Cloud Mobile Computing. Ed Crowley

Size: px
Start display at page:

Download "Cloud Mobile Computing. Ed Crowley"

Transcription

1 Cloud Mobile Computing Ed Crowley

2 Tonight s Topics Communicate class expectations Distribute syllabus Identify Texts Communicate Grading Criteria Discuss online support materials Project on Host Gator or your personal Sites

3 Selected Qualifications Certified Ethical Hacker EcCouncil AccessData Certified Examiner AccessData Forensic Tool Kit (FTK) Certified Information Systems Security Professional (CISSP) ISC 2 Security +, Internet +, Network + -- CompTIA Microsoft and Novell Certifications Graduate: US Army Military Police Academy USARPAC Basic Sentry Dog School 3

4 Academic Background Established and Directed, Academic Computing Department, at Daytona State College (DBCC) Assistant Director/Net Admin, Galveston College Researcher, Academic Computing, Southern Illinois University Adjunct Instructor Daytona Beach Community College, Daytona, FL Lake Michigan College, Benton Harbor, MI Galveston College, Galveston College

5 At Heathkit, I wrote the operations manual for their first IBM PC compatible. Also published a computer graphic tutorial, an AutoCad tutorial, and an CAD/CAM textbook. More significantly, I was exposed to the Heathkit philosophy. Make Magazine, talking about what Steve Jobs learnd from HeathKit: The kits taught Steve Jobs that products were manifestations of human ingenuity, not magical objects dropped from the sky, Jobs was quoted as saying It gave a tremendous level of selfconfidence, that through exploration and learning one could understand seemingly very complex things in one s environment.

6 CIS 4397 Overview As defined by the Mobile Cloud Computing (MCC) forum, MCC [1]: at its simplest, refers to an infrastructure where both the data storage and data processing happen outside of the mobile device. Mobile cloud applications move the computing power and data storage away from mobile phones and into the cloud, bringing applications and MC to not just smartphone users but a much broader range of mobile subscribers. This class provides an introduction to mobile cloud computing. Specific interest areas include cloud and mobile architectures, platforms, and applications. Class scope includes cloud services, mobile devices, related operating systems, and the mobile Internet. Each student will complete an online mobile computing project.

7 Class Objectives At the end of this course, you will be able to: List and explain common cloud computing terms. Articulate how hardware independence, virtualization, clustering, networking and data centers relate to cloud computing Compare and contrast different cloud architecture, models, and services. Explain how cloud computing can provide business value Compare and contrast different cellular technologies Compare and contrast RF principles and their functionality Explain disaster recovery principles and how they affect mobile devices List, compare and contrast common network ports used for network devices Compare and contrast mobility solutions to enterprise requirements Identify various encryption methods for securing mobile environments. Explain risks, threats and mitigation strategies affecting the mobile ecosystem Demonstrate familiarity with HTML5, CSS, JQUERY, and related mobile web technologies.

8 Class Texts Bobby Rogers, CompTIA Mobility+ Certification, McGraw Hill Education, 2014, ISBN Nate Stammer and Scott Wilson, CompTIA Cloud+ Certification, McGraw Hill, 2014, ISBN

9 Class Support Site f=3

10 Syllabus and Schedule Review

11 Assignments

12 Questions?

13 Informal Survey Do you, or have you, worked in IT? Explain Briefly describe your class goal. IT certifications? Background with IT, computers, and networks? Anything special that you would like to learn about?

167 th Air Wing Fast Track Cyber Security Blue Ridge Community and Technical College

167 th Air Wing Fast Track Cyber Security Blue Ridge Community and Technical College 167 th Air Wing Fast Track Cyber Security Blue Ridge Community and Technical College Information Security Certificate: Designed to introduce students to programming, security basics, network monitoring,

More information

167 th Air Wing Fast Track Cyber Program Blue Ridge Community and Technical College

167 th Air Wing Fast Track Cyber Program Blue Ridge Community and Technical College 167 th Air Wing Fast Track Cyber Program Blue Ridge Community and Technical College Information Security Certificate: Designed to introduce students to programming, security basics, network monitoring,

More information

FedVTE Training Catalog SPRING 2015. advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov

FedVTE Training Catalog SPRING 2015. advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov FedVTE Training Catalog SPRING 2015 advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov If you need any assistance please contact the FedVTE Help Desk here or email the

More information

Field of Study Area of Expertise Certification Vendor Course

Field of Study Area of Expertise Certification Vendor Course Field of Study Area of Expertise Certification Vendor Course Advanced Security Certified Information Systems Security Professional (CISSP) ISC2 CISSP Advanced Security CompTIA Advanced Security Practitioner

More information

FedVTE Training Catalog SUMMER 2015. advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov

FedVTE Training Catalog SUMMER 2015. advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov FedVTE Training Catalog SUMMER 2015 advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov Access FedVTE online at: fedvte.usalearning.gov If you need any assistance please

More information

Certified Digital Forensics Examiner

Certified Digital Forensics Examiner Cyber Security Training & Consulting Certified Digital COURSE OVERVIEW 5 Days 40 CPE Credits $3,000 Digital is the investigation and recovery of data contained in digital devices. This data is often the

More information

Principles of Information Assurance Syllabus

Principles of Information Assurance Syllabus Course Number: Pre-requisite: Career Cluster/Pathway: Career Major: Locations: Length: 8130 (OHLAP Approved) Fundamentals of Technology or equivalent industry certifications and/or work experience. Information

More information

Syllabus: TB143 Introduction to Personal Computers

Syllabus: TB143 Introduction to Personal Computers Syllabus: TB143 Introduction to Personal Computers Instructor: Office hours: Class hours: Course Description Organization of a typical Personal Computer (PC) is examined in a given popular operating systems

More information

Curriculum Vitae -Joel H. Bush

Curriculum Vitae -Joel H. Bush Curriculum Vitae -Joel H. Bush Joel H. Bush Email: [email protected] Home: 360 Polk 75 Mena, AR 71953 Cell: 479-216-4553 Rich Mountain Community College 1100 College Drive Mena, AR 71953 479-394-7622 X1356

More information

All about CPEs. David Gittens CISA CISM CISSP CRISC HISP

All about CPEs. David Gittens CISA CISM CISSP CRISC HISP All about CPEs David Gittens CISA CISM CISSP CRISC HISP The Designer David Gittens ISSA Barbados Past President Certified in ethical hacking and computer forensics Certified in security management and

More information

CURRICULUM VITAE. David T. Gallant (USAF Retired) President, Gallant Computer Investigative Services, LLC

CURRICULUM VITAE. David T. Gallant (USAF Retired) President, Gallant Computer Investigative Services, LLC CURRICULUM VITAE David T. Gallant (USAF Retired) President, Gallant Computer Investigative Services, LLC EDUCATION: Bachelor of Science, University of the State of New York, Albany, NY, 1995 AA, Criminal

More information

Cybersecurity Workforce Training Partnership

Cybersecurity Workforce Training Partnership Cybersecurity Workforce Training Partnership NSA Cyber Command AACC @ Arundel Mills CAE-2Y NSA and DHS designated AACC as a National Center of Academic Excellence in Information Assurance 2-Year Education

More information

RARITAN VALLEY COMMUNITY COLLEGE COURSE OUTLINE. CISY 229 Information Security Fundamentals

RARITAN VALLEY COMMUNITY COLLEGE COURSE OUTLINE. CISY 229 Information Security Fundamentals RARITAN VALLEY COMMUNITY COLLEGE COURSE OUTLINE CISY 229 Information Security Fundamentals I. Basic Course Information A. Course Number & Title: CISY-229 Information Security Fundamentals B. New or Modified

More information

CURRICULUM VITAE JAMES R. SWAUGER Digital Forensic Examiner

CURRICULUM VITAE JAMES R. SWAUGER Digital Forensic Examiner CURRICULUM VITAE JAMES R. SWAUGER Digital Forensic Examiner Binary Intelligence, LLC 150 Industrial Drive Franklin, Ohio 45005 Phone: 866.246.2794 x703 Email: [email protected] CERTIFICATIONS AND

More information

EC-Council Ethical Hacking and Countermeasures

EC-Council Ethical Hacking and Countermeasures EC-Council Ethical Hacking and Countermeasures Description This class will immerse the students into an interactive environment where they will be shown how to scan, test, hack and secure their own systems.

More information

JAMES R. SWAUGER Digital Forensic Examiner

JAMES R. SWAUGER Digital Forensic Examiner CURRICULUM VITAE JAMES R. SWAUGER Digital Forensic Examiner Binary Intelligence, LLC 726 East Main Street, Suite F #150 Lebanon, Ohio 45036 Phone: 866.246.2794 x703 Email: [email protected] CERTIFICATIONS

More information

capabilities statement

capabilities statement capabilities statement GSA Schedule 70 Contract Holder: Contract #: GS-35F-0649Y Duns#: 824940121 Cage Code#: 6B5K3 SIN Codes: 132-34 Maintenance of Software 132-51 Information Technology Professional

More information

Shon Harris s Newly Updated CISSP Materials

Shon Harris s Newly Updated CISSP Materials Shon Harris s Newly Updated CISSP Materials WHY PURSUE A CISSP? Many companies are beginning to regard a CISSP certification as a requirement for their technical, mid-management, and senior IT management

More information

APPLICATION FOR BOARD APPROVAL. of Locally Developed Course. MCP CERTIFICATION 11/12a/12b/12c

APPLICATION FOR BOARD APPROVAL. of Locally Developed Course. MCP CERTIFICATION 11/12a/12b/12c APPLICATION FOR BOARD APPROVAL of Locally Developed Course MCP CERTIFICATION 11/12a/12b/12c John Murtha APPLICATION FOR BOARD APPROVAL Of the Locally Developed MCP CERTIFICATION 11/12a/12b/12c PREAMBLE:

More information

Page 1 of 5 Position Code #P10260. Forensic Identification - Technological Crimes Unit ASSOCIATION: Civilian LOCATION: Headquarters

Page 1 of 5 Position Code #P10260. Forensic Identification - Technological Crimes Unit ASSOCIATION: Civilian LOCATION: Headquarters Page 1 of 5 Position Code #P10260 POSITION TITLE: Computer Forensics DEPT./DIV.: Investigative Services Support Technician REPORTS TO: Sergeant, Technological Crimes Unit BRANCH: Forensic Identification

More information

Syllabus CIS 3630: Management Information Systems Spring 2009

Syllabus CIS 3630: Management Information Systems Spring 2009 Syllabus CIS 3630: Management Information Systems Spring 2009 Instructor: Dr. Silvana Faja Office: Dockery 301 I Office Hours: 9:15 10:45 and 1:00-2:00 TR or by appointment Office Phone: (660) 441 2423

More information

Cybersecurity Certificate Programs

Cybersecurity Certificate Programs Cybersecurity Certificate Programs Maryland Workforce Outlook Forum May 26th, 2016 Homer Minnick, Director, Cybersecurity Academy, UMBC Training Centers umbctraining.com 443-692-6600 About UMBC Training

More information

CERTIFIED DIGITAL FORENSICS EXAMINER

CERTIFIED DIGITAL FORENSICS EXAMINER CERTIFIED DIGITAL FORENSICS EXAMINER KEY DATA Course Title: C)DFE Duration: 5 days CPE Credits: 40 Class Format Options: Instructor-led classroom Live Online Training Computer Based Training Who Should

More information

WILLIAM OETTINGER PHONE (702) 292-4645 [email protected]

WILLIAM OETTINGER PHONE (702) 292-4645 WOETTINGER@GMAIL.COM WILLIAM OETTINGER PHONE (702) 292-4645 [email protected] SUMMARY OF QUALIFICATIONS Veteran investigator in a traditional and computer-related environment. A leader experienced in organizing, directing,

More information

Course Title: ITAP 3471: Web Server Management

Course Title: ITAP 3471: Web Server Management Course Title: ITAP 3471: Web Server Management Semester Credit Hours: 4 (3,1) I. Course Overview The primary objective of this course is to give students a comprehensive overview of the tools and techniques

More information

Learning Tree Training Pre-approved Training for Continuing Education Units (CEUs)

Learning Tree Training Pre-approved Training for Continuing Education Units (CEUs) Learning Tree Training Pre-approved Training for Continuing Education Units (CEUs) Note: Approved training courses in this document are subject to change without prior notification. Training submitted

More information

Doctor of Philosophy in Business Administration - Computer & Information Security, 2014 North Central University, Prescott Valley, Arizona

Doctor of Philosophy in Business Administration - Computer & Information Security, 2014 North Central University, Prescott Valley, Arizona Dr. Scott P. Paetzold University of Wisconsin Stout College of Science, Technology, Engineering and Math Menomonie, Wisconsin 54751 715-232-5498 [email protected] EDUCATION: Doctor of Philosophy in

More information

University of Central Oklahoma Spring 2012 Undergraduate Course Syllabus. "Transforming Academic Excellence into Professional Competence"

University of Central Oklahoma Spring 2012 Undergraduate Course Syllabus. Transforming Academic Excellence into Professional Competence University of Central Oklahoma Spring 2012 Undergraduate Course Syllabus "Transforming Academic Excellence into Professional Competence" Course Information Course Title: Careers and Technologies in Criminal

More information

Unit 3 Cyber security

Unit 3 Cyber security 2016 Suite Cambridge TECHNICALS LEVEL 3 IT Unit 3 Cyber security Y/507/5001 Guided learning hours: 60 Version 1 September 2015 ocr.org.uk/it LEVEL 3 UNIT 3: Cyber security Y/507/5001 Guided learning hours:

More information

IT Security Training. Why Security Certification? A Serious Business - Fear Drives the Demand High Demand Freedom to Make and Break Rules

IT Security Training. Why Security Certification? A Serious Business - Fear Drives the Demand High Demand Freedom to Make and Break Rules IT Security Training Why Security Certification? A Serious Business - Fear Drives the Demand High Demand Freedom to Make and Break Rules Benefits of Certification Provides Assurance to Employers Certification

More information

CCA CYBER SECURITY TRACK

CCA CYBER SECURITY TRACK CCA CYBER SECURITY TRACK 2013-2014 CCA Advanced Cyber Security Track A detailed description of the advanced cyber security track. Courses to be offered in the CCA Advanced Cyber Security Track 2013-2014

More information

A UNIVERSAL MACHINE FOR THE INDUSTRIAL INTERNET OF THINGS. MultiConnect Conduit

A UNIVERSAL MACHINE FOR THE INDUSTRIAL INTERNET OF THINGS. MultiConnect Conduit A UNIVERSAL MACHINE FOR THE INDUSTRIAL INTERNET OF THINGS MultiConnect Conduit 1 A Universal Machine for the Industrial Internet of Things The term Universal Machine, introduced in 1936 by the mathematician

More information

Computer Virtualization (ITNW 1313) Credit: 3 semester credit hours (2 hours lecture, 4 hours lab) Prerequisite/Co-requisite: None

Computer Virtualization (ITNW 1313) Credit: 3 semester credit hours (2 hours lecture, 4 hours lab) Prerequisite/Co-requisite: None Computer Virtualization (ITNW 1313) Credit: 3 semester credit hours (2 hours lecture, 4 hours lab) Prerequisite/Co-requisite: None Course Description Implement and support virtualization of clients of

More information

CYBER FORENSICS (W/LAB) Course Syllabus

CYBER FORENSICS (W/LAB) Course Syllabus 6111 E. Skelly Drive P. O. Box 477200 Tulsa, OK 74147-7200 CYBER FORENSICS (W/LAB) Course Syllabus Course Number: CSFS-0020 OHLAP Credit: Yes OCAS Code: 8134 Course Length: 130 Hours Career Cluster: Information

More information

TTS EXPLORE. Fall 2014 Course Schedule. Technology Training Solutions (TTS) IT Certifications. Mobile Apps. Webmaster. Software Social Media

TTS EXPLORE. Fall 2014 Course Schedule. Technology Training Solutions (TTS) IT Certifications. Mobile Apps. Webmaster. Software Social Media IT Certifications EXPLORE Mobile Apps TTS Software Social Media Webmaster Fiber Optics Online Software Harness Productivity Tools to Improve Efficiency Page 3 Mobile Apps Be Competitive with Mobile Apps

More information

HARFORD COMMUNITY COLLEGE 401 Thomas Run Road Bel Air, MD 21015 Course Outline

HARFORD COMMUNITY COLLEGE 401 Thomas Run Road Bel Air, MD 21015 Course Outline HARFORD COMMUNITY COLLEGE 401 Thomas Run Road Bel Air, MD 21015 Course Outline CIS 210 COURSE NUMBER: CIS 210 COURSE NAME: MEETING PLACE: Random On-Line DIVISION: Business, Computing & Applied Technology

More information

IT Networking and Security

IT Networking and Security elearning Course Outlines IT Networking and Security powered by Calibrate elearning Course Outline CompTIA A+ 801: Fundamentals of Computer Hardware/Software www.medallionlearning.com Fundamentals of Computer

More information

Security Transcends Technology

Security Transcends Technology INTERNATIONAL INFORMATION SYSTEMS SECURITY CERTIFICATION CONSORTIUM, INC. Career Enhancement and Support Strategies for Information Security Professionals Paul Wang, MSc, CISA, CISSP [email protected]

More information

COURSE SYLLABUS BMIS 342 CYBER SECURITY

COURSE SYLLABUS BMIS 342 CYBER SECURITY Note: Course content may be changed, term to term, without notice. The information below is provided as a guide for course selection and is not binding in any form, and should not be used to purchase course

More information

A three step plan for migrating to Microsoft Exchange 2010

A three step plan for migrating to Microsoft Exchange 2010 A three step plan for migrating to Microsoft Exchange 2010 Mimecast can mitigate the risks associated with migration, such as increased email downtime and threats to data security, helping businesses to

More information

Your complete guide to Cloud Computing

Your complete guide to Cloud Computing Your complete guide to Cloud Computing 1 Doc V1.0 Dec 2013 Table of Contents Hosted Desk- 3 The Cloud and Cloud Computing... 4 The benefits of Cloud Solutions 6 The Cloud is Growing - Rapidly 7 Resolving

More information

CRN# 23614 CPET 58100-02 Cloud Computing: Technologies & Enterprise IT Strategies

CRN# 23614 CPET 58100-02 Cloud Computing: Technologies & Enterprise IT Strategies CRN# 23614 CPET 58100-02 Cloud Computing: Technologies & Enterprise IT Strategies A Specialty Course for Purdue University s M.S. in Technology: Information Technology/Advanced Computer Apps Track Spring

More information

MIS 7381 Syllabus_Spring 2016_Cooper.doc 1 02/08/16 2:44 PM

MIS 7381 Syllabus_Spring 2016_Cooper.doc 1 02/08/16 2:44 PM MIS 7381 Management of Information Security Spring 2016: Tuesday 6-9PM Room: 114 MH Professor: R. Cooper Office: MH 280B Phone: 713-743-4732 E-mail: [email protected] (Rather than phone, e-mail is my preferred

More information

Certification and Training

Certification and Training Certification and Training CSE 4471: Information Security Instructor: Adam C. Champion Autumn Semester 2013 Based on slides by a former student (CSE 551) Outline Organizational information security personnel

More information

Security Certifications. A Short Survey. Welcome. Stan Reichardt [email protected]

Security Certifications. A Short Survey. Welcome. Stan Reichardt stan2007@sluug.org Security Certifications A Short Survey Welcome Stan Reichardt [email protected] Disclaimer This is just a cursory look at what is out there. I believe certifications are good training tools, but not necessarily

More information

CAST CENTER FOR ADVANCED SECURITY TRAINING. CAST618 Designing and Implementing Cloud Security CAST

CAST CENTER FOR ADVANCED SECURITY TRAINING. CAST618 Designing and Implementing Cloud Security CAST CENTER FOR ADVANCED SECURITY TRAINING 618 Designing and Implementing Cloud Security About EC-Council Center of Advanced Security Training () The rapidly evolving information security landscape now requires

More information

Montgomery County Community College Non-Credit Programs Winter/Spring 2016 TECHNOLOGY PROGRAMS

Montgomery County Community College Non-Credit Programs Winter/Spring 2016 TECHNOLOGY PROGRAMS TECHNOLOGY PROGRAMS PROGRAM PAGE A+... 4 CISCO NETWORKING ACADEMY... 2 CITRIX IT ACADEMY... 3 COMPUTER AIDED DRAFTING... 8 COMPUTERIZED ACCOUNTING... 6 COMPUTERS... 5 CYBER SECURITY... 3 MICROSOFT ADMINISTRATION...

More information

Technology Approved Certifications

Technology Approved Certifications Date Approved Designation Certificate Name Points Microsoft Systems Engineering 04/16/2002 MCSE Microsoft Certified Systems Engineer 280 06/14/2007 MCSE: WIN 2003 Microsoft Certified Systems Engineer:

More information

CJ 4480 Digital Forensics II Syllabus - Term 2 2015

CJ 4480 Digital Forensics II Syllabus - Term 2 2015 CJ 4480 Digital Forensics II Syllabus - Term 2 2015 For course syllabus posted prior to the beginning of the term, the instructor reserves the right to make minor changes prior to or during the term. The

More information

OCR LEVEL 2 CAMBRIDGE TECHNICAL

OCR LEVEL 2 CAMBRIDGE TECHNICAL Cambridge TECHNICALS OCR LEVEL 2 CAMBRIDGE TECHNICAL CERTIFICATE/DIPLOMA IN IT SYSTEMS SOFTWARE AND HARDWARE FOR DEVELOPMENT D/505/4621 LEVEL 2 UNIT 25 GUIDED LEARNING HOURS: 60 UNIT CREDIT VALUE: 10 Systems

More information

Access FedVTE online at: fedvte.usalearning.gov

Access FedVTE online at: fedvte.usalearning.gov FALL 2015 Access FedVTE online at: fedvte.usalearning.gov If you need any assistance please contact the FedVTE Help Desk her e or email the Help Desk at [email protected]. To speak with a Help Desk

More information

Table of Contents. Introduction. Audience. At Course Completion

Table of Contents. Introduction. Audience. At Course Completion Table of Contents Introduction Audience At Course Completion Prerequisites Certified Professional Exams Student Materials Course Outline Introduction This four-day, instructor-led course provides students

More information

Introduction to Cyber Security / Information Security

Introduction to Cyber Security / Information Security Introduction to Cyber Security / Information Security Syllabus for Introduction to Cyber Security / Information Security program * for students of University of Pune is given below. The program will be

More information

IT Networking and Security

IT Networking and Security elearning Course Outlines IT Networking and Security powered by Calibrate elearning Course Outline CompTIA A+ 801: Fundamentals of Computer Hardware/Software powered by Calibrate www.medallionlearning.com

More information

Information Technology Cluster

Information Technology Cluster Network Systems Pathway Information Technology Cluster Assistant Network Technician -- This major prepares students to install, configure, operate, and connections to remote sites in a wide area network

More information

SENIOR SYSTEMS ANALYST

SENIOR SYSTEMS ANALYST CITY OF MONTEBELLO 109 DEFINITION Under general administrative direction of the City Administrator, provides advanced professional support to departments with very complex computer systems, programs and

More information

GREAT PLAINS TECHNOLOGY CENTER COURSE OF STUDY. Adult Students: 1050 Hours

GREAT PLAINS TECHNOLOGY CENTER COURSE OF STUDY. Adult Students: 1050 Hours GREAT PLAINS TECHNOLOGY CENTER COURSE OF STUDY Career Cluster: Career Pathway: Career Major: Career Major Hours: Information Technology (IT) Network Systems (IT001) Cyber Security Forensics Specialist

More information

Hosted by Lunarline: School of Cyber Security

Hosted by Lunarline: School of Cyber Security Hosted by Lunarline: School of Cyber Security Please Fax Government Purchase Orders and SF 182s To (22) 315-33 Cybersecurity is one of the hottest issues for today s Federal and DOD Agencies and commercial

More information

CJ 4488, 4489, 4490 Lee Page 1

CJ 4488, 4489, 4490 Lee Page 1 CJ-4488, CJ-4489, CJ-4490 Internship in a Criminal Justice Agency For course syllabus posted prior to the beginning of the term, the instructor reserves the right to make minor changes prior to or during

More information

Cloud Computing TODAY S TOPICS WHAT IS CLOUD COMPUTING? ICAC Webinar Cloud Computing September 4, 2012. What Cloud Computing is and How it Works

Cloud Computing TODAY S TOPICS WHAT IS CLOUD COMPUTING? ICAC Webinar Cloud Computing September 4, 2012. What Cloud Computing is and How it Works Cloud Computing TODAY S TOPICS What Cloud Computing is and How it Works Security & Privacy Issues Investigative Challenges WHAT IS CLOUD COMPUTING? Cloud computing refers to software or processes offered

More information

How To Get An Individualized Technical Studies Associate Degree At Northcentral Technical College

How To Get An Individualized Technical Studies Associate Degree At Northcentral Technical College Guide to Individualized Technical Studies Associate Degree www.ntc.edu Table of Contents Page Welcome, Introduction and Advanced Standing Opportunities...3 Individualized Technical Studies Associate Degree

More information

Apply today: strayer.edu/apply SCHOOL OF INFORMATION SYSTEMS AND TECHNOLOGY MASTER OF SCIENCE IN INFORMATION SYSTEMS RECOGNIZED MARKETABLE FLEXIBLE

Apply today: strayer.edu/apply SCHOOL OF INFORMATION SYSTEMS AND TECHNOLOGY MASTER OF SCIENCE IN INFORMATION SYSTEMS RECOGNIZED MARKETABLE FLEXIBLE RECOGNIZED PROVEN RESPECTED MARKETABLE FLEXIBLE Fernanda Tapia Student SCHOOL OF INFORMATION SYSTEMS AND TECHNOLOGY MASTER OF SCIENCE IN INFORMATION SYSTEMS Apply today: strayer.edu/apply FLEXIBLE / AFFORDABLE

More information

MIS 426: Management Information Systems

MIS 426: Management Information Systems MIS 426: Management Information Systems COURSE SYLLABUS: Spring 2015 01 E Instructor: Dr. Bo Han Email Address: [email protected] To protect your academic privacy, please always send me emails from your

More information

(BDT) BDT/POL/CYB/Circular-002. +41 22 730 6057 +41 22 730 5484 [email protected]

(BDT) BDT/POL/CYB/Circular-002. +41 22 730 6057 +41 22 730 5484 cybersecurity@itu.int 2011 15 (BDT) BDT/POL/CYB/Circular-002 +41 22 730 6057 +41 22 730 5484 [email protected] 2008 2010 2010 International Telecommunication Union Place des Nations CH-1211 Geneva 20 Switzerland Tel: +41

More information

CSTA- Oracle Academy 2014 U.S. High School CS Survey: The State of Computer Science in U.S. High Schools: an Administrator s Perspective.

CSTA- Oracle Academy 2014 U.S. High School CS Survey: The State of Computer Science in U.S. High Schools: an Administrator s Perspective. CSTA- Oracle Academy 2014 U.S. High School CS Survey: The State of Computer Science in U.S. High Schools: an Administrator s Perspective Methodology: The Computer Science Teachers Association (CSTA), in

More information

EDUCATION FOR THE FUTURE. www.itt-tech.edu

EDUCATION FOR THE FUTURE. www.itt-tech.edu EDUCATION FOR THE FUTURE www.itt-tech.edu THE MISSION OF THE ITT TECHNICAL INSTITUTE The THE ITT MISSION Technical of ITT Educational Institute is Services, an institution Inc., and ITT of Technical higher

More information

High School Articulation Requirements Guide

High School Articulation Requirements Guide High School Articulation Requirements Guide This document outlines courses approved by for high school articulation consideration along with teacher qualification and certification requirements and terms

More information

Implementing Multi-factor Authentication for Clinical Applications

Implementing Multi-factor Authentication for Clinical Applications Implementing Multi-factor Authentication for Clinical Applications Presented by: Todd Greene (Carolinas Healthcare System) Jon Sternstein (Stern Security) Introduction Jon Sternstein, Founder & Principal

More information

Information Security Specialist Training on the Basis of ISO/IEC 27002

Information Security Specialist Training on the Basis of ISO/IEC 27002 Information Security Specialist Training on the Basis of ISO/IEC 27002 Natalia Miloslavskaya, Alexander Tolstoy Moscow Engineering Physics Institute (State University), Russia, {milmur, ait}@mephi.edu

More information

Articulation Course Guide and High School Teacher Requirements

Articulation Course Guide and High School Teacher Requirements Articulation Course Guide and High School Teacher Requirements This document outlines courses approved by for high school articulation consideration along with teacher qualification and certification requirements

More information

LIS 638: Internet Technologies and Information Services Spring 2015 (January 14 to May 1)

LIS 638: Internet Technologies and Information Services Spring 2015 (January 14 to May 1) University of Kentucky School of Library & Information Science (SLIS) LIS 638: Internet Technologies and Information Services Spring 2015 (January 14 to May 1) Instructor Assistant Professor Office: 331

More information

Security+ Certification Course

Security+ Certification Course Your Course Information Security+ Certification Course Swaledale 4 Coaley Lane Houghton-le-Spring Tyne & Wear DH4 4SQ The CompTIA Security+ Certification Course covers the Latest CompTIA Certification

More information

SYLLABUS CIS 3660: OBJECT-ORIENTED SYSTEM ANALYSIS AND DESIGN SPRING 2010

SYLLABUS CIS 3660: OBJECT-ORIENTED SYSTEM ANALYSIS AND DESIGN SPRING 2010 SYLLABUS CIS 3660: OBJECT-ORIENTED SYSTEM ANALYSIS AND DESIGN SPRING 2010 Instructor: Dr. Silvana Faja Office: WDE 2400 Office Hours: 9:30 10:45 and 1:30 3:00, Tuesday and Thursday and by appointment Office

More information

COURSE SYLLABUS DESIGNING WEB PAGES COP3835-RVC-1121 GENERAL INFORMATION IMPORTANT INFORMATION PROFESSOR INFORMATION

COURSE SYLLABUS DESIGNING WEB PAGES COP3835-RVC-1121 GENERAL INFORMATION IMPORTANT INFORMATION PROFESSOR INFORMATION COURSE SYLLABUS DESIGNING WEB PAGES COP3835-RVC-1121 GENERAL INFORMATION IMPORTANT INFORMATION COURSE DETAIL COURSE CALENDAR GENERAL INFORMATION PROFESSOR INFORMATION Instructor: Timothy Walker Phone/Text:

More information

Bellevue University Cybersecurity Programs & Courses

Bellevue University Cybersecurity Programs & Courses Undergraduate Course List Core Courses: CYBR 250 Introduction to Cyber Threats, Technologies and Security CIS 311 Network Security CIS 312 Securing Access Control CIS 411 Assessments and Audits CYBR 320

More information

Security + Certification (ITSY 1076) Syllabus

Security + Certification (ITSY 1076) Syllabus Security + Certification (ITSY 1076) Syllabus Course: ITSY 1076 Security+ 40 hours Course Description: This course is targeted toward an Information Technology (IT) professional who has networking and

More information

PC/Network Technician Certification Program: CompTIA A+, Microsoft MTA: OS Essentials, CWTS Wireless Certifications

PC/Network Technician Certification Program: CompTIA A+, Microsoft MTA: OS Essentials, CWTS Wireless Certifications : CompTIA A+, Microsoft MTA: OS Essentials, CWTS Wireless Certifications ZAPL- 007 CompTIA A+, Microsoft MTA: Windows OS Essentials, CWTS Wireless Certifications) Fee: $3,175 - Includes training, comprehensive

More information

City Tech Instructional Technology & Media Services. Blackboard Tutorial for Students

City Tech Instructional Technology & Media Services. Blackboard Tutorial for Students City Tech Instructional Technology & Media Services Blackboard Tutorial for Students How to find your courses After you log-in to Blackboard by visiting CUNY website at http://www.cuny.edu=>portal Login/Blackboard/eSIMS=>Blackboard

More information

Gulf Coast Service Center

Gulf Coast Service Center Gulf Coast Service Center Michael J. O Dowd, IAAI-CFI Senior Investigator Orlando, Florida 904-751-9696 [email protected] EDUCATION: Valencia Community College A.S. Degree, Fire Science Technology Orlando,

More information

Curriculum Committee Meeting Approved March 20, 2014

Curriculum Committee Meeting Approved March 20, 2014 Approved Members Present: Mr. David Epstein, Mr. Brian Foley, Ms. Barbara Gershman, Ms. Barbara Hopkins, Ms. Ann-Marie John, Dr. Julie Leidig, Ms. Lisa Riggleman-Gross, Dr. Sharon Robertson, Ms. Maria

More information

Department of Computer & Information Sciences. INFO-450: Information Systems Security Syllabus

Department of Computer & Information Sciences. INFO-450: Information Systems Security Syllabus Department of Computer & Information Sciences INFO-450: Information Systems Security Syllabus Course Description This course provides a deep and comprehensive study of the security principles and practices

More information