CYBERSECURITY CERTIFICATION PROGRAMS



Similar documents
UNM Information Assurance Scholarship for Service (SFS) Program

Wyoming Community College Commission Request for New, Pilot or Revised Degree or Certificate Program

::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::: Trends

Introduction to Cybersecurity Overview. October 2014

Cybersecurity Guidance for Industrial Automation in Oil and Gas Applications

PRESENTATION TO THE UNIVERSITY SYSTEM OF MARYLAND S BOARD OF REGENTS

Critical Infrastructure Cybersecurity Framework. Overview and Status. Executive Order Improving Critical Infrastructure Cybersecurity

Thank you for your very kind introduction.

OVERVIEW DEGREES & CERTIFICATES

Cybersecurity in the Utilities Sector Best Practices and Implementation 2014 Canadian Utilities IT & Telecom Conference September 24, 2014

NIST Cybersecurity Framework. ARC World Industry Forum 2014

Dr. Starnes E. Walker Founding Director, Cybersecurity Initiative (302)

Cybersecurity Framework: Current Status and Next Steps

Written Testimony. Dr. Andy Ozment. Assistant Secretary for Cybersecurity and Communications. U.S. Department of Homeland Security.

National Initiative for Cyber Security Education

Executive Order 13636: The Healthcare Sector and the Cybersecurity Framework. September 23, 2014

[STAFF WORKING DRAFT]

Cybersecurity: Legislation, Hearings, and Executive Branch Documents

UTCS CyberSecurity. Educating Cyber Professionals. Dr. Bill Young Department of Computer Sciences University of Texas at Austin. Spring Semester, 2015

Framework for Improving Critical Infrastructure Cybersecurity

Cybersecurity AAS Program

Jane A. LeClair, Ed.D Chapelhill Drive Victor, NY

Cybersecurity Audit Why are we still Vulnerable? November 30, 2015

Hosted by Lunarline: School of Cyber Security

MASTER OF PROFESSIONAL STUDIES

OUTLINE FOR AN INTERDISCPLINARY CERTIFICATE PROGRAM

Billing Code: 3510-EA

Update on U.S. Critical Infrastructure and Cybersecurity Initiatives

Thomas J. Schlagel Chief Information Officer, BNL

Delving Into FCC's 'Damn Important' Cybersecurity Report

Protecting Energy s Infrastructure and Beyond: Cybersecurity for the Smart Grid

How to use the National Cybersecurity Workforce Framework. Your Implementation Guide

SECTION-BY-SECTION. Section 1. Short Title. The short title of the bill is the Cybersecurity Act of 2012.

IT Security Training. Why Security Certification? A Serious Business - Fear Drives the Demand High Demand Freedom to Make and Break Rules

Your Career Direction

STUDENT LEARNING ASSESSMENT REPORT MS Cybersecurity

CLIENT UPDATE CRITICAL INFRASTRUCTURE CYBERSECURITY: U.S. GOVERNMENT RESPONSE AND IMPLICATIONS

An Overview of Large US Military Cybersecurity Organizations

Becoming a Cyber Professional: A Discussion with Recent Graduates

Fast Facts About The Cyber Security Job Market

How To Write A National Cybersecurity Act

GAO CYBERSECURITY HUMAN CAPITAL. Initiatives Need Better Planning and Coordination

WILLIAM OETTINGER PHONE (702)

U. S. Attorney Office Northern District of Texas March 2013

Cybersecurity: Authoritative Reports and Resources

September 24, Mr. Hogan and Ms. Newton:

The War on Terror in Classrooms and Clinics: An Inventory

How To Write A Cybersecurity Framework

Cyberterror. Cyberspace computer-mediated communication systems has become a battleground between states and terrorists, and among nation states.

University of Maryland University College. American Military University. Henley-Putnam University

S. ll IN THE SENATE OF THE UNITED STATES

Strategic Progress Update July 2014 March 2015

How To Understand And Manage Cybersecurity Risk

of Highly Effective Security Professionals By Sondra Schneider CEO Security University

Servicemembers Opportunity Colleges (SOC)

NEW GRADUATE DEGREE PRELIMINARY REVIEW AND PROPOSAL OUTLINE

Computer Science at James Madison University

How To Protect Yourself From Cyber Crime

National Cyber Security Awareness Month. Week Five: Building the Next Generation of Cyber Professionals

NGA Paper. Act and Adjust: A Call to Action for Governors. for cybersecurity;

An Accelerated Pathway to Careers in Cybersecurity for Transitioning Veterans. NICE Annual Conference November 2015

Information Systems Technology & Cybersecurity Programs

C ETS C/ETS: CYBER INTELLIGENCE + ENTERPRISE SOLUTIONS CSCSS / ENTERPRISE TECHNOLOGY + SECURITY

Homeland Security Major

ONLINE MASTER OF BUSINESS ADMINISTRATION. Open for Business. Designed for You.

Homeland Open Security Technology HOST Program

National and Transnational Security Implications of Big Data in the Life Sciences

Servicemembers Opportunity Colleges (SOC)

Cybersecurity Framework. Executive Order Improving Critical Infrastructure Cybersecurity

Preparing Millennials to Lead in Cyberspace

Middle Class Economics: Cybersecurity Updated August 7, 2015

Los Angeles and Orange Counties CENTER OF EXCELLENCE Los Angeles and Orange Counties E N V I R O N M E N T A L S C A N

The Senior Executive s Role in Cybersecurity. By: Andrew Serwin and Ron Plesco.

Transcription:

CYBERSECURITY CERTIFICATION PROGRAMS

Workforce Training Need 30% more computer and network workers needed from 2008 to 2018 1 ; 433 New Mexico IT job postings in 2012 for securityspecific positions 2 ; 110,000 information assurance professionals in assigned positions to have security certification within the next five years 3 ; 400,000 full and part-time military service members, and contractors who are performing information assurance functions must be certified in security 3 ;

Workforce Training Need (cont) Executive Order -- Improving Critical Infrastructure Cybersecurity The national and economic security of the United States depends on the reliable functioning of the Nation's critical infrastructure in the face of such threats. It is the policy of the United States to enhance the security and resilience of the Nation's critical infrastructure and to maintain a cyber environment that encourages efficiency, innovation, and economic prosperity while promoting safety, security, business confidentiality, privacy, and civil liberties. 4

The need for quality cybersecurity training is expected to dramatically increase within the year Headlines from the past 24hr (6/4/13): Obama to press China's Xi to act against cyber spying New Chinese hacker group targets governments and nuclear facilities NATO takes up cyber-defense as threat grows VA Systems Hacked From Abroad-At Least 8 Nation-States Said to Be Behind Attacks US, China to talk cyber security on West Coast NATO boosts cyber defenses but members differ on its role

Cybersecurity Certificate Development Initially designed by Stephen Miller in accordance with American Computing Machines (ACM) and CompTIA Security+ recommendations; Approved by the ENMU Regents and submitted to the New Mexico Higher Education Department 12/9/2010; While attending the Washington, D.C. NSI Impact Conference in April, 2011, military and Homeland Security personnel recommended INFOSEC certification for the Ruidoso program;

Cybersecurity Certificate Development (cont) Curriculum was re-written to INFOSEC standards and the application was submitted December, 2011; Awarded NSF INFOSEC 4011 & 4016 January, 2012. Ruidoso is the only INFOSEC certified Community College in NM and one of 14 in the nation; Signed articulation agreement with NM Tech in February, 2013, accepting Ruidoso IS courses as meeting BS degree requirements; 14 graduates as of May, 2013 including one dual credit student;

Cybersecurity Program Characteristics All 19 credit hours of college coursework and the selfpaced community education versions are available entirely online; Self-paced certification program is tailored for active military, returning veterans, and current IT professionals; Programs qualify for federal, VA, VA Spousal, and WIA funding;

Cybersecurity Program Characteristics (cont) Courses are taught by full- and part time, highly qualified professors; The certificate has been adopted by Santa Fe Community College and ENMU-Roswell and will appear in their course catalogs. It is coming soon to CNM, UNM-Taos, UNM- Los Alamos, and UNM-Valencia. Adoption is made possible by SUN Online. Cyber Ninja's

Delivery Methodology Beginning this year, the ENMU-Ruidoso Cybersecurity courses will be shared with community colleges throughout New Mexico via SUN Online

Delivery Methodology (cont) SUN Online is a post-secondary online course sharing system that has been initiated by a consortium of New Mexico public community colleges and universities; Promotes cooperation rather than competition; Reduces program duplication; Increases access to unique programs such as the Cybersecurity Certificate; Promotes increased quality of online instruction in New Mexico; Can be used to share online courses, certifications, and degrees from any discipline;

References: 1 The US Bureau of Labor Statistics, Office of Occupational Statistics and Employment Projections 2 NM Workforce, CNM researcher Brittnay Esswein, EMSI database systems and WFS 3 Department of Defense, Directive 8570 4 http://www.whitehouse.gov/the-pressoffice/2013/02/12/executive-order-improving-criticalinfrastructure-cybersecurity