Debate - Cybersecurity
|
|
- Prudence Black
- 5 years ago
- Views:
Transcription
1 Debate - Cybersecurity within Computing Science Degrees Prof Liz Bacon BCS President Deputy Pro Vice-Chancellor, University of Greenwich Adrian Davis (ISC) 2 and Lyndsay Turley (ISC) 2
2 Cybersecurity Context Cybersecurity is one of the fastest developing requirements within industry and Government Global Information Security Workforce Study, commissioned by (ISC) 2, predicts that the workforce in cybersecurity will double within five years, with 11% year on year growth Since 2010 cyber threats have been classed as a tier 1 threat on the National Risk Register for the UK, alongside terrorism, natural hazards etc. 2
3 An explosion of vulnerability (1) 3
4 An explosion of vulnerability (2) 4
5 Shortage!!!! Lack of available entry level education or roles 5
6 Need for cybersecurity knowledge Cybersecurity considered an economic/societal priority Government/Industry looking to Universities for cybersecurity talent To prevent vulnerability: Cybersecurity knowledge is core to computing Call for more emphasis on professional/industry requirements within degrees 6
7 Current University Context Major supplier of talent to the industry Verizon report 92% of 100,000 incidents analysed over 10 years can be described by 9 basic patterns On average, top 3 patterns cover 72% of incidents Issue: Computing degrees (excluding specialist security degrees) aren t ensuring students are competent in the basics so mistakes are being repeated Industry needs cybersecurity savvy graduates 7
8 An opportunity missed? 56% of cybersecurity departments understaffed 7% of cybersecurity workforce under 29 years old 28% new entrants to cybersecurity profession come from a more general role in IT 13% unemployment of 2013 computer science graduates six months after leaving university HESA eskills UK 11% growth year on year growth to 2017 (ISC)2 /Frost & Sullivan less than 5% of university courses offer one optional module on security 2013 academic/industry workshop 8
9 Academic Perspective: To Date Different approaches to security in computing No incentive to incorporate more cybersecurity Not a popular option Reaccreditation to include was onerous Many other competing subject areas To do Clarify value of cybersecurity as a subject (white paper) Define how much and where security should be taught Highlight the significant professional resources that exist 9
10 Building on existing resource Within computing ACM BCS/IET CompTIA ecf The Tech Partnership (eskills UK) Within cybersecurity (ISC) 2 CBK IISP GCHQ/OSCIA CREST This project is not about creating something from scratch: there is a wealth of knowledge, research and practical material that can be adopted, incorporated, referenced and so on 10
11 Our Objectives for this Project Engage UK universities in the effort to close a recognised skills gap in cybersecurity Stem vulnerability by informing criteria in cybersecurity for courses accredited by the BCS and IET Note: Both have accreditation guidelines include security at a high level security can be inferred within many statements Motivate universities to recognise and embed knowledge areas most relevant to their programmes Enhance awareness & preparedness for career opportunities in IT and cybersecurity, business management 11
12 What we want to achieve Agree foundational cyber security knowledge areas for undergraduate CS degrees (not specialist security degrees!) Agree priority subject areas within computing science where cybersecurity education should be embedded Agree an approach to accreditation for courses where cybersecurity knowledge is relevant (computing science as first focus) 12
13 The challenges (1) Computing Science and related degrees are full Much to teach Accreditation to be kept What do we drop or replace? What is less or more important? Meeting academic / accreditation / vocational / employers requirements Stretched too thin? 13
14 The challenges (2) How much knowledge do we impart? Familiarity/awareness/? When do we impart that knowledge? Which Year is the right one to introduce cyber? We offer security as module already and have low take-up Why teach it? 14
15 Questions 1. What are the foundational cyber security principles? 2. To which computing subject areas do these principles apply? 3. What cybersecurity knowledge areas apply to the priority computing subject areas? 4. To what depth should cybersecurity be taught in each computing subject area where it is present? 15
16 Debate held 7 th Nov - outcomes 1. General agreement that cybersecurity needs to be a fundamental component of CS and related degrees 2. Aim is to support development rather than prescribe the curriculum 3. While current criteria cover the breadth of need, it was agreed more explanation is required to describe the scope of what should be included to achieve it 4. Supplementary guidelines would also help course designers recognise the requirement for security content within particular subject areas need balance between generality and detail 5. Re-accreditation shouldn't be necessary - should include relevant content within existing course structures 16
17 Next Steps - Timelines Q Q2 Produce draft accreditation paper for comment Workshop to: review accreditation paper agree incorporation into accreditation guidelines Present findings at CPHC Conference Work with BCS and IET to revise accreditation guidelines 17
18 Thank you Liz Bacon: Adrian Davis: Lyndsay Turley:
Embedding Cyber Security in the Computer Science Curriculum. Alastair Irons, Carsten Maple, Nick Savage, Adrian Davis, Lyndsay Turley
Embedding Cyber Security in the Computer Science Curriculum Alastair Irons, Carsten Maple, Nick Savage, Adrian Davis, Lyndsay Turley Objectives from Session To discuss the issue trying to be resolved Summary
More informationSTUDENT AND ACADEMIC SERVICES
PROGRAMME SPECIFICATION Part 1: Information Awarding Institution Teaching Institution Delivery Location Study abroad / Exchange / Credit recognition Faculty responsible for programme Department responsible
More informationCESG:10 Steps to Cyber Security WORKING WITH GOVERNMENT, INDUSTRY AND ACADEMIA TO MANAGE INFORMATION RISK
CESG:10 Steps to Cyber Security WORKING WITH GOVERNMENT, INDUSTRY AND ACADEMIA TO MANAGE INFORMATION RISK Building resilience: 10 Steps to Cyber Security 1. Information Risk Management Regime 2. Secure
More informationWhich Side Are You On?
12/9/2015 ARE YOU THE NEXT CYBER WARRIOR? Maria S. Thompson State Chief Risk/Security Officer Which Side Are You On? 8/17/2015 2 Information Technology 2 1 Cyber Professionals Deficiency Statistics Cybersecurity
More informationSchool of Engineering & Computational Sciences
Catalog: Undergraduate Catalog 2014-2015 [Archived Catalog] Title: School of Engineering and Computational Sciences School of Engineering & Computational Sciences Administration David Donahoo, B.S., M.S.
More informationITU CBS. Digital Security Capacity Building: Role of the University GLOBAL ICT CAPACITY BUILDING SYMPOSIUM SANTO DOMINGO 2018
GLOBAL ICT CAPACITY BUILDING SYMPOSIUM ITU CBS SANTO DOMINGO 2018 Digital Capacity Building: Role of the University 18 20 June 2018 Santo Domingo, Dominican Republic Dr. Nizar Ben Neji Faculty of Sciences
More informationComputing Accreditation Commission Version 2.0 CRITERIA FOR ACCREDITING COMPUTING PROGRAMS
Computing Accreditation Commission Version 2.0 CRITERIA FOR ACCREDITING COMPUTING PROGRAMS Optional for Reviews During the 2018-2019 Accreditation Cycle Mandatory for Reviews During the 2019-2020 Accreditation
More informationKEY PROGRAMME INFORMATION. Originating institution(s) Bournemouth University. Faculty responsible for the programme Faculty of Science and Technology
KEY PROGRAMME INFORMATION Originating institution(s) Bournemouth University Faculty responsible for the programme Faculty of Science and Technology Final award(s), title(s) and credits 20 (60 ECTS) Level
More informationSchool of Engineering & Built Environment
School of Engineering & Built Environment BEng (Hons) in Digital Security, Forensics & Ethical Hacking Programme Specification Proforma (PSP) August 2015 P a g e 1 GLASGOW CALEDONIAN UNIVERSITY Programme
More informationNCSF Foundation Certification
NCSF Foundation Certification Overview This ACQUIROS accredited training program is targeted at IT and Cybersecurity professionals looking to become certified on how to operationalize the NIST Cybersecurity
More informationISACA MOSCOW CHAPTER Chapter meeting 22 September 2016
ISACA MOSCOW CHAPTER Chapter meeting 22 September 2016 Introduction Special guest speaker ISACA Audit committee member, Rosemary Amato Open dialog Wrap-up and close Special guest speaker CISA, CMA, CPA,
More informationStrengthening Capacity in Cyber Talent sans.org/cybertalent
SANS Security Awareness Summit August 4th, 2016 Strengthening Capacity in Cyber Talent sans.org/cybertalent Cybersecurity: The Current State Skills Mismatch Emphasis on theory over practice Education focus
More informationSTUDENT LEARNING OUTCOMES Beacom College of Computer and Cyber Sciences
STUDENT LEARNING OUTCOMES Beacom College of Computer and Cyber Sciences Undergraduate Programs - Bachelor B.S. Computer Game Design Upon completion of the B.S. degree in Computer Game Design, students
More informationTHE LIFE AND TIMES OF CYBERSECURITY PROFESSIONALS
SESSION ID: AST3-R02 THE LIFE AND TIMES OF CYBERSECURITY PROFESSIONALS Jon Oltsik Senior Principal Analyst Enterprise Strategy Group @joltsik Candy Alexander, CISSP CISM International Board Director ISSA
More informationYou will choose to study units from one of four specialist pathways depending on the career you wish to pursue. The four pathways are:
Qualification Title: OCR Level 3 Cambridge Technical Diploma in IT Qualification Number: 601/7101/7 Overview This qualification is designed for you if you re 16 years old or over and prefer to study IT
More informationGuidelines for Texas Skill Standards Based Program Recognition
Guidelines for Texas Skill Standards Based Program Recognition Texas Workforce Investment Council 1100 San Jacinto Boulevard, Suite 1.100 Austin, Texas 78701 (512) 936 8100 www.gov.texas.gov/twic Publication
More informationAligning Academic Supply and Industry Demand
Aligning Academic Supply and Industry Demand Presented by: RADM (ret) Ken Slaght, Co-Chair & President, San Diego Cyber Center of Excellence (CCOE) 1 Cyber Center of Excellence (CCOE) CCOE is a non-profit
More informationIT Specialist Program Format 5, page
FORMAT 5 Submit originals and one copy and electronic copy to Governance/Faculty Senate Office (email electronic copy to fysenat@uaf.edu) SUBMITTED BY: PROGRAM/DEGREE REQUIREMENT CHANGE (MAJOR/MINOR) Department
More informationBuilding the Cybersecurity Workforce. November 2017
Building the Cybersecurity Workforce November 2017 Our Global Footprint Measuring Kaplan University s Educational Impact For every career path +1MM students annually served Facilities in 30+ countries
More informationCybersecurity Workshop: Critical Cybersecurity Education & Professional Development
Cybersecurity Workshop: Critical Cybersecurity Education & Professional Development Ben Scribner, Program Manager Department of Homeland Security (DHS) National Cybersecurity Education & Awareness Branch
More informationBuilding new cybersecurity pipelines. NICE Conference 2017 November 8, Strengthening Cyber Workforce Development sans.
Building new cybersecurity pipelines NICE Conference 2017 November 8, 2017 Strengthening Cyber Workforce Development sans.org/cybertalent Cybersecurity: The Current State Skills Mismatch Emphasis on theory
More informationBTEC LEVEL 4 Higher National Certificate in Business
BTEC LEVEL 4 Higher National Certificate in Business HNC Business (RQF programme) HNC Programme Specification 1. Qualification HNC 2. Programme Title Business 3. UCAS Code 4. Programme Type Full time 5.
More informationImplementation Strategy for Cybersecurity Workshop ITU 2016
Implementation Strategy for Cybersecurity Workshop ITU 2016 Council for Scientific and Industrial Research Joey Jansen van Vuuren Intricacies and interdependencies cyber policies must address potential
More informationDeveloping Career-Relevant Academic Programs
2016 USENIX Summit for Educators in System Administration Developing Career-Relevant Academic Programs A Case Study: UMUC s B.S. Program in Computer Networks & Cybersecurity S. K. Bhaskar (S.Bhaskar@umuc.edu)
More informationHearing Voices: The Cybersecurity Pro s View of the Profession
SESSION ID: AST2-W02 Hearing Voices: The Cybersecurity Pro s View of the Profession Jon Oltsik Senior Principal Analyst and ESG Fellow Enterprise Strategy Group @joltsik Candy Alexander, CISSP CISM International
More informationBachelor Business Engineering Technology (Hons) in Networking System (BNS)
NAME OF PROGRAMME Bachelor Business Engineering Technology (Hons) in Networking System (BNS) SHORT DESCRIPTION With embedded curriculum of professional bodies such Microsoft, COMPTIA to equip students
More informationEC-Council Certified Incident Handler v2. Prepare to Handle and Respond to Security Incidents EC-COUNCIL CERTIFIED INCIDENT HANDLER 1
EC-Council Certified Incident Handler v2 Prepare to Handle and Respond to Security Incidents EC-COUNCIL CERTIFIED INCIDENT HANDLER 1 THE CRITICAL NATURE OF INCIDENT HANDLING READINESS An organized and
More informationApprenticeships CYBER SECURITY HIGHER APPRENTICESHIP FROM IT TECHNICIAN TO SKILLED INFORMATION SECURITY PROFESSIONAL
Apprenticeships CYBER SECURITY HIGHER APPRENTICESHIP FROM IT TECHNICIAN TO SKILLED INFORMATION SECURITY PROFESSIONAL WHY CHOOSE QA? There are lots of apprenticeship providers out there but we think we
More informationSchool of Engineering and Computational Sciences
Catalog: Undergraduate Catalog 2012-2013 [Archived Catalog] Title: School of Engineering and Computational Sciences School of Engineering and Computational Sciences David Donahoo, B.S., M.S. Interim Dean,
More informationTHE POWER OF TECH-SAVVY BOARDS:
THE POWER OF TECH-SAVVY BOARDS: LEADERSHIP S ROLE IN CULTIVATING CYBERSECURITY TALENT SHANNON DONAHUE DIRECTOR, INFORMATION SECURITY PRACTICES 1 IT S A RISK-BASED WORLD: THE 10 MOST CRITICAL UNCERTAINTIES
More informationCertification. What: Who: Where:
Certification What: Certification is a process by which the Wisconsin Technical College System Office evaluates the occupational, academic, and teaching experience of district employees to determine his/her
More informationCyberbit Range. A Global Success Story by CYBERBIT 2017 by CYBERBIT Proprietary CYBERBIT Proprietary
Cyberbit Range A Global Success Story 2017 by CYBERBIT 2017 by CYBERBIT Proprietary CYBERBIT Proprietary The Israeli Defense Forces Cyber Academy (Israel) The official training platform for the Israeli
More informationUniversity Strategy
University Strategy 2011-2015 FOREWORD Dear Colleagues Thank you for your contributions to the University Strategy 2011-2015, which was endorsed by University Council at its meeting in December 2010. The
More informationCyber Security School
Cyber Cyber Security School FUTURE PROOF Y SECURITY TALENT "The UK needs to tackle the systemic issues at the heart of the Cyber skills shortage..." National Cyber Security Strategy 2016-2021, HM Government
More informationWelcome to the HP Institute
Welcome to the HP Institute How HP is working with education to develop tomorrow s IT workforce today Capability Business need for speed The rate of business is increasing exponentially 2020 2T devices
More informationCISCO NETWORKING ACADEMY CASE STUDY
NETWORKING ACADEMY CASE STUDY MARCH 2018 CUSTOMER PROFILE Cisco Systems Inc. is the worldwide leader in IT that helps companies seize the opportunities of tomorrow by proving that amazing things can happen
More informationState of the Cyber Training Market January 2018
State of the Cyber Training Market January 2018 2018 by CYBERBIT 2018 by CYBERBIT Proprietary CYBERBIT Proprietary Cybersecurity Market Worth 202.36 Billion USD by 2021 Marketandmarkets analysis, 2017
More informationCyberVista Certify cybervista.net
ONLINE CYBERSECURITY CERTIFICATION TRAINING CyberVista Certify ONLINE CYBERSECURITY CERTIFICATION TRAINING CyberVista Certify CyberVista offers the industry s most comprehensive cybersecurity training
More informationWhy the Security Workforce Needs More Women and Men
Why the Security Workforce Needs More Women and Men ISSA International Conference Tammy Moskites, CIO/CISO, Venafi October 10, 2015 A Little Bit About Me 25+ Years in IT & Security Current CIO/CISO of
More informationCIM Level 3 Foundation Certificate in Marketing
Qualification Specification: CIM Level 3 Foundation Certificate in Marketing About CIM CIM (The Chartered Institute of Marketing) has been representing its members and the industry for over 100 years.
More informationKeeping Your SOCs Full. May 26, Strengthening Capacity in Cyber Talent sans.org/cybertalent
Keeping Your SOCs Full May 26, 2016 Strengthening Capacity in Cyber Talent sans.org/cybertalent Cybersecurity: The Current State Skills Mismatch Emphasis on theory over practice Education focus on theoretical
More informationNational Initiative for Cyber Education (NICE) and the Cybersecurity Workforce Framework: Attract and Retain the Best in InfoSec.
National Initiative for Cyber Education (NICE) and the Cybersecurity Workforce Framework: Attract and Retain the Best in InfoSec April 12, 2018 1 Introduction to NICE - The National Initiative for Cybersecurity
More informationPREPARE FOR TAKE OFF. Accelerate your organisation s journey to the Cloud.
PREPARE FOR TAKE OFF Accelerate your organisation s journey to the Cloud. cloud. Contents Introduction Program & Governance BJSS Cloud Readiness Assessment: Intro Platforms & Development BJSS Cloud Readiness
More informationMODULE SPECIFICATION UNDERGRADUATE PROGRAMMES KEY FACTS
MODULE SPECIFICATION UNDERGRADUATE PROGRAMMES KEY FACTS Module name Audit and Assurance Module code AF3100 School Cass Business School Department or equivalent UG Programme UK credits 15 ECTS 7.5 Level
More informationDriving Global Resilience
Driving Global Resilience Steve Mellish FBCI Chairman, The Business Continuity Institute Monday December 2nd, 2013 Business & IT Resilience Summit New Delhi, India Chairman of the Business Continuity Institute
More informationCourse Specifications M. Tech. / PG Diploma Programme
Course Specifications M. Tech. / PG Diploma Programme Faculty of Engineering & Technology M. S. Ramaiah University of Applied Sciences University House, New BEL Road, MSR Nagar, Bengaluru 560 054 www.msruas.ac.in
More informationGovernment Resolution No of February 15, Resolution: Advancing National Regulation and Governmental Leadership in Cyber Security
Government Resolution No. 2443 of February 15, 2015 33 rd Government of Israel Benjamin Netanyahu Resolution: Advancing National Regulation and Governmental Leadership in Cyber Security It is hereby resolved:
More informationStakeholder feedback form
Stakeholder feedback form Leveraging insights yielded from extensive industry consultation, the NSW Department of Industry has developed a Government-led and industry-driven Strategy to grow the NSW cyber
More informationConstruction and Property
ACADEMIC SERVICES Part 1: Basic Data Awarding Institution Teaching Institution Delivery Location Faculty responsible for programme Department responsible for programme Modular Scheme Title Professional
More informationMSc Cyber Security. International Students Can Apply
MSc Cyber Security International Students Can Apply UCAS Code: Course Length: P052286 12-18 Months Full-Time, 2-3 Years Part-Time Start Dates: September 2019, January 2020, Department: Location: September
More informationIT Essentials I: PC Hardware and Software v4.0 Detailed Objectives (Draft) November 2006
IT Essentials I: PC Hardware and Software v4.0 Detailed Objectives (Draft) November 2006 The following draft of detailed objectives will be used by the authoring team to write the content of the revised
More informationCRITERIA FOR ACCREDITING COMPUTING PROGRAMS
CRITERIA FOR ACCREDITING COMPUTING PROGRAMS Effective for Reviews During the 2014-2015 Accreditation Cycle Incorporates all changes approved by the ABET Board of Directors as of October 26, 2013 Computing
More informationCLOSING IN FEDERAL ENDPOINT SECURITY
CLOSING IN FEDERAL ENDPOINT SECURITY More than half of agency IT officials worry about cyberattacks involving endpoint devices as a means of accessing agency networks. Yet many aren t taking advantage
More informationOverview of NIPP 2013: Partnering for Critical Infrastructure Security and Resilience October 2013
Overview of NIPP 2013: Partnering for Critical Infrastructure Security and Resilience October 2013 PPD-21: CI Security and Resilience On February 12, 2013, President Obama signed Presidential Policy Directive
More informationBOARD OF REGENTS ACADEMIC AFFAIRS COMMITTEE 4 STATE OF IOWA SEPTEMBER 12-13, 2018
STATE OF IOWA SEPTEMBER 12-13, 2018 REQUEST FOR NEW PROGRAM AT IOWA STATE UNIVERSITY: BACHELOR OF SCIENCE IN CYBER SECURITY ENGINEERING Contact: Rachel Boon Action Requested: Consider approval of the request
More informationSchool of Engineering & Built Environment
School of Engineering & Built Environment BSc (Hons) in Cyber Security and Networks Programme Specification Proforma (PSP) 2015/2016 Programme Specification Document 2015/2016 BSc (Hons) in Cyber Security
More informationExpected start dates September Placements 30 weeks, optional Partnership model Not applicable
KEY PROGRAMME INFORMATION Originating institution(s) Bournemouth University Faculty responsible for the programme Faculty of Science and Technology Final award(s), title(s) and credits 20 (60 ECTS) Level
More informationTeaching of Computer Science in Schools Supporting changes to the National Curriculum
Teaching of Computer Science in Schools Supporting changes to the National Curriculum Irene Glendinning, Coventry University Margaret Low, University of Warwick BCS, Coventry Branch 1 Our presentation
More informationNCSF Foundation Certification
NCSF Foundation Certification Overview This ACQUIROS accredited training program is targeted at IT and Cybersecurity professionals looking to become certified on how to operationalize the NIST Cybersecurity
More informationSchool of Engineering and Built Environment. MSc. Information Technology (Oil & Gas) Programme Specification Document
School of Engineering and Built Environment MSc. Information Technology (Oil & Gas) Programme Specification Document 20/2016 1. Programme Specification Pro-forma GENERAL INFORMATION Programme Titles: Final
More informationDeveloping a Model for Cyber Security Maturity Assessment
Developing a Model for Cyber Security Maturity Assessment Tariq Al-idrissi, Associate Vice President IT, Trent University Ian Thomson, Information Security Officer, Trent University June 20 th, 2018 (8:45am
More informationUK Gender Pay Gap Report 2018
UK Gender Pay Gap Report 2018 As part of McAfee s commitment to build a better, more balanced workplace and community, we wholly embrace the UK Gender Pay Gap report. This year s calculations cover our
More informationUnderstanding Cybersecurity Talent Needs Findings From Surveys of Business Executives and College Presidents
Understanding Cybersecurity Talent Needs Findings From Surveys of Business Executives and College Presidents BHEF_Report_mk_050817_ms Acknowledgements This report is supported primarily by a grant from
More informationIncident Response. Tony Drewitt Head of Consultancy IT Governance Ltd
Incident Response Tony Drewitt Head of Consultancy IT Governance Ltd www.itgovernance.co.uk IT Governance Ltd: GRC One-Stop-Shop Thought Leaders Specialist publisher Implementation toolkits ATO Consultants
More informationGRADUATE CERTIFICATE IN INFORMATION SECURITY MANAGEMENT
GRADUATE CERTIFICATE IN INFORMATION SECURITY MANAGEMENT If you are looking to develop expertise in a specialized area and broaden your knowledge base, but time and cost limitations are interfering with
More informationNIS Standardisation ENISA view
NIS Standardisation ENISA view Dr. Steve Purser Brussels, 19 th September 2017 European Union Agency for Network and Information Security Instruments For Improving Cybersecurity Policy makers have a number
More informationAssociation for International PMOs. Expert. Practitioner. Foundation PMO. Learning.
AIPM Association for International PMOs Expert Practitioner Foundation www.pmolearning.co.uk PMO The Leading Standard and Certification for PMO Professionals Today Understand the Value of High-Performing
More informationProgramme Specification Section 1
Programme Specification Section 1 KEY PROGRAMME INFORMATION Originating institution(s) Bournemouth & Poole ollege Final award(s), title(s) and credits 120 (60 ETS) Level 4 / 120 (60 ETS) Level 5 credits
More informationFoundation Learning as a progression route to. Apprenticeships. The Toolkit
Foundation Learning as a progression route to Apprenticeships The Toolkit Introduction Although Middlesbrough has a higher than average take up on Apprenticeship programmes, a significant number of 16
More informationCYBERSECURITY RESILIENCE
CLOSING THE IN CYBERSECURITY RESILIENCE AT U.S. GOVERNMENT AGENCIES Two-thirds of federal IT executives in a new survey say their agency s ability to withstand a cyber event, and continue to function,
More informationQuality Code for Higher Education. Application for Validation Part 1: Programme/Stage Specification Pro Forma
Quality Code for Higher Education Application for Validation Part 1: Programme/Stage Specification Pro Forma INTRODUCTION Identifiers (e.g. a, b, c etc) should be used throughout this document to indicate
More informationCOURSE BROCHURE. ITIL - Intermediate SERVICE STRATEGY Training & Certification
COURSE BROCHURE ITIL - Intermediate SERVICE STRATEGY Training & Certification What is ITIL SS? The Service Strategy (SS) qualification is one of five ITIL Service Lifecycle modules and provides you with
More informationADMINISTRATIVE REGULATION Milwaukee Area Technical College Title: PROFESSIONAL GROWTH CREDIT EVALUATION FOR CERTIFIED POSITIONS
Certification is a process by which the Wisconsin Technical College System (WTCS) evaluates the occupational, academic, and teaching experience of an employee to determine his/her preparedness to work
More informationBachelor of Applied Science Degree IT NETWORKING
Bachelor of Applied Science Degree IT NETWORKING Beginning fall 2017! Whatcom Community College s nationally acclaimed computer information systems program will begin offering a bachelor of applied science
More informationDIABLO VALLEY COLLEGE CATALOG
COMPUTER NETWORK TECHNOLOGY CNT Despina Prapavessi, Dean Math and Computer Sciences Division Math Building, Room 267 Possible career opportunities These CNT-courses prepare students for a career path in
More informationUpdating the contents and structure of Computer Engineering Larry Hughes Electrical and Computer Engineering Dalhousie University 18 November 2016
Introduction Updating the contents and structure of Computer Engineering Larry Hughes Electrical and Computer Engineering Dalhousie University 8 November 06 The Department of Electrical and Computer Engineering
More informationMicro-Enterprise Start to Finish
1 Micro-Enterprise Start to Finish 2 Micro-Enterprise Credential: Start to Finish Jason Mercer STEM/CTE Instructor Winnfield Senior High lamicroenterprise@icloud.com 3 What is the BRAC Micro-Enterprise
More informationCareer Readiness Pathways
FUEL EDUCATION SOLUTION Career Readiness Pathways A Comprehensive Online and Blended Learning Program for Career and Technical Education, Leading Students from Exploration through Certification Igniting
More informationCyber Security Advanced Education: Preparing the Emerging Workforce
Cyber Security Advanced Education: Preparing the Emerging Workforce Scott vonfischer, CISO We are all apprentices in a craft where no one ever becomes a master. Ernest Hemingway A Unique Perspective on
More informationPECB UNIVERSITY PECB UNIVERSITY
PECB UNIVERSITY In today s dynamic world a degree with no specialization can hardly yield well-rounded qualifications and serve as a substantial baggage for climbing the career ladder. Taking control over
More informationDeveloping the Next Generation Cyber Army VINCENT NESTLER, PH. D., CALIFORNIA STATE UNIVERSITY, SAN BERNARDINO
Developing the Next Generation Cyber Army VINCENT NESTLER, PH. D., CALIFORNIA STATE UNIVERSITY, SAN BERNARDINO Bio Assistant Director, Cybersecurity Center California State University, San Bernardino Professor,
More informationGRADUATE CERTIFICATE IN BUSINESS CONTINUITY MANAGEMENT
GRADUATE CERTIFICATE IN BUSINESS CONTINUITY MANAGEMENT If you are looking to develop expertise in a specialized area and broaden your knowledge base, but time and cost limitations are interfering with
More informationTechnical Conference on Critical Infrastructure Protection Supply Chain Risk Management
Technical Conference on Critical Infrastructure Protection Supply Chain Risk Management Remarks of Marcus Sachs, Senior Vice President and the Chief Security Officer North American Electric Reliability
More informationA guide to CompTIA training and certification DDLS Australia Pty Ltd
A guide to CompTIA training and certification 1 DDLS DDLS is an accredited CompTIA training organisation, offering the courses needed to establish CompTIA A+, Linux+, Network+, and Security+. DDLS can
More informationIn order to reduce the amount of paper involved in a submission, BCS requires much of the documentation on CD, preferably in HTML format.
Type 2 - HEI application for BCS accreditation Submission document In order to reduce the amount of paper involved in a submission, BCS requires much of the documentation on CD, preferably in HTML format.
More informationMSc Computing and Technology (Part-Time)
MSc Computing and Technology (Part-Time) Campus: London Level of study: Postgraduate Tuition fee: 7,650 (UK/EU) Entry requirements: 2:2 (second class) honours degree or equivalent in any discipline English
More informationCollaboration on Cybersecurity program between California University and Shippensburg University
Collaboration on Cybersecurity program between California University and Shippensburg University Weifeng Chen Dept. of Math, Computer Science and Information Systems California University, California,
More informationNew CEPIS Mission
New CEPIS Mission 2016-2020 Contents: 1 Introduction... 3 2 CEPIS Today... 3 3 CEPIS Tomorrow... 3 1.1 Mission Statement... 3 1.2 Target Audiences... 3 1.3 Strategy... 4 1.3.1 Promoting High Standards
More informationCybersecurity Fundamentals
Cybersecurity Fundamentals Prof. Georges Ataya, Vice President of the Belgian Cybersecurity Coalition Academic Director, IT Management Education (Solvay Brussels School of Economics and Management) Managing
More informationHomeland Security 1 1
1 Foster effective cybersecurity education and workforce by facilitating the availability of qualified It security professionals to support the Nation s cyber security needs Improve cyber security education/training
More information3.4.3 Bachelor of Technology (Electronics Engineering)
3.4.3 Bachelor of Technology (Electronics Engineering) The BTech (Electronics Engineering) is offered in partnership with the Department of Electrical & Computer Engineering. The programme aims to graduate
More informationPROGRAMME SPECIFICATION
PROGRAMME SPECIFICATION Master of Computing (Hons) in Computer Security Awarding institution Teaching institution UCAS Code JACS Code Programme Duration Language of Programme Liverpool John Moores University
More informationNZTECH ADVANCE SECURITY SUMMIT: ADDRESSING A CRITICAL
NZTECH ADVANCE SECURITY SUMMIT: ADDRESSING A CRITICAL SKILLS SHORTAGE BRIEFING PAPER CONNECT PROMOTE ADVANCE @NZTechIA PREPARED BY THE NEW ZEALAND TECHNOLOGY INDUSTRY ASSOCIATION Published: November 2016
More informationNational Initiative for Cybersecurity Education
National Initiative for Cybersecurity Education NIST Special Publication, 800-181 NICE Cybersecurity Workforce Framework Douglas Rausch Cybersecurity Program Director, Bellevue University Lead Skills-based
More informationStandard Course Outline IS 656 Information Systems Security and Assurance
Standard Course Outline IS 656 Information Systems Security and Assurance I. General Information s Course number: IS 656 s Title: Information Systems Security and Assurance s Units: 3 s Prerequisites:
More informationASTON UNIVERSITY PROGRAMME SPECIFICATION
ASTON UNIVERSITY PROGRAMME SPECIFICATION Programme Title UCAS/JACS School/Subject Area Final Award Interim Awards Mode(s) of Study Normal Length of Programme Total Credits Programme Accredited By Dates
More informationCALIFORNIA CYBERSECURITY TASK FORCE
CALIFORNIA CYBERSECURITY TASK FORCE Advancing California s cybersecurity priorities through public, private, corporate, and academic sector collaboration. Agenda Task Force Overview California Cybersecurity
More informationIT Information Security Manager Job Description
IT Information Security Manager Job Description IT Information Security Manager Responsible to: Accountable to: IT Service Manager Head of IT Services Overall Purpose To provide effective response, protection
More information13.f Toronto Catholic District School Board's IT Strategic Review - Draft Executive Summary (Refer 8b)
AGENDA ADDENDU TE REGULAR EETING OF TE AUDIT COITTEE COITTEE PUBLIC SESSION Tuesday, June 6, 2017 6:30 P.. Pages 13. Staff Reports 13.f Toronto Catholic District School Board's IT Strategic Review - Draft
More informationEngineering. June 2015
Faculty of Engineering and Informatics Programme Specification Programme title: MEng Chemical Engineering Academic Year: 2015-16 Degree Awarding Body: Partner(s), delivery organisation or support provider
More information