Center of Academic Excellence Cyber Operations Program 2013 Application



Similar documents
Certifications and Standards in Academia. Dr. Jane LeClair, Chief Operating Officer National Cybersecurity Institute

NSA/DHS Centers of Academic Excellence for Information Assurance/Cyber Defense

Course Content Summary ITN 261 Network Attacks, Computer Crime and Hacking (4 Credits)

Cyber Security in the Nuclear Age. Dr. Jane LeClair, Chief Operating Officer National Cybersecurity Institute at Excelsior College Washington, D.C.

The USNA Cyber Program

CS 356 Lecture 25 and 26 Operating System Security. Spring 2013

Cyber Security In High-Performance Computing Environment Prakashan Korambath Institute for Digital Research and Education, UCLA July 17, 2014

IINS Implementing Cisco Network Security 3.0 (IINS)

Information Security Services

Implementing Cisco IOS Network Security

Network Security Administrator

Computer and Information Sciences

CS 356 Lecture 19 and 20 Firewalls and Intrusion Prevention. Spring 2013

Course Content Summary ITN 262 Network Communication, Security and Authentication (4 Credits)

Telecom Testing and Security Certification. A.K.MITTAL DDG (TTSC) Department of Telecommunication Ministry of Communication & IT

Introduction to Cyber Security / Information Security

MASTER OF SCIENCE IN INFORMATION ASSURANCE PROGRAM DEPARTMENT OF COMPUTER SCIENCE HAMPTON UNIVERSITY

CESG Certification of Cyber Security Training Courses

M.S. Computer Science Program

CS 665: Computer System Security. Network Security. Usage environment. Sources of vulnerabilities. Information Assurance Module

A Systems Engineering Approach to Developing Cyber Security Professionals

NSA/DHS National Centers of Academic Excellence in Information Assurance/Cyber Defense 2014 List of Knowledge Units and Focus Areas

FRONT RUNNER DIPLOMA PROGRAM INFORMATION SECURITY Detailed Course Curriculum Course Duration: 6 months

BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: Security Note

Please consult the Department of Engineering about the Computer Engineering Emphasis.

Network Security 網 路 安 全. Lecture 1 February 20, 2012 洪 國 寶

Securing Modern Substations With an Open Standard Network Security Solution. Kevin Leech Schweitzer Engineering Laboratories, Inc.

Principles of Information Assurance Syllabus

e-code Academy Information Security Diploma Training Discerption

Information Technology Career Cluster Introduction to Cybersecurity Course Number:

CS 356 Lecture 17 and 18 Intrusion Detection. Spring 2013

Certification of Master s Degrees in Computer Science for Cyber Security

---Information Technology (IT) Specialist (GS-2210) IT Security Competency Model---

Information Systems Security Certificate Program

NSA/DHS CAE in IA/CD 2014 Mandatory Knowledge Unit Checklist 4 Year + Programs

Eastern Washington University Department of Computer Science. Questionnaire for Prospective Masters in Computer Science Students

Fundamentals of Network Security - Theory and Practice-

EUCIP - IT Administrator. Module 5 IT Security. Version 2.0

90% of data breaches are caused by software vulnerabilities.

Implementing Secured Converged Wide Area Networks (ISCW) Version 1.0

Govt. of Karnataka, Department of Technical Education Diploma in Computer Science & Engineering. Sixth Semester

How To Classify A Dnet Attack

MEng, BSc Applied Computer Science

Network Security. 1 Pass the course => Pass Written exam week 11 Pass Labs

How To Get A Computer Science Degree

An expert s tips for cracking tough CISSP exam

DESIGNING WEB LABS FOR TEACHING SECURITY CONCEPTS ABSTRACT

CCNA Security 2.0 Scope and Sequence

IT Networking and Security

SCP - Strategic Infrastructure Security

PUF Physical Unclonable Functions

CompTIA Security+ (Exam SY0-410)

PFP Technology White Paper

Host-based Intrusion Prevention System (HIPS)

Computer Scientist. Conduct research in latest computer and network security technologies for high assurance system security solutions

How To Protect Your Firewall From Attack From A Malicious Computer Or Network Device

The Value of Physical Memory for Incident Response

IoT Security Platform

Designing and Coding Secure Systems

NETWORK SECURITY (W/LAB) Course Syllabus

MEng, BSc Computer Science with Artificial Intelligence

SECURITY PRACTICES FOR ADVANCED METERING INFRASTRUCTURE Elif Üstündağ Soykan, Seda Demirağ Ersöz , ICSG 2014

University of Dayton Department of Computer Science Undergraduate Programs Assessment Plan DRAFT September 14, 2011

Cloud security architecture

Frontiers in Cyber Security: Beyond the OS

167 th Air Wing Fast Track Cyber Program Blue Ridge Community and Technical College

Information and Communications Technology Courses at a Glance

Weighted Total Mark. Weighted Exam Mark

Security Intelligence Services. Cybersecurity training.

Information Security Attack Tree Modeling for Enhancing Student Learning

Description: Objective: Attending students will learn:

BM482E Introduction to Computer Security

Multi-core Curriculum Development at Georgia Tech: Experience and Future Steps

CMPT 471 Networking II

Computer Security. Principles and Practice. Second Edition. Amp Kumar Bhattacharjee. Lawrie Brown. Mick Bauer. William Stailings

FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 4 Finding Network Vulnerabilities

EC-Council. Certified Ethical Hacker. Program Brochure

JOB READY ASSESSMENT BLUEPRINT COMPUTER NETWORKING FUNDAMENTALS - PILOT. Test Code: 4514 Version: 01

Department of Information Systems and Cyber Security

CMSC 421, Operating Systems. Fall Security. URL: Dr. Kalpakis

Security (II) ISO : Security Architecture of OSI Reference Model. Outline. Course Outline: Fundamental Topics. EE5723/EE4723 Spring 2012

Cyber Security. BDS PhantomWorks. Boeing Energy. Copyright 2011 Boeing. All rights reserved.

Chapter 9 Firewalls and Intrusion Prevention Systems

Computer Science 4302 Operating Systems. Student Learning Outcomes

Master Degree Program in Computer Science (CS)

External Supplier Control Requirements

Bellevue University Cybersecurity Programs & Courses

International Program for Bachelor of Science (Software Engineering) College of Arts, Media and Technology, Chiang Mai University

IT Networking and Security

That Point of Sale is a PoS

Transcription:

Center of Academic Excellence Cyber Operations Program 2013 Application Name of Institution: Mailing Address of Institution: Date: Institution s President s Name and Official Email Address: Department Submitting Application (e.g., Computer Science (CS), Electrical Computing Engineering (ECE), etc.): Applying at which program level: Undergraduate Graduate* Both (* See question #2 below) Accreditations Nationally accredited? Yes No Name of National Accreditation Body: Regionally accredited? Yes No Name of Regional Accreditation Body: Date of National Accreditation: Date of Regional Accreditation: Institution s Points of Contact (POC) Primary POC Name: Alternate POC #1 Name: Office Phone #: Office Phone #: Office Email Address: Office Email Address: Page 1 of 5

Center of Academic Excellence Cyber Operations Program 2013 Application Alternate POC #2 Name: Alternate POC #3 Name: Office Phone # and Official Email Address: Office Phone # and Official Email Address: 1. Identify courses believed to cover the academic requirements knowledge units in the knowledge unit alignment worksheet (see Criteria 1 and 5). If applying at the graduate and undergraduate level, please complete separate KU alignment worksheets for the graduate and undergraduate programs. If graduate courses may be taken by undergraduate students, those courses may be included in the undergraduate matrix. 2. Identify the Degree Program(s) in which the Cyber Operations curriculum is based and include the title of the degree/specialization/track, sample course schedule, course description and syllabi that contain a weekly schedule of topics. Please note-- if applying at the graduate level and enrolling students are expected to have already met some of the CAE Cyber Operations mandatory requirements, indicate how students may demonstrate that those requirements are met. 2013 Application Page 2 of 5

Center of Academic Excellence Cyber Operations Program 2013 Application 3. Describe how students who participate in the Cyber Operations curricula will be distinguished from other (non-cyber Operations) students (see Criteria 2): 4. Provide a list of research topics believed to be related to the Cyber Operations Program in which faculty are currently involved (See Criteria 6): 5. Provide research topics believed to be related to the Cyber Operations Program in which students are currently engaged or could engage (See Criteria 7): 6. Describe Cyber Operations-related outreach efforts in which students are currently involved or could participate (e.g., Cyber exercises, volunteers at local K-12 schools, cyber camps, etc.) (See Criteria 8): 2013 Application Page 3 of 5

Center of Academic Excellence Cyber Operations Program 2013 Application 7. Identify the names and number of faculty who teach active Cyber Operations-related program courses (See Criteria 10): Continuation and Additional Comments: 2013 Application Page 4 of 5

Center of Academic Excellence Cyber Operations Program 2013 Application Our Institution understands and believes that our program meets the criteria defined for the CAE-Cyber Operations program and has active courses that cover the mandatory knowledge units and at least 60 percent of the optional units to meet the academic content requirements. Our Institution agrees, as part of the application process, that its program will participate in an in-person curricula review of courses satisfying the mandatory and optional knowledge units as part of the application review and selection process. If designated as a CAE-Cyber Operations Institution, our institution agrees to participate in NSA-hosted Summer Seminars as part of the program (See Criteria 9). Signature Date 2013 Application Page 5 of 5

MANDATORY KNOWLEDGE UNITS Course # Course Title Low Level Programming C Write a program that implements a network stack to manage network comms Assembly Write a functional, stand-alone assembly language programmimplementing a basic telnet client (no help) Develop programs that can be embedded in OS kernel Implement exploits for discovered vulnerabilties Reverse Engineering Malware Analysis Reverse Engineering tools Communications (including protocols) Software Use of IDAPro Safely perform static & dynamic analysis Use a tool to safely perform static and dynamic analysis (malware) of unknown origin Covers appropriate tools, techniques & procedures Date Last Taught Date Last Updated Operating System Theory Privileged vs non-privileged states Concurrency and synchronization Page 1 of 10

Processes and threads, process/thread mgt, inter-process comms Memory mgt/virtual memory File Systems IO Issues (buffering, queuing, sharing, mgt) Disributed OS issues (client/server, message passing, etc.) Understand OS internals to the level that they could design & implement significant architectural changes to an existing OS Networking TCP/IP Protocols (routing network & application protocols) Architectures Wireless Traffic Analysis Protocol Analysis Know how networks transfer data Know how to enable communications Know how the lower network layers support the upper ones Telecommunications Mobile Telephony Insfrastructures (i.e., fiber otpic network) Core Network (Mobile and Inernet) Describe routing in a telecomm network Page 2 of 10

Describe interaction of elements w/in the telecomm core Describe end-to-end delivery of a packet and/or signal Understand what happnes with the hand-off at each step along the way Explain differences in core architecture btwn different generations of mobile network technology Discrete Math Introduce 1st order logic graphs, accounting, accountability, and induction proofs. Algorithms Exposed to fundamental algorithm sorting/searching/data/manipulation Analyze the complexity of algorithms Statistics/Calculus I & II Understand how variability affects outcomes How to identify anamolous events How to identify the meaing of anamolous events Able to integrate and differentiate continuous functions of multiple variables Automota Understand how automota is used to describe computing machines & computation & notion that some things are computable and some are not Understand the connection btwn automata and computer languages Describe the hiearchy of language from regular expression to context files Page 3 of 10

Institution Name: Legal Laws, Regulations, Directives, and Policies Understand the legal issues governing the authorized conduct of cyber operations and use of related tools, techniques, technology, and data Overview of Cyber Defense (incl. hands-on labs/exercises) Network Security Techniques and Components (e.g., Firewalls, IDS, etc.) Cryptography (include PKI Cryptography) Malicious Activity Detection Identification of reconnaissance operations Anomaly/Intrusion detection Anomaly identification Identification of command and control operations Identifying malicious code based on signatures, behavior and artifacts System Security Archit. Defense in depth Trust Relationships Distributed/Cloud Virtualization Describe, evaluate, and operate defense network architecture employing multiple layers of protection using technology appropriate for secure misssion accomplishent Page 4 of 10

Security Fundamental Principles (1st Principles of Domain Separation Process Isolation Resource Encapsulation Least Privilege Layering/Abstraction/Data Hiding Modularity/Minimization Security Policies Applied Cryptography Understand fundamental principles underlying cyber security How these principles inter-relate and are typically employed to achieved assured solutions Vulnerabilities Vulnerability Taxonomy Root Causes Buffer Overflows Privilege Escalation Attacks Trojans/Backdoors/Viruses Rootkits Understand the various types of vulnerabilities, their underlying causes, and the ways in which they were exploited Know how to avoid these vulnerabilities during system design, development, and implementation Page 5 of 10

Institution Name: OPTIONAL KNOWLEDGE UNITS Programmable Logic Languages FPGA Design Albe to specify digital device behavior using a programmable logic language Wireless Security Course # Course Title Date Last Taught Date Last Updated Describe the unique security and operational attributes in the wireless environment and their effects on network communications Identify the unique security implications of these effects and how to mitigate security issues associated with them Virtualization Discuss the advantages and disadvantages of virtualization Identify the different approaches for virtualizing computer systems and the security implications of each different approach Large Scale Distributed Systems Cloud computing/cloud security Describe different kinds of Cloud architecture models, services, security issues, and components (logical and physical) Identify all associated data paths within a given cloud design Risk Managmenet of Information Systems Page 6 of 10

Identify classes of possible threats, what are the consequences associated with each threat, and what actions can be taken to mitigate the threat Computer Architecture Define devices of electronic digital circuits and describe how these components are interconnected Integrate individual components into a more complex digital system and understand the data path through a CPU. Microcontroller Design Integrate discrete components into a single processor element and describe ways of achieving performance efficiencies through combining components. Identify trade-offs associated with microcontroller optimization. Software Analysis System Source Code Static and Dynamic Techniques Testing (Black box/white box/fuzz) Perform analysis of existing source code for functional correctness. Apply industry standard tools that analyze software for security vulnerabilities. Through the application of testing methodologies, students should be able to build test cases that demonstrate the existence of vulnerabilities. Page 7 of 10

Secure Software Development (Building secure software) Secure Programming Principles and Practices Constructive Techniques Demonstrate that they understand the techniques specifying program behavior, the classes of well known defects. How they manifest themselves in various languages and are capable of authoring programs that are free from defects. Embedded Systems Define requirements which lead to the design and fabrication of an embedded system. Program the microcontrollers to achieve an application specific design and identify the security concerns associated with resourceconstrained devices. Forensics Operating Systems Network Forensics Determine the manner in which an operating system or application has been subverted, recover deleted and/or intentionally hidden information from various types of media and demonstrate proficiency with handling of a large number of different kinds of components. Secure Systems Programming Kernel Internals Page 8 of 10

Device Drivers Multi-Threading Use of alternate processors Build and integrate kernel modules, understand the system call mechanism and how malicious software subverts system calls. Demonstrate sufficient knowledge of the networking stack to be able to construct network filter components. Discuss strengths and weaknesses of alternative processors, demonstrate familiarity of toolsets for making use of alternative processors (e.g., GPUs). Applied Cryptography Identify the appropriate uses of symmetric and asymmetric encryption. Assign some measure of strength to cryptographic algorithms and the associated keys. Identify what level of algorithm strength is needed for particular applications and the implementation factors related to its suitability for use. Understand the common pitfalls associated with the implementation of cryptography. Understand the challenges and limitations of various key management systems. SCADA Systems Describe how embedded systems are employed in industrial infrastructures and control systems. Describe methods for management of distributed nodes Page 9 of 10

Identify potential security vulnerabilities associated with the use of such systems and means for mitigating these vulnerabilities. HCI/Usable Security Understand user interface issues that will affect the implementation of and perception of security mechanisms and the behavioral impacts of various security policies. Understand the tension between user security and convenience. Page 10 of 10