CAE Program Updates and Support



Similar documents
Goal. Vision. CAE 2Y Program Eligibility and Summary

Sabbatical Leave Application

Goal. Vision. CAE IA/CD Program Eligibility and Summary

2015 Webinar Series: NCL for the Classroom

Protecting Energy s Infrastructure and Beyond: Cybersecurity for the Smart Grid

Cyber Security at NSU

Certifications and Standards in Academia. Dr. Jane LeClair, Chief Operating Officer National Cybersecurity Institute

In Response to Section 942 of the National Defense Authorization Act for Fiscal Year 2014 (Public Law ) Terry Halvorsen DoD CIO

Meeting the CAE IA/CD Knowledge Units Requirements for the Polytechnic University of Puerto Rico

Cybersecurity: A Shared Responsibility and Department of Homeland Security Priority

NSA/DHS Centers of Academic Excellence for Information Assurance/Cyber Defense

LESLIE A. CUMMINGS 654 Golden Eagle Circle Jasper, AL Cell: (205) Home: (205)

Cybersecurity High School and Beyond

Toward Curricular Guidance in the Cyber Sciences

NATIONAL INITIATIVE FOR CYBERSECURITY EDUCATION SAN DIEGO, CA

Cybersecurity Definitions and Academic Landscape

Engineering Masters Program Requirements

NSA/DHS National Centers of Academic Excellence in Information Assurance/Cyber Defense 2014 List of Knowledge Units and Focus Areas

Program Contact Information (name, title, telephone number, and address)

Traditional courses are taught primarily face to face.

UNM Information Assurance Scholarship for Service (SFS) Program

Department of Bioinformatics and Computational Biology College of Science Student Handbook

2015 Cybersecurity Awareness

Your Archiving Service

Online Learning Policies & Procedures. La Roche College

Corning Community College ACE Continuing Education Grant. All Requests

Becoming a Cyber Professional: A Discussion with Recent Graduates

Request for Proposal ecampus Technology Equipment Program

Department of Defense Information Assurance Scholarship Program. Sponsored by the. DoD Chief Information Officer

Ernest F. Hollings Undergraduate Scholarship Program 2016 Online Application Instructions

Whither SFS?: Cybersecurity SFS Workforce Development Workshop Report

Preparing Healthcare Providers for Today s Complex Healthcare System: A Community College Perspective

UW-Madison School of Nursing Assessment Report Please see attached assessment plan for the UW-Madison School of Nursing.

Master of Cyber Security

Distance Learning Faculty Handbook

The priority deadline to submit your Fall 2016 LL.M. application to the University of San Francisco School of Law is February 16, 2016.

1 P a g e. Art Institute Regionally Accredited Schools Transfer Credit Policy - June The Policy: TRANSFER OF CREDIT

Table of Contents TCC Online Learning Department - Guidelines for Online Courses... 3

Guidelines for the Development of Certificate Programs University of Nebraska at Kearney

Online Program. An academic program that contains only online courses.

Agriculture Business Risk Management Fact Sheet *please refer to the website, for the most up to date information

Online Student Orientation Master of Science in Entrepreneurship in Applied Technologies USF INNOVATIVE EDUCATION

Karen L. Hays 428 Capstan Court Arnold, MD Office: ( ) Cell: ( )


Cybersecurity Workforce Training Partnership

MPH PROGRAM. Area of focus: Community Health Education ADMISSIONS INFORMATION PACKET. Fall 2009

National Chiao Tung University Department of Mechanical Engineering Doctoral Program Regulations

UTSA Computer Science MS Degree Program

ONLINE MASTER OF SCIENCE IN MANAGEMENT INFORMATION SYSTEMS

National Science Foundation Funding Opportunities for Cybersecurity Education and Workforce Development

Centers of Academic Excellence in Cyber Security (CAE-C) Knowledge Units Review

MARYLAND. Cyber Security White Paper. Defining the Role of State Government to Secure Maryland s Cyber Infrastructure.

MFT Program - University of Nevada, Las Vegas Criteria Data Disclosure

Distance Learning Programs

Handbook of Policies, Procedures, and Requirements for the Masters Degree in Instructional Systems

ADGR and ADCO / Public Relations 4 Credits; Fall, 2015

What is the Green Chemistry Commitment?

Earth Science 102 Introduction to Physical Geology Fall 2015 Online

Connect Math Hosted by Aleks. Training Guide

Heating, Refrigeration and Air Conditioning Technology Program Review/Planning Document May 6th, Section 1.

The Communications Handbook

CENTER FOR TEACHING EXCELLENCE

ADMISSIONS INFORMATION PACKET MASTERS OF HEALTH SERVICES ADMINISTRATION PROGRAM

Welcome to Cinema 105 online!

RESUME Dr. James Christopher Lefler 108 Frank Hilbert Road Jonesborough, TN

THE UNIVERSITY OF BRITISH COLUMBIA. O-4: Governance of the College of Graduate Studies

College of Engineering and Applied Science Department of Computer Science

ONLINE ONLINE. Master of Science in. Bachelor of Science in

254 South 300 East #101 Salt Lake City, Utah

Temple University - School of Pharmacy 425 Commerce Drive, Suite 175 Fort Washington, PA Phone: Fax:

CERTIFICATE IN BASIC PHARMACEUTICAL DEVELOPMENT Focusing on the Business of Pharmaceuticals

The director of alumni programs reports to the director of development. Responsibilities include the following:

Programme Review. Bachelor of Science (Honours) in Computing in Information Security and Digital Forensics BN120. Department of Informatics

MEMORANDUM OF UNDERSTANDING

STUDENT LEARNING ASSESSMENT REPORT MS Cybersecurity

Specialized Certificate in Healthcare Information Technology:

Transcription:

May 29, 2015 CAE Program Updates and Support National CyberWatch Center Prince George s Community College Room 129B 301 Largo Road Largo, MD 20774 www.nationalcyberwatch.org

2 Webinar Protocol :: Mute your phone/mic when not talking :: Questions during the webinar? :: Technical problems

3 About the 2015 Webinar Series :: Last Friday each month, 1 hour long, 11am ET :: Great topics :: Recorder & archived on National CyberWatch Center YouTube channel

4 CAE Program Updates and Support :: Produced May 29, 2015 :: 11am EST

5 Dr. Vera Zdravkovich Senior Advisor Past Director and PI of CyberWatch Championed the Center of Academic Excellence Two Year DesignaBon

6 Denisha Jackson CAE Program Manager, NSA

7 Professor Michael Burt NaBonal CyberWatch Program Manager Author of one of the first six CAE2Y proposals Author of the first CAE2Y re- designabon proposal

8 Professor Tony Coulson Director Cyber Security Center at Cal State San Bernardino Chair CAE Community Co-PI CyberWatch West Faculty Development

9 Important Facts CAE is an INSTITUTIONAL designation National Security Agency (NSA) and Department of Homeland Security (DHS) award the CAE designation CAE awarded ceremony held at a June event and at NICE Workshop in the fall CAE designation is awarded based on successful application

10 Why CAE? Internal Recognition and Support External Recognition and Support CAE program graduates have better job opportunities Collaboration and funding opportunities

11 CAE Program Criteria 0. LeMer of Intent 1. Program Outreach and Collaboration 2. Student Development/Student Curriculum Path and RecogniBon 3. IA/CD Center Establishment and Maintenance 4. IA/CD Multidisciplinary Efforts 5. PracBce of IA/CD at the InsBtuBon Level 6. IA/CD Faculty 7. KU Mapping * Please note: CAE2Y and CAE- CDE criteria varies slightly

12 Letter of Intent Institution must include an official letter stating the institution s intent to apply for CAE IA/CD designation Must be on official institution letterhead, signed by a collegiate official at an appropriate level (Dean or higher) To be uploaded to web application (hard copy should not be mailed)

13 Program Outreach and Collaboration Shared curriculum and faculty Articulation agreements with high schools and 4 year institutions Sponsorship/participation in cyber competitions Community outreach Providing cybersecurity practitioners to students

14 IA/CD Center Establishment and Maintenance Formal organization for use as a resource for faculty and students (does not have to be a physical space) Center website should be operational, dynamic and current: contains up-to-date links to key IA/CD resources such as other academic institutions, government sites, conferences, workshops, IA/CD news, center POCs, IA/CD courses, etc. Website must be easy to find and easily accessible

15 Student Development/Student Curriculum Path and Recognition Hands-on labs IA/Cybersecurity degrees/areas of study/track or certificates available to students Certificate for students to recognize completion of a KU mapped and CAE approved program Must demonstrate that courses used to map to KUs are within a path that students can take towards degree/ certificate; Path must be attainable

16 IA/CD Multidisciplinary Efforts Internal dissemination of cybersecurity Review other department programs for the integration of cybersecurity Presentation to disciplinary groups of faculty on infusion of cybersecurity Development of cybersecurity modules for other disciplines

17 Practice of IA/CD at the Institution Level Review and describe the institutional policies for IA/ CD applications and practices Discuss practices with the CTO for additional information

18 IA/CD Faculty Identify all full-time and adjunct faculty teaching in the program Describe credentials and experience of the IA/CD faculty Describe internal and external professional development opportunities for these faculty Describe planned future developments

19 Mapping to Knowledge Units (KUs) 70 Knowledge Units KUs - targeted technology areas composed of Topics and expected Outcomes 3 KU categories: Core, Mandatory, and OpBonal

20 KU Breakdown and Minimum Requirements Core 2Y: 11 Mandatory KUs 2 year insbtubons must map to all 11 Core 4Y: 6 AddiBonal Mandatory KUs 4 year insbtubons must map to the 11 Mandatory Core 2Y KUs Plus map addibonal 6 KUs OpBonal KUs: 51 ElecBve KUs 4 year insbtubons must select 5 Summary of Minimums: 2Y 11 KUs; 4Y 22 KUs

21 Mapping Resources KUs - Download reference materials: www.iad.gov/nietp/caerequirements.cfm NaBonal CyberWatch Mapping Guide: hmps://scout.wisc.edu/cyberwatch/r131 Content experts: Faculty who teach topics Course materials: Syllabi, detailed course outlines, textbooks, lab exercises, handouts.

22 Sample Mapping Resource Syllabus Course ObjecAves: Describe gaining confidenbal informabon or unauthorized access through human intelligence (i.e. social engineering) Discuss counter measures to social engineering (training and educabon of users, administrators and personnel) Describe fishing Define organizabonal policies and procedures Describe security policies (guidance provided by security policies, points of contact, roles and responsibilibes, enterprise, issue specific, and system specific security policies) Describe AIS and telecommunicabons systems policies (points of contact, references) Explain change management Explain classificabon of informabon Describe documentabon, logs, and journals Explain acceptable use of resources, internet usage policy, and e- mail usage policy Discuss due care, due diligence, and due process Describe separabon of dubes, need to know and least privilege Discuss transportabon of media Explain monitoring of cribcal areas, communicabons centers, informabon systems centers (IT/data centers), protected distributed systems, stand- alone systems, peripherals, storage areas Describe Policies and Procedures for computers and users

KU Mapping Matrix Main Screen 23

24 Mapping SuggesAons Enlist mulbple content experts, even for same KU Use textbook TOC and detailed course outlines that contain Topic descripbons in creabng your Master Syllabi (a well developed Master Syllabus will make your like so much easier during the mapping process) Specify clear tesbng (grading) of Outcomes expectabons Map fewest number of courses required to sabsfy KU Consolidate individual KU mapping sheets into a single document to facilitate data entry into NSA/DHS applicabon database

25 Application Deadlines The website application is closed The website application re-opens around July 1, 2015 Deadline, August 1, 2015 for NICE designation in November 2015 Deadline January 15, 2016 for designation in June 2016

26 Next Step Data Entry Go to NIETP - www.iad.gov/nietp/ Login Select (or apply for admission to) insbtubon Ø First Bme: Specify insbtubon informabon Add new or Edit existing course

NIETP Welcome Screen 27

NIETP Login 28

Add or Edit Course 29

Course Topic and ObjecAve 30

31 CAE Resources Resources such as mapping consultabon, KU Mapping Guide, sample applicabons, and personal assistance is listed on these websites: NSA website: www.iad.gov/nietp/caerequirements.cfm NaBonal CyberWatch Center website: www.nabonalcyberwatch.org CyberWatch West website: www.cyberwatchwest.org CAE website: www.caecommunity.org Email: askcaeiae@nsa.gov AddiBonal QuesBons: info@nabonalcyberwatch.org

32 UPCOMING EVENTS The Colloquium for Information Systems Security Education (CISSE) Annual Conference, June 14-17, 2015, JW Marriott Las Vegas Resort and Spa, Las Vegas, Nevada 2015 Community College Cyber Summit (3CS), June 17-19, 2015, Las Vegas, Nevada (same location as CISSE) National Initiative for Cybersecurity Education (NICE) 3-4 November 2015, San Diego, CA

33 Next Webinar :: August 28, 11am EDT :: Q&A with Advanced Cyberforensics Education (ACE) consortium

Thank You! 34