Course Design Document. IS436: Data Security and Privacy. Version 1.0

Size: px
Start display at page:

Download "Course Design Document. IS436: Data Security and Privacy. Version 1.0"

Transcription

1 Course Design Document IS436: Data Security and Privacy Version July 2014

2 Table of Content 1 Versions History Overview of Data Security and Privacy Course Synopsis Prerequisites Objectives Basic Modules Instructional Staff Output and Assessment Summary... 4 Class participation (10%)... 5 Projects (50%)... 5 Final Exam (40%; open book) in week Grades release schedule Group Allocation for Assignments Classroom Planning Course schedule summary Weekly plan List of Information Resources and References Tooling Learning Outcomes, Achievement Methods and Assessment...13 Course: Security and Trust Page 2

3 1 Versions History Version Description of Changes Author Date V 1.0 ingjiu Li Overview of Data Security and Privacy Course 2.1 Synopsis This course introduces undergraduate students to fundamental access control techniques that are essential to ensure data security and privacy. The focus of this course is on (A) access control on mobile platforms, and (B) access control on cloud. The topics to be covered in the area of access control on mobile platforms include mobile platform security model, Android overview, SELinux, and SEAndroid. The topics to be covered in the area of access control on cloud include an overview from PKI to ABE, math foundation and IBE, fuzzy IBE, KP- ABE, and CP-ABE. 2.2 Prerequisites Students should have a good grasp of the fundamentals of information security and privacy (e.g., IS302 Information Security and Trust or equivalent). In addition, students should have basic knowledge about algebra. 2.3 Objectives Upon finishing the course, students are expected to: Understand basic security models, policy language, policy configuration and policy application on SELinux and SEAndroid. Know how to customize security policies on Android so as to address common security problems on mobile platforms. Understand basic encryption techniques for protecting data on the cloud and enabling flexible access to the protected data. Be exposed to emerging and new topics in data security and privacy. Course: Security and Trust Page 3

4 2.4 Basic Modules Data security & privacy on mobile platforms (6 weeks) Mobile platform security model and Android overview (1 week) SELinux (3 weeks) Project 1 presentation (1 week) SEAndroid (1 week) Overview from PKI to ABE (1 week) Math foundatio n and IBE (1 week) Data security & privacy on cloud (6 weeks) Fuzzy IBE/Thres hold ABE (1 week) Project 2 presentation (1 week) KP ABE (1 week) CP ABE (1 week) 2.5 Instructional Staff Professor: ingjiu Li Instructional staff: TBD Teaching assistants: TBD 3 Output and Assessment Summary Week Date Output Weighting Group Remarks Assessments in % Weighting 1 project groups Project 1 25% (report 15%, presentatio Mobile security model and Android overview 2 n 10%) SELinux 3 SELinux 4 Project 2 SELinux 5 25% (report SEAndroid 6 15%, Overview from presentatio PKI to ABE 7 n 10%) Math and IBE Course: Security and Trust Page 4

5 8 (Recess) Final exam Work on project % Fuzzy IBE 10 KP-ABE 11 Class CP-ABE 12 Project 1 10 participatio Work on project presentation n 10% 2 13 Project 2 Presentation 10 Work on project reports 14 Project reports (Review) 15 Final exam % Total Class participation (10%) Evaluated by the lecturers based on students attendance and participation in classroom discussions Projects (50%) There are two group projects with each project 25% Teaming: each team consists of 2-3 members. References: course material and internet Grading: 25% Presentation15% Presentation organization 5% Technical description 5% Q&A 5% Project report 10% Breadth 5% Depth 5% The first group project is on SEAndroid Identify certain problems on existing Android platforms Design and implement SEAndroid policies to address the problems Instructions for the first group project: Identify a security problem on existing Android platforms. The problem must make sense. Design and implement SEAndroid policies to address the problem, and show the effectiveness of the proposed policies (both analytically and through a demo). Course: Security and Trust Page 5

6 Project presentation will be graded on (a) presentation organization, (b) technical description, and (c) questions and answers. The project report will be graded on (a) breadth/completeness (addressing all relevant issues), and (b) depth (providing in-depth analysis with technical details). The second group project is on encryption of data on cloud Identify a specific topic related to IBE, Fuzzy IBE, KP-ABE or CP- ABE Survey the recent advancements on the topic and discuss their applications Instructions for the second project: Read at least 2 published papers on the selected topic. Write a survey paper that covers the following: Introduction: motivation, application domain, problem definition Summaries of the techniques developed in each paper, clearly highlighting the strengths and weaknesses of each A taxonomy of the various techniques if possible Discussion on the applications of the techniques developed in each paper Project presentation will be graded on (a) presentation organization, (b) technical description, and (c) questions and answers. The report will be graded on (a) understanding of the chosen papers, and (b) critique of the papers. The presentations of project 1 are scheduled in week 12, and the presentations of project 2 are scheduled in week 13. The final reports are due on in week 14. Final Exam (40%; open book) in week 15 Cover all material taught in class Short answer questions Grades release schedule Participation Final exam Group projects at the end of term at the end of term at the end of term 4 Group Allocation for Assignments Course: Security and Trust Page 6

7 Each class is partitioned into multiple teams for project. Each team should consist of 2 or 3 members. The students may form their own teams or select teams randomly. 5 Classroom Planning Teaching session: 3 hours Review: 15 minutes Motivation: 30 minutes Security problems Motivating examples Technical solutions: 2 hours Settings and steps Discussions Summary: 15 minutes Note Learning Learning Learning effect 5.1 Course schedule summary Wk Topic (problem) Classroom: techniques (1.5 hours) 1 Overview Mobile platform security model and Android overview 2 SELinux (model) From DAC to MAC, SELinux architecture, security model After-class reading and exercise Group formation Work on project 1 3 SELinux (language) SELinux policy language Work on project 1 4 SELinux (application) SELinux policy application, configuration, customization 5 SEAndroid Challenges, implementation, and case analysis 6 Overview from Introduction to PKI, IBE, Fuzzy PKI to ABE IBE, KP-ABE, and CP-ABE Work on project 1 Work on project 1 Work on project 2 7 Math foundation and IBE Abstract algebra, bilinear maps, IBE setup, IBE encryption, IBE decryption Work on project 2 8 Recess No class Work on project 1 Course: Security and Trust Page 7

8 9 Fuzzy IBE/Threshold ABE Fuzzy IBE/threshold ABE setup, encryption, decryption, and application 10 KP-ABE KP-ABE setup, encryption, decryption, and application Work on project 2 Work on project 2 11 CP-ABE CP-ABE setup, encryption, Work on project 2 decryption, and application 12 Project 1 Presentations of all groups Work on project 2 presentation 13 Project 2 presentation Presentations of all groups Work on project reports 14 Review No class Review, Q&A 15 Final exam Final exam (open book) 5.2 Weekly plan Week: 1 Introduction to the course Mobile platform security model Android overview Project 1 and project team formation Asokan, et al.: Mobile Platform Security, Morgan & Claypool, Course material is available for download from the course web site Students form teams for projects Week: 2 Access control models: from DAC to MAC Linux architecture and security model Linux policy language: TE statements Stephen Smalley: Configuring the SELinux Policy, NSA Technical Report, Clarify the advantages and disadvantages of different security models Students know how to explain and compose TE statements in SELinux Week: 3 Course: Security and Trust Page 8

9 SELinux policy language: TE statements RBAC statements User declaration, constraint definition Security context specifications, file contexts configuration Stephen Smalley: Configuring the SELinux Policy, NSA Technical Report, 2005 Students know how to explain and compose SELinux policy Week: 4 Applying security policy Configuration files for security-aware apps Customizing policy Meeting security objectives Stephen Smalley: Configuring the SELinux Policy, NSA Technical Report, 2005 Students understand how to apply, configure, and customize SELinux security policy Students know how to design security policies to meet security objectives Week: 5 Challenges of using SELinux in Android SEAndroid implementation: Kernel support SEAndroid implementation: Userspace support SEAndroid implementation: policy configuration SEAndroid case analysis Stephen Smalley, Robert Craig: Security Enhanced (SE) Android: Bringing Flexible MAC to Android, NDSS Students understand the challenges of using SELinux in Android and know how to address the challenges in SEAndroid Students know how to implement SEAndroid Students understand how to use SEAndroid to achieve security objectives Week: 6 PKI issues Introduction to IBE Introduction to fuzzy IBE Introduction to ABE Project 2 Course: Security and Trust Page 9

10 Rong-Jaye Chen: Attribute-Based Encryption Understand the issues of PKI Know the basic ideas of IBE, fuzzy IBE, and ABE Week: 7 Abstract algebra: group, ring, field Bilinear maps IBE setup IBE encryption IBE decryption Sahai and Waters: IBE, Eurocrypt 2005 John Bethencourt: Intro to Bilinear Maps Understand the math foundations of abstract algebra and bilinear maps Understand the processes of IBE Week: 8 (Recess week: no class) Week: 9 Fuzzy IBE/threshold ABE motivation Fuzzy IBE setup, encryption, and decryption Security of fuzzy IBE Application of fuzzy IBE Understand the processes of fuzzy IBE Understand why fuzzy IBE is secure and how to apply it Week: 10 KP-ABE motivation KP-ABE setup KP-ABE encryption and decryption Course: Security and Trust Page 10

11 KP-ABE security and application Goyal, Pandey, Sahai, Waters: KP-ABE, CCS 2006 Understand the processes of KP-ABE Understand why KP-ABE is secure and how to apply it Week: 11 CP-ABE motivation CP-ABE setup CP-ABE encryption and decryption CP-ABE security and application Bethencourt, Sahai, Waters: CP-ABE, Oakland 2007 Understand the processes of CP-ABE Understand why CP-ABE is secure and how to apply it Week: 12 Presentation of project 1 Presentation of project 1 All groups present how to use SEAndroid to address security problems on Android platforms Week: 13 (project presentation and demo: teams 6-10) Presentation of project 2 Presentation of project 2 Be exposed to emerging and new topics in IBE, fuzzy IBE, KP-ABE and CP-ABE Week: 14 (review week: no class) Course: Security and Trust Page 11

12 Project report is due Week: 15 (exam week: no class) Final exam 6 List of Information Resources and References Asokan, et al.: Mobile Platform Security, Morgan & Claypool, Stephen Smalley: Configuring the SELinux Policy, NSA Technical Report, Peter Loscocco, Stephen Smalley: Meeting Critical Security Objectives with Security-Enhanced Linux, In proceedings of Ottawa Linux Symposium (2001) Stephen Smalley, Robert Craig: Security Enhanced (SE) Android: Bringing Flexible MAC to Android, NDSS Frank Mayer, Karl MacMillan, David Caplan: SELinux by Example, Prentice Hall, 2007 Rong-Jaye Chen: Attribute-Based Encryption Sahai and Waters: IBE, Eurocrypt 2005 John Bethencourt: Intro to Bilinear Maps Goyal, Pandey, Sahai, Waters: KP-ABE, CCS 2006 Bethencourt, Sahai, Waters: CP-ABE, Oakland 2007 Other reading material and reference websites are available in the course slides 7 Tooling Tool Description Remarks SEAndroid (include SEAndroid Emulator) A set of tools enabling the use of SELinux in Android Project 1 Course: Security and Trust Page 12

13 8 Learning Outcomes, Achievement Methods and Assessment 1 IS302 - Information Security and Trust Integration of business & technology in a sector context Course-specific core competencies which address the Outcomes Understand the advantages and disadvantages of different security models on mobile platforms and cloud Faculty Methods to Assess Outcomes Classroom interactions Grade and give feedback to group projects 1.1 Business IT value linkage skills Ability to understand & analyze the linkages between: a) Business strategy and business value creation b) Business strategy and information strategy c) Information strategy and technology strategy d) Business strategy and business processes e) Business processes or information strategy or technology strategy and IT solutions 1.2 Cost and benefits analysis skills Ability to understand and analyze: a) Costs and benefits analysis of the project 1.3 Business software solution impact analysis skills Be able to explain, configure, apply, customize, and compose security policies on SELinux and SEAndroid Design security policies to meet security objectives on mobile platforms Understand the processes of different encryption schemes on cloud Know how to choose appropriate encryption schemes in various cloud applications Course: Security and Trust Page 13

14 Ability to understand and analyze: a) How business software applications impact the enterprise within a particular industry sector. 2 IT architecture, design and development skills Identify the security requirements for mobile platforms and cloud applications Classroom interactions and projects 2.1 System requirements specification skills Design security policies to protect mobile platforms a) Elicit and understand functional requirements from customer b) Identify non functional requirements (performance, availability, reliability, security, usability etc ) c) Analyze and document business processes 2.2 Software and IT architecture analysis and design skills Choose appropriate encryption schemes to protect cloud data and enable flexible access control Analyze the security issues of mobile platforms and apply SEAndroid policy to address the security issues Analyze the security of different cloud encryption schemes Project 1 and project 2 a) Analyze functional and nonfunctional requirements to produce a system architecture that meets those requirements. b) Understand and apply process and methodology in building the application c) Create design models using known design principles (e.g. Choose and customize cloud encryption schemes in cloud applications Course: Security and Trust Page 14

15 layering) and from various view points (logical, physical etc ) d) Explain and justify all the design choices and tradeoffs done during the application's development 2.3 Implementation skills a) Realize coding from design and vice versa b) Learn / practice one programming language c) Integrate different applications (developed application, cots software, legacy application etc ) d) Use tools for testing, integration and deployment 2.4 Technology application skills a) Understand, select and use appropriate technology building blocks when developing an enterprise solution (security, middleware, network, IDE, ERP, CRM, SCM etc ) 3 Project management skills 3.1 Scope management skills a) Identify and manage trade-offs on scope/cost/quality/time b) Document and manage changing requirements 3.2 Risks management skills a) Identify, prioritize, mitigate and document project s risks b) Constantly monitor projects risks as part of project monitoring 3.3 Project integration and time management skills Use SEAndroid tools to design and implement security policies so as to meet specific security objectives Understand and know how to use Android security policy to meet security objectives, how to choose encryption schemes in cloud applications Project 1 Project 1 and project 2 Course: Security and Trust Page 15

16 a) Establish WBS, time & effort estimates, resource allocation, scheduling etc b) Practice in planning using methods and tools (Microsoft project, Gantt chart etc ) c) Develop / execute a project plan and maintain it 3.4 Configuration management skills a) Understand concepts of configuration mgt and change control 3.5 Quality management skills a) Understand the concepts of Quality Assurance and Quality control (Test plan, test cases ) 4 Learning to learn skills 4.1 Search skills a) Search for information efficiently and effectively 4.2 Skills for developing a methodology for learning a) Develop learning heuristics in order to acquire new knowledge skills (focus on HOW to learn versus WHAT to learn ). b) Abide by appropriate legal, professional and ethical practices for using and citing the intellectual property of others Identify a specific topic related to IBE, Fuzzy IBE, KP-ABE or CP-ABE; survey the recent advancements on the topic and discuss their applications Project 2 5 Collaboration (or team) skills: 5.1 Skills to improve the effectiveness of group processes Effectively communicate and resolve conflicts while working in a team Grade and give feedback to projects Course: Security and Trust Page 16

17 and work products Ability to develop: a) Leadership skills b) Communication skills c) Consensus and conflict resolution skills 6 7 Change management skills for enterprise systems 6.1 Skills to diagnose business changes a) Understand the organizational problem or need for change (e.g. Analyze existing business processes or as-is process ) 6.2 Skills to implement and sustain business changes a) implement the change (e.g. advertise / communicate the need for change etc..) and to sustain the change over time Skills for working across countries, cultures and borders 7.1 Cross-national awareness skills a) Develop cross-national understandings of culture, institutions (e.g. law), language etc 7.2 Business across countries facilitation skills a) Communicate across countries b) Adapt negotiation and conflict resolution techniques to a multicultural environment 8 Communication skills 8.1 Presentation skills Prepare and deliver effective Grade and give feedback Course: Security and Trust Page 17

18 a) Provide an effective and efficient presentation on a specified topic. 8.2 Writing skills a) Provide documentation understandable by users (Requirements specifications, risks management plan, assumptions, constraints, architecture choices, design choices etc ) presentations on two different projects. Write a survey report on the recent advancements of IBE, fuzzy IBE, KP-ABE, or CP-ABE. to projects Provide feedback and suggestions to students writings This sub-skill is covered partially by the course This sub-skill is a main focus for this course Course: Security and Trust Page 18

Course Design Document: IS202 Data Management. Version 4.5

Course Design Document: IS202 Data Management. Version 4.5 Course Design Document: IS202 Data Management Version 4.5 Friday, October 1, 2010 Table of Content 1. Versions History... 4 2. Overview of the Data Management... 5 3. Output and Assessment Summary... 6

More information

Course Design Document. IS410: Advanced Data Management. Version 5.1

Course Design Document. IS410: Advanced Data Management. Version 5.1 Course Design Document IS410: Advanced Data Management Version 5.1 07 December 2010 Table of Contents 1. Versions History 2. Overview of Advanced Data Management Course 2.1. Synopsis 2.2. Prerequisites

More information

Computer Networks IT321

Computer Networks IT321 Computer Networks IT321 CS Program 3 rd Year (2 nd Semester) Page 1 Assiut University Faculty of Computers & Information Computer Science Department Quality Assurance Unit Computer Networks Course Specifications

More information

Software Reliability and Reusability CS614

Software Reliability and Reusability CS614 Software Reliability and Reusability CS614 Assiut University Faculty of Computers & Information Quality Assurance Unit Software Reliability and Reusability Course Specifications2011-2012 Relevant program

More information

"Charting the Course... Certified Information Systems Auditor (CISA) Course Summary

Charting the Course... Certified Information Systems Auditor (CISA) Course Summary Course Summary Description In this course, you will perform evaluations of organizational policies, procedures, and processes to ensure that an organization's information systems align with overall business

More information

Certified Manager Certification

Certified Manager Certification Certified Manager Certification Get Trained Get Certified Get Recognized www.hr-pulse.org In Partnership With HR Pulse has the Learning Solutions to Empower Your People & Grow Your Business About ICPM

More information

City University of Hong Kong. Course Syllabus. offered by Department of Information Systems with effect from Semester A 2017 / 2018

City University of Hong Kong. Course Syllabus. offered by Department of Information Systems with effect from Semester A 2017 / 2018 City University of Hong Kong offered by Department of Information Systems with effect from Semester A 2017 / 2018 Part I Course Overview Course Title: Information Systems Infrastructure and Security Management

More information

BSc (Hons) Information Systems - IC 311

BSc (Hons) Information Systems - IC 311 BSc (Hons) Information Systems - IC 311 1. Context and Objectives The field of Information systems (IS) focuses on technology-enabled business development whereby IS professionals require both technical

More information

B. Subject-specific skills B1. Problem solving skills: Supply the student with the ability to solve different problems related to the topics

B. Subject-specific skills B1. Problem solving skills: Supply the student with the ability to solve different problems related to the topics Zarqa University Faculty: Information Technology Department: Computer Science Course title: Programming LAB 1 (1501111) Instructor: Lecture s time: Semester: Office Hours: Course description: This introductory

More information

Syllabus for HIMT 450 Healthcare Information and Technology Standards

Syllabus for HIMT 450 Healthcare Information and Technology Standards Syllabus for HIMT 450 Healthcare Information and Technology Standards Course Description Healthcare is the fastest growing employment sector in the United States. The ways in which healthcare is given

More information

Advanced Database Organization INF613

Advanced Database Organization INF613 Advanced Database Organization INF613 Assiut University Faculty of Computers & Information Quality Assurance Unit Advanced Database Organization Course Specifications 2010-2011 Relevant program Master

More information

BSc (Hons) Software Engineering (FT) - IC320

BSc (Hons) Software Engineering (FT) - IC320 BSc (Hons) Software Engineering (FT) - IC320 1. Context and Objectives The BSc Software Engineering degree concentrates more on the skills needed for a career in the software industry by focusing on the

More information

COBIT 5 Implementation

COBIT 5 Implementation COBIT 5 Implementation Fifalde Consulting Inc. +1-613-699-3005 2017 Fifalde Consulting Inc. COBIT is a registered Trade Mark of ISACA and the IT Governance Institute. 2 1. Course Description: Get a practical

More information

ISO LEAD AUDITOR TRAINING

ISO LEAD AUDITOR TRAINING FINAL CERTIFICATION AWARDED BY PECB CANADA ISO 22301 LEAD AUDITOR TRAINING & CERTIFICATION (Business Continuity Management) Master the Audit of Business Continuity Management System (BCMS) based on ISO

More information

Bachelor of Science Information Studies School of Information Program Summary

Bachelor of Science Information Studies School of Information Program Summary Bachelor of Science Information Studies School of Information Program Summary Students admitted to the program beginning the Summer 2011 semester follow the proposed catalog guidelines below. Program Pre-Requisites

More information

ROJECT ANAGEMENT PROGRAM AND COURSE GUIDE

ROJECT ANAGEMENT PROGRAM AND COURSE GUIDE ROJECT ANAGEMENT PROGRAM AND COURSE GUIDE PROJECT MANAGEMENT CERTIFICATE PROGRAM Further your career and gain an understanding of what it takes to lead a project to successful completion functional skills,

More information

Rochester Institute of Technology Golisano College of Computing and Information Sciences Department of Information Sciences and Technologies

Rochester Institute of Technology Golisano College of Computing and Information Sciences Department of Information Sciences and Technologies Rochester Institute of Technology Golisano College of Computing and Information Sciences Department of Information Sciences and Technologies 4002-360.01 ~ Introduction to Database & Data Modeling ~ Spring

More information

INFORMATION SYSTEMS AND ANALYTICS DEPARTMENT

INFORMATION SYSTEMS AND ANALYTICS DEPARTMENT Information Systems and Analytics Department 1 INFORMATION SYSTEMS AND ANALYTICS DEPARTMENT Concentration in Information Systems Objectives To provide students with the information technology skills required

More information

Bachelor of Information Technology (Network Security)

Bachelor of Information Technology (Network Security) Course information for Bachelor of Information Technology (Network Security) Course Number HE20524 Location Meadowbank Course Design The Bachelor of Information Technology (Network Security) is a three-year

More information

COURSE PLAN. Regulation: R12. FACULTY DETAILS: Name of the Faculty:: B.VIJAY KUMAR Designation: Assistant Professor Department:: IT

COURSE PLAN. Regulation: R12. FACULTY DETAILS: Name of the Faculty:: B.VIJAY KUMAR Designation: Assistant Professor Department:: IT CLOUD COMPUTING 2015-16 COURSE PLAN COURSE DETAILS Name Of The Programme:: B.Tech Batch:: 2012 Designation:: IV-B.Tech Year 2015-16 Semester II Title of The Subject CLOUD COMPUTING Subject Code 58065 No

More information

Certified Software Quality Engineer Preparation On Demand, Web-Based Course Offered by The Westfall Team

Certified Software Quality Engineer Preparation On Demand, Web-Based Course Offered by The Westfall Team Certified Software Quality Engineer (CSQE) Preparation course is an on demand, web-based course design to be a comprehensive, in-depth review of the topics in the ASQ s Certified Software Quality Engineer

More information

Course Information

Course Information Course Information 2018-2020 Master of Information Systems: Management and Innovation Institutt for teknologi / Department of Technology Index Index... i 1... 1 1.1 Content... 1 1.2 Name... 1 1.3 Programme

More information

Project Management Professional (PMP) Exam Preparation elearning Course

Project Management Professional (PMP) Exam Preparation elearning Course Project Management Professional (PMP) Exam Preparation elearning Course Course Code: PMC001CL Duration: 4 Days, 35 Hours Format: elearning Certification Exam: PMI s PMP Exam Certification Track: N/A Course

More information

EE3315 Internet Technology EE3315 Internet Technology Overview Slide 1

EE3315 Internet Technology   EE3315 Internet Technology Overview Slide 1 EE3315 Internet Technology http://www.cityu.edu.hk/ug/current/course/ee3315.htm EE3315 Internet Technology Overview Slide 1 Course Aim This course aims to provide students with the knowledge of key protocols

More information

Level 5 Diploma in Computing

Level 5 Diploma in Computing Level 5 Diploma in Computing 1 www.lsib.co.uk Objective of the qualification: It should available to everyone who is capable of reaching the required standards It should be free from any barriers that

More information

NCSF Foundation Certification

NCSF Foundation Certification NCSF Foundation Certification Overview This ACQUIROS accredited training program is targeted at IT and Cybersecurity professionals looking to become certified on how to operationalize the NIST Cybersecurity

More information

FPM-IT-420B: FAC-P/PM-IT Planning & Acquiring Operations of IT Systems Course Details

FPM-IT-420B: FAC-P/PM-IT Planning & Acquiring Operations of IT Systems Course Details FPM-IT-420B: FAC-P/PM-IT Planning & Acquiring Operations of IT Systems Course Details 2 FPM IT 420B: FAC P/PM IT Planning & Acquiring Operations of IT Systems FPM-IT-420B: FAC-P/PM-IT PLANNING & ACQUIRING

More information

The University of Jordan

The University of Jordan The University of Jordan Faculty: Business Department: Management Information Systems Semester: 1 st and 2 nd Academic Year: Each academic year Database Management Systems (2) [1605440] -----------------------------------------------------------------------------------------------------------

More information

PROFESSIONAL DEVELOPMENT COURSES. May - December Institute for Professional Excellence

PROFESSIONAL DEVELOPMENT COURSES. May - December Institute for Professional Excellence PROFESSIONAL DEVELOPMENT COURSES May - December 2018 Institute for Professional Excellence INSTITUTE FOR PROFESSIONAL EXCELLENCE (IPEx) Training to Advance Your Career Davenport University s IPEx offers

More information

Module Definition Form (MDF)

Module Definition Form (MDF) Module Definition Form (MDF) Module code: MOD005618 Version: 1 Date Amended: 25/Nov/2016 1. Module Title Object Orientated Modelling and Data Design 2a. Module Leader Peter Sun 2b. Department Department

More information

TDWI Data Governance Fundamentals: Managing Data as an Asset

TDWI Data Governance Fundamentals: Managing Data as an Asset TDWI Data Governance Fundamentals: Managing Data as an Asset Training Details Training Time : 1 Day Capacity : 10 Prerequisites : There are no prerequisites for this course. About Training About Training

More information

MIS5205 IT Service Delivery and Support Fall 2016

MIS5205 IT Service Delivery and Support Fall 2016 1 About the Instructor: MIS5205 IT Service Delivery and Support Fall 2016 Liang Yao (Liang.Yao@temple.edu) http://community.mis.temple.edu/lyao Phone: 856-905-4158 Office hours: Online or by appointment

More information

Qualification details

Qualification details Qualification details Title New Zealand Certificate in Business (First Line Management) (Level 4) Version 1 Qualification type Certificate Level 4 Credits 60 NZSCED 080301 Management and Commerce > Business

More information

ABD - Database Administration

ABD - Database Administration Coordinating unit: 270 - FIB - Barcelona School of Informatics Teaching unit: 747 - ESSI - Department of Service and Information System Engineering Academic year: Degree: 2017 BACHELOR'S DEGREE IN INFORMATICS

More information

CURRICULUM MASTER OF DISASTER MANAGEMENT

CURRICULUM MASTER OF DISASTER MANAGEMENT CURRICULUM MASTER OF DISASTER MANAGEMENT Applicable to students enrolling in one or more of the below components of the Master of Disaster Management (MDMa) as of September 1 st 2013 The programme is delivered

More information

Qualification details

Qualification details Qualification details Title New Zealand Diploma in Web Development and Design (Level 5) Version 1 Qualification type Diploma Level 5 Credits 120 NZSCED 020115 Information Technology > Computer Science

More information

Competency Definition

Competency Definition Adult Children's Outreach Technical Teen Acquisition Adaptability The ability to effectively process library material orders; knowledge of vendor software, processes, products, and updates x x The ability

More information

Module specification

Module specification Module specification 1. Factual information Module title TM260 Security, ethics and privacy in IT and Computing Level 2 Module tutor TBA Credit value 15 Module type Taught Notional learning hours 4 2.

More information

PREPARE FOR TAKE OFF. Accelerate your organisation s journey to the Cloud.

PREPARE FOR TAKE OFF. Accelerate your organisation s journey to the Cloud. PREPARE FOR TAKE OFF Accelerate your organisation s journey to the Cloud. cloud. Contents Introduction Program & Governance BJSS Cloud Readiness Assessment: Intro Platforms & Development BJSS Cloud Readiness

More information

"Charting the Course... ITIL 2011 Managing Across the Lifecycle ( MALC ) Course Summary

Charting the Course... ITIL 2011 Managing Across the Lifecycle ( MALC ) Course Summary Course Summary Description ITIL is a set of best practices guidance that has become a worldwide-adopted framework for IT Service Management by many Public & Private Organizations. Since early 1990, ITIL

More information

The Information Technology Program (ITS) Contents What is Information Technology?... 2

The Information Technology Program (ITS) Contents What is Information Technology?... 2 The Information Technology Program (ITS) Contents What is Information Technology?... 2 Program Objectives... 2 ITS Program Major... 3 Web Design & Development Sequence... 3 The Senior Sequence... 3 ITS

More information

Computer Science Technology Department

Computer Science Technology Department Computer Science Technology Department Houston Community College Department Phone Number: ab Houston Community College ITSC 1309 Integrated Software Applications I Course Syllabus Instructor Course Reference

More information

Qualification details

Qualification details Qualification details Title New Zealand Certificate in Project Management (Level 4) Version 1 Qualification type Certificate Level 4 Credits 60 NZSCED 080315 Management and Commerce > Business and Management

More information

University of Plymouth. BA (Hons) Accounting and Finance 0414

University of Plymouth. BA (Hons) Accounting and Finance 0414 University of Plymouth Faculty of Business Plymouth Business School Programme Specification BA (Hons) Accounting and Finance 0414 Final Approved Version August 2018 1. BA (Hons) Accounting and Finance

More information

Undergraduate Program for Specialty of Software Engineering

Undergraduate Program for Specialty of Software Engineering Undergraduate Program for Specialty of Software Engineering Ⅰ. Length of Schooling Standard: 4 years; Length of Schooling: 3-6 years Ⅱ. Degree Bachelor of Engineering Ⅲ. Specialty Orientation School of

More information

Recertification Handbook

Recertification Handbook Recertification Handbook NACAS 3 Boar's Head Lane, Suite B Charlottesville, VA 22903 Phone 434-245-8425 Fax 434-245-8453 nacas.org/casp casp@nacas.org Congratulations on receiving the CASP designation!

More information

Audit and Assurance Overview

Audit and Assurance Overview Chartered Professional Accountants of Canada, CPA Canada, CPA are trademarks and/or certification marks of the Chartered Professional Accountants of Canada. 2018, Chartered Professional Accountants of

More information

CPSC 4600 Biometrics and Cryptography Fall 2013, Section 0

CPSC 4600 Biometrics and Cryptography Fall 2013, Section 0 CPSC 4600 Biometrics and Cryptography Fall 2013, Section 0 Course: CPSC4600, Section 0, CRN 42532 Title: Biometrics and Cryptography Class Schedule: EMCS302, MW 2:00 pm-3:15 pm Credit: 3 Faculty: Dr. Li

More information

CSCI 3160: User Interface Design

CSCI 3160: User Interface Design CSCI 3160: User Interface Design Dalhousie Faculty of Computer Science 24 October 2003 Objectives CSCI 3160: User Interface Design This class deals with concepts and techniques underlying the design of

More information

Descriptions for CIS Classes (Fall 2017)

Descriptions for CIS Classes (Fall 2017) Descriptions for CIS Classes (Fall 2017) Major Core Courses 1. CIS 1015. INTRODUCTION TO COMPUTER INFORMATION SYSTEMS. (3-3-0). This course provides students an introductory overview to basic computer

More information

ISO9001:2015 LEAD IMPLEMENTER & LEAD AUDITOR

ISO9001:2015 LEAD IMPLEMENTER & LEAD AUDITOR ISO9001:2015 LEAD IMPLEMENTER & LEAD AUDITOR JPCANN ASSOCIATES LTD #58 NSAWAM ROAD, AVENOR JUNCTION, KOKOMLEMLE-ACCRA Office lines: +233 302 242 573 / +233 302 974 302 Mobile: +233 501 335 818 20 www.corptrainghana.com

More information

Information Systems and Tech (IST)

Information Systems and Tech (IST) Information Systems and Tech (IST) 1 Information Systems and Tech (IST) Courses IST 101. Introduction to Information Technology. 4 Introduction to information technology concepts and skills. Survey of

More information

CAPM & PMP Exam Preparation Boot Camp

CAPM & PMP Exam Preparation Boot Camp CAPM & PMP Exam Preparation Boot Camp About This Course In this course, you will gain the essential knowledge and preparation needed to pass either the Certified Associate in Project Management (CAPM)

More information

DECENTRALIZED ATTRIBUTE-BASED ENCRYPTION AND DATA SHARING SCHEME IN CLOUD STORAGE

DECENTRALIZED ATTRIBUTE-BASED ENCRYPTION AND DATA SHARING SCHEME IN CLOUD STORAGE DECENTRALIZED ATTRIBUTE-BASED ENCRYPTION AND DATA SHARING SCHEME IN CLOUD STORAGE ABSTRACT We propose a Multi-Authority Attribute-Based Encryption (ABE) system. In our system, any party can become an authority

More information

University of Maryland at College Park Department of Geographical Sciences GEOG 477/ GEOG777: Mobile GIS Development

University of Maryland at College Park Department of Geographical Sciences GEOG 477/ GEOG777: Mobile GIS Development University of Maryland at College Park Department of Geographical Sciences GEOG 477/ GEOG777: Mobile GIS Development Instructor: Dr. Ruibo Han Office: LeFrak Hall (LEF) 1111B Email: ruibo@umd.edu (preferred)

More information

Tonight s Agenda. CSC340: Requirements Engineering. Course Objectives. Requirements Engineering. Software Engineering. What is Software Engineering?

Tonight s Agenda. CSC340: Requirements Engineering. Course Objectives. Requirements Engineering. Software Engineering. What is Software Engineering? Tonight s Agenda CSC340: Engineering Jennifer Campbell Lecturer Part 1 Introduction to course content Course information Changes to the SE courses/program Part 2 What are requirements? CSC340 University

More information

Typical Training Duration 11 months

Typical Training Duration 11 months New Zealand Certificate in Business (Administration and Technology) (Level 3) This programme is ideal for learners who need to gain a good general understanding of business administration and technology.

More information

COURSE OUTLINE. Last Amendment Edition Procedure No. Lecturer /blog Room No. Phone No. / Name.

COURSE OUTLINE. Last Amendment Edition Procedure No. Lecturer  /blog Room No. Phone No. /  Name. FACULTY OF COMPUTING Page 1 of 6 COURSE 0 PRE-REQUISITE none EQUIVALENCE CONTACT HOURS 4 Lecturer e-mail/blog Room No. Phone No. 1. Dr. Siti Hajar Othman hajar@utm.my / www.comp.utm.my/hajar 347-04, N8

More information

SYLLABUS POSTGRADUATE TRAINING FOR NORDIC COMPUTER FORENSIC INVESTIGATORS. Module 3E Windows Forensics 10 ECTS

SYLLABUS POSTGRADUATE TRAINING FOR NORDIC COMPUTER FORENSIC INVESTIGATORS. Module 3E Windows Forensics 10 ECTS SYLLABUS POSTGRADUATE TRAINING FOR NORDIC COMPUTER FORENSIC INVESTIGATORS Module 3E Windows Draft for the Board at NPUC 2 December2015 (5 November) 1. Introduction Personal computing has for years been

More information

CS 235AM, Mobile Application Development: Android Spring 2016

CS 235AM, Mobile Application Development: Android Spring 2016 CS 235AM, Mobile Application Development: Android Spring 2016 Sections CRN 44555 & 44036 Credits 4 Classroom 19/132 Day & Time M, W 8:00 9:50 Instructor Brian Bird Office Building 19, Room 152 Office Phone

More information

Instructor: Anna Miller

Instructor: Anna Miller Media Graphics ADV 3203 Fall 2016 Advertising Media Graphics - 81584 - ADV 3203 Mondays and Wednesdays 12:15 PM - 1:30 PM room 1011 And Advertising Media Graphics - 82354 - ADV 3203 Mondays and Wednesdays

More information

COMPUTER FORENSICS (CFRS)

COMPUTER FORENSICS (CFRS) Computer Forensics (CFRS) 1 COMPUTER FORENSICS (CFRS) 500 Level Courses CFRS 500: Introduction to Forensic Technology and Analysis. 3 credits. Presents an overview of technologies of interest to forensics

More information

1 of 5 1/28/2015 12:27 PM BDA Program Program Mission/Purpose The mission of the Bachelor of Science in Business Data Analytics (BDA) program is to prepare students to understand the foundation of business

More information

MGA Developing Interactive Systems (5 ECTS), spring 2017 (16 weeks)

MGA Developing Interactive Systems (5 ECTS), spring 2017 (16 weeks) MGA 672 - Developing Interactive Systems (5 ECTS), spring 2017 (16 weeks) Lecturer: Ilja Šmorgun ilja.smorgun@idmaster.eu, Sónia Sousa sonia.sousa@idmaster.eu Contact Details: All email communication regarding

More information

COURSE OUTLINE Survey of Operating Systems

COURSE OUTLINE Survey of Operating Systems Butler Community College Science, Technology, Engineering, and Math Division Skyler Lovelace New Fall 2014 Implemented Spring 2015 Textbook Update Fall 2016 COURSE OUTLINE Survey of Operating Systems Course

More information

Programming 2. Outline (112) Lecture 0. Important Information. Lecture Protocol. Subject Overview. General Overview.

Programming 2. Outline (112) Lecture 0. Important Information. Lecture Protocol. Subject Overview. General Overview. Programming 2 (112) Lecture 0 College of Computer Science and Engineering Taibah University S2, 1439 Outline Important Information Lecture Protocol Subject Overview General Overview Course Objectives Studying

More information

Academic Course Description

Academic Course Description BEC601 - COMPUTER COMMUNICATION AND NETWORKS Course (catalog) description Academic Course Description BHARATH UNIVERSITY Faculty of Engineering and Technology Department of Electronics and Communication

More information

The University of Jordan. Accreditation & Quality Assurance Center. COURSE Syllabus

The University of Jordan. Accreditation & Quality Assurance Center. COURSE Syllabus The University of Jordan Accreditation & Quality Assurance Center COURSE Syllabus 1 Course title Introduction to Web Pages Development 2 Course number 807413 Credit hours (theory, practical) 3 3 Contact

More information

INSTITUTE OF AERONAUTICAL ENGINEERING (Autonomous) Dundigal, Hyderabad

INSTITUTE OF AERONAUTICAL ENGINEERING (Autonomous) Dundigal, Hyderabad INSTITUTE OF AERONAUTICAL ENGINEERING (Autonomous) Dundigal, Hyderabad - 500 043 INFORMATION TECHNOLOGY COURSE DESCRIPTION FORM Course Title Course Code Regulation Course Structure Course Coordinator SOFTWARE

More information

COURSE OBJECTIVES. Name of the Program : B.Tech Year: II Section: A, B & C. Course/Subject : MATLAB/ LABVIEW LAB Course Code: GR11A2020

COURSE OBJECTIVES. Name of the Program : B.Tech Year: II Section: A, B & C. Course/Subject : MATLAB/ LABVIEW LAB Course Code: GR11A2020 Academic Year : 201-2014 COURSE OBJECTIVES Semester : I Name of the Program : B.Tech Year: II Section: A, B & C Course/Subject : MATLAB/ LABVIEW LAB Course Code: GR11A2020 Name of the Faculty : K.Sireesha,Assistant

More information

University of San Francisco Course Syllabus and Outline

University of San Francisco Course Syllabus and Outline College of Professional Studies BSIS 340 Business Data Networks and Telecommunications University of San Francisco Fall Semester 2008 Robert C. Hughes, M.S. Email: rchughes3@usfca.edu Enrolled Student

More information

Master of Cyber Security, Strategy and Risk Management. CECS PG Information Session April 17, 2018

Master of Cyber Security, Strategy and Risk Management. CECS PG Information Session April 17, 2018 Master of Cyber Security, Strategy and Risk Management CECS PG Information Session April 17, 2018 2 Program Purpose Provide a working understanding of information, network and software security, across

More information

ENGINEERING AND TECHNOLOGY MANAGEMENT

ENGINEERING AND TECHNOLOGY MANAGEMENT Engineering and Technology Management 1 ENGINEERING AND TECHNOLOGY MANAGEMENT Master of Science in Engineering Technology Management Tim Hardin, PhD Director Brenda L. Johnson, MS Assistant Director OSU

More information

Advanced Security Tester Course Outline

Advanced Security Tester Course Outline Advanced Security Tester Course Outline General Description This course provides test engineers with advanced skills in security test analysis, design, and execution. In a hands-on, interactive fashion,

More information

Standard Course Outline IS 656 Information Systems Security and Assurance

Standard Course Outline IS 656 Information Systems Security and Assurance Standard Course Outline IS 656 Information Systems Security and Assurance I. General Information s Course number: IS 656 s Title: Information Systems Security and Assurance s Units: 3 s Prerequisites:

More information

EXAM PREPARATION GUIDE

EXAM PREPARATION GUIDE When Recognition Matters EXAM PREPARATION GUIDE PECB Certified ISO 22000 Lead Implementer www.pecb.com The objective of the Certified ISO 22000 Lead Implementer examination is to ensure that the candidate

More information

SRM UNIVERSITY FACULTY OF ENGINEERING AND TECHNOLOGY

SRM UNIVERSITY FACULTY OF ENGINEERING AND TECHNOLOGY SRM UNIVERSITY FACULTY OF ENGINEERING AND TECHNOLOGY DEPARTMENT OF COMPUTER APPLICATIONS COURSE PLAN Course Code : MC0657 Course Title : Grid Computing Semester : III Course Time : July Nov 2011 Day Order

More information

College of San Mateo Course Outline

College of San Mateo Course Outline College of San Mateo Course Outline New Course Update/No change Course Revision (Minor) Course Revision (Major) Date: 1/26/12 Department: CIS Number: 420 Course Title: Project Management Professional Certificate

More information

Presenter. Xiaolong Li, Assistant Professor Department of Industrial and Engineering Technology Morehead State University

Presenter. Xiaolong Li, Assistant Professor Department of Industrial and Engineering Technology Morehead State University DEVELOPMENT AND APPLICATION OF A NEW CURRICULUM FOR COMPUTER NETWORKING Presenter Xiaolong Li, Assistant Professor Department of Industrial and Engineering Technology Morehead State University Gabriel

More information

Oklahoma State University Institute of Technology Face-to-Face Common Syllabus Fall 2017

Oklahoma State University Institute of Technology Face-to-Face Common Syllabus Fall 2017 Oklahoma State University Institute of Technology Face-to-Face Common Syllabus Fall 2017 ITD 3443 Network Security Students will provide Cyber Defense while understanding Cyber Threats. Their attack types

More information

IT Systems and Networking Degree Apprenticeship

IT Systems and Networking Degree Apprenticeship IT Systems and Networking Degree Apprenticeship THE ROAD TO BECOMING A HIGHLY-SKILLED GRADUATE IT ENGINEER Apprenticeships Content Programme Overview... Mandatory Units Part 1... Optional Units Part 1...

More information

Education Brochure. Education. Accelerate your path to business discovery. qlik.com

Education Brochure. Education. Accelerate your path to business discovery. qlik.com Education Education Brochure Accelerate your path to business discovery Qlik Education Services offers expertly designed coursework, tools, and programs to give your organization the knowledge and skills

More information

CAPM TRAINING EXAM PREPARATION TRAINING

CAPM TRAINING EXAM PREPARATION TRAINING CAPM TRAINING EXAM PREPARATION TRAINING WHAT IS CAPM? PMI s Certified Associate in Project Management (CAPM) is a valuable entry-level certification for the individual who aspire to become project manager.

More information

INFORMATION SESSION. MS Software Engineering, specialization in Cybersecurity

INFORMATION SESSION. MS Software Engineering, specialization in Cybersecurity INFORMATION SESSION MS Software Engineering, specialization in Cybersecurity Presenter Afifa Hamad Program Specialist Graduate & Extended Studies Charles W. Davidson College of Engineering San Jose State

More information

MORGAN STATE UNIVERSITY DEPARTMENT OF ELECTRICAL AND COMPUTER ENGINEERING COURSE SYLLABUS FALL, 2015

MORGAN STATE UNIVERSITY DEPARTMENT OF ELECTRICAL AND COMPUTER ENGINEERING COURSE SYLLABUS FALL, 2015 MORGAN STATE UNIVERSITY DEPARTMENT OF ELECTRICAL AND COMPUTER ENGINEERING COURSE SYLLABUS FALL, 2015 CATALOG DESCRIPTION ONLINE EEGR.483 INTRODUCTION TO SECURITY MANAGEMENT CREDITS: 3 THIS COURSE IS A

More information

Guide for the international tekom certification examinations

Guide for the international tekom certification examinations Guide for the international tekom certification examinations 1 Obtaining the tekom-certificate First Level 1.1 The tekom-certificate First Level at a glance The tekom-certificate First Level is the first

More information

Academic Course Description

Academic Course Description BEC502 MICROPROCESSOR AND MICROCONTROLLER Course (catalog) description Academic Course Description BHARATH UNIVERSITY Faculty of Engineering and Technology Department of Electronics and Communication Engineering

More information

Information Security Management System (ISMS) ISO/IEC 27001:2013

Information Security Management System (ISMS) ISO/IEC 27001:2013 Information Security Management System (ISMS) ISO/IEC 27001:2013 Course No. 110B Attendees will learn how to help your organization manage the security of assets such as financial information, intellectual

More information

Computer Science (Informática)

Computer Science (Informática) Computer Science (Informática) (Code 600005) Bachelor s Degree on Electronics and Industrial Automation Engineering (G60) Universidad de Alcalá Academic Year 2018/2019 1st Course 1st Semester COURSE GUIDE

More information

Course Information

Course Information Course Information 2018-2020 Master of Information Systems: Digital Business System Institutt for teknologi / Department of Technology Index Index... i 1 s... 1 1.1 Content... 1 1.2 Name... 1 1.3 Programme

More information

SALESFORCE CERTIFIED TECHNICAL ARCHITECT

SALESFORCE CERTIFIED TECHNICAL ARCHITECT Certification Exam Guide SALESFORCE CERTIFIED TECHNICAL ARCHITECT Winter 18 2017 Salesforce.com, inc. All rights reserved. S ALESFORCE CERTIFIED TECHNICAL ARCHITECT CONTENTS About the Salesforce Certified

More information

Information Technology Health Informatics OIT Assessment Report Information Technology Health Informatics Mission Statement:

Information Technology Health Informatics OIT Assessment Report Information Technology Health Informatics Mission Statement: I. Program History Information Technology Health Informatics OIT Assessment Report 2011-2012 History The field of Health Informatics is the result of the convergence of information management and information

More information

City University of Hong Kong

City University of Hong Kong City University of Hong Kong Information on a Course offered by Department of Information Systems and Department of Management Sciences with effect from Semester B in 01 / 013 Part I Course Title: Course

More information

MODULE SPECIFICATION UNDERGRADUATE PROGRAMMES KEY FACTS

MODULE SPECIFICATION UNDERGRADUATE PROGRAMMES KEY FACTS MODULE SPECIFICATION UNDERGRADUATE PROGRAMMES KEY FACTS Module name Audit and Assurance Module code AF3100 School Cass Business School Department or equivalent UG Programme UK credits 15 ECTS 7.5 Level

More information

Philadelphia University FACULTY OF ADMINISTRATIVE & FINANCIAL SCIENCES Department of Accounting 0000 Semester

Philadelphia University FACULTY OF ADMINISTRATIVE & FINANCIAL SCIENCES Department of Accounting 0000 Semester Philadelphia University FACULTY OF ADMINISTRATIVE & FINANCIAL SCIENCES Department of Accounting 0000 Semester000000 Course Syllabus Course Title: Accounting Information Systems Course Level: fourth year

More information

GLASGOW CALEDONIAN UNIVERSITY. Programme Specification 1. GENERAL INFORMATION

GLASGOW CALEDONIAN UNIVERSITY. Programme Specification 1. GENERAL INFORMATION GLASGOW CALEDONIAN UNIVERSITY Programme Specification. GENERAL INFORMATION. Programme Title: BSc (ons) Quantity Surveying 2. Final Award: BSc (ons) Quantity Surveying 3. Exit Awards: University Certificate

More information

INSTRUCTIONAL OBJECTIVES

INSTRUCTIONAL OBJECTIVES New York City College of Technology The City University of New York Department of Communication Design COMD 2450 - Web Design I Course Description : A required course for all Advertising Design and Graphic

More information

ITSS Model Curriculum. - To get level 3 -

ITSS Model Curriculum. - To get level 3 - ITSS Model Curriculum - To get level 3 - (Corresponding with ITSS V3) IT Skill Standards Center IT Human Resources Development Headquarters Information-Technology Promotion Agency (IPA), JAPAN Company

More information

EUROPEAN ICT PROFESSIONAL ROLE PROFILES VERSION 2 CWA 16458:2018 LOGFILE

EUROPEAN ICT PROFESSIONAL ROLE PROFILES VERSION 2 CWA 16458:2018 LOGFILE EUROPEAN ICT PROFESSIONAL ROLE PROFILES VERSION 2 CWA 16458:2018 LOGFILE Overview all ICT Profile changes in title, summary, mission and from version 1 to version 2 Versions Version 1 Version 2 Role Profile

More information

EXAM PREPARATION GUIDE

EXAM PREPARATION GUIDE When Recognition Matters EXAM PREPARATION GUIDE PECB Certified Disaster Recovery Manager www.pecb.com The objective of the PECB Certified Disaster Recovery Manager examination is to ensure that the candidate

More information