Cloud Mobile Computing. Ed Crowley

Similar documents
167 th Air Wing Fast Track Cyber Security Blue Ridge Community and Technical College

167 th Air Wing Fast Track Cyber Program Blue Ridge Community and Technical College

FedVTE Training Catalog SPRING advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov

Field of Study Area of Expertise Certification Vendor Course

FedVTE Training Catalog SUMMER advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov

Certified Digital Forensics Examiner

Principles of Information Assurance Syllabus

Syllabus: TB143 Introduction to Personal Computers

Curriculum Vitae -Joel H. Bush

All about CPEs. David Gittens CISA CISM CISSP CRISC HISP

CURRICULUM VITAE. David T. Gallant (USAF Retired) President, Gallant Computer Investigative Services, LLC

Cybersecurity Workforce Training Partnership

RARITAN VALLEY COMMUNITY COLLEGE COURSE OUTLINE. CISY 229 Information Security Fundamentals

CURRICULUM VITAE JAMES R. SWAUGER Digital Forensic Examiner

EC-Council Ethical Hacking and Countermeasures

JAMES R. SWAUGER Digital Forensic Examiner

capabilities statement

Shon Harris s Newly Updated CISSP Materials

APPLICATION FOR BOARD APPROVAL. of Locally Developed Course. MCP CERTIFICATION 11/12a/12b/12c

Page 1 of 5 Position Code #P Forensic Identification - Technological Crimes Unit ASSOCIATION: Civilian LOCATION: Headquarters

Syllabus CIS 3630: Management Information Systems Spring 2009

Cybersecurity Certificate Programs

CERTIFIED DIGITAL FORENSICS EXAMINER

WILLIAM OETTINGER PHONE (702)

Course Title: ITAP 3471: Web Server Management

Learning Tree Training Pre-approved Training for Continuing Education Units (CEUs)

Doctor of Philosophy in Business Administration - Computer & Information Security, 2014 North Central University, Prescott Valley, Arizona

University of Central Oklahoma Spring 2012 Undergraduate Course Syllabus. "Transforming Academic Excellence into Professional Competence"

Unit 3 Cyber security

IT Security Training. Why Security Certification? A Serious Business - Fear Drives the Demand High Demand Freedom to Make and Break Rules

CCA CYBER SECURITY TRACK

A UNIVERSAL MACHINE FOR THE INDUSTRIAL INTERNET OF THINGS. MultiConnect Conduit

Computer Virtualization (ITNW 1313) Credit: 3 semester credit hours (2 hours lecture, 4 hours lab) Prerequisite/Co-requisite: None

CYBER FORENSICS (W/LAB) Course Syllabus

TTS EXPLORE. Fall 2014 Course Schedule. Technology Training Solutions (TTS) IT Certifications. Mobile Apps. Webmaster. Software Social Media

HARFORD COMMUNITY COLLEGE 401 Thomas Run Road Bel Air, MD Course Outline

IT Networking and Security

Security Transcends Technology

COURSE SYLLABUS BMIS 342 CYBER SECURITY

A three step plan for migrating to Microsoft Exchange 2010

Your complete guide to Cloud Computing

CRN# CPET Cloud Computing: Technologies & Enterprise IT Strategies

MIS 7381 Syllabus_Spring 2016_Cooper.doc 1 02/08/16 2:44 PM

Certification and Training

Security Certifications. A Short Survey. Welcome. Stan Reichardt stan2007@sluug.org

CAST CENTER FOR ADVANCED SECURITY TRAINING. CAST618 Designing and Implementing Cloud Security CAST

Montgomery County Community College Non-Credit Programs Winter/Spring 2016 TECHNOLOGY PROGRAMS

Technology Approved Certifications

CJ 4480 Digital Forensics II Syllabus - Term

OCR LEVEL 2 CAMBRIDGE TECHNICAL

Access FedVTE online at: fedvte.usalearning.gov

Table of Contents. Introduction. Audience. At Course Completion

Introduction to Cyber Security / Information Security

IT Networking and Security

Information Technology Cluster

SENIOR SYSTEMS ANALYST

GREAT PLAINS TECHNOLOGY CENTER COURSE OF STUDY. Adult Students: 1050 Hours

Hosted by Lunarline: School of Cyber Security

CJ 4488, 4489, 4490 Lee Page 1

Cloud Computing TODAY S TOPICS WHAT IS CLOUD COMPUTING? ICAC Webinar Cloud Computing September 4, What Cloud Computing is and How it Works

How To Get An Individualized Technical Studies Associate Degree At Northcentral Technical College

Apply today: strayer.edu/apply SCHOOL OF INFORMATION SYSTEMS AND TECHNOLOGY MASTER OF SCIENCE IN INFORMATION SYSTEMS RECOGNIZED MARKETABLE FLEXIBLE

MIS 426: Management Information Systems

(BDT) BDT/POL/CYB/Circular

CSTA- Oracle Academy 2014 U.S. High School CS Survey: The State of Computer Science in U.S. High Schools: an Administrator s Perspective.

EDUCATION FOR THE FUTURE.

High School Articulation Requirements Guide

Implementing Multi-factor Authentication for Clinical Applications

Information Security Specialist Training on the Basis of ISO/IEC 27002

Articulation Course Guide and High School Teacher Requirements

LIS 638: Internet Technologies and Information Services Spring 2015 (January 14 to May 1)

Security+ Certification Course

SYLLABUS CIS 3660: OBJECT-ORIENTED SYSTEM ANALYSIS AND DESIGN SPRING 2010

COURSE SYLLABUS DESIGNING WEB PAGES COP3835-RVC-1121 GENERAL INFORMATION IMPORTANT INFORMATION PROFESSOR INFORMATION

Bellevue University Cybersecurity Programs & Courses

Security + Certification (ITSY 1076) Syllabus

PC/Network Technician Certification Program: CompTIA A+, Microsoft MTA: OS Essentials, CWTS Wireless Certifications

City Tech Instructional Technology & Media Services. Blackboard Tutorial for Students

Gulf Coast Service Center

Curriculum Committee Meeting Approved March 20, 2014

Department of Computer & Information Sciences. INFO-450: Information Systems Security Syllabus

Transcription:

Cloud Mobile Computing Ed Crowley

Tonight s Topics Communicate class expectations Distribute syllabus Identify Texts Communicate Grading Criteria Discuss online support materials Project on Host Gator or your personal Sites

Selected Qualifications Certified Ethical Hacker EcCouncil AccessData Certified Examiner AccessData Forensic Tool Kit (FTK) Certified Information Systems Security Professional (CISSP) ISC 2 Security +, Internet +, Network + -- CompTIA Microsoft and Novell Certifications Graduate: US Army Military Police Academy USARPAC Basic Sentry Dog School 3

Academic Background Established and Directed, Academic Computing Department, at Daytona State College (DBCC) Assistant Director/Net Admin, Galveston College Researcher, Academic Computing, Southern Illinois University Adjunct Instructor Daytona Beach Community College, Daytona, FL Lake Michigan College, Benton Harbor, MI Galveston College, Galveston College

At Heathkit, I wrote the operations manual for their first IBM PC compatible. Also published a computer graphic tutorial, an AutoCad tutorial, and an CAD/CAM textbook. More significantly, I was exposed to the Heathkit philosophy. Make Magazine, talking about what Steve Jobs learnd from HeathKit: The kits taught Steve Jobs that products were manifestations of human ingenuity, not magical objects dropped from the sky, Jobs was quoted as saying It gave a tremendous level of selfconfidence, that through exploration and learning one could understand seemingly very complex things in one s environment.

CIS 4397 Overview As defined by the Mobile Cloud Computing (MCC) forum, MCC [1]: at its simplest, refers to an infrastructure where both the data storage and data processing happen outside of the mobile device. Mobile cloud applications move the computing power and data storage away from mobile phones and into the cloud, bringing applications and MC to not just smartphone users but a much broader range of mobile subscribers. This class provides an introduction to mobile cloud computing. Specific interest areas include cloud and mobile architectures, platforms, and applications. Class scope includes cloud services, mobile devices, related operating systems, and the mobile Internet. Each student will complete an online mobile computing project.

Class Objectives At the end of this course, you will be able to: List and explain common cloud computing terms. Articulate how hardware independence, virtualization, clustering, networking and data centers relate to cloud computing Compare and contrast different cloud architecture, models, and services. Explain how cloud computing can provide business value Compare and contrast different cellular technologies Compare and contrast RF principles and their functionality Explain disaster recovery principles and how they affect mobile devices List, compare and contrast common network ports used for network devices Compare and contrast mobility solutions to enterprise requirements Identify various encryption methods for securing mobile environments. Explain risks, threats and mitigation strategies affecting the mobile ecosystem Demonstrate familiarity with HTML5, CSS, JQUERY, and related mobile web technologies.

Class Texts Bobby Rogers, CompTIA Mobility+ Certification, McGraw Hill Education, 2014, ISBN 978-0-07-182522-1 Nate Stammer and Scott Wilson, CompTIA Cloud+ Certification, McGraw Hill, 2014, ISBN 978-0-07-182818-5

Class Support Site http://cis3347.chibana500.com/ http://forum14.chibana500.com/viewforum.php? f=3

Syllabus and Schedule Review

Assignments

Questions?

Informal Survey Do you, or have you, worked in IT? Explain Briefly describe your class goal. IT certifications? Background with IT, computers, and networks? Anything special that you would like to learn about?