UNM Information Assurance Scholarship for Service (SFS) Program
|
|
|
- Garey Flowers
- 10 years ago
- Views:
Transcription
1 UNM Information Assurance Scholarship for Service (SFS) Program
2 What is Information Assurance? Committee on National Security Systems (CNSS) defines information assurance (IA): Measures that protect and defend information and information systems by ensuring their availability, integrity, authentication, confidentiality, and nonrepudiation Obvious subtopics: Encryption Network security Intrusion detection Secure coding practices Digital forensics Not-so-obvious subtopics: Fraud & forensic accounting Security policy & implementation Legal and privacy issues Education & training
3 IA Overlap to Other Fields
4 Information Assurance at the University of New Mexico
5 UNM History Security courses and research within multiple departments since the 1990s Engineering and Management schools UNM s Center for Information Assurance Research and Education (CIARE) established in 2006 in collaboration with national laboratories DHS/NSA designation as Center of Academic Excellence (CAE) in Information Assurance in 2007 New Mexico regional computer forensics lab (RCFL) opens on UNM south campus in 2012 Re-designation (CAE) in 2012 and CAE-R NSF Scholarship for Service grant in 2013
6 UNM Current IA Programs Master of Accounting - IA concentration 33 semester credit hours with in IA Graduates work primarily in fraud/forensic accounting, internal auditing, and public accounting Master of Computer Science 33 semester credit hours Cybersecurity emphasis available through multiple courses and research projects Master of Electrical & Computer Engineering 33 semester credit hours Cybersecurity emphasis available through multiple courses and research projects
7 UNM Current IA Programs - Continued Master of Science (MS) in Information Systems and Assurance Minimum 32 semester credit hours No formal tracks take courses in IA, MIS, or both Study plans customized to student background and career goals 4 management core courses required but waived for students with an undergraduate management degree IS Security, database management, project management, and professional communications are required but waived for students with similar undergraduate coursework Remaining courses taken from IS/IA electives A thesis option is available
8 UNM IA SFS Program UNM was awarded a National Science Foundation grant to create the UNM Information Scholarship for Service (SFS) Program 18 scholarships over 3 years Similar programs at a few dozen universities though only 3 are administered within management schools Students are funded to complete an IArelated Master s degree in exchange for accepting a job with the Federal Cybercorps
9 UNM IA SFS Program Summary Complete a Masters degree in IA at UNM following pre-approved study plan Full funding for three semesters Mandatory summer internship in Washington, D.C. Mandatory 2-years employment in Federal Cybercorps Must be a U.S. citizen and able to receive a security clearance
10 UNM IS SFS Per Student Funding Tuition and all fees Stipend - $2083 per month Book allowance - $500 per semester Travel to job fairs and conferences Health insurance reimbursement
11 Student Timeline Apply for scholarship by September (for January start) or by May (August start) must also apply for Master s program Interview for scholarship Recipients notified in October or June Preparation during fall for January SFS job fair in Washington, D.C find an internship Complete spring (or fall and spring) courses Complete internship in summer Complete remaining courses Attend January SFS job fair find a Cybercorps placement Graduate and begin work in the Federal Cybercorps
12 UNM Center for IA Research & Education (CIARE) Focal point for research efforts on campus Meet & greet space for IA students Meeting space for external collaboration and outreach efforts IA computer labs
13 UNM CIARE Research Digital Forensics Intrusion Detection Incident Response Malware Steganalysis Digital Rights Management Pen Testing and Assessments Corporate and Financial Fraud White and Red Collar Crime Social Engineering Internet Banking Identity Theft Virtualization
14 UNM CIARE Outreach K-12 community support in cyber security (presentations, training, awareness) Over 80 NM schools since 2007 Information Security Assessments Developed in partnership with NM DHS, 10 organizations served since 2009 Fraud Prevention Audits Service in support of non profit organizations in New Mexico Material expert presentations to community Minimum of quarterly presentations on cyber security, fraud prevention and information security management
15 UNM CIARE Partnerships FBI NM Regional Computer Forensics Lab, actively engaged in research and internship collaborations Sandia National Laboratories - College Cyber Defenders Program with satellite office on campus dedicated to cyber security research and internships Los Alamos National Laboratories Digital forensics, intrusion detection and incident response internships US Attorney s Office, Secret Service and local law enforcement fraud, forensic accounting and white collar crime research and internships NSA Onsite research presentations and internships Industry Various and growing
16 UNM CIARE Students Background in technical areas including computer science, engineering, information technology, and accounting Actively engaged in community (K-12, InfoSec Assessments & Fraud Prevention Audits) Internships (NM RCFL, Sandia, LANL, US Attorney, Secret Service and local law enforcement agencies) Regularly participate in cyber security competitions TracerFIRE (Sandia/LANL Forensics and Incident Response) Computer and Network Vulnerability Assessment Simulation (CANVAS, NSA and Air Force Academy) National Collegiate Cyber Defense Competition (CCDC)
17 UNM CIARE Funding NSA/DHS Scholarship for Service $1.67 M Dell - $220,000 for design and development of the advanced virtual cloud lab infrastructure (VLAB) UNM/State of NM - $150,000 (yearly for 10 years) in support of the NM RCFL CitiCards - $5,000 for small business fraud prevention training seminars
18 IA Centers of Academic Excellence (CAE) Joint designation by National Security Agency (NSA) and the Department of Homeland Security (DHS) Higher education institutions must meet minimum standards for IA-related curriculum, resources, research CAE/2Y - National Centers of Academic Excellence in Information Assurance 2-Year Education CAE/IAE- National Centers of Academic Excellence in Information Assurance Education CAE/R - National Centers of Academic Excellence in Information Assurance Research Designated institutions are: Eligible to apply for targeted grants Targeted for Federal Cybercorps hires Currently 181 designated institutions
19 Curriculum Standards Until this year, CAE curriculum standards were based on CNSS training standards: Standard Description Last Revised 4011 National Training Standard for Information Systems 1994 Security (INFOSEC) Professionals 4012 National Information Assurance Training Standard for 2004 Senior Systems Managers 4013 National Information Assurance Training Standard For 2004 System Administrators 4014 Information Assurance Training Standard for Information 2004 Systems Security Officers 4015 National Training Standard for Systems Certifiers National Information Assurance Training Standard For Risk Analysts 2005
20 Curriculum Standards Update Multiple initiatives are in progress to update obsolete standards: NSA-led effort to define curriculum standards for cyber-operations NSA/DHS effort to update IA curriculum standards for CAE designation National Initiative for Cybersecurity Education There is overlap and competition among these efforts
21 Cyber-operations Standards NSA and (to a lesser extent) DOD and DHS have unique requirements for personnel engaged in cutting-edge attack and defense Greater reliance on CS, engineering, and math skills Rapidly changing environment less amenable to canned solutions Greater need for research skills Cyber-operations standards reflect their unique needs Standards resemble old-fashioned programs in computer science and engineering Breadth vs. depth Theory vs. application Only a handful of schools have such a curriculum Why?
22 Updated CAE Standards Content and structure both updated: Modernized technology and related issues (for example, social networking, handheld devices, and ubiquitous wireless communication) Modernized curriculum constructs (for example, knowledge units with well-defined learning objectives) Content has been broadened to reflect the breadth of IA rather than the narrowness of computer/network security Result should be a more diversity in participating institutions, programs, and academic departments Substantial room for institutions and programs to define unique niches, for example: White collar crime Security administration and compliance Behavioral aspects of cybercrime and risk mitigation
23 NICE National Initiative for Cybersecurity Education (NICE) NICE is a national campaign designed to improve the cyber behavior, skills, and knowledge of every segment of the population, enabling a safer cyberspace A key component is the National Cybersecurity Workforce Framework Targeted more to workforce development/training but does reflect the breadth of IA
24 National Cybersecurity Workforce Framework
Certifications and Standards in Academia. Dr. Jane LeClair, Chief Operating Officer National Cybersecurity Institute
Certifications and Standards in Academia Dr. Jane LeClair, Chief Operating Officer National Cybersecurity Institute Accreditation What is it? Why is it important? How is it attained? The National Centers
Becoming a Cyber Professional: A Discussion with Recent Graduates
Becoming a Cyber Professional: A Discussion with Recent Graduates Moderator: George L. Heron, LifeJourney USA Panelists: Danielle Santos, Assistant Program Manager, Cyber Formal Education, DHS Scott Wallace.
Cyber Security at NSU
Cyber Security at NSU Aurelia T. Williams, Ph.D. Chair, Department of Computer Science Associate Professor of Computer Science June 9, 2015 Background Undergraduate computer science degree program began
The National Cybersecurity Workforce Framework. 2015 Delaware Cyber Security Workshop September 29, 2015
The National Cybersecurity Workforce Framework 2015 Delaware Cyber Security Workshop September 29, 2015 Bill Newhouse NICE Program Office at the National Institute of Standards and Technology NICE is a
Cybersecurity High School and Beyond
Cybersecurity High School and Beyond High School Career Fair and Expo March 29, 2014 Diane G. Miller, CCP Director, Operations Northrop Grumman Information Security Program Director, CyberPatriot Topics
The GW CyberCorps Program
The GW CyberCorps Program www.seas.gwu.edu/cybercorps Introduction The need for educated personnel in the government s cyber security workforce is critical to the nation s security. As evidenced by remarks
Building a Successful Cyber-security Program
Building a Successful Cyber-security Program David Dampier Distributed Analytics and Security Institute Mississippi Box 9627, HPC A129 Mississippi, MS 39762-9627 001-662-325-0779 [email protected]
Cybersecurity: A Shared Responsibility and Department of Homeland Security Priority
Cybersecurity: A Shared Responsibility and Department of Homeland Security Priority A Presentation to the National Cyberwatch Center November 20, 2015 Webinar Protocol :: Mute your phone/mic when not talking
In Response to Section 942 of the National Defense Authorization Act for Fiscal Year 2014 (Public Law 113-66) Terry Halvorsen DoD CIO
A Department of Defense Report on the National Security Agency and Department of Homeland Security Program for the National Centers of Academic Excellence in Information Assurance Education Matters In
NATIONAL INITIATIVE FOR CYBERSECURITY EDUCATION SAN DIEGO, CA
NATIONAL INITIATIVE FOR CYBERSECURITY EDUCATION SAN DIEGO, CA Dr. Aurelia T. Williams, NSU Ms. Kamilah Brown, CCSD Mr. Ronald Williams, DTC Mr. Tony Baylis, LLNL November 3, 2015 Who Are We? A collaborative
National Initiative for Cybersecurity Education Strategic Plan. Building a Digital Nation
National Initiative for Cybersecurity Education Strategic Plan Building a Digital Nation August 11, 2011 Table of Contents I. Introduction... 1 II. NICE Strategic Overview... 4 III. NICE Goals... 6 Goal
Proposed Education & Workforce Development Plan for FY2015. Education & Workforce Development Work Group Andrew Turner November 2014
Proposed Education & Workforce Development Plan for FY2015 Education & Workforce Development Work Group Andrew Turner November 2014 Current Opportunities Significant state-wide opportunities for Cyber
Department of Defense Information Assurance Scholarship Program. Sponsored by the. DoD Chief Information Officer
Department of Defense Information Assurance Scholarship Program Sponsored by the DoD Chief Information Officer SOLICITATION FOR PROPOSALS From Universities Designated by the National Security Agency (NSA)
Goal. Vision. CAE 2Y Program Eligibility and Summary
Goal National Centers of Academic Excellence in Information Assurance/Cyber Defense for Two-Year Education (CAE2Y) Program Criteria for Measurement Jointly Sponsored by the National Security Agency (NSA)
Sabbatical Leave Application
LOS RIOS COMMUNITY COLLEGE DISTRICT Sabbatical Leave Application Name Lance Parks College: CRC Present Assignment: CIS Type of Leave Requested: A. Type A One Semester: Fall Spring X Entire Year Will you
Cyber Innovation and Research Consortium
Cyber Innovation and Research Consortium Mission Conduct, coordinate and promote cyber and cyber security innovation, research, and policy 2 Focus Basic and Applied Research Education and Curriculum Outreach
[STAFF WORKING DRAFT]
S:\LEGCNSL\LEXA\DOR\OI\PARTIAL\CyberWD..xml [STAFF WORKING DRAFT] JULY, 0 SECTION. TABLE OF CONTENTS. The table of contents of this Act is as follows: Sec.. Table of contents. Sec.. Definitions. TITLE
Master of Science in Security Informatics (MSSI) Information Security Institute (JHUISI) The Johns Hopkins University
Master of Science in Security Informatics (MSSI) Information Security Institute (JHUISI) The Johns Hopkins University Securing cyberspace and our national information infrastructure is now more important
How To Become A Cybersecurity Consultant
Strengthening the Nexus: Government-Business- University cooperation and collaboration on security, training and research November 1, 2011 Susan C. Aldridge, PhD University of Maryland University College
USING INFORMATION ASSURANCE CURRICULUM STANDARDS AS A BASIS FOR A GRADUATE DEGREE
USING INFORMATION ASSURANCE CURRICULUM STANDARDS AS A BASIS FOR A GRADUATE DEGREE N. Paul Schembari, Mike Jochen East Stroudsburg University of Pennsylvania {nschembari, mjochen}@esu.edu ABSTRACT We describe
Dr. Dave Dampier Professor of Computer Science and Engineering
Dr. Dave Dampier Professor of Computer Science and Engineering Director, Distributed Analytics and Security Institute and the Center for Computer Security Research Mississippi State University CAE-2Y:
Meeting the CAE IA/CD Knowledge Units Requirements for the Polytechnic University of Puerto Rico
Meeting the CAE IA/CD Knowledge Units Requirements for the Polytechnic University of Puerto Rico Diana M. Darabi, Master of Computer Science, IT Management and Information Assurance, Alfredo Cruz, PhD
NICE and Framework Overview
NICE and Framework Overview Bill Newhouse NIST NICE Leadership Team Computer Security Division Information Technology Lab National Institute of Standards and Technology TABLE OF CONTENTS Introduction to
THE WORLD IS MOVING FAST, SECURITY FASTER.
THE WORLD IS MOVING FAST, SECURITY FASTER. * COMMITTED TO SECURITY* *Committed to providing peace of mind in your digital life and business. [ 3 ] OUR MISSION TO PREVENT AND MANAGE RISKS FACED BY ORGANIZATIONS
Cybersecurity Definitions and Academic Landscape
Cybersecurity Definitions and Academic Landscape Balkrishnan Dasarathy, PhD Program Director, Information Assurance Graduate School University of Maryland University College (UMUC) Email: [email protected]
SECTION-BY-SECTION. Section 1. Short Title. The short title of the bill is the Cybersecurity Act of 2012.
SECTION-BY-SECTION Section 1. Short Title. The short title of the bill is the Cybersecurity Act of 2012. Section 2. Definitions. Section 2 defines terms including commercial information technology product,
Information Security & Intelligence
Information Security & Intelligence Why Choose Information Security & Intelligence? The ISI program is certified by NSA's Information Assurance Courseware Evaluation Program as a National Center of Academic
An Accelerated Pathway to Careers in Cybersecurity for Transitioning Veterans. NICE Annual Conference November 2015
An Accelerated Pathway to Careers in Cybersecurity for Transitioning Veterans NICE Annual Conference November 2015 Panelists David Brown, Director of CyberTalent at the SANS Institute, a new business unit
National Science Foundation Funding Opportunities for Cybersecurity Education and Workforce Development
National Science Foundation Funding Opportunities for Cybersecurity Education and Workforce Development Corby Hovis [email protected] Directorate for Education and Human Resources National Science Foundation
National Initiative for Cyber Security Education
2014/PPWE/SEM2/007 Agenda Item: 5 National Initiative for Cyber Security Education Submitted by: United States Women Business and Smart Technology Seminar Beijing, China 23 May 2014 NICE OVERVIEW Women
DHS. CMSI Webinar Series
DHS CMSI Webinar Series Renee Forney Executive Director As the Executive Director for the Cyberskills Management Support Initiative (CMSI), Ms. Forney supports the Undersecretary for Management (USM) for
An Overview of Large US Military Cybersecurity Organizations
An Overview of Large US Military Cybersecurity Organizations Colonel Bruce D. Caulkins, Ph.D. Chief, Cyber Strategy, Plans, Policy, and Exercises Division United States Pacific Command 2 Agenda United
Actions and Recommendations (A/R) Summary
Actions and Recommendations (A/R) Summary Priority I: A National Cyberspace Security Response System A/R 1-1: DHS will create a single point-ofcontact for the federal government s interaction with industry
NSA/DHS Centers of Academic Excellence for Information Assurance/Cyber Defense
NSA/DHS Centers of Academic Excellence for Information Assurance/Cyber Defense Cyber Investigations Data Management Systems Security Data Security Analysis Digital Forensics Health Care Security Industrial
Department of Homeland Security Federal Government Offerings, Products, and Services
Department of Homeland Security Federal Government Offerings, Products, and Services The Department of Homeland Security (DHS) partners with the public and private sectors to improve the cybersecurity
Cyber Defense Operations Graduate Certificate
The SANS Technology Institute makes shorter groups of courses available to students who are unable to commit to a full master s degree program. These certificate programs will augment your skills, provide
Preventing and Defending Against Cyber Attacks June 2011
Preventing and Defending Against Cyber Attacks June 2011 The Department of Homeland Security (DHS) is responsible for helping Federal Executive Branch civilian departments and agencies secure their unclassified
Microsoft s cybersecurity commitment
Microsoft s cybersecurity commitment Published January 2015 At Microsoft, we take the security and privacy of our customers data seriously. This focus has been core to our culture for more than a decade
Bellevue University Cybersecurity Programs & Courses
Undergraduate Course List Core Courses: CYBR 250 Introduction to Cyber Threats, Technologies and Security CIS 311 Network Security CIS 312 Securing Access Control CIS 411 Assessments and Audits CYBR 320
Protecting Energy s Infrastructure and Beyond: Cybersecurity for the Smart Grid
Protecting Energy s Infrastructure and Beyond: Cybersecurity for the Smart Grid Which is it? Cyber Security ~or~ Cybersecurity? Dr. Ernie Lara President Presenters Estrella Mountain Community College Dr.
CYBERSECURITY CERTIFICATION PROGRAMS
CYBERSECURITY CERTIFICATION PROGRAMS Workforce Training Need 30% more computer and network workers needed from 2008 to 2018 1 ; 433 New Mexico IT job postings in 2012 for securityspecific positions 2 ;
National Cyber Security Awareness Month. Week Five: Building the Next Generation of Cyber Professionals
National Cyber Security Awareness Month Week Five: Building the Next Generation of Cyber Professionals Webinar recording and evaluation survey This webinar is being recorded and will be made available
UMUC FED Program. Online Open House July 22, 2015
UMUC FED Program Online Open House July 22, 2015 Corporate Learning Solutions Shelby Byrd Senior Account Manager Danielle Haynes Account Manager 1-855-CLS-5300 or [email protected] www.umuc.edu/fedgov 2 UMUC
El Camino College Homeland Security Spring 2016 Courses
El Camino College Homeland Security Spring 2016 Courses With over 250,000 federal positions in Homeland Security and associated divisions, students may find good career opportunities in this field. Explore
Department of Homeland Security
Department of Homeland Security Cybersecurity Awareness for Colleges and Universities EDUCAUSE Live! July 24, 2014 Overview Dramatic increase in cyber intrusions, data breaches, and attacks at institutions
Certified Cyber Security Analyst VS-1160
VS-1160 Certified Cyber Security Analyst Certification Code VS-1160 Vskills certification for Cyber Security Analyst assesses the candidate as per the company s need for cyber security and forensics. The
Cybersecurity Education
Cybersecurity Education Issues & Approaches Derek A. Smith Director of Cybersecurity Initiatives at Excelsior College AFCEA November 18, 2014 Where we are now! Symantec: In a world of increased cybersecurity
UTCS CyberSecurity. Educating Cyber Professionals. Dr. Bill Young Department of Computer Sciences University of Texas at Austin. Spring Semester, 2015
UTCS CyberSecurity Educating Cyber Professionals Dr. Bill Young Department of Computer Sciences University of Texas at Austin Spring Semester, 2015 Slideset 1: 1 From the Headlines U.S. Not Ready for Cyberwar
Priority III: A National Cyberspace Security Awareness and Training Program
Priority III: A National Cyberspace Security Awareness and Training Program Everyone who relies on part of cyberspace is encouraged to help secure the part of cyberspace that they can influence or control.
MASTER OF SCIENCE IN INFORMATION ASSURANCE PROGRAM DEPARTMENT OF COMPUTER SCIENCE HAMPTON UNIVERSITY
MASTER OF SCIENCE IN INFORMATION ASSURANCE PROGRAM DEPARTMENT OF COMPUTER SCIENCE HAMPTON UNIVERSITY HTTP://SCIENCE.HAMPTONU.EDU/COMPSCI/ The Master of Science in Information Assurance focuses on providing
JOINT EXPLANATORY STATEMENT TO ACCOMPANY THE CYBERSECURITY ACT OF 2015
JOINT EXPLANATORY STATEMENT TO ACCOMPANY THE CYBERSECURITY ACT OF 2015 The following consists of the joint explanatory statement to accompany the Cybersecurity Act of 2015. This joint explanatory statement
https://www.iti.illinois.edu/sites/default/files/cybersecurity_image.jpg
ABOUT THE ACADEMY The National Academy of Public Administration is an independent, nonprofit, and non-partisan organization established in 1967 and chartered by Congress in 1984. It provides expert advice
Master of Cyber Security
Master of Cyber Security Dr. Winnie Callahan Assoc. Director, Informatics Meghan Balding Graduate & Professional Programs September 17, 2013 WebEx Quick Facts Will I be able to get a copy of the slides
OVERVIEW DEGREES & CERTIFICATES
OVERVIEW DEGREES & CERTIFICATES 015 The best. Made better. SANS graduate programs are the ultimate expression of our 25 years dedicated to the education and development of information security professionals.
Toward Curricular Guidance in the Cyber Sciences
Toward Curricular Guidance in the Cyber Sciences 1 6 J U N E 2 0 1 5 2 0 1 5 C I S S E L A S V E G A S D A V I D G I B S O N, U S A I R F O R C E A C A D E M Y B E T H H A W T H O R N E, U N I O N C O
Goal. Vision. CAE IA/CD Program Eligibility and Summary
Goal Vision National Centers of Academic Excellence in Information Assurance/Cyber Defense (IA/CD) Education Program Criteria for Measurement Jointly Sponsored by the National Security Agency (NSA) and
in Information Security and Assurance
[DRAFT] A Model Curriculum for Programs of Study A Model Curriculum for Programs of Study in Information Security and Assurance in Information Security and Assurance v. 6.0 February 2013 [DRAFT] http://infosec.kennesaw.edu/infoseccurriculummodel.pdf
How To Get A Computer Hacking Program
CHFI v8(computer Hacking Forensics Investigator) Course Description & Overview Overview CHFIv8 Course Description EC-Council releases the brand new Version 8 of the Computer Hacking Forensics Investigator
Establishing and Maintaining a Cybersecurity Program: The GWU EMSE Experience
Establishing and Maintaining a Cybersecurity Program: The GWU EMSE Experience Julie J.C.H. Ryan, D.Sc. Assistant Professor Engineering Management and System Engineering School of Engineering and Applied
How To Write A National Cybersecurity Act
ROCKEFELLER SNOWE CYBERSECURITY ACT SUBSTITUTE AMENDMENT FOR S.773 March 17, 2010 BACKGROUND & WHY THIS LEGISLATION IS IMPORTANT: Our nation is at risk. The networks that American families and businesses
Integrating Cybersecurity with Emergency Operations Plans (EOPs) for K-12 Education
Integrating Cybersecurity with Emergency Operations Plans (EOPs) for K-12 Education Amy Banks, U.S. Department of Education, Center for School Preparedness, Office of Safe and Healthy Students Hamed Negron-Perez,
Middle Class Economics: Cybersecurity Updated August 7, 2015
Middle Class Economics: Cybersecurity Updated August 7, 2015 The President's 2016 Budget is designed to bring middle class economics into the 21st Century. This Budget shows what we can do if we invest
Certified Cyber Security Analyst VS-1160
VS-1160 Certified Cyber Security Analyst Certification Code VS-1160 Vskills certification for Cyber Security Analyst assesses the candidate as per the company s need for cyber security and forensics. The
How to use the National Cybersecurity Workforce Framework. Your Implementation Guide
How to use the National Cybersecurity Workforce Framework Your Implementation Guide A NATIONAL PROBLEM The Nation needs greater cybersecurity awareness. The US workforce lacks cybersecurity experts. Many
RARITAN VALLEY COMMUNITY COLLEGE COURSE OUTLINE. CISY-274 Privacy, Ethics & Computer Forensics
RARITAN VALLEY COMMUNITY COLLEGE COURSE OUTLINE CISY-274 Privacy, Ethics & Computer Forensics I. Basic Course Information A. Course Number & Title: CISY-274 - Privacy, Ethics, & Computer Forensics B. New
CAREER OPPORTUNITIES
Wherever you serve within the Intelligence Community (IC), you will be working to defeat terrorism at home and abroad, prevent and counter the spread of weapons of mass destruction, protect the health
Establishing a State Cyber Crimes Unit White Paper
Establishing a State Cyber Crimes Unit White Paper Utah Department of Public Safety Commissioner Keith Squires Deputy Commissioner Jeff Carr Major Brian Redd Utah Statewide Information & Analysis Center
MS Information Security (MSIS)
MS Information Security (MSIS) Riphah Institute of Systems Engineering (RISE) Riphah International University, Islamabad, Pakistan 1. Program Overview: The program aims to develop core competencies in
Getting Started in Cybersecurity: How to Hone Your Hacking Skills. Dr. Davina Pruitt-Mentle CyberWatch K12 Ed Tech Policy, Research and Outreach
Getting Started in Cybersecurity: How to Hone Your Hacking Skills Dr. Davina Pruitt-Mentle CyberWatch K12 Ed Tech Policy, Research and Outreach What do you know about Cybersecurity? The Net --- Eagle Eye
Minnesota State Community and Technical College Detroit Lakes Campus
Computer Network Security Minnesota State Community and Technical College Detroit Lakes Campus Overview Philosophy Note on 2 year Colleges Certifications Program Courses CCDC Program Numbers Faculty Future
Cybersecurity y Managing g the Risks
Cybersecurity y Managing g the Risks Presented by: Steven L. Caponi Jennifer Daniels Gregory F. Linsin 99 Cybersecurity The Risks Are Real Perpetrators are as varied as their goals Organized Crime: seeking
MARYLAND. Cyber Security White Paper. Defining the Role of State Government to Secure Maryland s Cyber Infrastructure.
MARYLAND Cyber Security White Paper Defining the Role of State Government to Secure Maryland s Cyber Infrastructure November 1, 2006 Robert L. Ehrlich, Jr., Governor Michael S. Steele, Lt. Governor Message
Department of Defense INSTRUCTION. DoD Information Assurance Scholarship Program
Department of Defense INSTRUCTION NUMBER 8145.01 January 17, 2012 DoD CIO SUBJECT: DoD Information Assurance Scholarship Program References: See Enclosure 1 1. PURPOSE. This Instruction: a. Implements
Cyber Security in the Nuclear Age. Dr. Jane LeClair, Chief Operating Officer National Cybersecurity Institute at Excelsior College Washington, D.C.
Cyber Security in the Nuclear Age Dr. Jane LeClair, Chief Operating Officer National Cybersecurity Institute at Excelsior College Washington, D.C. Overview 2 A Vested Interest Computers have provided the
Preventing and Defending Against Cyber Attacks November 2010
Preventing and Defending Against Cyber Attacks November 2010 The Nation s first ever Quadrennial Homeland Security Review (QHSR), delivered to Congress in February 2010, identified safeguarding and securing
U. S. Attorney Office Northern District of Texas March 2013
U. S. Attorney Office Northern District of Texas March 2013 What Is Cybercrime? Hacking DDOS attacks Domain name hijacking Malware Other computer related offenses, i.e. computer and internet used to facilitate
Integrating Cybersecurity with Emergency Operations Plans (EOPs) for Institutions of Higher Education (IHEs)
Integrating Cybersecurity with Emergency Operations Plans (EOPs) for Institutions of Higher Education (IHEs) Amy Banks, U.S. Department of Education, Center for School Preparedness, Office of Safe and
Information Security Curriculum Creation: A Case Study
Information Security Curriculum Creation: A Case Study Bradley Bogolea College of Engineering The Pennsylvania State University University Park, Pa 16802 [email protected] Kay Wijekumar School of Information
Graduate Program Handbook M.S. and Ph.D. Degrees
Graduate Program Handbook M.S. and Ph.D. Degrees Department of Computer Science University of New Hampshire updated: Summer 2012 1 Overview The department offers both an M.S. in Computer Science and a
SECURE AND TRUSTWORTHY CYBERSPACE (SaTC)
SECURE AND TRUSTWORTHY CYBERSPACE (SaTC) Overview The Secure and Trustworthy Cyberspace (SaTC) investment is aimed at building a cybersecure society and providing a strong competitive edge in the Nation
Exploring a National Cyber Security Exercise for Community Colleges
Exploring a National Cyber Security Exercise for Community Colleges Casey W. O'Brien Co-PI, CyberWatch Center Community College of Baltimore County Baltimore, Maryland :: CyberWatch :: Current Cyber Exercise
Program Contact Information (name, title, telephone number, and email address)
Name of Institution The Citadel Name of Proposed Center/Institute Center for Cybersecurity Education and Research Proposed Date of Implementation January 1, 2016 Site Department of Mathematics and Computer
