Goal. Vision. CAE 2Y Program Eligibility and Summary
|
|
- Edmund Woods
- 8 years ago
- Views:
Transcription
1 Goal National Centers of Academic Excellence in Information Assurance/Cyber Defense for Two-Year Education (CAE2Y) Program Criteria for Measurement Jointly Sponsored by the National Security Agency (NSA) and the Department of Homeland Security (DHS) The goal of the CAE IA/CD for Two-Year Education program is to proactively increase our understanding of robust IA/CD technology, policy and practices that will enable our Nation to effectively prevent and respond to a catastrophic cyber event. This program will contribute significantly to the advancement of state-of-the-art IA/CD knowledge and practice. Vision The vision for the CAE2Y program is to: 1. Provide programs that commit to excellence in the field of Information Assurance and Cyber Defense education at community and technical college and government training institutions. 2. Provide innovative, comprehensive and multidisciplinary education and training in the IA/CD field. 3. Strengthen the cybersecurity workforce by providing IA/CD education and training through degree and certification programs at community and technical colleges and government training centers. 4. Build an effective education pipeline model with K 12 schools to encourage students at an early age to enter IA/CD fields of study. 5. Provide the Nation with a pipeline of qualified students poised to become the future skilled technical workforce. 6. Continuously improve the quality of IA/CD programs, curriculum, faculty, students and other institutions. CAE 2Y Program Eligibility and Summary The CAE2Y Program is open to current regionally accredited two-year community colleges, technical schools, state or federally endorsed IA/Cybersecurity training centers or U.S. Government IA/Cybersecurity training centers. All institutions must hold current regional accreditation as outlined by the Department of Education ( Overall CAE2Y requirements are: Demonstration of program outreach, student development, IA/CD Center establishment and maintenance, IA/CD faculty, and student curriculum path. Successful mapping of the institution s curriculum to the two-year core Knowledge Units (KUs). Completion of these requirements will recognize the institution with designation at the institution level as a NSA/DHS National Center of Academic Excellence for Information Assurance/Cyber Defense for Two-Year Education (CAE2Y). Institutions shall demonstrate that students can successfully complete the CAE2Y course of study and receive recognition on a transcript, diploma, etc. CAE 2Y Criteria Page 1 September 2013
2 Focus Area (Optional): 2014 NSA/DHS National CAE 2Y Criteria All CAEs have the option to apply for one or more CAE IA/CD Focus Area designations. The criteria include: Successful mapping of the institution s curriculum to all of the KUs identified in the Focus Area. Demonstration that a student can reasonably complete the necessary course of study to include all KUs identified in the Focus Area. The institution must provide student certificates to those that complete the FA course of study. The certificates must clearly identify the specific Focus Area achieved. Knowledge Units: The KU mapping will require the institution to address how it meets each Core and chosen Optional KU. An institution has many ways to demonstrate how a program meets/fulfills a KU. Some examples include: course syllabus, course outline, student assignments, lab assignment, modules in a course/collection of courses, and certifications (CCNA, CISSP, etc.). Required information will include: course syllabi, course outlines and justifications showing where and how the KUs are addressed in the curriculum. One course may fulfill the requirements of multiple KUs, and multiple courses may fulfill the requirements of a single KU. Program Evaluation: Institutions will be evaluated by CAE Program staff with assistance from Subject Matter Experts. The last phase of the criteria may be an on-site evaluation focused on course content, course relevance, laboratory facilities, and faculty involvement. CAE2Y Designation: Successful institutions will be designated as a NSA/DHS National Center of Academic Excellence for Information Assurance/Cyber Defense for Two-Year Education (CAE2Y). Due to the requirement to have all institutions designated by 2014, designation periods granted during this designation cycle will range from three to six years from the institution s application. This will allow a more distributed range of re-applications in the future. Subsequent cycles will revert to a five-year cycle. The initial designation period will be dependent upon timing of the application, with allowances for changes by the program office. Future criteria (including KUs and FAs) will continue to be reviewed annually and strengthened as appropriate to keep pace with the evolving nature of IA/CD. Designation as a CAE2Y does not carry a commitment of funding from NSA or DHS. CAE 2Y Criteria Page 2 September 2013
3 CAE2Y Program requirements: 2014 NSA/DHS National CAE 2Y Criteria 1. Outreach/Collaboration. The institution must demonstrate how IA/CD is extended beyond the normal boundaries of the Institution. Overall Point value: 16 points minimum/32 points maximum a. Shared Curriculum (e.g., IA/Cybersecurity teaching materials provided to technical schools, universities, community colleges, K-12 schools, etc.) or shared faculty (e.g., Faculty on IA/Cybersecurity curriculum development committee for more than one institution) b. Evidence that the program is providing students with access to IA/Cybersecurity practitioners (e.g., Guest lecturers working in IA/Cybersecurity industry, government, faculty exchange program with industry and/or government, etc.) c. Evidence of Articulation/Transfer agreements with 4 year institutions offering a concentration or IA/Cybersecurity degrees/areas of study/track or certificates d. Evidence of agreements with high schools to facilitate awareness and training for faculty/administration/students Point Value: 2 points per school/6 points maximum e. Sponsorship/participation in Cybersecurity/IA competitions Point Value: 2 points each/6 points maximum f. Community Outreach. Sponsor community events such as cybersecurity education for K-12, adult education centers, senior groups, camps, summer programs, state homeland security, first responders and industry (e.g., Schools in a target region are encouraged to participate in cybersecurity education events, like community computer diagnostic check-ups and IA awareness days) CAE 2Y Criteria Page 3 September 2013
4 2014 NSA/DHS National CAE 2Y Criteria 2. Center for IA/CD Education. The institution must have a formal organization for use as a resource for faculty and students. The Center should provide program guidance, general IA/CD information and promote collaboration and interaction with other students, faculty, and programs. The Center and website must be operational, dynamic and current. (For the purpose of this document, the word Center is used in a general sense). Overall Point Value: 14 points minimum/20 points maximum a. Show formal documentation of the designation of the IA/CD/Cybersecurity Center and provide a hyperlink to the Center. Point Value: 5 points required b. Demonstrate the Center website is operational, dynamic and current: contains up-to-date links to key IA/CD resources such as other academic institutions, government sites, conferences, workshops, cyber competitions, IA/CD news, center POCs, IA/CD courses, etc. The website must be easy to find and easily accessible. Demonstrate how current and potential students are informed of the website. Point Value: 5 points required c. Provide evidence that subscription-based IA/CD journals are available for student and faculty use on the website. Demonstrate that hyperlinks to key IA/CD websites are provided in course syllabus and/or professors webpage or provided to students during class instruction. /2 points required d. Demonstrate that physical and/or virtual IA/CD labs and equipment are available and used for hands-on learning (provide examples of student lab projects/exercises/case studies syllabus, links to assignments, etc.). /2 points required CAE 2Y Criteria Page 4 September 2013
5 2014 NSA/DHS National CAE 2Y Criteria 3. IA/CD Student Development. The program provides development opportunities for students that lead to a two year associate s degree or a certificate in an IA/CD discipline. Overall Point Value: 12 points minimum /31 points maximum a. Provide evidence of IA/Cybersecurity degrees/areas of study/track or certificates (e.g., List of IA/Cybersecurity Associates degrees and/or certificates in IA/Cybersecurity curriculum as listed on the institution s website or catalog) b. Demonstrate how the institution provides applied training to students (e.g., Courses containing hands-on or lab training) Point Value: 2 points per course/6 points maximum c. Provide evidence that students who participate sufficiently in the IA/CD curriculum (i.e., take and pass courses that satisfy all of the mandatory KU requirements) will receive a certificate, or a reference to completing the CAE2Y course of study on their transcript and/or degree. Provide evidence in the form of a letter, transcript notation, and/or degree (may be redacted) Point Value: 10 points/students are taking the CAE2Y curriculum path 5 points/students have an opportunity to take the IA/CD path d. Provide evidence that students who participate sufficiently in the IA/CD curriculum for a Focus Area (i.e., take and pass courses that satisfy all of the mandatory KU requirements for that Focus Area) will receive certificate, or a reference to a focus area on their transcript and/or degree (may be redacted). Point Value: 10 points/students are taking the IA/CD curriculum path 5 points/students have the opportunity to take the IA/CD path 4. IA/CD as a Multidisciplinary Science. The institution demonstrates that IA/CD is not treated as a separate discipline, but as a multidisciplinary science with elements of IA/CD knowledge incorporated into various disciplines. Overall Point Value: 10 points minimum/15 points maximum a. Evidence that IA/CD is taught as modules in existing non-ia courses and that nontechnical/non-ia students are being introduced to IA/CD (e.g., business courses teaching Information Security modules, health courses incorporating HIPAA regulations, etc.) b. Evidence that IA/CD programs (certificate and/or degree programs) require non-technical courses of study (e.g., ethics, policy, and business) c. Availability of non-credit/credit professional development courses in IA/CD (e.g., First responders, K-12 teachers) CAE 2Y Criteria Page 5 September 2013
6 2014 NSA/DHS National CAE 2Y Criteria 5. Practice of IA/Cybersecurity Encouraged Throughout the Institution: The academic program must demonstrate how the institution encourages the practice of IA, not merely that it teaches IA. Overall Point Value: 8 points minimum/20 points maximum a. Provide a link to the institution s IA security plan and/or policies b. Provide evidence of institution designated Information System Security Officer or equivalent. Provide name, position and job description for person or persons responsible for information security. c. Provide evidence of the implementation of the institution IA security plan to encourage IA awareness throughout the campus (e.g., Students, faculty and staff are required to take computer based training or on-line tutorials; a security banner statement present on institution computers; security related help screens are available; institution-wide seminars are held on the importance of IA, etc - 2pts awarded per item). Point Value: 2 points minimum (required)/10 points maximum 6. IA/CD Faculty. Faculty assigned specifically to teach and/or develop IA/CD courses/curriculum/modules. Overall Point Value: 11 points minimum/15 points maximum a. Identify, by name, faculty member with overall responsibility for the IA/Cybersecurity instructional program. Provide evidence, i.e., verification letter and/or job description. Provide link to biography or CV. b. Identify, by name, additional IA/Cybersecurity faculty members teaching IA/Cybersecurity courses within the department that sponsors IA/Cybersecurity programs. Provide link to biography or CV. Point Value: 1 point per faculty/5 points maximum c. Provide evidence in the form of curriculum vitae supporting the faculty member s qualifications to teach IA/Cybersecurity. At least one IA/Cybersecurity faculty member will be expected to be professionally certified with at least one of the IA/Cybersecurity certifications listed under DOD Directive 8570, such as CISSP, CISA, CISM, CEH, etc. (see attached DoD 8570 list). A minimum of 15 hrs of graduate coursework and/or appropriate experience in a related field could be considered in lieu of a professional certification. Note: Can be same individual as 5a/b. CAE 2Y Criteria Page 6 September 2013
Goal. Vision. CAE IA/CD Program Eligibility and Summary
Goal Vision National Centers of Academic Excellence in Information Assurance/Cyber Defense (IA/CD) Education Program Criteria for Measurement Jointly Sponsored by the National Security Agency (NSA) and
More informationeach standard. (You will be able to add/update this information just before formal submission after the Prepare for review button is selected.
National Centers of Academic Excellence for Information Assurance Education and Training Program for 2 Year Institutions (CAE-2Y) Criteria for Measurement July 2011 The National Security Agency (NSA) and
More informationSabbatical Leave Application
LOS RIOS COMMUNITY COLLEGE DISTRICT Sabbatical Leave Application Name Lance Parks College: CRC Present Assignment: CIS Type of Leave Requested: A. Type A One Semester: Fall Spring X Entire Year Will you
More informationCAE Program Updates and Support
May 29, 2015 CAE Program Updates and Support National CyberWatch Center Prince George s Community College Room 129B 301 Largo Road Largo, MD 20774 www.nationalcyberwatch.org 2 Webinar Protocol :: Mute
More informationMEETING THE NATION S INFORMATION SECURITY CHALLENGES
MEETING THE NATION S INFORMATION SECURITY CHALLENGES TO ADDRESS SKILLS AND WORKFORCE SHORTAGES IN THE INFORMATION SECURITY INDUSTRY, THE NATIONAL SECURITY AGENCY AND THE DEPARTMENT OF HOMELAND SECURITY
More informationCyber Security at NSU
Cyber Security at NSU Aurelia T. Williams, Ph.D. Chair, Department of Computer Science Associate Professor of Computer Science June 9, 2015 Background Undergraduate computer science degree program began
More informationCertifications and Standards in Academia. Dr. Jane LeClair, Chief Operating Officer National Cybersecurity Institute
Certifications and Standards in Academia Dr. Jane LeClair, Chief Operating Officer National Cybersecurity Institute Accreditation What is it? Why is it important? How is it attained? The National Centers
More informationMeeting the CAE IA/CD Knowledge Units Requirements for the Polytechnic University of Puerto Rico
Meeting the CAE IA/CD Knowledge Units Requirements for the Polytechnic University of Puerto Rico Diana M. Darabi, Master of Computer Science, IT Management and Information Assurance, Alfredo Cruz, PhD
More informationProtecting Energy s Infrastructure and Beyond: Cybersecurity for the Smart Grid
Protecting Energy s Infrastructure and Beyond: Cybersecurity for the Smart Grid Which is it? Cyber Security ~or~ Cybersecurity? Dr. Ernie Lara President Presenters Estrella Mountain Community College Dr.
More informationIn Response to Section 942 of the National Defense Authorization Act for Fiscal Year 2014 (Public Law 113-66) Terry Halvorsen DoD CIO
A Department of Defense Report on the National Security Agency and Department of Homeland Security Program for the National Centers of Academic Excellence in Information Assurance Education Matters In
More informationTURNING THE RISING TIDE OF CYBERSECURITY THREATS
TURNING THE RISING TIDE OF CYBERSECURITY THREATS With cyber attacks on the rise, there s a growing need for digital forensic professionals with the knowledge and skills to investigate technology crimes
More informationUNM Information Assurance Scholarship for Service (SFS) Program
UNM Information Assurance Scholarship for Service (SFS) Program What is Information Assurance? Committee on National Security Systems (CNSS) defines information assurance (IA): Measures that protect and
More informationProgram Contact Information (name, title, telephone number, and email address)
Name of Institution The Citadel Name of Proposed Center/Institute Center for Cybersecurity Education and Research Proposed Date of Implementation January 1, 2016 Site Department of Mathematics and Computer
More informationThe following institutions are partners in the operation of CSEC:
1. IA Partnerships: Extending IA beyond the normal boundaries of the College/Institution and bringing current IA practitioners into the IA Center. Provide evidence of partnerships in IA education with
More informationCybersecurity Definitions and Academic Landscape
Cybersecurity Definitions and Academic Landscape Balkrishnan Dasarathy, PhD Program Director, Information Assurance Graduate School University of Maryland University College (UMUC) Email: Balakrishnan.Dasarathy@umuc.edu
More informationNational Cyber Security Awareness Month. Week Five: Building the Next Generation of Cyber Professionals
National Cyber Security Awareness Month Week Five: Building the Next Generation of Cyber Professionals Webinar recording and evaluation survey This webinar is being recorded and will be made available
More informationBecoming a Cyber Professional: A Discussion with Recent Graduates
Becoming a Cyber Professional: A Discussion with Recent Graduates Date: November 6, 2014 MICHAEL ROCHA Education B.S. Administration, Concentration in Cyber Security California State University, San Bernardino
More informationProgramme Review. Bachelor of Science (Honours) in Computing in Information Security and Digital Forensics BN120. Department of Informatics
Programme Review Bachelor of Science (Honours) in Computing in Information Security and Digital Forensics BN120 Department of Informatics Peer-review panel report 7 th June 2013 Table of contents Executive
More informationhttps://www.iti.illinois.edu/sites/default/files/cybersecurity_image.jpg
ABOUT THE ACADEMY The National Academy of Public Administration is an independent, nonprofit, and non-partisan organization established in 1967 and chartered by Congress in 1984. It provides expert advice
More informationBecoming a Cyber Professional: A Discussion with Recent Graduates
Becoming a Cyber Professional: A Discussion with Recent Graduates Moderator: George L. Heron, LifeJourney USA Panelists: Danielle Santos, Assistant Program Manager, Cyber Formal Education, DHS Scott Wallace.
More informationNSA/DHS Centers of Academic Excellence for Information Assurance/Cyber Defense
NSA/DHS Centers of Academic Excellence for Information Assurance/Cyber Defense Cyber Investigations Data Management Systems Security Data Security Analysis Digital Forensics Health Care Security Industrial
More informationNettitude Ltd. (FHEQ) level 7] MSc Postgraduate Diploma Postgraduate Certificate. British Computer Society (BCS) Master s Degree in Computing
Faculty of Engineering and Informatics Programme Specification Programme title: MSc Cyber Security Academic Year: 2015/16 Degree Awarding Body: Partner(s), delivery organisation or support provider (if
More informationSustaining a Student Information Assurance Club
Sustaining a Student Information Assurance Club Jeffrey A. Livermore Mott Community College Flint, MI, USA Jeff.livermore@mcc.edu ABSTRACT: A number of schools that teach Information Assurance have formed
More information2015 Webinar Series: NCL for the Classroom
2015 Webinar Series: NCL for the Classroom National CyberWatch Center Prince George s Community College Room 129B 301 Largo Road Largo, MD 20774 www.nationalcyberwatch.org Webinar Protocol :: Mute your
More informationCincinnati State Technical and Community College. College Credit Plus
Cincinnati State Technical and Community College College Credit Plus Cincinnati State Background Cincinnati State sees the adoption of College Credit Plus as building on our successful high school dual
More informationNSA/DHS National Centers of Academic Excellence in Information Assurance/Cyber Defense 2014 List of Knowledge Units and Focus Areas
The CAE IA/CD academic requirements are based on meeting defined sets of Knowledge Units (KUs): 1. Core for 2 year programs - technical or applied emphasis 2. Core for 4 year + programs - technical or
More informationIntroducing... FedVTE and FedCTE
Introducing... FedVTE and FedCTE Sponsored by: Cybersecurity Education and Workforce Development Program (CEWD) DHS National Cyber Security Division October, 2010 Agenda FedVTE and FedCTE overview & how
More informationCybersecurity Workforce Training Partnership
Cybersecurity Workforce Training Partnership NSA Cyber Command AACC @ Arundel Mills CAE-2Y NSA and DHS designated AACC as a National Center of Academic Excellence in Information Assurance 2-Year Education
More informationHow To Become A Cybersecurity Consultant
Strengthening the Nexus: Government-Business- University cooperation and collaboration on security, training and research November 1, 2011 Susan C. Aldridge, PhD University of Maryland University College
More informationPROGRAMME SPECIFICATION POSTGRADUATE PROGRAMME
PROGRAMME SPECIFICATION POSTGRADUATE PROGRAMME KEY FACTS Programme name Advanced Computer Science Award MSc School Mathematics, Computer Science and Engineering Department or equivalent Department of Computing
More informationThe GW CyberCorps Program
The GW CyberCorps Program www.seas.gwu.edu/cybercorps Introduction The need for educated personnel in the government s cyber security workforce is critical to the nation s security. As evidenced by remarks
More informationToward Curricular Guidance in the Cyber Sciences
Toward Curricular Guidance in the Cyber Sciences 1 6 J U N E 2 0 1 5 2 0 1 5 C I S S E L A S V E G A S D A V I D G I B S O N, U S A I R F O R C E A C A D E M Y B E T H H A W T H O R N E, U N I O N C O
More informationDepartment of Defense Information Assurance Scholarship Program. Sponsored by the. DoD Chief Information Officer
Department of Defense Information Assurance Scholarship Program Sponsored by the DoD Chief Information Officer SOLICITATION FOR PROPOSALS From Universities Designated by the National Security Agency (NSA)
More informationUNIVERSITY OF TRIESTE UNIVERSITY OF UDINE ACADEMIC REGULATIONS MASTER DEGREE PROGRAMMEME IN PHYSICS. Master Degree Programme Section LM-17
UNIVERSITY OF TRIESTE UNIVERSITY OF UDINE ACADEMIC REGULATIONS MASTER DEGREE PROGRAMMEME IN PHYSICS Master Degree Programme Section LM-17 DM 270/2004, art.12 R.D.A. art. 5 1 Art. 1 General rules and objectives
More informationMASTER PROGRAM IN EVENT MANAGEMENT (One year) 1. Program Title Master in Business Administration with specialization in event management (One year)
MASTER PROGRAM IN EVENT MANAGEMENT (One year) 1. Program Title Master in Business Administration with specialization in event management (One year) 2. Program Aims and Objectives The education will help
More informationUNIVERSITY OF BRADFORD School of Computing Informatics and Media Department of Computing Programme/course title: Computing
UNIVERSITY OF BRADFORD School of Computing Informatics and Media Department of Computing Programme/course title: Computing Awarding and teaching institution: Teaching institute: University of Bradford
More informationMSc Corporate Real Estate & Facilities Management (Flexible Masters Programme) For students entering in 2005
1 MSc Corporate Real Estate & Facilities Management (Flexible Masters Programme) For students entering in 2005 Awarding Institution: Teaching Institution: Faculty of Economic and Social Sciences Date of
More informationInformation Systems Technology & Cybersecurity Programs
Information Systems Technology & Cybersecurity Programs Stay close. Go far. Computer Studies Faculty Trudy Gift Professor, Information Systems Technology 240-500-2214 tgift@hagestowncc.edu Carrie Pifer
More informationUnique Standards and Documentation Required for Accredited CLT/MLT Programs
Unique Standards and Documentation Required for Accredited CLT/MLT Programs Section III (CLT/MLT) Page 1 UNIQUE STANDARDS AND THE REQUIRED DOCUMENTATION Objectives Clinical Laboratory Technician/Medical
More informationINNOVATION. Campus Box 154 P.O. Box 173364 Denver, CO 80217-3364 Website: http://cam.ucdenver.edu/ncmf
EDUCATION RESEARCH INNOVATION Campus Box 154 P.O. Box 173364 Denver, CO 80217-3364 Website: http://cam.ucdenver.edu/ncmf Email: ncmf@ucdenver.edu Phone: 303.315.5850 Fax: 303.832.0483 JEFF M. SMITH, m.s.
More informationBaccalaureate Degree Completion Guidelines for Medical Laboratory Technicians/Clinical Laboratory Technicians
Program Description Baccalaureate Degree Completion Guidelines for Medical Laboratory Technicians/Clinical Laboratory Technicians Department of Clinical Laboratory Sciences MCV Campus of Virginia Commonwealth
More informationUniversity Guidelines for Certificate Programs
(Guidelines Based on Executive Order 806) Types of Certificate Programs San Diego State University offers two types of certificate programs: Academic certificate programs, and Professional certificate
More informationMSc Programme Intelligent Adaptive Systems (IAS)
Faculty of Mathematics, Informatics and Natural Sciences Department of Informatics UHH Fachbereich Informatik Vogt-Koelln-Str. 30 D-22527 Hamburg MSc Programme Intelligent Adaptive Systems (IAS) Web: http://www.master-intelligent-adaptive-systems.com/
More informationHosted by Lunarline: School of Cyber Security
Hosted by Lunarline: School of Cyber Security Please Fax Government Purchase Orders and SF 182s To (22) 315-33 Cybersecurity is one of the hottest issues for today s Federal and DOD Agencies and commercial
More informationCurriculum Vitae -Joel H. Bush
Curriculum Vitae -Joel H. Bush Joel H. Bush Email: jbush@rmcc.edu Home: 360 Polk 75 Mena, AR 71953 Cell: 479-216-4553 Rich Mountain Community College 1100 College Drive Mena, AR 71953 479-394-7622 X1356
More informationONLINE ONLINE. Master of Science in. Bachelor of Science in
ONLINE Bachelor of Science in INFORMATION SYSTEMS ONLINE Master of Science in Management Information Systems Information Systems Online University of Alabama at Birmingham COLLAT School of Business Dear
More informationCybersecurity High School and Beyond
Cybersecurity High School and Beyond High School Career Fair and Expo March 29, 2014 Diane G. Miller, CCP Director, Operations Northrop Grumman Information Security Program Director, CyberPatriot Topics
More informationContinuing Education Requirements
California Code of Regulations Title 16, Division 13.1, Article 10. Continuing Education Requirements 1397.60. Definitions. As used in this article: (a) Conference means a course consisting of multiple
More informationThe College of EMS Strategic Plan can be seen at the college s WEB site
B2. PROGRAM EDUCATIONAL OBJECTIVES B2.1 Mission Statements The fundamental mission of UW-Platteville and the entire UW System is to serve the people of Wisconsin. This basic goal is expressed in detail
More information(FHEQ) level 7] MSc Postgraduate Diploma Postgraduate Certificate. June 2015
Faculty of Engineering and Informatics Programme Specification Programme title: MSc Big Data Science and Technology (BDST) Academic Year: 2015/16 Degree Awarding Body: Partner(s), delivery organisation
More informationCybersecurity Education
Cybersecurity Education Issues & Approaches Derek A. Smith Director of Cybersecurity Initiatives at Excelsior College AFCEA November 18, 2014 Where we are now! Symantec: In a world of increased cybersecurity
More informationCAE News WINTER 2015. Announcing the new CAE Community Website. CAE Community Website Webinar
CAE News WINTER 2015 promote higher education reduce vulnerabilities grow cyber professionals Announcing the new CAE Community Website The National Security Agency (NSA) and Department of Homeland Security
More informationUndergraduate Transfer Credit Policy
Undergraduate Transfer Credit Policy I. GENERAL POLICY STATEMENT Mount Aloysius College will consider credits in transfer into associate and bachelor degree programs from coursework taken at regionally-accredited
More informationProgramme Specification and Curriculum Map for MSc Electronic Security and Digital Forensics
Programme Specification and Curriculum Map for MSc Electronic Security and Digital Forensics 1. Programme title Electronic Security & Digital Forensics 2. Awarding institution Middlesex University 3. Teaching
More information9. ACADEMIC QUALITY PLANNING PROCESS AND OUTCOME ASSESSMENT
Page 1 of 32 STANDARDS AND CRITERIA FOR ACCREDITATION OF POSTSECONDARY CONSTRUCTION EDUCATION DEGREE PROGRAMS TABLE OF CONTENTS 1. INTRODUCTION 2. GOVERNANCE AND ADMINISTRATION 3. CURRICULUM 4. FACULTY
More information21. Evaluative Report of the Department
21. Evaluative Report of the Department 1. Name of the Department : School of Studies in Political Science 2. Year of establishment : 1994 3. Is the Department part of a School/Faculty of the university?
More informationof Highly Effective Security Professionals By Sondra Schneider CEO Security University s0ndra@securityuniversity.net 203.357.7744
6 Skills of Highly Effective Security Professionals By Sondra Schneider CEO Security University s0ndra@securityuniversity.net 203.357.7744 Basic Principles The Basic Principles of InfoSecurity are Universal
More informationKU School of Education Graduate Student Handbook
KU School of Education Graduate Student Handbook 2011-2012 Graduate Student Responsibility All graduate students are responsible for informing themselves of requirements of the Graduate School as stated
More informationEast Carolina UNIVERSITY
East Carolina UNIVERSITY MASTER OF MASTER OF Online or On Campus (Face to Face) Department of Construction Management Department of Construction Management College of Engineering and Technology www.ecu.edu/cet/construction
More informationSTATEWIDE ARTICULATION
STATEWIDE ARTICULATION The Advanced Technical Credit Program consists of: 1. The ATC Standard Articulation Agreement, which outlines criteria for the recognition of statewide-articulated courses and award
More information6 th year Special Education. 1. History, Development and Expectations
1. History, Development and Expectations 6 th year Special Education a. The 6 th year certificate program in Special Education was developed in the late 1990 s to offer students who were seeking additional,
More informationREGULATIONS FOR FIRST DEGREE CURRICULA 1
REGULATIONS FOR FIRST DEGREE CURRICULA 1 (See also General Regulations) UG 1 Definitions: For the purpose of regulations and syllabuses for all first degree curricula unless otherwise defined An academic
More informationProgramme Specification and Curriculum Map for MSc Electronic Security and Digital Forensics
Programme Specification and Curriculum Map for MSc Electronic Security and Digital Forensics 1. Programme title Electronic Security and Digital Forensics 2. Awarding institution Middlesex University 3.
More informationFedVTE Training Catalog SUMMER 2015. advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov
FedVTE Training Catalog SUMMER 2015 advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov Access FedVTE online at: fedvte.usalearning.gov If you need any assistance please
More informationDoD IA Training Products, Tools Integration, and Operationalization
Defense Information Systems Agency A Combat Support Agency DoD IA Training Products, Tools Integration, and Operationalization Roger S. Greenwell, CISSP, CISA, CISM Technical Director / Capabilities Implementation
More informationONLINE MASTER OF BUSINESS ADMINISTRATION. Open for Business. Designed for You.
ONLINE MASTER OF BUSINESS ADMINISTRATION Open for Business. Designed for You. Our MBA is different. It s designed for you. Today s global workplace is ever-evolving and increasingly competitive. To succeed,
More informationCertification Requirements by Discipline. Allied Health Sciences
Certification Requirements by Discipline Allied Health Sciences The minimum degree requirement for instructors wishing to teach UConn ECE Allied Health courses can be met by either of the following options:
More informationUnit Plan for Assessing and Improving Student Learning in Degree Programs
Unit Plan for Assessing and Improving Student Learning in Degree Programs Unit: Civil and Environmental Engineering (CEE) Unit Head Approval: Prof. R.H. Dodds Date: SECTION 1: PAST ASSESSMENT RESULTS Brief
More informationDISTANCE EDUCATION STANDARDS AND GUIDELINES
DISTANCE EDUCATION STANDARDS AND GUIDELINES Distance Education in a National Context Distance education is becoming a standard practice in higher education. 1 According to a report issued by the National
More informationROYAL HOLLOWAY University of London PROGRAMME SPECIFICATION
ROYAL HOLLOWAY University of London PROGRAMME SPECIFICATION This document describes the Doctorate in Clinical Psychology. This specification is valid for new entrants and current students from September
More informationApplication for Center of Excellence at College of DuPage
College of DuPage Spring 2016 Application for Center of Excellence at College of DuPage The Center of Excellence designation is determined by a set of direct and indirect measures that identify the applicant
More informationAll applications are submitted to the Higher Education Authority, which requests the HAC s expert opinion on the quality of the application.
HUNGARIAN ACCREDITATION COMMITTEE (HAC) STANDARDS AND CRITERIA FOR MASTER PROGRAMS 1 AND EX POST ACCREDITATION OF INSTITUTIONS AND PROGRAMS The Hungarian accreditation system consists of ex ante and ex
More informationPreparing Leaders in Urban Special Education A Special Education Masters Program
General Questions 1. Is the PLUS project a principal preparation program? No, scholars accepted into the PLUS scholarship project are enrolled in a Master s program in special education and complete courses
More informationNorth Carolina School of Science and Mathematics Faculty Performance Appraisal Form For Teachers. Name: Department: Date:
For Teachers Name: Department: Date: the designated spaces for your comments. As you complete your form, please note the All Faculty designations as well as the IVC and Online Faculty ONLY designations.
More informationN/A N/A. Programme duration: 1 year full time - September (semester 1) and January (Semester 2) starts, 2 years parttime N/A.
Faculty of Engineering & Informatics Programme Specification Programme title: MSc Information Technology Management Academic Year: 2015-2016 Degree Awarding Body: Partner(s), delivery organisation or support
More informationMaster of Science in Vision Science and Investigative Ophthalmology MVSIO
Master of Science in Vision Science and Investigative Ophthalmology MVSIO Global Leadership in Eye Care, Vision Research and Ophthalmology Education Bascom Palmer Eye Institute is pleased to introduce
More informationDate of specification: January 2005
1 MSc Real Estate Appraisal (Flexible Masters Programme) Awarding Institution: Teaching Institution: Faculty of Economic and Social Sciences Programme Director: Board of Studies: Accreditation: The University
More informationJoint Master in Information Security and Data Management (ISDM)
PROJECT CONCEPT PAPER Joint Master in Information Security and Data Management (ISDM) First draft: Dr. Derar Eleyan, Palestine Technical University-Palestine. Key Action 2: Capacity Building in the Field
More informationGraduate Handbook. for. Master of Arts in Music. Music Education Concentration
Graduate Handbook for Master of Arts in Music Music Education Concentration Introduction The Master of Arts in Music, Music Education Concentration provides a hybrid course of study that will be taught
More informationLewis College of Business LEWIS COLLEGE OF BUSINESS VISION STATEMENT LEWIS COLLEGE OF BUSINESS MISSION STATEMENT
Lewis College of Business LEWIS COLLEGE OF BUSINESS VISION STATEMENT The Marshall University Elizabeth McDowell Lewis College of Business (LCOB) will be recognized as an exceptional educational value and
More informationPost-Baccalaureate Certificate Program
Post-Baccalaureate Certificate Program ACT PROGRAM 47 Accelerated Certification for Teaching (ACT) Program ACT is an online certificate program designed for individuals who hold a bachelor s degree and
More informationWyoming Community College Commission Request for New, Pilot or Revised Degree or Certificate Program
Community Commission Request for New, Pilot or Revised Degree or Certificate Program A. : Laramie County Community B. Date submitted to WCCC: C. Program 1. Request for: X New Program Pilot Program Revised
More informationThe Nursing and Midwifery Council
MSc/PGDip Public Health Nursing For students entering in 2008 Awarding Institution: Teaching Institution: Faculty: Programme length: Date of specification: Programme Director: Board of Studies Accreditation:
More informationAntioch University MIdwest. A collaborative framework for change. Early Childhood Generalist Endorsement 4th & 5th Grades. Updated 3/21/11 Pg.
Antioch University MIdwest A collaborative framework for change Early Childhood Generalist Endorsement 4th & 5th Grades A p p l i c a n t H a n d b o o k Updated 3/21/11 Pg. 1 the Antioch tradition History
More informationBuilding a Successful Cyber-security Program
Building a Successful Cyber-security Program David Dampier Distributed Analytics and Security Institute Mississippi Box 9627, HPC A129 Mississippi, MS 39762-9627 001-662-325-0779 dampier@dasi.msstate.edu
More informationMASTER IN BUSINESS ADMINISTRATION. Overview. Fee: 10,000 euros (International Students Non EU) Awarding Body:
MASTER IN BUSINESS ADMINISTRATION Overview Fee: 10,000 euros (International Students Non EU) Awarding Body: Award Level: Title of Award: Duration: Quality & Qualifications Ireland (QQI) - formerly The
More informationAccess FedVTE online at: fedvte.usalearning.gov
FALL 2015 Access FedVTE online at: fedvte.usalearning.gov If you need any assistance please contact the FedVTE Help Desk her e or email the Help Desk at support@usalearning.net. To speak with a Help Desk
More informationSpecialized Certificate in Healthcare Information Technology:
Specialized Certificate in Healthcare Information Technology: Frequently Asked Questions Jump to information about the certificate, the courses, or financial aid, or request more information. About the
More informationWyoming Community College Commission Request for New, Pilot or Revised Degree or Certificate Program
Wyoming Community College Commission Request for New, Pilot or Revised Degree or Certificate Program A. College: Laramie County Community College B. Date submitted to WCCC: C. Program 1. Request for: X
More informationMASTER OF SCIENCE LOGISTICS AND SUPPLY CHAIN MANAGEMENT
MASTER OF SCIENCE LOGISTICS AND SUPPLY CHAIN MANAGEMENT CURRICULUM HANDBOOK 2010 2012 VISION The CMI envision producing ready maritime and logistics leaders through borderless strategic partnerships, research
More informationISACA Tools Help Develop Cybersecurity Expertise
Volume 21, 8 October 2014 ISACA Tools Help Develop Cybersecurity Expertise Nominate Qualified Candidates for the ISACA Board of Directors Tips for Solving Data Classification Challenges Earn CPE at Professional
More informationSECONDARY TEACHER LICENSING REQUIREMENTS
SECONDARY TEACHER LICENSING REQUIREMENTS NORTH DAKOTA STATE BOARD FOR CAREER AND TECHNICAL EDUCATION Wayne Kutzer State Director and Executive Officer July, 2015 NORTH DAKOTA STATE BOARD FOR CAREER AND
More informationMSc Cyber Security UKPASS P052286. Course 1 Year Full-Time, 2-3 Years Part-Time
MSc Cyber Security International Students Can Apply UKPASS P052286 Code: Course 1 Year Full-Time, 2-3 Years Part-Time Length: Start Dates: September 2015, January 2016, September 2016, January 2017 Department:Department
More informationLICENSE RENEWAL AT A GLANCE (Frequently Asked Questions including Renewal Procedures)
Salem City Schools Office of Personnel Services 510 College Avenue Salem, VA 24153 LICENSE RENEWAL AT A GLANCE (Frequently Asked Questions including Renewal Procedures) This is in reply to your request
More informationStrategy and Resources to Strengthen IT Programs. Academic Leadership Conference May 28, 2015
Strategy and Resources to Strengthen IT Programs Academic Leadership Conference May 28, 2015 Session Key Objectives Presentation Agenda 1. Gain insight into the career opportunity for students: the current
More informationBOARD OF TRUSTEES OF COMMUNITY-TECHNICAL COLLEGES AFT BARGAINING UNIT APPLICATION FOR PROMOTION TEACHING FACULTY Academic Year 2012-2013
BOARD OF TRUSTEES OF COMMUNITY-TECHNICAL COLLEGES AFT BARGAINING UNIT APPLICATION FOR PROMOTION TEACHING FACULTY Academic Year 2012-2013 This application must be submitted to the President no later than
More information