Cybersecurity AAS Program
|
|
|
- Chastity Austin
- 10 years ago
- Views:
Transcription
1 Cybersecurity AAS Program New Program Proposal State Submission Steve Buchholz, Dean of Accreditation and Advancement July 2015
2 TABLE OF CONTENTS Executive Summary... 2 Identification and Description of the Program... 2 Objectives and Purpose of the Program... 3 Methods of Attaining the Objectives of the Program... 4 Population Served by the Program... 4 Projected Three Year Budget... 4 Program Competencies and Entry and Exit Points... 5 Statement of Non Duplication... 5 Curriculum Design... 5 Wage Factor... 5 Suggested CIP Code... 5 Appendix... 5 Appendix A... 6 Appendix B Appendix C
3 WESTERN DAKOTA TECHNICAL INSTITUTE (WDT) Cybersecurity AAS Program New Program Proposal EXECUTIVE SUMMARY Western Dakota Technical Institute requests approval to create an Associate of Applied Science degree in Cybersecurity. This program would prepare students for the increasing number of career opportunities in the cybersecurity field. WDT would continue to offer its Associate of Applied Science Degree in Science with a specialization in Network Administration to provide students with multiple options. The current program in Network Administration would continue to include overview coursework in computer security so those students would be familiar with the basics of the topic. The new program would dive much deeper into the cybersecurity so graduates are prepared for the growing number of cybersecurity-focused careers available. WDT requests permission to begin offering the four-semester, two-year program in fall Labor market information for the state indicates that the demand for workers in cybersecurity career fields is strong now and in the future. Through 2022, the number of workers in SOC Code (Information Security Analysts) will grow by 25 percent in South Dakota and 37 percent nationally. Additionally, graduates of the program would be qualified for other positions in the computer science field, including careers as Network and Systems Administrators and Network Support Specialists. IDENTIFICATION AND DESCRIPTION OF THE PROGRAM The recent slew of high-profile data breaches (like the one that afflicted Target and millions of the retailer s customers) have highlighted the need for skilled cybersecurity workers. Unfortunately, the supply is not currently meeting demand: There are currently as many as 300,000 unfilled security jobs across the country, according to a report from The Abell Foundation and CyberPoint International 1. According to the Cyber Security Jobs Report, the dramatic proliferation of computing and communications technologies across the globe has caused unprecedented growth in the cybersecurity industry. This growth has created an urgent need for qualified individuals to fill current job openings and to develop the skilled workforce necessary to address the expected dramatic job growth in the future. 1 Cyber Security Jobs Report, 2013, baltimore.com/reports/cybersecurityjobsreport pdf 2
4 This program has been designed to prepare students for those opportunities. Students will complete classes in network security, network defense and countermeasures, information security, databases, computer forensics, and more. Graduates of the program will be able to accomplish the typical duties of a cybersecurity professional, including: Monitoring their organization s networks for security breaches and investigate a violation when one occurs Installing and using software, such as firewalls and data encryption programs, to protect sensitive information Preparing reports that document security breaches and the extent of the damage caused by the breaches Conducting penetration testing, which is when analysts simulate attacks to look for vulnerabilities in their systems before they can be exploited Researching the latest information technology (IT) security trends Helping plan and carry out an organization s way of handling security Developing security standards and best practices for their organization Recommending security enhancements to management or senior IT staff Helping computer users when they need to install or learn about new security products and procedures OBJECTIVES AND PURPOSE OF THE PROGRAM The primary objective of the Cybersecurity program is to prepare students with the necessary skills to be successful in the cybersecurity field. The program will articulate appropriate high school credits whenever possible, and there could be dual enrollment possibilities for high school students. The Cybersecurity graduate will be able to: Organize, compile and maintain information security documentation. Understand how physical and logical network topologies and operation apply to information security. Analyze and apply ethical and legal concepts related to information assurance and cyber security. Analyze and understand risk management and threat awareness. Analyze digital evidence to determine user and intruder activity on systems. Research, formulate and critique security policies regarding the collection, preservation, safeguarding and disposition of log data. Research, formulate and critique security policies regarding the collection, preservation, safeguarding and disposition of personally identifiable information. Research, formulate and critique security policies regarding the security of computer systems and the services that they provide. 3
5 METHODS OF ATTAINING THE OBJECTIVES OF THE PROGRAM WDT will provide students with instruction in classroom and lab settings on the WDT campus. The classroom and lab instruction will be augmented with guest speakers and other experiences that will prepare students for the workforce. As with all WDT programs, a variety of services and support will be available to Cybersecurity students. This includes expanded tutoring and office hours provided by full-time program faculty and at WDT s Student Success Center. Access to current technical reference materials and resources is available via WDT library services. The Cybersecurity program will work closely with an industry advisory committee composed of representatives who are from potential employers and others in the field. The advisory committee will approve the curriculum, discuss and recommend equipment purchases, and assist in forming partnerships to help WDT with innovative curriculum, internships, and presentations. As indicated in the letters of support that accompany this proposal, industry is supportive of this program proposal. Future employers of program graduates have stated this program is necessary because they want employees who have skills in this growing area of importance. This program will meet that need. In addition, the program s general education courses will provide students with the math, English, and communication skills employers are seeking. POPULATION SERVED BY THE PROGRAM The Cybersecurity program will be available to all interested individuals who successfully meet the WDT admissions criteria established for the program. The program will be open to full-time and part-time students. All applicants must be high school graduates and take an admissions test to establish reading, writing, and math abilities. No restriction will be made regarding race, creed, gender or age. The program will draw students primarily from South Dakota. The opportunities for employment in the field will be primarily in western South Dakota. The program also will appeal to people already in the workforce who have experience in cybersecurity and are seeking additional training so they can increase their skill level and become prepared for additional job opportunities in these growing career fields. PROJECTED THREE-YEAR BUDGET This program will be staffed by a full-time instructor. Adjunct instructors with industry experience may be used to teach some courses. The projected budget is as follows: Expenses Year One Year Two Year Three Instructors $10,000 $12,500 $15,000 Equipment $15,000 $15,000 $15,000 Supplies $10,000 $10,000 $10,000 4
6 PROGRAM COMPETENCIES AND ENTRY AND EXIT POINTS Entry point: Fall Semester Exit point: After completion of all coursework Job titles: See Appendix A STATEMENT OF NON-DUPLICATION Western Dakota Tech is proposing this program to meet regional industry needs for graduates prepared for a wide variety of cybersecurity career fields. While there are related programs in South Dakota, they are not meeting the needs of business and industry in western South Dakota. Currently, Lake Area Tech offers a Security Specialist degree, and Southeast Tech offers a Network Security Technician. In Fall 2014, 39 and 27 students were enrolled in those programs respectfully. The placement rates for graduates from each program was 100 percent. Those placement rates show more graduates are needed. Business and industry representatives in WDT s service area (and another headquartered in North Sioux City, SD) report problems finding skilled, qualified workers for the growing number of cybersecurity positions available. This program will help fill those needs. CURRICULUM DESIGN See Appendix B for Curriculum Sequence. WAGE FACTOR See Appendix A SUGGESTED CIP CODE and Information Systems Security. A program that prepares individuals to assess the security needs of computer and network systems, recommend safeguard solutions, and manage the implementation and maintenance of security devices, systems, and procedures. Includes instruction in computer architecture, programming, and systems analysis; networking; telecommunications; cryptography; security system design; applicable law and regulations; risk assessment and policy analysis; contingency planning; user access issues; investigation techniques; and troubleshooting. APPENDIX A. Wage factor and job titles B. Curriculum Outline C. Letters of Support 5
7 APPENDIX A South Dakota Employment Projections and Wage Data for Related Occupations SOC Code Occupational Title Information Security Analysts Network and Systems Administrators Network Support Specialists 2012 Workers 2022 Workers Numeric Change Percent Change % 5 1,525 1, % % 12 Average Annual Demand for Workers 6
8 South Dakota Wage Estimates for SD, Rapid City, and Percentile West AREA SOC Occupation Workers Avg. 10 th 25 th 50 th 75 th 90th CODE Wage Statewide Information Security 80 $39.31 $25.67 $31.91 $39.32 $46.57 $55.15 Rapid City MSA West Statewide Rapid City MSA West Statewide Rapid City MSA West Analysts Information Security Analysts Information Security Analysts Network and Systems Administrators Network and Systems Administrators Network and Systems Administrators Network Support Specialists Network Support Specialists Network Support Specialists 10 $39.83 $29.78 $33.37 $39.34 $46.82 $53.63 N/A N/A N/A N/A N/A N/A N/A 1,660 $28.45 $20.41 $23.59 $27.62 $33.13 $ $29.03 $21.44 $24.72 $28.42 $33.46 $ $27.30 $20.55 $22.79 $26.29 $29.84 $ $23.42 $17.65 $20.01 $22.56 $26.68 $ $23.49 $17.24 $20.01 $22.51 $27.24 $ $20.83 $17.32 $19.35 $20.96 $22.57 $
9 United States Employment Projections and Wage Data for Related Occupations Occupational SOC Title Information Security Analysts Network and Systems Administrators Network Support Specialists 2012 Base Number of Jobs 2022 Projected Number of Jobs Percent Change 75, ,500 37% 2, , ,400 12% 4, , ,800 7% 1,220 Average Annual Demand 8
10 Wage Estimates for United States SOC Occupation May CODE Information Security Analysts Network and Systems Administrators Network Support Specialists Percentile 10 th 25 th 50 th 75 th 90th Avg. Wage Workers 78,020 $43.85 $24.24 $32.27 $42.59 $54.38 $ ,310 $37.46 $21.76 $27.67 $35.58 $45.17 $ ,100 $30.85 $16.99 $21.74 $28.93 $37.67 $
11 APPENDIX B First Semester Credits CIS125 A+ hardware/software 6 CIS126 Cisco Academy/Networking Technologies I 3 CIS129 Windows Operating Systems 3 CIS105 Microcomputer Software Applications 3 MATH101 Intermediate Algebra 3 or MATH102 or College Algebra TOTAL CREDITS 18 Second Semester Credits CIS127 Cisco Academy/Networking Technologies II 3 CIS211 Linux Operating Systems 3 CIS213 Networking Using Windows Server 3 CIS225 Databases 3 ENGL101 Composition 3 PSYC103 Human Relations in the Workplace 3 TOTAL CREDITS 18 Third Semester Credits CCS 200 Programming for Security I 3 CCS 210 Pentesting 3 CCS 220 Web Security 3 CCS 230 Cryptography 3 MATH102 or MATH120 College Algebra or Trigonometry TOTAL CREDITS 15 Fourth Semester Credits CCS 240 Programming for Security II 3 CCS 250 Cyber Security Forensics 3 CCS 260 Offensive/Defensive Security 3 CCS 270 Malware Analysis 3 CCS 280 Security Research Project 3 SOC100 Introduction to Sociology 3 TOTAL CREDITS
12 APPENDIX C 11
13
14
15
Dental Assistant Diploma
Dental Assistant Diploma New Program State Submission Steve Buchholz, Dean of Accreditation and Advancement July 2015 TABLE OF CONTENTS Executive Summary... 2 Identification and Description of the Program...
Medical Laboratory Technician AAS Program
Medical Laboratory Technician AAS Program New Program Proposal State Submission Steve Buchholz, Dean of Accreditation and Advancement July 2015 TABLE OF CONTENTS Executive Summary... 2 Identification and
Pharmacy Technician AAS Program
Pharmacy Technician AAS Program Expansion of Existing Program State Submission Mark Wilson, President May 2013 TABLE OF CONTENTS Executive Summary... 2 Identification and Description of the Program...
HVAC and Plumbing Technology
HVAC and Plumbing Technology Expansion of Existing Program State Submission Mark Wilson, President May 2013 TABLE OF CONTENTS Executive Summary... 2 Identification and Description of the Program... 2 Objectives
HVAC/R Technology AAS Degree
HVAC/R Technology AAS Degree State Submission Mark Wilson, President January 2014 Table of Contents EXECUTIVE SUMMARY... 2 IDENTIFICATION AND DESCRIPTION OF THE PROGRAM... 3 OBJECTIVES AND PURPOSE OF THE
Business Program: Entrepreneurship Option
Business Program: Entrepreneurship Option State Submission Kelly O Brien 1/4/2012 Table of Contents EXECUTIVE SUMMARY... 2 IDENTIFICATION AND DESCRIPTION OF THE PROGRAM... 3 OBJECTIVES AND PURPOSE OF THE
Practical Nursing AAS Program
Practical Nursing AAS Program State Submission Mark Wilson, President March 201 Table of Contents EXECUTIVE SUMMARY... 2 IDENTIFICATION AND DESCRIPTION OF THE PROGRAM... OBJECTIVES AND PURPOSE OF THE PROGRAM...
Wyoming Community College Commission Request for New, Pilot or Revised Degree or Certificate Program
Community Commission Request for New, Pilot or Revised Degree or Certificate Program A. : Laramie County Community B. Date submitted to WCCC: C. Program 1. Request for: X New Program Pilot Program Revised
Minnesota State Community and Technical College Detroit Lakes Campus
Computer Network Security Minnesota State Community and Technical College Detroit Lakes Campus Overview Philosophy Note on 2 year Colleges Certifications Program Courses CCDC Program Numbers Faculty Future
167 th Air Wing Fast Track Cyber Security Blue Ridge Community and Technical College
167 th Air Wing Fast Track Cyber Security Blue Ridge Community and Technical College Information Security Certificate: Designed to introduce students to programming, security basics, network monitoring,
COMPUTER SCIENCE & INFORMATION TECHNOLOGY
ST. JOHNS RIVER STATE COLLEGE COMPUTER SCIENCE & INFORMATION TECHNOLOGY Computer Information Technology Computer Network Engineering Technology Computer Programming and Analysis Computer Programmer Computer
Information Technology
your MISD guide to careers in Information Technology Computer Support Specialist Geographer Communications Analyst Multimedia Producer Data Analysts Administrator Computer Analyst Web Developer Software
BOARD OF HIGHER EDUCATION REQUEST FOR COMMITTEE AND BOARD ACTION
BOARD OF HIGHER EDUCATION REQUEST FOR COMMITTEE AND BOARD ACTION COMMITTEE: Academic Affairs NO: AAC 14-02 COMMITTEE DATE: October 22, 2013 BOARD DATE: October 29, 2013 APPLICATION OF SPRINGFIELD TECHNICAL
ALABAMA COMMUNITY COLLEGE SYSTEM SHORT-TERM CERTIFICATE PROGRAM APPLICATION NEW PROGRAM
ALABAMA COMMUNITY COLLEGE SYSTEM SHORT-TERM CERTIFICATE PROGRAM APPLICATION NEW PROGRAM Use this application when requesting approval for a short-term certificate (
Computer Support & Network Administration
Computer Support & Network Administration What You Will Learn MCTC s Information Technology program has two A.A.S. awards: Computer Support and Network Administration and Software Development, as well
Itawamba Community College Program Review Career-Technical and Health Science Programs
Itawamba Community College Program Review Career-Technical and Health Science Programs I. Program Information 1. Name of Program Computer Networking Technology 2. Submission Date of Program Review 6/21/2012
167 th Air Wing Fast Track Cyber Program Blue Ridge Community and Technical College
167 th Air Wing Fast Track Cyber Program Blue Ridge Community and Technical College Information Security Certificate: Designed to introduce students to programming, security basics, network monitoring,
Information Systems Technology & Cybersecurity Programs
Information Systems Technology & Cybersecurity Programs Stay close. Go far. Computer Studies Faculty Trudy Gift Professor, Information Systems Technology 240-500-2214 [email protected] Carrie Pifer
Software Development
Software Development Associate s Degree The ITT Technical Institutes offer a variety of career-focused curricula. This sheet helps describe the associate s degree program in Software Development 1 offered
Criminal Justice. Criminal Justice, Computer Forensics. Program Description
, Computer Forensics Criminal Justice This program is designed to prepare the student for employment as a computer forensics investigator. It includes a mix of several disciplines of study that, when combined,
ITEM 125-2851-R1104 November 18-19, 2004
AAS IN AVIATION -- PROGRAM DESCRIPTION 1. Briefly describe the proposed new program. Please indicate if it is (a) an expansion of an existing program or a new program; (b) a cooperative effort with another
Allegany College of Maryland. 239 Cisco Networking 2 * Offered Fall semester and
Cybersecurity comes to Allegany College of Maryland 107 Intro to Cybersecurity Offered fall and spring semesters. This course provides a broad overview of computer security, ethical issues and information
CURRICULUM DEVELOPMENT & REVISION
CURRICULUM DEVELOPMENT & REVISION Developmental Studies Reading / Writing, Math College Success = 1 representative = 1 representative = 1 representative Curriculum and Program Review Committee Purpose
Computer Information Technology
Computer Information Technology Business and Social Sciences Division, Room A44, (847) 543-04 The Computer Information Technology degree programs provide five specialty options with a common core of general
Bachelor of Science Degree Cyber Security Advancing the nation s workforce one graduate at a time
Flexible Online Bachelor s Degree Completion Programs Bachelor of Science Degree Cyber Security Advancing the nation s workforce one graduate at a time Cyber Security Major The Program You ve heard about
Union County College Faculty Curriculum Committee. New Program Proposal Form
Union County College Faculty Curriculum Committee New Program Proposal Form To all faculty members seeking to introduce a new program (including degree and certificate programs and options to existing
Criminal Justice. Criminal Justice, Computer Forensics
, Computer Forensics Criminal Justice This program is designed to prepare the student for employment as a computer forensics investigator. It includes a mix of several disciplines of study that, when combined,
CYBER SECURITY TRAINING SAFE AND SECURE
CYBER SECURITY TRAINING KEEPING YOU SAFE AND SECURE Experts in Cyber Security training. Hardly a day goes by without a cyber attack being reported. With this ever-increasing threat there is a growing need
Associate s Degree Program
Information Technology-Computer Network Systems Associate s Degree Program The ITT Technical Institutes offer a variety of career-focused curricula. This sheet helps describe the Associate s Degree program
Credit Programs and Awards
Credit Programs and Awards The college offers programs of instruction designed to meet a variety of educational and vocational needs of students. Students who wish to earn a baccalaureate degree may complete
Dietary Management. Program Proposal. Presented to the South Dakota State Board of Education May 2012 For Implementation Fall 2012
Dietary Management Program Proposal Presented to the South Dakota State Board of Education May 2012 For Implementation Fall 2012 Mitchell Technical Institute 1800 E. Spruce St. Mitchell, SD 57301 Mitchell
Computer Security and Investigations
Computer Security and Investigations Program Locations: Program Code: Coordinator: Credential: Peterborough CSI Blair Brown Ontario College Advanced Diploma Start Dates: September 06, 2016 January 09,
College of Business. Role and Mission. Idaho Falls Programs. EITC/Idaho State University Program. Undergraduate Curriculum Learning Goals.
2015-16 Idaho State University Undergraduate Catalog 1 College of Business Faculty Dean Thomas Ottaway, Ph.D. Associate Dean for Information Assurance Corey Schou, Ph.D. Associate Dean Joanne Tokle, Ph.D.
Apply today: strayer.edu/apply SCHOOL OF INFORMATION SYSTEMS AND TECHNOLOGY BACHELOR OF SCIENCE IN INFORMATION TECHNOLOGY RECOGNIZED MARKETABLE
RECOGNIZED PROVEN RESPECTED MARKETABLE FLEXIBLE Bryan Rolle Student SCHOOL OF INFORMATION SYSTEMS AND TECHNOLOGY BACHELOR OF SCIENCE IN INFORMATION TECHNOLOGY Apply today: strayer.edu/apply FLEXIBLE /
GREAT PLAINS TECHNOLOGY CENTER COURSE OF STUDY. Adult Students: 1050 Hours
GREAT PLAINS TECHNOLOGY CENTER COURSE OF STUDY Career Cluster: Career Pathway: Career Major: Career Major Hours: Information Technology (IT) Network Systems (IT001) Cyber Security Forensics Specialist
Itawamba Community College Program Review Career-Technical and Health Science Programs
Itawamba Community College Program Review Career-Technical and Health Science Programs I. Program Information 1. Name of Program Associate Degree Nursing 2. Submission Date of Program Review 6/29/2011
STEM: Science, Technology, Engineering & Mathematics
STEM: Science, Technology, Engineering & Mathematics Science & Mathematics s Science Biochemistry...186 Biology...186 Chemistry...186 Natural Sciences...186 Physics...187 Mathematics Mathematics....187
Program Drill-Downs National
July 2014 Program Drill-Downs National Prepared for Hilbert College and St. Bonaventure University Matching People & Jobs Reemployment & Education Pathways Resume Parsing & Management Real-Time Jobs Intelligence
Itawamba Community College Program Review Career-Technical and Health Science Programs
Itawamba Community College Program Review Career-Technical and Health Science Programs I. Program Information 1. Name of Program Occupational Therapy Assistant Program 2. Submission Date of Program Review
Computer Network Engineering
226 Computer Network Engineering Computer Network Engineering Degrees, Certificates and Awards Associate in Science: Computer Network Engineering Certificate of Achievement: Computer Network Engineering
PRIMARY AND SECONDARY EDUCATION EDUCATIONAL STANDARDS - VOCATIONAL EDUCATION ESTABLISHMENT OF ACADEMIC AND TECHNICAL STANDARDS
TITLE 6 CHAPTER 33 PART 2 PRIMARY AND SECONDARY EDUCATION EDUCATIONAL STANDARDS - VOCATIONAL EDUCATION ESTABLISHMENT OF ACADEMIC AND TECHNICAL STANDARDS 6.33.2.1 ISSUING AGENCY: Public Education Department
Information Technology Networking Specialist Cisco Network Professional
Information Technology Networking Specialist Cisco Network Professional INDIVIDUAL PROGRAM INFORMATION 2015 2016 866.Macomb1 (866.622.6621) www.macomb.edu Information Technology Networking Specialist Cisco
COMMISSION FOR HIGHER EDUCATION Friday, October 14, 2011
COMMISSION FOR HIGHER EDUCATION Friday, October 14, 2011 DISCUSSION ITEM D: New Program Proposal Guidelines Staff Recommendation Background For discussion only. Drafts of the New Program Proposal Guidelines
Management. Program Learning Outcomes
263 Definition is the achievement of organizational objectives through people and other resources. By effective planning, organizing, directing, and controlling, managers combine capital, labor, and materials
Wichita State University School Psychologist, Narrative Describing the Operation of the Program Assessment Plan Approved 11-15-05
School Psychologist, Narrative Describing the Operation of the Program Assessment Plan Approved 11-15-05 Program evaluation in the Program occurs both (a) to make decisions about individual candidates
Cover/Signature Page Full Template
Cover/Signature Page Full Template Institution Submitting Request: Utah Valley University Proposed Title: Graduate Certificate in Cyber Security School or Division or Location: College of Technology &
GROSSMONT-CUYAMACA COMMUNITY COLLEGE DISTRICT REVIEW OF CAREER TECHNICAL EDUCATION PROGRAMS. Cuyamaca College Introduction
GROSSMONT-CUYAMACA COMMUNITY COLLEGE DISTRICT REVIEW OF CAREER TECHNICAL EDUCATION PROGRAMS 2011-2012 Cuyamaca College Introduction In keeping with Section 78016 (Review of program; termination) of the
ACADEMIC AFFAIRS COUNCIL ******************************************************************************
ACADEMIC AFFAIRS COUNCIL AGENDA ITEM: 4.C.1 DATE: January 20, 2011 ****************************************************************************** SUBJECT: New Site Request NSU, BS Marketing, Online Northern
Computer and Information Science
Computer and Information Science www.odessa.edu/dept/computer Faculty: Katrieva Jones- Munroe, chair The computer information systems curriculum provides students with practical, job- related computer
Computer Network Engineering
208 Computer Network Engineering Degrees, Certificates and Awards Associate in Science: Certificate of Achievement: Skills Competency Award: Cisco Networking Associate Program Description The field of
Overview of USI s College Achievement Program (CAP) for Prospective Instructors and School Administrators
Overview of USI s College Achievement Program (CAP) for Prospective Instructors and School Administrators What is CAP? CAP is a concurrent credit program available to high school juniors & seniors, taught
UNO COLLEGE OF INFORMATION SCIENCE & TECHNOLOGY
UNO COLLEGE OF INFORMATION SCIENCE & TECHNOLOGY 1110 S 67th St Omaha, NE 68182 402.554.3819 www.ist.unomaha.edu Requirements Correspond to Catalog TABLE OF CONTENTS & GENERAL INFORMATION The College of
BOARD OF HIGHER EDUCATION REQUEST FOR COMMITTEE AND BOARD ACTION
BOARD OF HIGHER EDUCATION REQUEST FOR COMMITTEE AND BOARD ACTION COMMITTEE: Academic Affairs NO: AAC 14-53 COMMITTEE DATE: June 10, 2014 BOARD DATE: June 17, 2014 APPLICATION OF MASSASOIT COMMUNITY COLLEGE
Cybersecurity Occupation Report CIP 11.1003
Cybersecurity Occupation Report CIP 11.1003 Pima, SC Computer and Information Systems Security/Information Assurance CIP 2010: A program that prepares individuals to assess the security needs of computer
Network Engineering Technology
Network Engineering Technology Network Engineering Technology with Specializations in: Cisco Routing and Switching Microsoft Systems Administration Cyber Security and Digital Forensics Associate in Science
PHARMACY TECHNOLOGY PROGRAM Offered on the Macon Campus Admission Packet Criteria
PHARMACY TECHNOLOGY PROGRAM Offered on the Macon Campus Admission Packet Criteria CENTRAL GEORGIA TECHNICAL COLLEGE Warner Robins Campus 80 Cohen Walker Drive, Warner Robins, GA 31088 (478)988-6850 Macon
ARTICULATION AGREEMENT. Macomb Community College. Eastern Michigan University. Between. and. College of Technology. School of Technology Studies
September 2011 Bachelor of Science in Information Assurance School of Technology Studies College of Technology Eastern Michigan University and Professional AAS in IT-Networking Specialist-Network Security
ACADEMIC AFFAIRS COUNCIL ******************************************************************************
ACADEMIC AFFAIRS COUNCIL AGENDA ITEM: 4.D.3 DATE: November 13, 2008 ****************************************************************************** SUBJECT: Intent to Plan DSU BS in Network & System Administration
CYBERSYSTEMS AND INFORMATION SECURITY (CSIS) CURRICULUM
CYBERSYSTEMS AND INFORMATION SECURITY (CSIS) CURRICULUM The approved (by ACHE in 12/2009) and accredited (by SACS in 12/2010) Master of Science degree program in Cybersystems and Information Security will
Apply today: strayer.edu/apply SCHOOL OF INFORMATION SYSTEMS AND TECHNOLOGY MASTER OF SCIENCE IN INFORMATION SYSTEMS RECOGNIZED MARKETABLE FLEXIBLE
RECOGNIZED PROVEN RESPECTED MARKETABLE FLEXIBLE Fernanda Tapia Student SCHOOL OF INFORMATION SYSTEMS AND TECHNOLOGY MASTER OF SCIENCE IN INFORMATION SYSTEMS Apply today: strayer.edu/apply FLEXIBLE / AFFORDABLE
Education for the Future.
Education for the Future. The six schools of study at the ITT Technical Institutes 2 (School of Information Technology, School of Electronics Technology, School of Drafting and Design, School of Business,
