Bachelor of Applied Information Science (Information Systems Security)



Similar documents
What You Need to Know About Computer Science, B.S.A.T. Programs

ACADEMIC YEAR SCHOOL OF INFORMATION TECHNOLOGY. AS in INFORMATION TECHNOLOGY. BS in INFORMATION TECHNOLOGY

Computer Security and Investigations

DIGITAL FORENSICS SPECIALIZATION IN BACHELOR OF SCIENCE IN COMPUTING SCIENCE PROGRAM

Electrical and Computer Engineering

Information Science & Technology, B.S.

FORENSIC SCIENCE EDUCATION PROGRAMS ACCREDITATION COMMISSION. FEPAC Computing and Information Science Technology. Call for Comments September 2015

ACADEMIC YEAR SCHOOL OF INFORMATION TECHNOLOGY. AS in INFORMATION TECHNOLOGY COMPUTER INFORMATION SYSTEMS. BS in INFORMATION TECHNOLOGY

Allegany College of Maryland. 239 Cisco Networking 2 * Offered Fall semester and

Sport Management. Bachelor of Science in Sport Management. Admission into the Program FACULTY ASSOCIATE PROFESSORS ASSISTANT PROFESSORS LECTURERS

Establishing and Maintaining a Cybersecurity Program: The GWU EMSE Experience

Erik Jonsson School of Engineering and Computer Science

How To Get A Computer Science Degree At Coastal Carolina University

University of Illinois Department of Computer Science Goals, Objectives, and Assessments January 2009

Erik Jonsson School of Engineering and Computer Science Interdisciplinary Programs

C-. If these courses have not been completed satisfactorily upon enrolling at USF Sarasota-Manatee, they must be taken before the degree is granted.

The Department of Education. in Science and Technology

School of Business Graduate Curriculum (Effective Fall 2012)

Electrical and Computer Engineering Undergraduate Advising Manual

Cybersecurity Major. College of Arts and Letters Interdisciplinary Studies. Program Guide. Version 3 August 2015.

Other Required Courses (14-18 hours)

INFORMATION TECHNOLOGY (IT) 515

UNDERGRADUATE DEGREE PROGRAMME IN COMPUTER SCIENCE ENGINEERING SCHOOL OF COMPUTER SCIENCE ENGINEERING, ALBACETE

BACHELOR OF ENGINEERING WITH HONOURS IN INFORMATION AND COMMUNICATIONS TECHNOLOGY (INFORMATION SECURITY)

October 2, 2003 Don Genson, director Sloan Master s Programs, Eberly College of Science, Penn State dwg9@psu.edu

Computer Science & Engineering Department. Robert McCartney Director of Undergraduate Computing Education ITE robert@engr.uconn.

UNO COLLEGE OF INFORMATION SCIENCE & TECHNOLOGY

COMPUTER SCIENCE AND ENGINEERING

The University of Connecticut. School of Engineering COMPUTER SCIENCE GUIDE TO COURSE SELECTION AY Revised July 27, 2015.

Department of Computer Science and Information Systems

COMPUTER SCIENCE PROGRAM ASSESSMENT PLAN

FACULTY OF MANAGEMENT THE LEON RECANATI GRADUATE SCHOOL OF BUSINESS ADMINISTRATION

Bachelor of Applied Information Sciences (Information Systems

City University of Hong Kong

2. Basis for computing design and implementation at all levels through OS, distributed systems, human interface and computer graphics.

Computer and Information Sciences

Department of Computer Science

MASTER OF SCIENCE IN INFORMATION ASSURANCE PROGRAM DEPARTMENT OF COMPUTER SCIENCE HAMPTON UNIVERSITY

CONTENT. King Hussein Faculty of Computing Sciences

Cyber Security. Vision. Mission

Department of Electrical Engineering School of Engineering

Department of Information Systems and Cyber Security

The University of Connecticut. School of Engineering COMPUTER SCIENCE GUIDE TO COURSE SELECTION AY Revised May 23, 2013.

Department of Computer Science and Engineering

UNO COLLEGE OF INFORMATION SCIENCE & TECHNOLOGY

Department of Computer Science and Computer Engineering Program Change Proposal. BA in Computer Science

Lecturer in the School of Computer Applications

Undergraduate Major Map

Bellevue University Cybersecurity Programs & Courses

Nelson Rusche College of Business

Computer Security Courses/Programs

Student Enrollment: Today s Program: Four Colleges: 7/17/2015. Academic Programs Co-op program First-Year Success Current Students

Computer Forensics and Security Management (MSCFSM)

Minnesota State Community and Technical College Detroit Lakes Campus

Applied Mathematics and Computer Science College of Science, Technology, Engineering and Mathematics University of Wisconsin Stout

Department of Electrical Engineering School of Engineering

Transfer Agreement Fort Hays State University: B.S. in Information Systems Engineering (ISE)

School of Computer Science Computing and Oceanography (COOS) Prog. Spec Awarding institution Teaching institution Programme accredited by

Expected Undergraduate Outcomes

Math Integrated B.Sc./B.Ed. Programs 1

k. p MIS program section is replaced with following content.

Graduate Programs in Education and Human Development

hold a degree of BBA(IS) from the University of Hong Kong. The curriculum shall normally extend over one academic year of full-time study.

MATH 4446 Mathematics Research/Project

THE CITY UNIVERSITY OF NEW YORK

Educational Requirement Analysis for Information Security Professionals in Korea

INFORMATION SYSTEMS (INFO)

Cover/Signature Page - Abbreviated Template/Abbreviated Template with Curriculum

ACADEMIC AFFAIRS COUNCIL ******************************************************************************

(IŞIK - IT201) 1 / 6 COURSE PROFILE. Theory+PS+Lab (hour/week) Local Credits. Course Name Code Semester Term ECTS

NASAD Standards Undergraduate Programs in Graphic Design

Changes in Accounting

ACCOUNTING School of Business Central Connecticut State University

About This Major... Bachelor of Arts: English Technical and Professional Writing Program Sheet, Page 1 of 5 Posted 5/31/06

The following are the measurable objectives for graduated computer science students (ABET Standards):

Please consult the Department of Engineering about the Computer Engineering Emphasis.

Computer Security & Information Assurance MS Program

THE MATHEMATICS EDUCATION PROGRAM FOR STUDENTS GRADUATING IN 2017 AND LATER (also see the Math Education web site:

Accounting Major (59 credit hours)

Teaching Information Security to Engineering Managers

Masters in Applied Cyber Security Upskilling Existing Employees

Studying

Proposal for a BA in Applied Computing

Master of Social Work

Department of Computer Science School of Arts and Science.

Accountancy. 44 Credits

April Revised February College of Education, Criminal Justice and Human Services. School Of Criminal Justice

About Shorter College Sports Management Degree Online Learning and Careers Application Tuition and Financial Aid. Sport Management. online.shorter.

Computer Information Science xxx

I n t r o d u c t i o n

Bachelor of Commerce (Honours Business Administration) (Co-op) PROGRAM REQUIREMENTS

BSc (Hons) Computer Networks

HIGHER EDUCATION PRACTICE RESEARCH ABSTRACTS

Computer Science CATALOG 2014/2015 BINUS UNIVERSITY

DEPARTMENT OF SOCIAL WORK

INFORMATION TECHNOLOGY

Accountancy - Five-Year CPA-MS-ISI Program

PROGRAMS STUDY. Information Technology

USF Graduate Catalog SECTION 18.

UCF, College of Medicine BS Biotechnology MS Biotechnology/MBA Professional Science Masters Program in Biotechnology/MBA

Transcription:

Sheridan College Institute of Technology and Advanced Learning Bachelor of Applied Information Science (Information Systems Security) Victor Ralevich, Ph.D. Professor and Program Coordinator Sheridan College Institute of Technology and Advanced Learning 1

What are applied degrees? Applied degrees are undergraduate bachelor (baccalaureate) degrees with an applied, hands-on focus in a particular field. They prepare people to work in a profession or earn a professional designation or standing while also earning a degree. Students graduate with a Bachelor of Applied Sciences (BASc) degree, for example, rather than a Bachelor of Arts (B.Sc.) degree. Sheridan s BAISc (ISS) Program: Four years program. Computer science curriculum with emphasis on secure database/network security, technical and legal issues. 8-month (consecutive) paid work placement. Two major information systems security related projects. Sheridan College Institute of Technology and Advanced Learning 2

The program curriculum includes topics such as: o Database security o Network security o Writing secure programs (OO and structured) o Ethics and ethical hacking o IS security legislation o Computer forensics o Cryptography and cryptology o Physical security o Operations security o Communications security Sheridan College Institute of Technology and Advanced Learning 3

Program Map Sm Security Programming Math Networks Database CS El Tot 1 IS Loss Prevention OOP I Finite/discrete 3 21 Methodologies 3 (Introduction) - 6 Math. 3 2 IS Security Threats and risk assessment 3 OOP II (Interm.) 6 Computer Math. 3 3 OOP III (Advanced) Statistical (web program.) 6 methods 3 4 IS Forensics and data recovery 3 5 Information Systems Intrusion Detection and Prevention 3 6 7 8 Intro. to Cryptology 3 IS Security Auditing 3 Data/ Information Security Systems 3 Information Security 3 Project 3 Secure e-comm. tech. 3 Computer. Security 3 Advanced IS Sec. 3 Graduation Project 6 Multi-tier programming I - 3 Algorithms and Data-Structures 6 Multi-tier programming II - 3 Systems Programming - 3 Secure Software Development 3 Scientific Computing - 3 Introduction to Communication Networks 3 Intro. to UNIX Operating System 3 Structured Data Modeling 3 6 21 Database implementations Structured 3 18 and Computer mngmnt 3 Organization 3 Internetworking 3 3 18 Network and distr. systems security 3 Database security 3 Data security standards 3 Operating Systems Design 3 3 18 3 18 6 18 3 18 Sheridan College Institute of Technology and Advanced Learning 4

Overall in 8 terms, streams of courses are represented with the following percentage of curriculum: Stream of courses Credits % core % overall Security 45 37.5 30% Programming 36 30.0 24% Mathematics 12 10.0 8% Networks 9 7.5 6% Database Management 9 7.5 6% Topics in Computer Science 9 7.5 6% Electives 30 ---- 20% Overall 150 100.0 100% Eight months internship is between years 3 and 4. Sheridan College Institute of Technology and Advanced Learning 5

How you as ISS Professionals can get involved? The Information Systems Security is ever-changing field that is being constantly updated and extended. So is the program. Program s focus and curriculum content, need to be regularly revisited, updated and adjusted to what is new in industry. Program has PAC Program Advisory Committee, consisting of industry professionals, IS Security managers and representatives of various other interested parties. PAC members meet at least twice a year to review the program and bring to the table suggestions, offer software and hardware support and donations, as well as other forms of professional and financial contributions to the success of the ISS program. Sheridan College Institute of Technology and Advanced Learning 6

You are invited to: Participate as PAC members, To offer help to the program in terms of: o Presentations, lectures, professional visits and discussions with students, o Software/hardware, o Financial help to talented students in the form of grants, o Help us to find internship paid 8-moth placements in your companies for our third year students. Contact email address: victor.ralevich@sheridaninstitute.ca Sheridan College Institute of Technology and Advanced Learning 7