Dr. Dave Dampier Professor of Computer Science and Engineering



Similar documents
Dr. Dave Dampier Professor of Computer Science and Engineering

Building a Successful Cyber-security Program

NSA/DHS Centers of Academic Excellence for Information Assurance/Cyber Defense

UNM Information Assurance Scholarship for Service (SFS) Program

Certifications and Standards in Academia. Dr. Jane LeClair, Chief Operating Officer National Cybersecurity Institute

The National Cybersecurity Workforce Framework Delaware Cyber Security Workshop September 29, 2015

Cyber Security at NSU

National Initiative for Cyber Security Education

Centers of Academic Excellence in Cyber Security (CAE-C) Knowledge Units Review

ACADEMIC AFFAIRS COUNCIL ******************************************************************************

Cybersecurity Definitions and Academic Landscape

Appendix A: Gap Analysis Spreadsheet. Competency and Skill List. Critical Thinking

Northrop Grumman Cybersecurity Research Consortium

Course Content Summary ITN 267 Legal Topics in Network Security (3 Credits)

Cyber Innovation and Research Consortium

Sabbatical Leave Application

An Accelerated Pathway to Careers in Cybersecurity for Transitioning Veterans. NICE Annual Conference November 2015

Psychology. Admission Criteria. Academic Performance. Provisional Admission. Mississippi State University 1

Cyber Security in the Nuclear Age. Dr. Jane LeClair, Chief Operating Officer National Cybersecurity Institute at Excelsior College Washington, D.C.

University of Maryland Cybersecurity Center (MC 2 )

Table 1. Summary of CSIS PhD Program Requirements

Testimony of Eunice Santos. House Oversight and Government Affairs Committee Subcommittee on Information Technology

USF Graduate Catalog SECTION 23.

Curriculum Vitae Summary Employment University of Washington at Bothell Sept 2013 Present BBN Technologies June 2011 May 2013

Panel on Emerging Cyber Security Technologies. Robert F. Brammer, Ph.D., VP and CTO. Northrop Grumman Information Systems.

National Initiative for Cybersecurity Education

Center of Academic Excellence Cyber Operations Program 2013 Application

NATIONAL INITIATIVE FOR CYBERSECURITY EDUCATION SAN DIEGO, CA

USF Graduate Catalog SECTION 18.

University of Maryland University College: Master of Science in Digital Forensics and Cyber Investigation

CYBERSYSTEMS AND INFORMATION SECURITY (CSIS) CURRICULUM

How To Get A Computer Science Degree At Mississippi State

Course Content Summary ITN 261 Network Attacks, Computer Crime and Hacking (4 Credits)

S. ll IN THE SENATE OF THE UNITED STATES

Bellevue University Cybersecurity Programs & Courses

How To Become A Cybersecurity Consultant

Cyber Education triangle clarifying the fog of cyber security through targeted training

Information Systems and Tech (IST)

MASTER OF SCIENCE IN BIOMEDICAL FORENSIC SCIENCES

Computer Science MS/MCS ipos Information Session. Fall 2015

Meeting the CAE IA/CD Knowledge Units Requirements for the Polytechnic University of Puerto Rico

Program Proposal for a Minor

Norway and the Nordic s

Department of Defense INSTRUCTION. DoD Information Assurance Scholarship Program

NSA/DHS National Centers of Academic Excellence in Information Assurance/Cyber Defense 2014 List of Knowledge Units and Focus Areas

Microsoft s cybersecurity commitment

BlacKnight. Cyber Security international A BUSINESS / MARKETING PRESENTATION

2. Cyber security research in the Netherlands

Goal. Vision. CAE 2Y Program Eligibility and Summary

CYBER SECURITY TRAINING SAFE AND SECURE

Silicon Valley University Doctor of Computer Engineering (DCE) Program Outline and Study Plan

MS Information Security (MSIS)

NICE and Framework Overview

Proposed Education & Workforce Development Plan for FY2015. Education & Workforce Development Work Group Andrew Turner November 2014

Cybersecurity Major. College of Arts and Letters Interdisciplinary Studies. Program Guide. Version 3 August 2015.

PH.D. IN BUSINESS ADMINISTRATION

Cyber Exercises, Small and Large

Master of Science in Information Systems & Security Management. Courses Descriptions

Quarterly Cybersecurity BILT Meeting August 6, Meeting Minutes

The University of Southern Mississippi. Detailed Assessment Report As of: 10/02/ :44 AM CDT Forensics MS

DEPARTMENT OF COMMERCE OFFICE OF HUMAN RESOURCES MANAGEMENT HUMAN RESOURCES (HR) BULLETIN #201, FY15

The Case for Support: The Center for Cyber Security Studies at the U. S. Naval Academy

INFRAGARD.ORG. Portland FBI. Unclassified 1

SANS CyberTalent VetSuccess Immersion Academy. VetSuccess

The Department of Electrical and Computer Engineering (ECE) offers the following graduate degree programs:

AC : BUILDING AN EDUCATION PROGRAM FOR ENGINEERS IN DIGITAL FORENSICS

Introduction to Cybersecurity Overview. October 2014

Research Topics in the National Cyber Security Research Agenda

Welcome to the Summer Workshop on Cybersecurity for Faculty of Community Colleges in Texas The Program

Commonwealth Graduate Engineering Program

Cybersecurity Education

MS in Computer Science with specialization in Computer Security. Prof. Clifford Neuman

2. What are your learning objectives or outcomes associated with each student learning goal?

CRIMINAL JUSTICE, BACHELOR OF SCIENCE (B.S.) WITH A CONCENTRATION IN FORENSIC CRIME SCENE INVESTIGATION

Cyber DTU. Lars Ramkilde Knudsen

Computer Forensics and Security Management (MSCFSM)

THE NATIONAL CYBERSECURITY WORKFORCE FRAMEWORK. USER GUIDE Employers

Cisco Master Security Specialization Practice Areas Summary. June 2015

::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::: Trends

I n t r o d u c t i o n

Temple University Tuition Rate Schedule By School/College

Transcription:

Dr. Dave Dampier Professor of Computer Science and Engineering Director, Distributed Analytics and Security Institute and the Center for Computer Security Research Mississippi State University

CAE-2Y: Center of Academic Excellence in Information Assurance/Cyber Defense Education for Community Colleges (32) CAE-IA/CD: Center of Academic Excellence in Information Assurance/Cyber Defense Education (130) CAE-R: CAE in Information Assurance/Cyber Defense Research (58) CAE-Cyber: Center of Academic Excellence in Cyber Operations (13) Seven institutions have CAE-(IA/CD, R, and Cyber) AFIT, Auburn, CMU, MSU, NPS, Northeastern, NYU Poly, Tulsa https://www.nsa.gov/ia/academic_outreach/nat_cae/

Originally known as CAE-IAE (Information Assurance Education) Oldest credential, started in 2000 Most basic credential available to four year institutions To achieve this designation, curriculum has to be mapped to a detailed set of knowledge units derived from NICE framework. Very time-intensive process (probably at least 100 man-hours for someone very familiar with the curriculum.) Course/Textbook/Syllabus/Required Activity NICE National Initiative for Cyber Security Education http://crsc.nist.gov/nice/framework

OPERATE AND MAINTAIN SECURELY PROVISION PROTECT AND DEFEND OVERSIGHT AND DEVELOPMENT ANALYZE INVESTIGATE COLLECT AND OPERATE

SECURELY PROVISION Specialty areas responsible for conceptualizing, designing, and building secure information technology (IT) systems (i.e., responsible for some aspect of systems development). OPERATE AND MAINTAIN Specialty areas responsible for providing support, administration, and maintenance necessary to ensure effective and efficient information technology (IT) system performance and security.

PROTECT AND DEFEND Specialty areas responsible for identification, analysis, and mitigation of threats to internal information technology (IT) systems or networks. INVESTIGATE Specialty areas responsible for investigation of cyber events and/or crimes of information technology (IT) systems, networks, and digital evidence.

COLLECT AND OPERATE Specialty areas responsible for specialized denial and deception operations and collection of cybersecurity information that may be used to develop intelligence. ANALYZE Specialty areas responsible for highly specialized review and evaluation of incoming cybersecurity information to determine its usefulness for intelligence.

OVERSIGHT AND DEVELOPMENT Specialty areas providing leadership, management, direction, and/or development and advocacy so that individuals and organizations may effectively conduct cybersecurity work

CAE-IA/CD 2001/2004/2007/2012/2014-2021 CAE-R 2008/2014-2021 CAE-Cyber 2013-2018 Students and Faculty with clearances up to TS/SCI Cross-disciplinary; multi-college Builds on degree programs in College of Engineering and College of Business BBA Business Information Systems BS Computer Science, Computer Engineering, Electrical Engineering, Industrial Engineering, Software Engineering MS Computer Science, Electrical and Computer Engineering, Industrial Engineering MSIS Information Systems PhD Computer Science, Electrical and Computer Engineering, Industrial Engineering, Business Administration (Information Systems)

Dr. David Dampier Professor of Computer Science and Engineering Computer Security and Digital Forensics Director of DASI Dr. Drew Hamilton Professor of Computer Science and Engineering Computer Security and Digital Forensics Assoc. VP for Research Dr. Merrill Warkentin Professor of Management Information Systems Social Aspects of Security Dr. Yogi Dandass Associate Professor of Computer Science and Engineering FPGA Development and Supply Chain Security Dr. Tommy Morris Associate Professor of Electrical and Computer Engineering Electrical Grid and Control System Security Director of CIPC Dr. Mahalingam Ramkumar Associate Professor of Computer Science and Engineering Trustworthy Computing Dr. Rob Crossler Assistant Professor of Management Information Systems Data Security and Privacy Dr. Wes McGrew Assistant Research Professor of Computer Science and Engineering Control Systems Human Machine Interface Security and Malware Reverse Engineering

BIS 4113/6113: BIS Security Policy Constructing and maintaining security policies for organizations CSE 4243/6243: Information and Computing Security Introductory class with weekly lab exercises, final exercise is Capture the Flag exercise. Cross-listed as ECE 4763/6763 CSE 4273/6273: Computer Crime and Digital Forensics Practical training in investigative techniques with lab, semester long practical exercise, final exercise is Mock Trial CSE 4363/6363: Reverse Engineering of Malware Practical training in malware reverse engineering, semester long practical exercise CSE 4383/6383: Cryptography and Network Security Programming assignments CSE/ECE 8990: Full Graduate Level Special topics classes in current security research

Advanced Digital Forensics - CSE Advanced Topics in Network Security - CSE Computer Security Research Seminar (INSURE) - ECE Cyber Physical System Security - ECE Information Security Research Design - MIS Internet Security Protocols - CSE Process Control System Security - ECE Security in the Cloud - CSE Security in Cooperative Systems - CSE Software Security -CSE Trustworthy Computing -CSE

Dr. David A. Dampier Professor of Computer Science and Engineering Director, Distributed Analytics & Security Institute dad6@msstate.edu