How To Become A Cybersecurity Consultant



Similar documents
MRKT 601 Legal and Ethical Issues in Global Communications (3) MRKT 602 Consumer Behavior (3)

Cyber Security at NSU

UNM Information Assurance Scholarship for Service (SFS) Program

Redesigning Data System Technology Curricula. IBM BDAEdCon 2014 Las Vegas Dr. Elena Gortcheva, Program Chair for MSc Data Systems Technology, UMUC

UMUC FED Program. Online Open House July 22, 2015

Cybersecurity Definitions and Academic Landscape

Cyber threats are growing.

Apply today: strayer.edu/apply SCHOOL OF INFORMATION SYSTEMS AND TECHNOLOGY MASTER OF SCIENCE IN INFORMATION SYSTEMS RECOGNIZED MARKETABLE FLEXIBLE

Testimony of Eunice Santos. House Oversight and Government Affairs Committee Subcommittee on Information Technology

Ccybersecurity Education

MEETING THE NATION S INFORMATION SECURITY CHALLENGES

Program Proposal for a Minor

Protecting Energy s Infrastructure and Beyond: Cybersecurity for the Smart Grid

SANS CyberTalent VetSuccess Immersion Academy. VetSuccess

Certified Cyber Security Analyst VS-1160

University of Maryland University College. American Military University. Henley-Putnam University

National Initiative for Cyber Security Education

NICE and Framework Overview

University of Maryland University College: Master of Science in Digital Forensics and Cyber Investigation

University Program Approval: University of Oregon, BA/BS in Arts Management.

Central Georgia Technical College Associate of Degree Transfer Information

USF Graduate Catalog SECTION 23.

NSA/DHS Centers of Academic Excellence for Information Assurance/Cyber Defense

Office of Programs and Academic Assessment (MC 103) 2630 University Hall 601 South Morgan Street Chicago, IL 60607

Computer Information Science xxx

Master of Science in Forensics

COMPUTER SCIENCE & INFORMATION TECHNOLOGY

MASTER OF SCIENCE IN BIOMEDICAL FORENSIC SCIENCES

Innovation, Partnership, Development

Cybersecurity Education

Certifications and Standards in Academia. Dr. Jane LeClair, Chief Operating Officer National Cybersecurity Institute

Enterprise Learning. threat to mobile devices, networks, and services employees in cybersecurity, mobility, big data

Allegany College of Maryland. 239 Cisco Networking 2 * Offered Fall semester and

Cybersecurity AAS Program

Distance Learning Update. Dr. Pam Northrup, Associate Provost/Academic Innovation

USF Graduate Catalog SECTION 18.

Advanced Cybersecurity Experience for Students (ACES) Program

I n t r o d u c t i o n

Assessment Plan for the Undergraduate Criminal Justice Program GOAL A

CYBER SECURITY TRAINING SAFE AND SECURE

Goal. Vision. CAE 2Y Program Eligibility and Summary

Capacity Building in Cyber Security Literacy: An Inter-disciplinary Approach

Cybersecurity Strategic Talent Management. March, 2012

State University System Florida Board of Governors Request to Establish Market Tuition Rates Regulation 7.001(15)

know school PubliC affairs

At Meeting No. 487 held on 26 January 2015, the Graduate Council approved the attached proposal that is now submitted to the Faculty Senate.

Cyber Security Strategy of Georgia

TAKE THE NEXT STEPS TO BUILDING YOUR FUTURE CATALOG THE UNDERGRADUATE SCHOOL

Computer and Information Science Division xxx

Department of Defense Information Assurance Scholarship Program. Sponsored by the. DoD Chief Information Officer

Apply today: strayer.edu/apply SCHOOL OF INFORMATION SYSTEMS AND TECHNOLOGY BACHELOR OF SCIENCE IN INFORMATION SYSTEMS RECOGNIZED MARKETABLE FLEXIBLE

An Accelerated Pathway to Careers in Cybersecurity for Transitioning Veterans. NICE Annual Conference November 2015

ACADEMIC AFFAIRS COUNCIL ******************************************************************************

Cybersecurity education for the next generation Emerging best practices

BOARD OF HIGHER EDUCATION REQUEST FOR COMMITTEE AND BOARD ACTION

DHS. CMSI Webinar Series

The GW CyberCorps Program

Sabbatical Leave Application

Eastern Shore Higher Education Center

CATALOG THE UNDERGRADUATE SCHOOL

Computer Science at James Madison University

NATIONAL INITIATIVE FOR CYBERSECURITY EDUCATION SAN DIEGO, CA

El Paso Community College Associate of Applied Science Transfer Information

Goal. Vision. CAE IA/CD Program Eligibility and Summary

Challenges in Cybersecurity. Major General Bret Daugherty, The Adjutant General, Washington Army and Air National Guard

Cert Information Security ( )

MASTER OF SCIENCE IN INFORMATION ASSURANCE PROGRAM DEPARTMENT OF COMPUTER SCIENCE HAMPTON UNIVERSITY

CYBERBOK Cyber Crime Security Essential Body of Knowledge: A Competency and Functional Framework for Cyber Crime Management

INNOVATION. Campus Box 154 P.O. Box Denver, CO Website:

about umuc university of Maryland university College undergraduate CataLOG

Digital Forensics Workforce Training for Wounded Warriors

University Of North Dakota SBHE Policy 307.1

ILLINOIS STATE UNIVERSITY

Eastern Shore Higher Education Center

Achieving Cybersecurity Excellence Through Evolution of the Nation's Cyber Workforce

Executive Cyber Security Training. One Day Training Course

NICE 2015 Conference

University-Industry Work Group: Education

Proposed Education & Workforce Development Plan for FY2015. Education & Workforce Development Work Group Andrew Turner November 2014

Bellevue University Cybersecurity Programs & Courses

Dr. Don Geddes Director, Graduate Studies in Information Security. Graduate Studies in. Information Security

CS/ITP Concurrent Degree (CSEN-BS/ITP-MS)

Pittsburg State University Distance Education Plan,

Future of Digital Forensics: A Survey of Available Training

Ph.D. Nova Southeastern University, Ft Lauderdale, FL, Information Systems, completed 24 credit hours, expected ABD in Spring 2012

Notification of Request for Authorization under the Degree-Granting Institutions Act

The University of Southern Mississippi. Detailed Assessment Report As of: 10/02/ :44 AM CDT Forensics MS

THE UNDERGRADUATE SCHOOL

Technology Courses. The following chart outlines the required courses in each of these three categories for the Ph.D. curriculum:

Agenda Item 2. USM Cyber Security Landscape and Contributions to the State

Report on CAP Cybersecurity November 5, 2015

MARYLAND. Cyber Security White Paper. Defining the Role of State Government to Secure Maryland s Cyber Infrastructure.

Department of Homeland Security Federal Government Offerings, Products, and Services

The Case for Support: The Center for Cyber Security Studies at the U. S. Naval Academy

MS In Forensic Computing (MSFC) Saint Joseph s College. (33 Credits, including a Practicum/Internship)

College of Business AACSB Continuous Improvement Review Accreditation Report

DOMINICAN UNIVERSITY

Department of Defense DIRECTIVE

Proposal for a Graduate Certificate in Information Assurance Education Track 2. Submitted. by the. School of Technology West Lafayette Campus

Transcription:

Strengthening the Nexus: Government-Business- University cooperation and collaboration on security, training and research November 1, 2011 Susan C. Aldridge, PhD University of Maryland University College

UMUC s Unique Attributes Contribute to Building a Pipeline of Cyber Warriors 2

University of Maryland University College Largest State University; 94,000 Students 28 Countries; 150 Locations Face to face instruction Award winning virtual campus 25,000 military service members 3

Workforce Relevant Degree Programs Mapped to industry standards Taught by scholar practitioners Close relationship to DoD and First Responders NSA/DHS Center of Academic Excellence in Information Assurance Education 4

UMUC was uniquely positioned for growth Global High tech Agile ability to launch new programs Large contingent of clearance ready students Creation of Cybersecurity Panel of Experts 5

GROWTH PROGRAMS: Cybersecurity Enrollments Since unveiling its three degree programs and three graduate certificate programs, UMUC has received 5,300 applications, and enrolled close to 3,200 students. 6

Graduate School Approach Establish new Department for Cybersecurity and Information Assurance Current IA specialization 2 New Cybersecurity degree programs Center for Security Studies 7

Degree Format 36 credits 8

Career Paths MS Cybersecurity Chief security officer Cybersecurity manager or administrator Cybersecurity architect Cybersecurity operations analyst Cybersecurity engineer Secure software assurance engineer Cyber operations planner 9

Career Paths MS Cybersecurity Policy Cyber policy analyst Cyber intelligence analyst Federal, state, and local government manager Legislative aide 10

Program Articulations Articulation with Community Colleges Articulation with UMUC Graduate Programs 11

School of Undergraduate Studies Approach Integrate Cybersecurity with existing major in Information Assurance (IA). IA and Cybersecurity are closely related (but distinct) disciplines. Major is interdisciplinary includes courses from several majors. External Consultant supported broadly-based undergraduate curriculum. 12

CSIA Degree Structure (33 sh) Foundation Courses (9 sh): CSIA 301 Information System Architecture IFSM 304 Ethics in the Information Age CSIA 302 Telecommunications in Information Systems OR CMIT 265 Networking Essentials Core Courses (12 sh): CSIA 303 CSIA 412 CSIA 413 CMIT 320 Foundations of Information System Security Senior System Managers and Security System Administrators and Information Security Network Security Supplemental Courses (9 sh) chosen from: CCJS 421 Computer Forensics CSIA 454 Information System Security Mechanisms CSIA 457 Cybercrime and Cyberterrorism CSIA 459 Security Issues and Emerging Technologies IFSM 432 Disaster Recovery Planning IFSM 433 Information System Security Needs Assessment & Planning CMIT 321 Ethical Practice of Intrusion Prevention & Detection CMIT 425 Advanced Network Security Capstone Course (3 sh): CSIA 485 Trends & projects in Cybersecurity & Information Assurance 13

Career Paths B.S. Cybersecurity A degree in cybersecurity prepares students for careers as information systems security professionals, senior systems managers and system administrators responsible for information systems and security of those systems. Systems security analyst Information security officer Systems administrator Security architect Malware analyst Computer crime investigator Security operations center analyst Intrusion analyst Vulnerability analyst 14

Course Components Interactive Case Study Threaded Discussions WebTycho LMS Learning Objects Technical Primers Reading Assignments Virtual Lab Exercises 15

Virtual Cybersecurity Lab Practical, hands-on exercises with live software (e.g., password cracking) Delivery at a distance 16

Learning Object - Content 17

Learning Object Computer Forensics 18

Learning Object - Multimedia 19

New Undergraduate Courses Developed Social Networking and Cybersecurity Best Practices Basic Security Measures in Cyberspace 20

Cybersecurity Scholarships Through its successful Cyber Gala, UMUC raised $470,000 for cybersecurity scholarships. Awarded more than $362,000 in scholarships to nearly 100 students. Scholarships are merit-based. 21

22

23

Corporate Cyber Programs UMUC s Corporate Learning Solutions (CLC) team signed 10 new alliance agreements this spring; currently has 28 prospects in the pipeline. Booz Allen Hamilton has more than 100 employees enrolled in one of UMUC s three graduate cyber certificate programs. 24

Testimonies at Hearings UMUC Provost Dr. Greg von Lehmen testified in July before a Senate Small Business and Entrepreneurship Committee, chaired by Senator Ben Cardin (D-MD). UMUC staffing a 3 year legislative taskforce on Cybersecurity in Maryland. 25

26

Career Services 2 Virtual fairs - global 1 Face to face fair including Maryland Colleges and Universities. 27