community College Commission Request for New, Pilot or Revised Degree or Certificate Program
Community Commission Request for New, Pilot or Revised Degree or Certificate Program A. : Laramie County Community B. Date submitted to WCCC: C. Program 1. Request for: X New Program Pilot Program Revised
More informationForensic Science. Three Certificate Programs in. Certificates in: Death Investigation Forensic Toxicology. Forensic Science
Three Certificate Programs in Forensic Science Giving you investigative skills to broaden the scope of your job opportunities Certificates in: Death Investigation Forensic Toxicology Forensic Science Sponsored
More informationUTCS CyberSecurity. Educating Cyber Professionals. Dr. Bill Young Department of Computer Sciences University of Texas at Austin. Spring Semester, 2015
UTCS CyberSecurity Educating Cyber Professionals Dr. Bill Young Department of Computer Sciences University of Texas at Austin Spring Semester, 2015 Slideset 1: 1 From the Headlines U.S. Not Ready for Cyberwar
More informationEnergy for Learning: From Education to Employment
Energy for Learning: From Education to Employment Chevron invested more than $100 million in education over the last three years in the U.S. and has pledged an additional $30 million through 2015 to support
More informationInformation Security & Intelligence
Information Security & Intelligence Why Choose Information Security & Intelligence? The ISI program is certified by NSA's Information Assurance Courseware Evaluation Program as a National Center of Academic
More informationTOPSECRETPROTECTION.COM (TSP)
TOPSECRETPROTECTION.COM (TSP) OVERVIEW OF CYBER SECURITY-INFORMATION SYSTEMS SECURITY PROGRAM MANAGEMENT TRAINING COURSE CYBER SECURITY-ISSPM PROFESSIONAL CERTIFICATION Introduction To TSP TSP has over
More informationVirtual Learning Tools in Cyber Security Education
Virtual Learning Tools in Cyber Security Education Dr. Sherly Abraham Faculty Program Director IT and Cybersecurity Dr. Lifang Shih Associate Dean School of Business & Technology, Excelsior College Overview
More informationIntroduction to NICE Cybersecurity Workforce Framework
Introduction to NICE Cybersecurity Workforce Framework Jane Homeyer, Ph.D., Deputy ADNI/HC for Skills and Human Capital Data, ODNI Margaret Maxson, Director, National Cybersecurity Education Strategy,
More informationSomeone s sitting in the shade today because someone planted a tree a long time ago. Warren Buffett. Ed Skoudis Mike Qaissaunee.
New Jersey Cyber Aces Academy at Brookdale: A Collaborative Public/Private Model to Secure the Nation A project funded through NSF SFS Grant DUE#1331170 Ed Skoudis Mike Qaissaunee April 30, 2014 Someone
More information[STAFF WORKING DRAFT]
S:\LEGCNSL\LEXA\DOR\OI\PARTIAL\CyberWD..xml [STAFF WORKING DRAFT] JULY, 0 SECTION. TABLE OF CONTENTS. The table of contents of this Act is as follows: Sec.. Table of contents. Sec.. Definitions. TITLE
More informationAn Accelerated Pathway to Careers in Cybersecurity for Transitioning Veterans. NICE Annual Conference November 2015
An Accelerated Pathway to Careers in Cybersecurity for Transitioning Veterans NICE Annual Conference November 2015 Panelists David Brown, Director of CyberTalent at the SANS Institute, a new business unit
More informationThe 2007-08 Humanities Departmental Survey. Art History. Table AH1: Faculty Members by Carnegie Classification and Highest Degree Offered 9
Art History In this section, we will provide an overview of Art History departments. First we will examine the total number of faculty and students. Then we will examine faculty hiring and recruiting and
More informationSoftware Applications Development Bachelor s Degree Program
Education for the future. The six schools of study at the ITT Technical Institutes 3 (School of Information Technology, School of Electronics Technology, School of Drafting and Design, School of Business,
More informationOperationally Focused CYBER Training Framework
Operationally Focused CYBER Training Framework Deputy Director, Field Security Operations 9 May 2012 Agenda DISA Cyber Workforce Training Vision Basic Tenets Role-based Educational/Assessment implementation
More informationInformation Systems Technology & Cybersecurity Programs
Information Systems Technology & Cybersecurity Programs Stay close. Go far. Computer Studies Faculty Trudy Gift Professor, Information Systems Technology 240-500-2214 tgift@hagestowncc.edu Carrie Pifer
More information15 USC 7404. NB: This unofficial compilation of the U.S. Code is current as of Jan. 4, 2012 (see http://www.law.cornell.edu/uscode/uscprint.html).
TITLE 15 - COMMERCE AND TRADE CHAPTER 100 - CYBER SECURITY RESEARCH AND DEVELOPMENT 7404. National Science Foundation computer and network security programs (a) Computer and network security capacity building
More informationScience and Math Teacher Initiative
Science and Math Teacher Initiative (CalTeach) Program Highlights Report OVERVIEW The University of California Science and Math Teacher Initiative known as CalTeach is making a strong contribution to the
More informationAC 2012-5259: THE DEVELOPMENT OF AN INTERDISCIPLINARY BACH- ELOR S DEGREE COMPLETION PROGRAM IN THE STEM FIELDS
AC 2012-5259: THE DEVELOPMENT OF AN INTERDISCIPLINARY BACH- ELOR S DEGREE COMPLETION PROGRAM IN THE STEM FIELDS Dr. Sara Hooshangi, George Washington University c American Society for Engineering Education,
More informationThe Education and Training subcommittee is charged with making recommendations regarding methods the State of Maryland can use to increase cyber
The Education and Training subcommittee is charged with making recommendations regarding methods the State of Maryland can use to increase cyber innovation by promoting workforce training, education, and
More informationNational Initiative for Cybersecurity Education
THE NICE VISION National Initiative for Cybersecurity Education a national campaign to promote cybersecurity awareness and digital literacy from our boardrooms to our classrooms, and to build a digital
More informationCONSTRUCTION. School of Technology &
CONSTRUCTION MANAGEMENT School of Technology & Professional Studies Construction Management: Drexel Graduates Build the World The U.S. Department of Labor s Bureau of Labor Statistics reports that 6.9
More informationSUSTAINABLE SOLUTIONS PAPER PROPOSAL. Derek A. Smith. Walden University
[SUSTAINABLE SOLUTIONS PAPER PROPOSAL] 1 Running head: [SUSTAINABLE SOLUTIONS PAPER PROPOSAL] SUSTAINABLE SOLUTIONS PAPER PROPOSAL Derek A. Smith Walden University Author Note This paper was prepared for
More informationSunnie Chung. Cleveland State University
Sunnie Chung Cleveland State University They are very new technologies to Computer Science in rise of Web Service on Internet (IoT) They were fast developed and fast evolving Research and Developments
More informationOVERVIEW DEGREES & CERTIFICATES
OVERVIEW DEGREES & CERTIFICATES 015 The best. Made better. SANS graduate programs are the ultimate expression of our 25 years dedicated to the education and development of information security professionals.
More informationGuidelines for Program Productivity Review Reordered and Augmented to Align with ASU Undergraduate Program Prioritization
Guidelines for Program Productivity Review Reordered and Augmented to Align with ASU Undergraduate Program Prioritization Family & Consumer Sciences, Secondary Education Fall 2012 1. Centrality to University's
More informationBecoming a Cyber Professional: A Discussion with Recent Graduates
Becoming a Cyber Professional: A Discussion with Recent Graduates Date: November 6, 2014 MICHAEL ROCHA Education B.S. Administration, Concentration in Cyber Security California State University, San Bernardino
More informationThe 2007-08 Humanities Departmental Survey. History of Science
History of Science In this section, we will provide an overview of the 19 History of Science programs that had awarded the most graduate degrees in a five-year period. We used NSF and Department of Education
More information