Building the Cybersecurity Workforce. November 2017
|
|
- Karen Gibbs
- 6 years ago
- Views:
Transcription
1 Building the Cybersecurity Workforce November 2017
2 Our Global Footprint Measuring Kaplan University s Educational Impact For every career path +1MM students annually served Facilities in 30+ countries Over 19,000 employees worldwide All of our degree programs are regionally accredited by the Higher Learning Commission (HLC) 7 accredited schools and colleges Over 180 degree and certificate programs Certificate, Associate s, Bachelor s, Master s, Professional Law, and Doctorate degrees Kaplan University dates back to 1937 when the American Institute of Commerce was founded ~40,000 students attending online or at 16 ground campuses (84% attend online) ~10,000 military affiliated students (25.5% of total University census; 28.3% of KUO census) 2
3 We continue to Innovate 3
4 Increase ROI Through The Right Education Program We can help you: 1. Get the best people in the door Our students are being developed in classes built to industry and skill needs help attract top talent 2. Develop the Talent you Have Better educated employees improve performance, customer service, and loyalty Education enables your people to gain skills, grow, and advance in their career 3. Hold on to the Talent you Want Learning as an employee benefit boosts retention The degree means something to them 4
5 Kaplan Cybersecurity Programs Maps to critical certifications recognized by the Information Assurance community, and for DoD personnel, mandated by DoD Directive 8570 CompTIA Network+, Security+, CEH, CISSP & CCNA Faculty with industry experience and certifications that provide support of student career paths Active Cybersecurity Club that provides networking opportunities and certification study groups 5
6 Kaplan Cybersecurity Programs Several courses in the program will help you prepare for industry certifications. The recommended timing/sequence for pursuing certifications follows: After completing: IT 273: Networking Concepts; IT 278: Network Administration & IT 283 Networking with TCP/IP IT 286: Introduction to Network Security Take Exam: CompTIA Network+ CompTIA Security+ IT 104: Introduction to Cybersecurity IT 273: Networking Concepts IT 277: CISSP I IT 278: Network Administration IT 279: CISSP II IT 286: Introduction to Network Security IT 410: CISSP III IT 412: Information Systems Security (ISC)2 - CISSP (Certified Information Systems Security Professional) Certification (students must have completed all stages)* IT 262: Certified Ethical Hacking I IT 390: Intrusion Detection and Incidence Response IT 395: Certified Ethical Hacking II CEH (Certified Ethical Hacker) IT 388: Routing and Switching I IT 471: Routing and Switching II (elective) CCNA - Routing and Switching* 6
7 Kaplan Cybersecurity Programs Industry certification holders can jump start their BSC degree and earn course credit as follows: CompTIA Network+ IT 273: Networking Concepts CompTIA Security+ (ISC)2 - CISSP (Certified Information Systems Security Professional) Certification (students must have completed all stages) Microsoft Certified Solutions Expert (MCSE) Microsoft Certified or Solutions Associate (MCSA) Associate level for Windows Server 2012 or 2016 IT 286: Introduction to Network Security IT 104: Introduction to Cybersecurity IT 273: Networking Concepts IT 277: CISSP I IT 278: Network Administration IT 279: CISSP II IT 286: Introduction to Network Security IT 410: CISSP III IT 412: Information Systems Security IT 375: Windows Enterprise Administration MCTS (Microsoft Certified Technology Specialist) CEH (Certified Ethical Hacker) EnCase - EnCE (EnCase Certified Examiner) Certification (students must have completed Phase 1 & 2) GIAC - GCIH (Certified Incident Handler) Certification IT 278: Network Administration IT 262: Certified Ethical Hacking I IT 390: Intrusion Detection and Incidence Response IT 395: Certified Ethical Hacking II IT 411: Digital Forensics IT 390: Intrusion Detection and Incidence Response 7
8 Kaplan Cybersecurity Programs Lockstep Program: Promotes community vs. alienation Affords opportunities for student leadership Social networking Implications for alumni employment 8
9 Kaplan Cybersecurity Programs Targets management in Cybersecurity and the unique combination of technical and managerial skills required Helps to prepare graduates for higher level certifications such as CSSLP and CISM Includes coursework to enable managers to evaluate risks and costs associated with Cybersecurity for their organizations Provides option for students to complete a capstone project or publish a comprehensive thesis 9
10 Master of Science in Cybersecurity Management IT513 IT530 IT537 IT527 IT528 IT540 IT541 IT542 IT550 IT590 IT544 IT545 IT591 IT592 IT595 Writing and Critical Thinking for the IT Professional Computer Networks Introduction to Cybersecurity Foundations in Data Analytics Quantitative Risk Analysis Management of Information Security Computer and Network Security Ethical Hacking and Network Defense Computer Forensics and Investigations Legal and Ethical Issues in IT Platforms, Applications and Data Security Wireless, Mobile, and Cloud Security IT Security Auditing and Assessments Financial Management of Cybersecurity Master's Capstone for Cybersecurity Management The Master of Science in Cybersecurity Management will prepare graduates for leadership roles directing and protecting critical information infrastructures. You will learn to develop, implement, evaluate, and update the cybersecurity policies and practices that allow an organization to effectively respond to the dynamic cybersecurity landscape. Graduates will be adept in the management of information continuity, asset classification and control, compliance management, and the secure administration of IT infrastructure, as well as incident response. 15 courses 60 credits total, 36 credits in common with the MSIT program 10
11 Model Implementations - Cybersecurity Build Aggressively Engage awareness of Kaplan University Cybersecurity Programs to companies and organizations that have a need or talent gap promote the ManTech success story to a targeted list of companies with similar needs to create multiple partnerships with similar solutions targeted individuals including HR managers and CLOs though multiple channels to enable an initial conversation for new prospective partnerships 11
12 Kaplan Partnership Services 12
13 Kaplan Can Tailor A Program To Meet The Needs Of Your Organization Employee Benefit Program Custom Degree Programs Strategic Corporate Solutions Tuition Discounts Specialized Pricing Models (Tuition Caps) Speed to Degree: Detailed Articulation Customization of Delivery Customized Solution EDAIM: Discovery and Diagnostic Process 13
14 The Kaplan Stacking Approach We combine past training, learning, and experience to reduce costs and accelerate degrees. X% X% X% X% X% Courses Remaining Prior Learning Corporate Training Transfer Credit Portfolios 14
15 Modular Articulation: Process Overview Kaplan University makes it possible to earn credit for what you already know without having to retake courses or relearn material. How it works Kaplan gets to know your business and understand the needs of your workforce with the goal of optimization in mind. You share your training with us and we map it to our existing modularized courses and curriculum. We prepare a program that enables your employees to take relevant, impactful courses to achieve the desired degree. 15
Introducing Maryville University s CYBER SECURITY ONLINE PROGRAMS. Bachelor of Science in Cyber Security & Master of Science in Cyber Security
Introducing Maryville University s CYBER SECURITY ONLINE PROGRAMS Bachelor of Science in Cyber Security & Master of Science in Cyber Security The cyber security industry is calling for more experts. And
More informationBACHELOR OF SCIENCE IN INFORMATION TECHNOLOGY
Bachelor of Science in Information Technology BACHELOR OF SCIENCE IN INFORMATION TECHNOLOGY Description and Outcomes The objective of the Bachelor of Science in Information Technology program is to help
More informationDeveloping Career-Relevant Academic Programs
2016 USENIX Summit for Educators in System Administration Developing Career-Relevant Academic Programs A Case Study: UMUC s B.S. Program in Computer Networks & Cybersecurity S. K. Bhaskar (S.Bhaskar@umuc.edu)
More informationITU CBS. Digital Security Capacity Building: Role of the University GLOBAL ICT CAPACITY BUILDING SYMPOSIUM SANTO DOMINGO 2018
GLOBAL ICT CAPACITY BUILDING SYMPOSIUM ITU CBS SANTO DOMINGO 2018 Digital Capacity Building: Role of the University 18 20 June 2018 Santo Domingo, Dominican Republic Dr. Nizar Ben Neji Faculty of Sciences
More informationBACHELOR OF SCIENCE IN INFORMATION TECHNOLOGY
Purdue University Global 208-209 Catalog BACHELOR OF SCIENCE IN INFORMATION TECHNOLOGY Description and Outcomes The objective of the Bachelor of Science in Information Technology program is to help you
More informationComputer Information Science xxx
1 xxx The mission of the Faculty is to provide future-focused, studentcentred programmes that prepare students for the dynamic Information Systems and Information sectors of the UAE. CIS programme graduates
More informationBachelor of Applied Science Degree IT NETWORKING
Bachelor of Applied Science Degree IT NETWORKING Beginning fall 2017! Whatcom Community College s nationally acclaimed computer information systems program will begin offering a bachelor of applied science
More informationThe fast track to top skills and top jobs in cyber. Guaranteed. FREE TO TRANSITIONING VETERANS
The fast track to top skills and top jobs in cyber. Guaranteed. FREE TO TRANSITIONING VETERANS WELCOME SANS Institute, in collaboration with RP6, is presenting the SANS VetSuccess CyberTalent Immersion
More informationMake Your Statement. Master of Management in Library and Information Science online. Graduate Certificate in Library and Information Management online
Make Your Statement Master of Management in Library and Information Science online Graduate Certificate in Library and Information Management online Help shape the future of your field. The Master of Management
More informationNEW JERSEY INSTITUTE OF TECHNOLOGY. Initiation of Cyber Defense Option. for the Master of Science in
NEW JERSEY INSTITUTE OF TECHNOLOGY Initiation of Cyber Defense Option for the Master of Science in Cyber Security and Privacy (MS CSP) Degree Program With the approval of the Faculty Senate (and its Committee
More informationThe fast track to top skills and top jobs in cyber. Guaranteed.
The fast track to top skills and top jobs in cyber. Guaranteed. NO COST TO SELECTED PARTICIPANTS WELCOME The SANS Institute is presenting the SANS CyberTalent Immersion Academy for Women to encourage women
More informationBuilding new cybersecurity pipelines. NICE Conference 2017 November 8, Strengthening Cyber Workforce Development sans.
Building new cybersecurity pipelines NICE Conference 2017 November 8, 2017 Strengthening Cyber Workforce Development sans.org/cybertalent Cybersecurity: The Current State Skills Mismatch Emphasis on theory
More informationAssociate in Science and Bachelor of Science in Information Technology
Associate in Science and Bachelor of Science in Information MISSION STATEMENT The Peirce Information program prepares graduates to be successful information technology professionals by providing them crucial
More informationThe fast track to top skills and top jobs in cyber. Guaranteed. FREE TO TRANSITIONING VETERANS
The fast track to top skills and top jobs in cyber. Guaranteed. FREE TO TRANSITIONING VETERANS WELCOME SANS Institute, in collaboration with Augusta Warrior Project and Augusta University, is presenting
More informationCyberSecurity Training and Capacity Building: A Starting Point for Collaboration and Partnerships. from the most trusted name in information security
CyberSecurity Training and Capacity Building: A Starting Point for Collaboration and Partnerships About SANS The SANS (SysAdmin, Audit, Network, Security) Institute Established in 1989 Cooperative research
More informationThe fast track to top skills and top jobs in cyber. Guaranteed. FREE TO TRANSITIONING VETERANS
The fast track to top skills and top jobs in cyber. Guaranteed. FREE TO TRANSITIONING VETERANS WELCOME SANS Institute is presenting the SANS VetSuccess Immersion Academy in San Diego. For transitioning
More informationThe fast track to top skills and top jobs in cyber. Guaranteed. FREE TO TRANSITIONING VETERANS
The fast track to top skills and top jobs in cyber. Guaranteed. FREE TO TRANSITIONING VETERANS WELCOME SANS Institute is presenting the SANS VetSuccess Immersion Academy in the DC Metro area. For transitioning
More informationDIABLO VALLEY COLLEGE CATALOG
COMPUTER NETWORK TECHNOLOGY CNT Despina Prapavessi, Dean Math and Computer Sciences Division Math Building, Room 267 Possible career opportunities These CNT-courses prepare students for a career path in
More informationWhat is the CISSP? Certified Ethical Hacker v8 or higher Certified Forensic Computer Examiner (CFCE) Certified Fraud Examiner (CFE)
What is the CISSP? (ISC)2 s Certified Information Systems Security Professional (CISSP ) is the gold standard professional certification for experienced information security and related professionals worldwide.
More informationCyberVista Certify cybervista.net
ONLINE CYBERSECURITY CERTIFICATION TRAINING CyberVista Certify ONLINE CYBERSECURITY CERTIFICATION TRAINING CyberVista Certify CyberVista offers the industry s most comprehensive cybersecurity training
More informationCYBER APPRENTICESHIP. Dr. Leigh Armistead, President
CYBER APPRENTICESHIP Dr. Leigh Armistead, President 1 OVERVIEW Peregrine Technical Solutions, LLC. (Peregrine) is a SBA certified 8(a) business with core competencies in IT security, IA and cyber warfare.
More informationImmersion Academy Annual Report 2017
Immersion Academy Annual Report 2017 Accelerated, intensive training and certification program that develops the real-world knowledge and hands-on skills needed to defend today s information security systems.
More informationCollege Of. Technological Innovation
College Of Technological Innovation Contact Us 00971-2-5993111 (Abu Dhabi) 00971-4-4021111 (Dubai) 00971-4-4021408 (College of Technological Innovation) @Zayed_U zayeduniversity ZayedU www.zu.ac.ae Introduction
More informationThe fast track to top skills and top jobs in cyber. FREE TO TRANSITIONING VETERANS
The fast track to top skills and top jobs in cyber. FREE TO TRANSITIONING VETERANS FAST TRACK Three steps to a cybersecurity career QUALIFY Take the qualifying exam, complete the application process, and
More informationUPDATED: 10/17/16. Senior Level. Senior Specialty Threat, Consultant, Engineer, Manager. Mid Level Analyst
WORKFORCE COLLABORATIVE: CYBERSECURITY BUILDING THE TALENT PIPELINE SECURITY ANALYST CAREER PATHWAY UPDATED: 10/17/16 CYBERSECURITY SECURITY ANALYST CAREER PATHWAY Senior Level Senior Specialty Threat,
More informationSecure Systems Administration and Engineering
Secure Systems Administration and Engineering Program Information The job outlook for careers in Cybersecurity and Information Technology continues to be very strong. Many experts predict a continued shortage
More informationIT Technician Pathways Course Guide
IT Technician Pathways Course Guide Stage Computer Retail Sales and Support Course Name or Topic Introduction to Retail or Business Fundamentals Related 3 rd Party Certifications C-ID IT-MC C-ID BUS 100
More informationE-guide CISSP Prep: 4 Steps to Achieve Your Certification
CISSP Prep: 4 Steps to Achieve Your Certification Practice for the exam and keep your skills sharp : Thank you for downloading our CISSP certification guide. Aside from this handy PDF, you can also access
More informationStrengthening Capacity in Cyber Talent sans.org/cybertalent
SANS Security Awareness Summit August 4th, 2016 Strengthening Capacity in Cyber Talent sans.org/cybertalent Cybersecurity: The Current State Skills Mismatch Emphasis on theory over practice Education focus
More informationHow to Become a CMA (Certified Management Accountant) May 10, 2017
How to Become a CMA (Certified Management Accountant) May 10, 2017 Today s Moderator Featured Presenter Agenda The CMA Designation Institute of Management Accountants (IMA) Why get a CMA? CMA Requirements
More informationInternationally Recognised Courses Affordable Courses Job Guarantee
Career prospects in Hardware & Networking courses in India. Nearly a decade ago, computer hardware and networking was not considered as a very lucrative career option in India but currently, IT, Computer
More informationPECB UNIVERSITY PECB UNIVERSITY
PECB UNIVERSITY In today s dynamic world a degree with no specialization can hardly yield well-rounded qualifications and serve as a substantial baggage for climbing the career ladder. Taking control over
More informationComputer Information Technology
Computer Information Technology Why Choose Computer Information Technology? To assure relevance and enduring value, our Computer Information Technology (CIT) program has been designed to align with industry
More informationE-guide Getting your CISSP Certification
Getting your CISSP Certification Intro to the 10 CISSP domains of the Common Body of Knowledge : The Security Professional (CISSP) is an information security certification that was developed by the International
More informationMaster of Science (MS) in Information Assurance and Cybersecurity with a specialization in. Digital Forensics
Master of Science (MS) in Information Assurance and Cybersecurity with a specialization in Digital Forensics Effective January 8, 2018 Master of Science (MS) in Information Assurance and Cybersecurity
More informationKeeping Your SOCs Full. May 26, Strengthening Capacity in Cyber Talent sans.org/cybertalent
Keeping Your SOCs Full May 26, 2016 Strengthening Capacity in Cyber Talent sans.org/cybertalent Cybersecurity: The Current State Skills Mismatch Emphasis on theory over practice Education focus on theoretical
More informationA United States Cyber Academy Program
The GIAC certifications I earned in the Academy really helped open doors for me as a cybersecurity professional. Justin Sappington, Information Security Analyst at Umpqua Bank A United States Cyber Academy
More informationWorkforce Certification
Services Include Secure certification testing in our hi-tech labs. Group testing for your company or organization. Test and certification preparation training. Community Proctoring Services. Workforce
More informationQUALITY IMPROVEMENT PLAN (QIP) FOR THE CONSTRUCTION MANAGEMENT DEGREE PROGRAM
DEPARTMENT OF CONSTRUCTION MANAGEMENT AND CIVIL AND CONSTRUCTION ENGINEERING QUALITY IMPROVEMENT PLAN (QIP) FOR THE CONSTRUCTION MANAGEMENT DEGREE PROGRAM Updated 5/17 Organization The QIP consists of
More informationSCHOOL OF APPLIED HANDS ON. HIGH VALUE. TECHNOLOGY LIVE AND ONLINE COURSES
G R A D U A T E P R O G R A M S SCHOOL OF APPLIED TECHNOLOGY HANDS ON. HIGH VALUE. LIVE AND ONLINE COURSES At IIT School of Applied Technology (SAT) our focus is on the future. Our distinctive programs
More informationSECURITY+ COMPETITIVE ANALYSIS 1. GIAC GSEC 2. (ISC)2 SSCP 3. EC-COUNCIL CEH
SECURITY+ COMPETITIVE ANALYSIS 1. GIAC GSEC 2. (ISC)2 SSCP 3. EC-COUNCIL CEH 1 SECURITY+ VS GIAC GSEC Where does GSEC fit? 3 CompTIA Security+ and GIAC Security Essentials (GSEC) Feature CompTIA Security+
More informationWhy MyITstudy is the best solution for your IT training needs
MyITstudy - The most trusted and effective partner for your IT training needs MyITstudy is a brand of, a leading global education training provider with offices in the US, UK, Australia, Germany, Canada,
More informationYour Student s Head Start on Career Goals and College Aspirations
Your Student s Head Start on Career Goals and College Aspirations INFORMATION TECHNOLOGY (IT) NETWORKING PATHWAY The Destinations Networking Pathway prepares students to test and evaluate computer network
More informationMaster of Science (MS) in Information Assurance and Cybersecurity with a specialization in. Health Care Security
Master of Science (MS) in Information Assurance and Cybersecurity with a specialization in Health Care Security Effective January 8, 2018 Master of Science (MS) in Information Assurance and Cybersecurity
More informationSTUDENT LEARNING OUTCOMES Beacom College of Computer and Cyber Sciences
STUDENT LEARNING OUTCOMES Beacom College of Computer and Cyber Sciences Undergraduate Programs - Bachelor B.S. Computer Game Design Upon completion of the B.S. degree in Computer Game Design, students
More informationa PennState A leader in online learning since 1998 Programs in Enterprise Architecture ~ World Campus A world of possibilities. Online.
A leader in online learning since 1998 To learn more about programs in Enterprise Architecture, visit: worldcampus.psu.edu/psueabt Programs in Enterprise Architecture a PennState ~ World Campus A world
More informationBOARD OF REGENTS ACADEMIC AFFAIRS COMMITTEE 4 STATE OF IOWA SEPTEMBER 12-13, 2018
STATE OF IOWA SEPTEMBER 12-13, 2018 REQUEST FOR NEW PROGRAM AT IOWA STATE UNIVERSITY: BACHELOR OF SCIENCE IN CYBER SECURITY ENGINEERING Contact: Rachel Boon Action Requested: Consider approval of the request
More informationGRADUATE PROGRAMS IN ENTERPRISE AND CLOUD COMPUTING
GRADUATE PROGRAMS IN ENTERPRISE AND CLOUD COMPUTING MASTER OF SCIENCE DOCTORAL DEGREE GRADUATE CERTIFICATES STEVENS.EDU/GRAD-ECC MASTER OF SCIENCE IN Enterprise and Cloud Computing Enterprise and cloud
More informationCertified Manager Certification
Certified Manager Certification Get Trained Get Certified Get Recognized www.hr-pulse.org In Partnership With HR Pulse has the Learning Solutions to Empower Your People & Grow Your Business About ICPM
More informationImmersion Academy Annual Report 2018
Immersion Academy Annual Report 2018 An accelerated, intensive training and certification program that develops the real-world knowledge and hands-on skills needed to defend today s information security
More informationCYBER APPRENTICESHIP. Dr Leigh Armistead, President
CYBER APPRENTICESHIP Dr Leigh Armistead, President 1 EVERYBODY HAS THE SAME ISSUE 2 OVERVIEW Peregrine Technical Solutions, LLC. (Peregrine) is a SBA certified 8(a), SB with core competencies in IT security,
More informationBETHESDA CHEVY CHASE HIGH SCHOOL Career and Technology Education Department
BETHESDA CHEVY CHASE HIGH SCHOOL Career and Technology Education Department Mr. Jonathan Nateghi-Asli Jonathan_A_Nateghi-Asli@mcpsmd.org Resource Teacher http://bit.ly/bcctechnology Graduation Requirements
More informationPROGRAMME SUMMARY You are required to take eight core modules in terms one and two as outlined in the module list.
PROGRAMME SPECIFICATION MSc Real Estate Investment KEY FACTS Programme name Real Estate Investment Award MSc School Cass Business School Department or equivalent Specialist Masters Programme Programme
More informationACCOUNTING. Iowa State University
Iowa State University 2016-2017 1 ACCOUNTING For undergraduate curriculum in business, major in The curriculum in accounting is accredited by AACSB International, the Association to Advance Collegiate
More informationStackable Credentials: Are They Right for Your Program?
Stackable Credentials: Are They Right for Your Program? Presenters Liberty Munson, Ph.D. Microsoft Jennifer Naughton, M.A., SPHR Manny Straehle, Ph.D., GISF, AERE 1. Definition 5. Myths 2. History Agenda
More informationAccounting Ethics and Auditing
Accounting Ethics and Auditing Only three percent of adults have career-boosting professional certifications you can be one of them. And you can earn while meeting Colorado CPA licensure requirements including
More informationCPA Exam and Licensure Information and FAQs
CPA Exam and Licensure Information and FAQs 1 CPA Exam and Licensure Information and FAQs July 2016 Dr. Gary Colbert, Director of Accounting Programs, University of Colorado Denver 1 Education and experience
More informationNational Initiative for Cyber Education (NICE) and the Cybersecurity Workforce Framework: Attract and Retain the Best in InfoSec.
National Initiative for Cyber Education (NICE) and the Cybersecurity Workforce Framework: Attract and Retain the Best in InfoSec April 12, 2018 1 Introduction to NICE - The National Initiative for Cybersecurity
More informationWINNING THE WAR FOR CYBER TALENT
WINNING THE WAR FOR CYBER TALENT National Initiative for Cyber Education (NICE) Conference Keynote NOVEMBER 2017 AGENDA CYBER TALENT SUPPLY VS. DEMAND MULTIDIMENSIONAL APPROACH TO ADDRESS THE SUPPLY /
More informationFOUNDATION CERTIFICATE IN INFORMATION SECURITY v2.0 INTRODUCING THE TOP 5 DISCIPLINES IN INFORMATION SECURITY SUMMARY
FOUNDATION CERTIFICATE IN INFORMATION SECURITY v2.0 INTRODUCING THE TOP 5 DISCIPLINES IN INFORMATION SECURITY SUMMARY The Foundation Certificate in Information Security (FCIS) course is designed to provide
More informationEC-Council - EC-Council Certified Security Analyst (ECSA) v8
EC-Council - EC-Council Certified Security Analyst (ECSA) v8 Code: 3402 Lengt h: URL: 5 days View Online The EC-Council Certified Security Analyst (ECSA) program teaches information security professionals
More informationCYBER FRAUD & DATA BREACHES 16 CPE s May 16-17, 2018
CYBER FRAUD & DATA BREACHES 16 CPE s May 16-17, 2018 Cyber fraud attacks happen; they can t all be stopped. The higher order question must be how can we, as fraud examiners and assurance professionals,
More informationIIT SCHOOL. Of APPLIed. Hands on. HigH value. technology. live and online CoURses
G R A d u A t e P R O G R A m S IIT SCHOOL Of APPLIed technology Hands on. HigH value. live and online CoURses The focus of IIT s School of Applied Technology (SAT) is the future: the application and integration
More informationcimc Information Brochure Chartered Institute of Management Consultants
cimc Chartered Institute of Management Consultants // Membership // CIMC Program // Capella Partnership // Business and Aquisition Certificate // Information Brochure Take a career leap with the Chartered
More informationComputer Information Systems
Computer Information Systems Credentials Information Technology Foundation Skills Certificate Cisco Networking Academy Skills Certificate Networking Specialist Certificate Networking Specialist AAS Degree
More informationSecurity. Protect your business from security threats with Pearl Technology. The Connection That Matters Most
Security Protect your business from security threats with Pearl Technology The Connection That Matters Most Committed to Your Future When it comes to your business, security can mean many things. But to
More informationVMEdu. 94 (Out of 100) D&B Rating. A+ BBB Rating. VMEdu Training. VMEdu Platform
VMEdu VMEdu provides organizations with corporate training and training solutions to manage their learning and development needs efficiently. VMEdu Training VMEdu Inc. is a leading global training service
More informationSecure Systems Administration and Engineering
Secure Systems Administration and Engineering Program Information The job outlook for careers in Cyber Security and Information Technology continues to be very strong. Many experts predict a continued
More informationCCNA Routing and Switching Courses. Scope and Sequence. Target Audience. Curriculum Overview. Last updated November 2, 2016
CCNA Routing and Switching Scope and Sequence Last updated November 2, 2016 Target Audience The Cisco CCNA Routing and Switching curriculum is designed for Cisco Networking Academy students who are seeking
More informationSOC Summit June 6, Strengthening Capacity in Cyber Talent sans.org/cybertalent
SOC Summit 2017 June 6, 2017 Strengthening Capacity in Cyber Talent sans.org/cybertalent Increasing Sense of Urgency Cyber threats to U.S. national and economic security are increasing in frequency, scale,
More informationISACA Enterprise. Solutions and Resources
ISACA Enterprise Solutions and Resources About ISACA Global association serving 140,000 members and certification holders Members in 180+ countries; 210+ chapters worldwide Developed and maintains the
More informationHealth Education Community Health Education
+ Master of Science Program Health Education Community Health Education CECH 2014 Primary Faculty: Keith King, PhD, MCHES 513-556-3859 keith.king@uc.edu I. Program Overview The Master of Science (MS) in
More informationBETHESDA CHEVY CHASE HIGH SCHOOL Career and Technology Education Department
BETHESDA CHEVY CHASE HIGH SCHOOL Career and Technology Education Department Mr. Jonathan Nateghi-Asli Jonathan_A_Nateghi-Asli@mcpsmd.org Resource Teacher http://bit.ly/bcctechnology Graduation Requirements
More informationSchool of Engineering and Technology. Department of Engineering
1 2 School of Engineering and Technology Department of Engineering 3 Bachelor of Science in Communication Engineering The program focuses on the technical aspects of digital and analog communications,
More informationInformation Systems and Tech (IST)
Information Systems and Tech (IST) 1 Information Systems and Tech (IST) Courses IST 101. Introduction to Information Technology. 4 Introduction to information technology concepts and skills. Survey of
More informationENGINEERING AND TECHNOLOGY MANAGEMENT
Engineering and Technology Management 1 ENGINEERING AND TECHNOLOGY MANAGEMENT Master of Science in Engineering Technology Management Tim Hardin, PhD Director Brenda L. Johnson, MS Assistant Director OSU
More informationMASTER OF SCIENCE IN ACCOUNTANCY
MASTER OF SCIENCE IN ACCOUNTANCY FACULTY Department Chair: Gerald D. Healy, M.B.A. Administrative Assistant: Carmen Diaz Department Office: Wilson 414 Department Telephone: (413) 572-5590 Graduate Advisor:
More informationCollege of Information Technology
College of Information Technology Undergraduate Transfer Evaluation Guidelines Bachelor of Science in Information Technology A transcript evaluation is completed once official transcripts from all previously
More informationBRING EXPERT TRAINING TO YOUR WORKPLACE.
BRING EXPERT TRAINING TO YOUR WORKPLACE. ISACA s globally respected training and certification programs inspire confidence that enables innovation in the workplace. ISACA s On-Site Training brings a unique
More informationNetworking and Cybersecurity. Computer Service Technician. Cybersecurity Award: Career Studies Certificate Length: 25 credits
Information Technology Information Systems Technology Award: Length: Associate of Applied Science 65 69 credits Networking and Cybersecurity Length: 20 Credits Computer Service Technician Award: Length:
More informationCOMPUTER INFORMATION SYSTEMS
Credentials Information Technology Foundation skills certificate Cisco Networking Academy skills certificate Networking Specialist Certificate Networking Specialist AAS degree Computer Systems Support
More informationARKANSAS TECH UNIVERSITY DEPARTMENT OF PARKS, RECREATION & HOSPITALITY ADMINISTRATION
ARKANSAS TECH UNIVERSITY DEPARTMENT OF PARKS, RECREATION & HOSPITALITY ADMINISTRATION Recreation & Park Administration Assessment Plan -11 Arkansas Tech University is accredited by the Higher Learning
More informationUpdated with information about the new certificate programs THE KU MSIT HANDBOOK 1
2016-2018 Updated with information about the new certificate programs THE KU MSIT HANDBOOK 1 THE KU MSIT HANDBOOK 2 MS in Information Technology (MSIT) School of Engineering The University of Kansas According
More informationCOMPUTER AND INTERNETWORKING TECHNOLOGIES
COMPUTER AND INTERNETWORKING TECHNOLOGIES COMPUTER AND INTERNETWORKING TECHNOLOGIES These days it s almost impossible to find any area of life not impacted by technology. As existing and emerging technologies
More informationNetworking Technology
Associate in Applied Science Networking Fundamentals Diploma Cisco Networking Certificate Network Security Certificate Networking Technology IT Support Certificate Advanced IT Support Certificate Information
More informationCertified Information Security Manager (CISM) Course Overview
Certified Information Security Manager (CISM) Course Overview This course teaches students about information security governance, information risk management, information security program development,
More informationDigital Forensics. Graduate Certificate
Digital Forensics Graduate Certificate Effective January 8, 2018 Digital Forensics Graduate Certificate Capella University has been designated by the National Security Agency (NSA) and the Department of
More informationPROJECT MANAGEMENT (PMGT)
PROJECT MANAGEMENT (PMGT) MASTER OF SCIENCE ONLINE INTERNATIONAL Harrisburg University of Science Technology is accredited by the Middle States Commission on Higher Education, 3624 Market Street, Philadelphia,
More informationCERTIFICATION TRAINING - ISC2
MERIT CLASSES The Michigan Cyber Range features a cybersecurity education experience based upon the National Institute of Standards and Technology National Initiative for Cybersecurity Education (NICE).
More information"Charting the Course... Certified Information Systems Auditor (CISA) Course Summary
Course Summary Description In this course, you will perform evaluations of organizational policies, procedures, and processes to ensure that an organization's information systems align with overall business
More informationRobert A. Robertson Ph.D., CISSP, GCFE, GCFA, GCIA
Summary Rob began his technical career with Automatic Data Processing (ADP), in their Dealer Service Division. His position at ADP laid the foundation for his passion for finding solutions to business
More informationPROFESSIONAL MASTER S IN
I m in a new job I love. ERIC LAFONTAINE Service Operations Manager GE Healthcare Class of 2013 PROFESSIONAL MASTER S IN APPLIED SYSTEMS ENGINEERING GAIN A COMPETITIVE EDGE WITH A GEORGIA TECH DEGREE TODAY
More informationITIL v3. Qualification & Certification scheme. itsmf International The IT Service Management Forum 1
ITIL v3 Qualification & Certification scheme 1 ITIL v3 Certification scheme The ITIL v3 scheme Scope Approach Features of each new certification level Transition scheme Certification scheme structure 2
More informationMANAGING PROJECTS USING PMI S STANDARDS. Facilitated by Mr. Andreas Solomou. 12, 19, 26 November and 3, 10 December :30 17:00
1 MANAGING PROJECTS USING PMI S STANDARDS Facilitated by Mr. Andreas Solomou 12, 19, 26 November and 3, 10 December 2018 08:30 17:00 CIIM Nicosia, 21 Akademias Ave. 2107 Registration deadline: 25 October
More informationBECOME TOMORROW S LEADER, TODAY. SEE WHAT S NEXT, NOW
BECOME TOMORROW S LEADER, TODAY. SEE WHAT S NEXT, NOW BECOME AN ISACA MEMBER TODAY. Nearing its 50th year, ISACA is a global association helping individuals and enterprises achieve the positive potential
More informationOpening Doors to Cyber and Homeland Security Careers
Opening Doors to Cyber and Homeland Security Careers Opening Doors to Cyber and Homeland Security Careers Today s Presenters: Frederic Lemieux, Ph.D. Professor and Program Director, Cybersecurity Strategy
More informationComputer Science & IT
Computer Science & IT TIDEWATER COMMUNITY COLLEGE CLOUD COMPUTING The Career Studies Certificate program in Cloud Computing prepares students to install, deploy, configure, manage, secure, and analyze
More informationMODULE SPECIFICATIONS
S 1. Title of the module Leading Assurance Engagements PRSN7106 2. School or partner institution which will be responsible for management of the module 3. The level of the module (e.g. Level 4, Level 5,
More informationCyber Security Advanced Education: Preparing the Emerging Workforce
Cyber Security Advanced Education: Preparing the Emerging Workforce Scott vonfischer, CISO We are all apprentices in a craft where no one ever becomes a master. Ernest Hemingway A Unique Perspective on
More informationIngram Micro Cyber Security Portfolio
Ingram Micro Cyber Security Portfolio Ingram Micro Inc. 1 Ingram Micro Cyber Security Portfolio Services Trainings Vendors Technical Assessment General Training Consultancy Service Certification Training
More information