Cybersecurity Curricular Guidelines
|
|
- Neal Evans
- 5 years ago
- Views:
Transcription
1 Cybersecurity Curricular Guidelines Ma2 Bishop, University of California Davis, co-chair Diana Burley The George Washington University, co-chair Sco2 Buck, Intel Corp. Joseph J. Ekstrom, Brigham Young University Lynn Futcher, Nelson Mandela Metropolitan University David Gibson, United States Air Force Academy Elizabeth K. Hawthorne, Union County College Siddharth Kaza, Towson University Yair Levy, Nova Southeastern University Herbert Ma2ord, Kennesaw State University Allen Parrish, United States Naval Academy 1
2 Background What should a cybersecurity professional know and what skills should they have? Disagreement due to nature of cybersecurity Used in many different roles Encompasses many disciplines Indeed, many different defini[ons of cybersecurity 2
3 Joint Task Force Assembled by ACM, IEEE_Computer Society, AIG Special Interest Group on Security, IFIP WG 11.8 Goal: to develop cybersecurity curricular guidelines for undergraduate programs that emphasize different areas of specializa[on Not curriculum development! Ins[tu[ons can use it as a basis for developing curricula, cer[fica[on requirements, though 3
4 What Is Cybersecurity? A compu[ng-based discipline involving technology, people, informa[on, and processes to enable assured opera[ons. It involves the crea[on, opera[on, analysis, and tes[ng of secure computer systems. It is an interdisciplinary course of study, including aspects of law, policy, human factors, ethics, and risk management in the context of adversaries. CSEC 2017 report, p. 10 4
5 Bases for Guidelines Cybersecurity educa[on programs should: Be based on core knowledge and skills; Have a compu[ng-based founda[on Teach concepts applicable to a broad range of cybersecurity exper[se; Emphasize ethical obliga[ons and responsibili[es; and Be flexible so programs can tailor their curriculum to any specialized needs 5
6 The Model 6
7 Knowledge Areas The subject ma2er of cybersecurity Each KA composed of Knowledge Units These describe the set of topics and what students should know about them 7
8 Knowledge Areas KAs meet 3 criteria: 1. The area is important for mul[ple disciplines; 2. The area provides a tool for understanding or exploring cybersecurity ideas; and 3. The material in the area can be learned in varying levels of detail and understanding over [me. 8
9 The Knowledge Areas Data Security Soiware Security System Security Human Security Organiza[onal Security Societal Security 9
10 Overlap Note a Knowledge Unit may be put into more than one KA Example: design of a library that grabs and processes packets Soiware security KA: assurance ques[on is how packets are protected and properly read System security KA: composi[on of components, as library interface [es network to system 10
11 Example: Soiware Security CSEC2017 Knowledge Units: Fundamental design principles Prac[ce Documenta[on 11
12 Example: Soiware Security Original (in CSEC2017 Drai) KU: fundamental design principles Separa[on (of domains) Isola[on Encapsula[on Least Privilege Simplicity (of design) Minimiza[on (of implementa[on) Fail Safe Defaults Fail Secure Modularity Layering Least Astonishment Open Design Usability End-to-End Security Defense in Depth Working Group Modifica[ons KU: fundamental design principles Simplicity principles: Economy of mechanism Minimize shared mechanisms Least astonishment Restric[ve principles: Least privilege Fail-safe defaults Complete media[on Separa[on Minimize trust Methodology principles: Open design Layering Abstrac[on Complete linkage Design for itera[on 12
13 Example: Topic Valida[on Mapped against a number of widely accepted lists of soiware problems Avoiding the Top 10 Soiware Security Design Flaws: IEEE Cyber Security OWASP Top 10 Most Cri[cal Web Applica[on Security Risks 13
14 Example: Data Security KA Knowledge Units: Cryptography Digital Forensics Data Integrity and Authen[ca[on Access Control Secure Communica[on Protocols Cryptanalysis Privacy Informa[on Storage Security csec2017.org 14
15 Example: Cryptography (KU) Topics 15
16 Cross-Cupng Concepts Framework for making connec[ons among KAs, unifying underlying ideas Fundamental to students abili[es to understand core ideas through any disciplinary lens They span most, if not all, of the KAs 16
17 The Concepts Confiden[ality: property defined by rules controlling spread of informa[on Why? Key component of data security, systems security, organiza[onal security Also component of human security in guise of privacy And societal security from the combina[on of all these 17
18 The Concepts Integrity Key component: assurance Availability Accessibility not enough; must meet any stated QoS Risk Func[on of probability of threat being realized and damage incurred should this happen Adversarial Thinking Requires understanding what threats will compromise en[ty, how to make them happen 18
19 Disciplinary Lens KAs are common to all cybersecurity Depth, approach that folks are expected to know varies depending on how they will use that knowledge We use ACM disciplines 19
20 The Disciplines Computer Science Computer Engineering Informa[on Systems Informa[on Technology Soiware Engineering Mixed Disciplinary 20
21 Guidelines and Professional Prac[ce Linked through seven applica[on areas Workforce frameworks can codify their bodies of knowledge by going from the applica[on areas back to the model Then extract both core knowledge, cross-cupng concepts they find appropriate View them through the appropriate disciplinary lens These areas allow the defini[on of competency levels for each area 21
22 Applica[on Areas Public policy Procurement Management IT security opera[ons Soiware development Enterprise architecture Research 22
23 Conclusion CSEC2017 is a basis for curricula, and is not itself a curriculum CSEC2017 s[ll under development 15 community engagement efforts so far 6 working groups composed of experts not on the task force Global surveys of cybersecurity experts and educators Web site for submipng comments is h2p:// 23
24 Acknowledgements Based upon work funded by the following: Na[onal Science Founda[on Grant No. DGE Na[onal Security Agency s CNAP Curriculum Development Effort (RFI ) ACM Educa[on Board Intel Corpora[on We thank them for their support And we thank all those who have been involved, and will be involved, in the KA working groups 24
25 Web Site h2ps:// Current version is Drai 0.75, released yesterday!!!!! Comment period open un[l July 3 Then we revise it... June 14, 2017 CISSE
26 A Contrarian View The future, according to some scien[sts, will be exactly like the past, only far more expensive John Sladek Slide #26
Cybersecurity Curricula 2017
Cybersecurity 0 January 0 Public Review and Comment period: January February, 0 Provide feedback at: http://csec0.org 0 0 Cybersecurity Curricula 0 Curriculum Guidelines for Undergraduate Degree Programs
More informationStrengthening Cybersecurity Workforce Development December 2017
Strengthening Cybersecurity Workforce Development December 2017 Agenda 1. Introduc3ons SANS GIAC Team 2. Goal: 2017 Execu3ve Order 3. SANS GIAC NICE Workforce Framework (NCWF) Mapping Overview 4. Workforce
More informationCAREER PATH FOR THE NEXT GENERATION RECORDS MANAGER
CAREER PATH FOR THE NEXT GENERATION RECORDS MANAGER San Jose State University October 1,2014 Presented by: Jim Merrifield, IGP, CIP, ERMs Jim Merrifield, IGP, CIP, ERMs Director of Informa.on Governance
More informationSoftware Assurance Education Overview
Software Assurance Education Overview Nancy Mead June 2011 ABSTRACT: Complex software systems affect nearly every aspect of our lives, in areas such as defense, government, energy, communication, transportation,
More informationGDPR ESSENTIALS END-USER COMPLIANCE TRAINING. Copyright 2018 Logical Operations, Inc. All rights reserved.
GDPR ESSENTIALS END-USER COMPLIANCE TRAINING 1 POTENTIAL MAXIMUM GDPR PENALTY 2 WHAT IS DATA PRIVACY? MOST NOTABLE US/CA PRIVACY LAWS Federal Trade Commission Act, Sec4on 5 California Online Privacy Protec4on
More informationMaking Research Data Public: Why, What, and How. Fall 2016
Making Research Data Public: Why, What, and How Fall 2016 Research Data Service (RDS) The Research Data Service provides the Illinois research community with exper:se, tools, and infrastructure to manage
More informationComputing Accreditation Commission Version 2.0 CRITERIA FOR ACCREDITING COMPUTING PROGRAMS
Computing Accreditation Commission Version 2.0 CRITERIA FOR ACCREDITING COMPUTING PROGRAMS Optional for Reviews During the 2018-2019 Accreditation Cycle Mandatory for Reviews During the 2019-2020 Accreditation
More informationCOSC 310: So*ware Engineering. Dr. Bowen Hui University of Bri>sh Columbia Okanagan
COSC 310: So*ware Engineering Dr. Bowen Hui University of Bri>sh Columbia Okanagan 1 Admin A2 is up Don t forget to keep doing peer evalua>ons Deadline can be extended but shortens A3 >meframe Labs This
More informationIntroducing Cyber Resiliency Concerns Into Engineering Education
Introducing Cyber Resiliency Concerns Into Engineering Education Mr. Tom McDermott Georgia Tech Research Institute Mr. Barry Horowitz University of Virginia NDIA 20 th Annual Systems Engineering Conference
More informationThe Ins(tute of Financial Opera(ons Cer(fica(on Programs
The Ins(tute of Financial Opera(ons Cer$fied Accounts Payable Professional (CAPP) Cer$fied Accounts Payable Associate (CAPA) by Lorraine Creek, BS, CAPP, CTE / Chair, Cer$fica$on CommiBee CAPP and CAPA
More informationIntroduction to Securing Critical Infrastructure
Her kan tekst skrives Her kan tekst skrives Introduction to Securing Critical Infrastructure Her kan tekst skrives Keith Frederick CISSP, CAP, CRISC, Author securenok.com Topics A)acks on the Oil and Gas
More informationRevising the MSIS Curriculum: Specifying Graduate Competencies
Revising the MSIS Curriculum: Specifying Graduate Competencies Second Public Deliverable of the ACM/AIS MSIS 2016 Task Force March 21, 2016 Topi, Heikki (Bentley University; ACM, co-chair; htopi@bentley.edu)
More informationBusiness Case Components
How to Build A SOC Agenda Mission Business Case Components Regulatory requirements SOC Terminology Technology Components Events categories Staff Requirements Organiza>on s Considera>ons Training Requirements
More informationSTUDENT LEARNING OUTCOMES Beacom College of Computer and Cyber Sciences
STUDENT LEARNING OUTCOMES Beacom College of Computer and Cyber Sciences Undergraduate Programs - Bachelor B.S. Computer Game Design Upon completion of the B.S. degree in Computer Game Design, students
More informationVendor Management: SSAE 18. Presented by Joseph Kirkpatrick CISSP, CISA, CGEIT, CRISC, QSA Managing Partner
Vendor Management: SSAE 18 Presented by Joseph Kirkpatrick CISSP, CISA, CGEIT, CRISC, QSA Managing Partner Audio Handouts Questions Welcome Joseph Kirkpatrick is the Managing Partner at KirkpatrickPrice
More informationInformation Assurance and Security in the ACM/IEEE CS2013
Information Assurance and Security in the ACM/IEEE CS2013 Ronald C Dodge United States Military Academy, West Point, NY, USA ronald.dodge@usma.edu Abstract. The ACM/IEEE Computing Curriculum 2013 is a
More informationCURRICULUM The Architectural Technology and Construction. programme
CURRICULUM The Architectural Technology and Construction Management programme CONTENT 1 PROGRAMME STRUCTURE 5 2 CURRICULUM COMMON PART 7 2.1 Core areas in the study programme 7 2.1.1 General 7 2.1.2 Company
More informationInformation Security Management Systems Standards ISO/IEC Global Opportunity for the Business Community
Information Security Management Systems Standards ISO/IEC 27001 Global Opportunity for the Business Community Prof. Edward (Ted) Humphreys IPA Global Symposium 2013 23 rd May 2013, Tokyo, Japan CyberSecurity
More informationModel Curriculum for K-12 Computer Science: Draft Report of the ACM K-12 Task Force Curriculum Committee*
Model Curriculum for K-12 Computer Science: Draft Report of the ACM K-12 Task Force Curriculum Committee* Allen Tucker (Chair) - Bowdoin College Fadi Deek - New Jersey Inst. of Technology Jill Jones -
More informationEnterprise Risk Management (ERM) and Cybersecurity. Na9onal Science Founda9on March 14, 2018
Enterprise Risk Management (ERM) and Cybersecurity Na9onal Science Founda9on March 14, 2018 Agenda Guiding Principles for Implementing ERM at NSF (Based on COSO) NSF s ERM Framework ERM Cybersecurity Risk
More informationCompu&ng Professions and Master s Degrees MSIS 2016
Compu&ng Professions and Master s Degrees MSIS 2016 Bipin Prabhakar, Indiana University Mark F. Thouin, University of Texas at Dallas Heikki Topi, Bentley University Barbara H. Wixom, CISR, MIT Sloan School
More informationLarge-scale Testbed and Cyber Range Organiza6on and Design
CYBER RANGE ORGANIZATION AND DESIGN Large-scale Testbed and Cyber Range Organiza6on and Design Razvan Beuran, Ken-ichi Chinen Outline 1. Mo9va9on & overview 2. Making use of StarBED 3. Case studies 4.
More informationTowards a Pervasive Information Assurance Security Educational Model for Information Technology Curricula
Towards a Pervasive Information Assurance Security Educational Model for Information Technology Curricula Lynn Futcher and Johan Van Niekerk Nelson Mandela Metropolitan University, Port Elizabeth, South
More informationIntroducing Maryville University s CYBER SECURITY ONLINE PROGRAMS. Bachelor of Science in Cyber Security & Master of Science in Cyber Security
Introducing Maryville University s CYBER SECURITY ONLINE PROGRAMS Bachelor of Science in Cyber Security & Master of Science in Cyber Security The cyber security industry is calling for more experts. And
More informationTeaching cybersecurity across the disciplines. Debasis Bhattacharya maui.hawaii.edu/cybersecurity 3CS Prince George s CC, 2017
Teaching cybersecurity across the disciplines Debasis Bhattacharya debasisb@hawaii.edu maui.hawaii.edu/cybersecurity 3CS Prince George s CC, 2017 Agenda Background Cybersecurity Education - Traditional
More informationCybersecurity & Privacy Enhancements
Business, Industry and Government Cybersecurity & Privacy Enhancements John Lainhart, Director, Grant Thornton The National Institute of Standards and Technology (NIST) is in the process of updating their
More informationIntegrated Program Performance Management
Integrated Program Performance Management The IPPM Certification The Integrated Program Performance Management Cer3fica3on is a senior expert-level professional creden3al offered by the College of Performance
More informationSystems Engineering Capabili2es
Systems Engineering Capabili2es Purdue University November 9, 2010 Integrated Deepwater System Concept US Coast Guard / ICGS Recent History of SE at Purdue 2003 Purdue College of Engineering ini2ates Signature
More informationEvalua&ng Secure Programming Knowledge
Evalua&ng Secure Programming Knowledge Ma6 Bishop, UC Davis Jun Dai, Cal State Sacramento Melissa Dark, Purdue University Ida Ngambeki, Purdue University Phillip Nico, Cal Poly San Luis Obispo Minghua
More informationStandard Course Outline IS 656 Information Systems Security and Assurance
Standard Course Outline IS 656 Information Systems Security and Assurance I. General Information s Course number: IS 656 s Title: Information Systems Security and Assurance s Units: 3 s Prerequisites:
More informationBOARD OF REGENTS ACADEMIC AFFAIRS COMMITTEE 4 STATE OF IOWA SEPTEMBER 12-13, 2018
STATE OF IOWA SEPTEMBER 12-13, 2018 REQUEST FOR NEW PROGRAM AT IOWA STATE UNIVERSITY: BACHELOR OF SCIENCE IN CYBER SECURITY ENGINEERING Contact: Rachel Boon Action Requested: Consider approval of the request
More informationNSA s Centers of Academic Excellence in Cyber Security
NSA s Centers of Academic Excellence in Cyber Security Centers of Academic Excellence in Cybersecurity NSA/DHS CAEs in Cyber Defense (CD) NSA CAEs in Cyber Operations (CO) Lynne Clark, Chief, NSA/DHS CAEs
More informationM.S. IN INFORMATION ASSURANCE MAJOR: CYBERSECURITY. Graduate Program
Detroit Mercy s Master of Science in Information Assurance with a major in Cybersecurity is a multi-disciplinary 30-credit-hour graduate degree. It is designed to produce a comprehensively knowledgeable
More informationAssessing Medical Device. Cyber Risks in a Healthcare. Environment
Assessing Medical Device Medical Devices Security Cyber Risks in a Healthcare Phil Englert Director Technology Operations Environment Catholic Health Ini
More informationSUBJECT: Teacher Certification Assessments TEST APPROVAL AND ESTABLISHMENT OF QUALIFYING SCORE
TO: FROM: Members of the State Board of Education Karen B. Salmon, Ph.D. DATE: SUBJECT: Teacher Certification Assessments TEST APPROVAL AND ESTABLISHMENT OF QUALIFYING SCORE PURPOSE: The purpose of this
More informationShon Harris s Newly Updated CISSP Materials
Shon Harris s Newly Updated CISSP Materials WHY PURSUE A CISSP? Many companies are beginning to regard a CISSP certification as a requirement for their technical, mid-management, and senior IT management
More informationJanice Sipior, Villanova Joe Valacich, Washington State. Panelists:
Heikki Topi Topi, Bentley Janice Sipior, Villanova Joe Valacich, Washington State Ryan T T. Wright Wright, Washington State Panelists: University University University University Introductions Status update
More informationIden%ty, Risk and Privacy in the broader enterprise
Iden%ty, Risk and Privacy in the broader enterprise Or Why the hell are you calling ME in Florida in the middle of the night because there is a tornado in Indiana?? Mark Bruhn Associate Vice President
More informationNetSecOps: Policy-Driven, Knowledge-Centric, Holis<c Network Security Opera<ons
NetSecOps: Policy-Driven, Knowledge-Centric, Holis
More informationRaising Security and Trust in our Inter-Federated World
Authen4ca4on and Authorisa4on for Research and Collabora4on Raising Security and Trust in our Inter-Federated World Hannah Short IT-DI-CSO CERN ISGC, Taipei 12-18 March, 2016 Agenda The federated landscape
More informationThreat modeling. Tuomas Aura T Informa1on security technology. Aalto University, autumn 2012
Threat modeling Tuomas Aura T- 110.4206 Informa1on security technology Aalto University, autumn 2012 Threats Threat = something bad that can happen Given an system or product Assets: what is there to protect?
More informationIntegrating Software Assurance Knowledge into Conventional Curricula
Integrating Software Assurance Knowledge into Conventional Curricula Dan Shoemaker Jeff Ingalsbe Nancy Mead February 2011 ABSTRACT: One of our challenges is deciding how best to address software assurance
More informationA CBK for Information Security and Critical Infrastructure Protection
A CBK for Information Security and Critical Infrastructure Protection Marianthi Theoharidou, Eleftheria Stougiannou, Dimitris Gritzalis Information Security and Critical Infrastructure Protection Research
More informationThe GenCyber Program. By Chris Ralph
The GenCyber Program By Chris Ralph The Mission of GenCyber Provide a cybersecurity camp experience for students and teachers at the K-12 level. The primary goal of the program is to increase interest
More informationInformation Systems and Tech (IST)
Information Systems and Tech (IST) 1 Information Systems and Tech (IST) Courses IST 101. Introduction to Information Technology. 4 Introduction to information technology concepts and skills. Survey of
More informationComparing Security Curricula and Accreditations to Industry Needs
Comparing Security Curricula and Accreditations to Industry Needs Who Are We: Robiam Background Professors at RIT Part of CSec Curriculum Committee Interests Web App Sec Education Rob Olson Chaim Sanders
More informationCrea%ng a SARNET Alliance by applying the Service Provider Group Framework and by using the Ciena/GENI testbed
Crea%ng a SARNET Alliance by applying the Service Provider Group Framework and by using the Ciena/GENI testbed April 29 th 2015 Leon Gommans: leon.gommans@klm.com Content - Introduc@on - Security Autonomous
More informationSeaCat: an SDN End- to- end Applica4on Containment ArchitecTure
: an SDN End- to- end Applica4on Containment ArchitecTure Enabling Secure Role Based Access To Sensi5ve Healthcare Data Junguk Cho, David Johnson, Makito Kano, Kobus Van der Merwe and Brent Elieson Mo4va4on
More informationCollateral Damage. Impact of Frequent Policy Changes on Vendors and Customers
Collateral Damage Impact of Frequent Policy Changes on Vendors and Customers Joshua Brickman Director, Security Evalua:ons Oracle Global Product Security Glenn BruneFe Dis:nguished Security Architect Oracle
More informationNEW JERSEY INSTITUTE OF TECHNOLOGY. Initiation of Cyber Defense Option. for the Master of Science in
NEW JERSEY INSTITUTE OF TECHNOLOGY Initiation of Cyber Defense Option for the Master of Science in Cyber Security and Privacy (MS CSP) Degree Program With the approval of the Faculty Senate (and its Committee
More informationNew PCI DSS Version 3.0: Can it Reduce Breaches? Dharshan Shanthamurthy, CEO, SISA Informa2on Security Inc. Core Competencies C11
New PCI DSS Version 3.0: Can it Reduce Breaches? Dharshan Shanthamurthy, CEO, SISA Informa2on Security Inc. Core Competencies C11 SISA Informa2on Security Formal Risk Assessment Specialists Authors of
More informationBest Prac*ces in Accessibility and Universal Design for Learning. Rozy Parlette, Instruc*onal Designer Center for Instruc*on and Research Technology
Best Prac*ces in Accessibility and Universal Design for Learning Rozy Parlette, Instruc*onal Designer Center for Instruc*on and Research Technology Purpose The purpose of this session is to iden*fy best
More informationPANEL: Cybersecurity Experimenta7on of the Future (CEF) CSET Workshop August 18, 2014
PANEL: Cybersecurity Experimenta7on of the Future (CEF) CSET Workshop August 18, 2014 Goal of the Panel Engage the workshop par/cipants in an interac/ve discussion of the experimenta/on capabili/es and
More informationBlending Information Systems Security and Forensics Curricula
Association for Information Systems AIS Electronic Library (AISeL) MWAIS 2012 Proceedings Midwest (MWAIS) 5-2012 Blending Information Systems Security and Forensics Curricula Jason Ferguson Friends University,
More informationAn introduc/on to Sir0i
Authen4ca4on and Authorisa4on for Research and Collabora4on An introduc/on to Sir0i Addressing Federated Security Incident Response Hannah Short CERN hannah.short@cern.ch TF-CSIRT May, 2016 Agenda Federated
More informationCollaboration on Cybersecurity program between California University and Shippensburg University
Collaboration on Cybersecurity program between California University and Shippensburg University Weifeng Chen Dept. of Math, Computer Science and Information Systems California University, California,
More informationApril 17, Ronald Layne Manager, Data Quality and Data Governance
Ensuring the highest quality data is delivered throughout the university providing valuable information serving individual and organizational need April 17, 2015 Ronald Layne Manager, Data Quality and
More informationWhat makes a hot topic hot? An NSF Perspective
What makes a hot topic hot? An NSF Perspective August 2015 Jeremy Epstein Program Officer National Science Foundation SRI International NSF Mission Mission: promote the progress of science; to advance
More informationUTC Timekeeping in the Future
UTC Timekeeping in the Future P. Kenneth Seidelmann University of Virginia John H. Seago Analytical Graphics, Inc. Time Scales Mean Solar Time Universal Time (UT1) Ephemeris Time Interna8onal Atomic Time
More informationAddressing the Challenges of the Networked Society through the Next Genera:on of IS Masters- Level Curricula MSIS 2016
Addressing the Challenges of the Networked Society through the Next Genera:on of IS Masters- Level Curricula MSIS 2016 - Andreas Gadatsch, Bonn- Rhein- Sieg University of Applied Sciences, Germany - Brian
More informationPresented by the Internet Security Alliance
Presented by the Internet Security Alliance Who s in Charge Howard Schmidt Problems and Solu9ons True and False Potpourri 100 100 100 100 100 202 202 202 202 202 303 303 303 303 303 406 406 406 406 406
More informationSchool of Engineering & Computational Sciences
Catalog: Undergraduate Catalog 2014-2015 [Archived Catalog] Title: School of Engineering and Computational Sciences School of Engineering & Computational Sciences Administration David Donahoo, B.S., M.S.
More informationThe fast track to top skills and top jobs in cyber. Guaranteed.
The fast track to top skills and top jobs in cyber. Guaranteed. NO COST TO SELECTED PARTICIPANTS WELCOME The SANS Institute is presenting the SANS CyberTalent Immersion Academy for Women to encourage women
More informationDOWNLOAD OR READ : COMPUTING CURRICULA GUIDELINES FOR ASSOCIATE DEGREE PROGRAMS COMPUTING FOR INFORMATION PROCESSING PDF EBOOK EPUB MOBI
DOWNLOAD OR READ : COMPUTING CURRICULA GUIDELINES FOR ASSOCIATE DEGREE PROGRAMS COMPUTING FOR INFORMATION PROCESSING PDF EBOOK EPUB MOBI Page 1 Page 2 computing curricula guidelines for associate degree
More informationDOWNLOAD OR READ : COMPUTING CURRICULA GUIDELINES FOR ASSOCIATE DEGREE PROGRAMS COMPUTING AND ENGINEERING TECHNOLOGY PDF EBOOK EPUB MOBI
DOWNLOAD OR READ : COMPUTING CURRICULA GUIDELINES FOR ASSOCIATE DEGREE PROGRAMS COMPUTING AND ENGINEERING TECHNOLOGY PDF EBOOK EPUB MOBI Page 1 Page 2 computing curricula guidelines for associate degree
More informationSuggestions for Addressing the Changing Needs of the Cyber Security Workforce Dr. Char Sample, & Dr. Connie Justice Introduction Cyber Security
Suggestions for Addressing the Changing Needs of the Cyber Security Workforce Dr. Char Sample, & Dr. Connie Justice Introduction Cyber Security programs continue to expand across universities creating
More informationComputer Information Systems (CIS) CIS 105 Current Operating Systems/Security CIS 101 Introduction to Computers
Computer Information Systems (CIS) CIS 101 Introduction to Computers This course provides an overview of the computing field and its typical applications. Key terminology and components of computer hardware,
More informationCUNY John Jay College of Criminal Justice MATH AND COMPUTER SCIENCE
Instructor: Prof Aftab Ahmad Office: NB 612 Telephone No. (212)393-6314 Email Address: aahmad@jjay.cuny.edu Office Hours: By appointment TEXT & REFERENCE MATERIAL Text Notes from instructor posted on Blackboard
More informationCRITERIA FOR ACCREDITING COMPUTING PROGRAMS
CRITERIA FOR ACCREDITING COMPUTING PROGRAMS Effective for Reviews During the 2014-2015 Accreditation Cycle Incorporates all changes approved by the ABET Board of Directors as of October 26, 2013 Computing
More informationEMBEDDING CYBERSECURITY IN THE SECOND PROGRAMMING COURSE (CS2) *
EMBEDDING CYBERSECURITY IN THE SECOND PROGRAMMING COURSE (CS2) * Michael Verdicchio, Deepti Joshi, Shankar M. Banik Department of Mathematics and Computer Science The Citadel Charleston, SC 29409 843 953-5039
More informationAcademic Reference Standards (ARS) for Electronics and Electrical Communications Engineering, B. Sc. Program
Academic Reference Standards (ARS) for Electronics and Electrical Communications Engineering, B. Sc. Program Faculty of Electronic Engineering Menoufya University MARCH 2015 1 st Edition Contents Introduction.....2
More informationCybersecurity Risk Mitigation: Protect Your Member Data. Introduction
Cybersecurity Risk Mitigation: Protect Your Member Data Presented by Matt Mitchell, CISSP Knowledge Consulting Group Introduction Matt Mitchell- Director Risk Assurance 17 years information security experience
More informationTina Ladabouche. GenCyber Program Manager
Tina Ladabouche GenCyber Program Manager GenCyber Help all students understand correct and safe on-line behavior Increase interest in cybersecurity and diversity in cybersecurity workforce of the Nation
More informationCybersecurity4All - Teaching cybersecurity across the disciplines
Cybersecurity4All - Teaching cybersecurity across the disciplines Debasis Bhattacharya debasisb@hawaii.edu maui.hawaii.edu/cybersecurity PCATT IT Symposium, 2017 Agenda Background Cybersecurity Education
More informationInteragency Advisory Board Meeting Agenda, Wednesday, December 5, 2012
Interagency Advisory Board Meeting Agenda, Wednesday, December 5, 2012 1. Opening Remarks 2. The State Identity Credential and Access Management Guidance and Roadmap (SICAM) (Chad Grant, NASCIO) 3. PIV
More informationCyber Security Program
Cyber Security Program Cyber Security Program Goals and Objectives Goals Provide comprehensive Security Education and Awareness to the University community Build trust with the University community by
More informationCybersecurity Essentials
Cybersecurity Essentials University of Moratuwa Cisco Networking Center Cybersecurity Essentials Foundational Security Course Overview Cybersecurity Essentials covers foundational knowledge and essential
More informationDesign Principles & Prac4ces
Design Principles & Prac4ces Robert France Robert B. France 1 Understanding complexity Accidental versus Essen4al complexity Essen%al complexity: Complexity that is inherent in the problem or the solu4on
More informationAccelera'ng Our Path Forward. Stephen Gille8
Accelera'ng Our Path Forward Stephen Gille8 Two Independent Companies with Strong Market Posi'ons $6.7Billion Revenues 1 IM 38% Norton 31% SYMANTEC SECURITY ES 31% INFORMATION MANAGEMENT $4.2 billion Revenue
More informationNASPInet 2.0 The Evolu4on of Synchrophasor Networks
NASPInet 2.0 The Evolu4on of Synchrophasor Networks NASPI Working Group Mee4ng San Mateo, California March 24, 2015 Dick Willson and Dan LuKer Allied Partners LLC 1 Agenda Future Synchrophasor Networks
More informationVENDOR CONTRACTING : CYBERSECURITY CHECKLIST
Software and Supply Chain Assurance Winter Forum 2017 VENDOR CONTRACTING : CYBERSECURITY CHECKLIST Lucy L. Thomson, Esq. CISSP American Bar Associa:on (ABA) Cybersecurity Legal Task Force Livingston PLLC,
More informationITSY Information Technology Security Course Syllabus Spring 2018
ITSY 1342 - Information Technology Security Course Syllabus Spring 2018 Instructor Course Reference Number (CRN) Course Description: Name: Fidelis Ngang Tel: 713-718-5552 Office: Spring Branch, Room 900L
More informationUpdating the contents and structure of Computer Engineering Larry Hughes Electrical and Computer Engineering Dalhousie University 18 November 2016
Introduction Updating the contents and structure of Computer Engineering Larry Hughes Electrical and Computer Engineering Dalhousie University 8 November 06 The Department of Electrical and Computer Engineering
More informationCourse Design Document. IS436: Data Security and Privacy. Version 1.0
Course Design Document IS436: Data Security and Privacy Version 1.0 7 July 2014 Table of Content 1 Versions History... 3 2 Overview of Data Security and Privacy Course... 3 2.1 Synopsis... 3 2.2 Prerequisites...
More informationSeneca. August 26,20II
FROM THE OFFICE OF THE PRESIDENT llavid.&$n$w, tlr*sitiqnt Seneca Seneca College Df Applied Arts and Technology $ Ih{ *$ilii*ii Wr,l_! i\"liirt{hsilr. il \l 1..}[r *Y I f 411'l 4ll li{lif ri"llfri $j t,r,
More informationcctld in the Frontier of the IG Ecosystem Mo Dong China Internet Network Informa4on Center
cctld in the Frontier of the IG Ecosystem Mo Dong China Internet Network Informa4on Center cctld in IG Definition and Contents of Internet Governance The Definition of Internet Governance Internet governance
More informationINFORMATION SESSION. MS Software Engineering, specialization in Cybersecurity
INFORMATION SESSION MS Software Engineering, specialization in Cybersecurity Presenter Afifa Hamad Program Specialist Graduate & Extended Studies Charles W. Davidson College of Engineering San Jose State
More informationUser Community Driven Development in Trust and Identity Services
User Community Driven Development in Trust and Identity Services Ann Harding, SWITCH Internet2 Global Summit 27 April 2015 Washington DCs Agenda Trust and Iden.ty Landscape GÉANT Research Community Engagement
More informationNetworking: Modelling and Standardisa>on
Mestrado em Engenharia Informá>ca e de Computadores Master Degree (MSc) in Informa>on Systems and Computer Engineering Administração e Gestão de Infra-estruturas de IT IT Infrastructure Management and
More informationCybersecurity Workshop: Critical Cybersecurity Education & Professional Development
Cybersecurity Workshop: Critical Cybersecurity Education & Professional Development Ben Scribner, Program Manager Department of Homeland Security (DHS) National Cybersecurity Education & Awareness Branch
More informationDiscover Viterbi: Computer Science, Cyber Security & Informatics Programs. Viterbi School of Engineering University of Southern California Fall 2017
Discover Viterbi: Computer Science, Cyber Security & Informatics Programs Viterbi School of Engineering University of Southern California Fall 2017 WebEx Quick Facts Will I be able to get a copy of the
More informationDetec%ng Wildlife in Uncontrolled Outdoor Video using Convolu%onal Neural Networks
Detec%ng Wildlife in Uncontrolled Outdoor Video using Convolu%onal Neural Networks Connor Bowley *, Alicia Andes +, Susan Ellis-Felege +, Travis Desell * Department of Computer Science * Department of
More informationJanuary 2011 Joint ISACA/IIA Mee5ng
January 2011 Joint ISACA/IIA Mee5ng Panel Discussion - Cloud Compu5ng January 13, 2011 Agenda Learning Objec5ves Introduc5ons Defini5ons Discussion Resource Links Note: Electronic copies of this presenta2on
More informationVirtualization. Introduction. Why we interested? 11/28/15. Virtualiza5on provide an abstract environment to run applica5ons.
Virtualization Yifu Rong Introduction Virtualiza5on provide an abstract environment to run applica5ons. Virtualiza5on technologies have a long trail in the history of computer science. Why we interested?
More informationREsources linkage for E-scIence - RENKEI -
REsources linkage for E-scIence - - hlp://www.e- sciren.org/ REsources linkage for E- science () is a research and development project for new middleware technologies to enable e- science communi?es. ""
More informationFITC Institute Final Report Appendix K. Curriculum Analysis Report: Florida State University Computer Science Program
FITC Institute Final Report Appendix K Curriculum Analysis Report: June 9, 2015 Chandrahasa Ambavarapu, Graduate Research Assistant Jinxuan Ma, Ph.D., Post-Doctoral Researcher Heather Kelleher, Graduate
More informationSynergies of the Common Criteria with Other Standards
Synergies of the Common Criteria with Other Standards Mark Gauvreau EWA-Canada 26 September 2007 Presenter: Mark Gauvreau (mgauvreau@ewa-canada.com) Overview Purpose Acknowledgements Security Standards
More informationBachelor of Information Technology (Network Security)
Course information for Bachelor of Information Technology (Network Security) Course Number HE20524 Location Meadowbank Course Design The Bachelor of Information Technology (Network Security) is a three-year
More informationPROGRAMME SPECIFICATION
PROGRAMME SPECIFICATION Master of Computing (Hons) in Computer Security Awarding institution Teaching institution UCAS Code JACS Code Programme Duration Language of Programme Liverpool John Moores University
More informationThe fast track to top skills and top jobs in cyber. Guaranteed. FREE TO TRANSITIONING VETERANS
The fast track to top skills and top jobs in cyber. Guaranteed. FREE TO TRANSITIONING VETERANS WELCOME SANS Institute is presenting the SANS VetSuccess Immersion Academy in San Diego. For transitioning
More information