Robert A. Robertson Ph.D., CISSP, GCFE, GCFA, GCIA

Size: px
Start display at page:

Download "Robert A. Robertson Ph.D., CISSP, GCFE, GCFA, GCIA"

Transcription

1 Summary Rob began his technical career with Automatic Data Processing (ADP), in their Dealer Service Division. His position at ADP laid the foundation for his passion for finding solutions to business problems through the information systems that corporations build their businesses on. Thank you ADP and my co-workers there, I will always be in your debt. Continuous education is at the center of his life s philosophy. Education comes in many ways, formal, informal, on-the-job, certifications, etc. No matter the form the philosophy has always been, in terms of technology, security, and forensics, that it is imperative to get your hands dirty with the technology being able to work with technology and understand how it works creates the ability to provide solutions that benefit individuals, organizations, and society as a whole. Bottom line, Rob loves the prospect of continuing to learn and build skills in security and forensics, and approaches all situations with the mindset that he will be able to learn something new from anyone with whom he works. This philosophy has served him well in the academic world for the past 17 and a half years. He has a Doctorate in Information Systems (Security Emphasis), and has also pursued a number of industry certifications, broadening his knowledge in the security and forensics fields for the past fifteen-plus years. Experience Robert A. Robertson Ph.D., CISSP, GCFE, GCFA, GCIA 3860 W N Cedar City, UT, Phone Wk: Cell: Ironman627@gmail.com Southern Utah University (SUU), Cedar City, UT For the past 8 years I have served as the Department Chair for Computer Science and Information Systems at SUU. This position has helped me develop leadership and management skills while continuing my security and forensics education through industry certifications. The past two years I have also acted as the Graduate Director for the Masters in Cyber Security & Information Assurance (CSIA). As the chief architect of this degree at SUU, I have worked with industry professionals to ensure there is a strong connection to industry needs and the skills that graduates of the program will gain to improve the contributions they can make to current and future organizations for whom they work. The Masters of CSIA was created and is being taught completely online. Through these positions I have also gained experience working with other institutions on articulation agreements that foster collaboration between secondary and higher educational entities. Included as part of these duties, is the development of industry partnerships. These relationships have developed not only through an Industry Advisory Board (IAB), but also reaching out to organizations outside of our IAB to foster internships, and other student-centered experiential education opportunities.

2 In the fifteen years at SUU, I have taught many courses in relation to information systems, networking, security, and forensics. All of the classes that I have taught contained and continue to contain a hands-on component where students get an opportunity to work with technology in relation to course topics and concepts. A major part of the technology we use is virtualization of computing resources. Part of my responsibilities in the Department has included the configuration and management or our virtual environment for the MS-CSIA program. We currently have 5 hosts and over 370 virtual machines that are managed through this environment. These 5 hosts service both our undergraduate and graduate courses. Leavitt Group, Technical Support, , Cedar City, UT In my efforts to maintain a pulse on industry I worked with the Leavitt Group as a Tier-1 Client Analyst in support of Insurance Agency IT systems across the nation. Advanced Marketing Concepts (AMC), Technical Support Supervisor, AMC was an out-sourced contractor with Novell to provide Tier-1 & 2 support for their customers. As a Certified Novell Engineer and Certified Novell Instructor, this provided a continued opportunity to maintain skills outside of the classroom. Brigham Young University Hawaii, Instructor, , Laie, HI Responsible for teaching Data Communications & Networking, Network Administration, and Network Design & Implementation. Responsible for maintaining the labs for classes, back then they were not virtual, utilizing imaging software for machines in the labs to configure for each class and semester. J&M Services, contract Novell Instructor, Qualified as a CNE and CNI taught courses within the CNE curriculum to various clients. Automatic Data Processing, Technical Support Team , Portland, OR Started as a Client Technical Analyst in the Dealer Services Division, supporting ADP-centric software for auto dealers across the nation. Promoted to the Accounting Team Lead in Education Nova Southeastern University 2008, Ph.D. in Information Systems, Security Emphasis Research interests include: Network Security, Ethical Hacking, Digital Forensics, E-Commerce, Intrusion Detection Systems, Intrusion Prevention Systems University of Portland 97: Masters in Business Administration Began the MBA program at the same time I also started at ADP, and went to school at night to complete the degree. Broaden my education of the business-side of information systems. Portland State University 93: Bachelor of Arts in History, English minor

3 This degree provided the ability to communicate effectively to various audiences and gave me an appreciation of our world. It fed the desire to help improve our world and make it a better place to live. Industry Certifications: Certified Information Systems Security Professional (CISSP, Active) GIAC Information Security Professional (GISP, Active) GIAC Certified Forensic Analyst (GCFA, Active) GIAC Certified Forensic Examiner (GCFE, Active) GIAC Certified Intrusion Analyst (GCIA, Active) CompTIA A+/Network+ Certified Ethical Hacker (CEH) ( Not active) Certified Penetration Tester (CPT) ( Not active) Certified Novell Instructor, Certified Novell Engineer (Not active) Microsoft Certified Systems Engineer (MCSE) (Not active) Microsoft Certified Trainer (MCT) (Not active) Professional Activities Completed the FOR585: Advanced Smartphone Forensics course with the SANS Institute (prior to the certification being created) Serving on Technology Advisory Board for Southwest Applied Technology College (Cedar City, UT since 2008) Member of Infragard, SLC chapter Analysis of BYU-Hawaii campus network design ABET Conference, San Diego, Spring 2006 Professional Membership: Association of Information Systems RSA Security Conference 2005, 2016 Network consulting for Colorado City School District, and NuBank (Cedar City) Lead Novell team technicians in providing solutions to client issues and requests (AMC, ) A+ Certification (December 2009) Network+ Certification (December 2009) Volunteer on the Laie Elementary School Technology Committee (Laie, Hawaii) Volunteer on the Gateway Preparatory Academy Technology Committee (Cedar City, UT, ) Professional Presentations/Publications: Robertson, R.A. (2012). Security Auditing: The Need for Policies and Practices. International Conference, Global Information Technology Management Association. Bangalore, India, June Robertson, R.A., Kesar, S., Cozzens, R., Kirk, R. (2012). Bringing Creativity into the Classroom. Workshop presented at the American Association of Behavioral and Social Sciences, Las Vegas, NV, February Robertson, R.A. (2011). Virtualization in the Cloud Classroom. Presentation at the American Association of Behavioral and Social Sciences. Robertson, R.A. (2010). Network Security and Ethical Hacking Presentation at the American Association of Behavioral and Social Sciences. Wu, D., Robertson, R.A., Tucker, B., Mitchell, E.R., Freden, E., (2011). Designing an ipad Application for Patient Education. ISOneWorld, Las Vegas, NV, May 2011.

4 Wu, D., Robertson, R.A., Freden, E., (2011). Empowering Patients through Mobile Patient Education systems. Ethicomp Conference Proceedings, pp IEEE SoutheastCon 2005 (April 8-10): Critical Success Drivers in B2B e-commerce. Published in conference proceedings. Vulnerability Assessment: A Model to Evaluate E-Commerce and Network Information Systems, GITM World Conference presentation, June 2006.

5 Professional presentations with undergraduates Wu, D., Robertson, R.A., Tucker, B., Mitchell, E.R., Freden, E., (2011). Designing an ipad Application for Patient Education. ISOneWorld, Las Vegas, NV, May Refereed Publications and/or Books Robertson, R.A. (2012). Security Auditing: The Need for Policies and Practices. Journal of Information Privacy and Security. Bangalore, India, June 2012 (Submitted, final reference forthcoming). Robertson, R.A. (2009). Critical Success Factors for Service-Oriented Small Businesses in the e-commerce Environment. Journal of Information Systems and Technology & Planning, Vol. 1, Issue 1, 2009, pp Robertson, R.A. (2007). Risk Management in E-Commerce. International Journal on Knowledge, Culture, and Change Management, Vol 7, Issue 3, 2007, pp Personal Accomplishments Eagle Scout Voluntary service for church

Building the Cybersecurity Workforce. November 2017

Building the Cybersecurity Workforce. November 2017 Building the Cybersecurity Workforce November 2017 Our Global Footprint Measuring Kaplan University s Educational Impact For every career path +1MM students annually served Facilities in 30+ countries

More information

Introducing Maryville University s CYBER SECURITY ONLINE PROGRAMS. Bachelor of Science in Cyber Security & Master of Science in Cyber Security

Introducing Maryville University s CYBER SECURITY ONLINE PROGRAMS. Bachelor of Science in Cyber Security & Master of Science in Cyber Security Introducing Maryville University s CYBER SECURITY ONLINE PROGRAMS Bachelor of Science in Cyber Security & Master of Science in Cyber Security The cyber security industry is calling for more experts. And

More information

TEXAS STATE VITA. A. Name: David L. Gibbs Title: Assistant Professor

TEXAS STATE VITA. A. Name: David L. Gibbs Title: Assistant Professor TEXAS STATE VITA I. Academic/Professional Background A. Name: David L. Gibbs Title: Assistant Professor B. Educational Background Degree Year University Major Thesis/Dissertation PhD 2015 Texas State University

More information

The fast track to top skills and top jobs in cyber. Guaranteed. FREE TO TRANSITIONING VETERANS

The fast track to top skills and top jobs in cyber. Guaranteed. FREE TO TRANSITIONING VETERANS The fast track to top skills and top jobs in cyber. Guaranteed. FREE TO TRANSITIONING VETERANS WELCOME SANS Institute is presenting the SANS VetSuccess Immersion Academy in San Diego. For transitioning

More information

The fast track to top skills and top jobs in cyber. Guaranteed.

The fast track to top skills and top jobs in cyber. Guaranteed. The fast track to top skills and top jobs in cyber. Guaranteed. NO COST TO SELECTED PARTICIPANTS WELCOME The SANS Institute is presenting the SANS CyberTalent Immersion Academy for Women to encourage women

More information

Bachelor of Applied Science Degree IT NETWORKING

Bachelor of Applied Science Degree IT NETWORKING Bachelor of Applied Science Degree IT NETWORKING Beginning fall 2017! Whatcom Community College s nationally acclaimed computer information systems program will begin offering a bachelor of applied science

More information

Make Your Statement. Master of Management in Library and Information Science online. Graduate Certificate in Library and Information Management online

Make Your Statement. Master of Management in Library and Information Science online. Graduate Certificate in Library and Information Management online Make Your Statement Master of Management in Library and Information Science online Graduate Certificate in Library and Information Management online Help shape the future of your field. The Master of Management

More information

Keeping Your SOCs Full. May 26, Strengthening Capacity in Cyber Talent sans.org/cybertalent

Keeping Your SOCs Full. May 26, Strengthening Capacity in Cyber Talent sans.org/cybertalent Keeping Your SOCs Full May 26, 2016 Strengthening Capacity in Cyber Talent sans.org/cybertalent Cybersecurity: The Current State Skills Mismatch Emphasis on theory over practice Education focus on theoretical

More information

The fast track to top skills and top jobs in cyber. Guaranteed. FREE TO TRANSITIONING VETERANS

The fast track to top skills and top jobs in cyber. Guaranteed. FREE TO TRANSITIONING VETERANS The fast track to top skills and top jobs in cyber. Guaranteed. FREE TO TRANSITIONING VETERANS WELCOME SANS Institute, in collaboration with Augusta Warrior Project and Augusta University, is presenting

More information

BOARD OF REGENTS ACADEMIC AFFAIRS COMMITTEE 4 STATE OF IOWA SEPTEMBER 12-13, 2018

BOARD OF REGENTS ACADEMIC AFFAIRS COMMITTEE 4 STATE OF IOWA SEPTEMBER 12-13, 2018 STATE OF IOWA SEPTEMBER 12-13, 2018 REQUEST FOR NEW PROGRAM AT IOWA STATE UNIVERSITY: BACHELOR OF SCIENCE IN CYBER SECURITY ENGINEERING Contact: Rachel Boon Action Requested: Consider approval of the request

More information

ITU CBS. Digital Security Capacity Building: Role of the University GLOBAL ICT CAPACITY BUILDING SYMPOSIUM SANTO DOMINGO 2018

ITU CBS. Digital Security Capacity Building: Role of the University GLOBAL ICT CAPACITY BUILDING SYMPOSIUM SANTO DOMINGO 2018 GLOBAL ICT CAPACITY BUILDING SYMPOSIUM ITU CBS SANTO DOMINGO 2018 Digital Capacity Building: Role of the University 18 20 June 2018 Santo Domingo, Dominican Republic Dr. Nizar Ben Neji Faculty of Sciences

More information

The fast track to top skills and top jobs in cyber. FREE TO TRANSITIONING VETERANS

The fast track to top skills and top jobs in cyber. FREE TO TRANSITIONING VETERANS The fast track to top skills and top jobs in cyber. FREE TO TRANSITIONING VETERANS FAST TRACK Three steps to a cybersecurity career QUALIFY Take the qualifying exam, complete the application process, and

More information

Career Paths In Cybersecurity

Career Paths In Cybersecurity Career Paths In Cybersecurity Introductions Rob Ashcraft Sr. Technical Advisor 26-yrs in Information Technology 14-yrs in Information Security Held positions as Technician, IT Management, IT Sales Double

More information

Department of Business Information Technology

Department of Business Information Technology Department of Business Information Technology 1 Department of Business Information Technology Chair Lorraine J. Willoughby Phone: 701-858-3314 Toll-Free: 1-800-777-0750, ext. 3308 Department Phone: 701-858-3308

More information

Building new cybersecurity pipelines. NICE Conference 2017 November 8, Strengthening Cyber Workforce Development sans.

Building new cybersecurity pipelines. NICE Conference 2017 November 8, Strengthening Cyber Workforce Development sans. Building new cybersecurity pipelines NICE Conference 2017 November 8, 2017 Strengthening Cyber Workforce Development sans.org/cybertalent Cybersecurity: The Current State Skills Mismatch Emphasis on theory

More information

The fast track to top skills and top jobs in cyber. Guaranteed. FREE TO TRANSITIONING VETERANS

The fast track to top skills and top jobs in cyber. Guaranteed. FREE TO TRANSITIONING VETERANS The fast track to top skills and top jobs in cyber. Guaranteed. FREE TO TRANSITIONING VETERANS WELCOME SANS Institute is presenting the SANS VetSuccess Immersion Academy in the DC Metro area. For transitioning

More information

Open Cloud Academy: Cyber Security Learning Track. Deborah Carter August, 2016

Open Cloud Academy: Cyber Security Learning Track. Deborah Carter August, 2016 Open Cloud Academy: Cyber Security Learning Track Deborah Carter August, 2016 Open Cloud Academy We are a Rackspace inspired Education Center focused on developing technical talent, and enhancing technical

More information

The fast track to top skills and top jobs in cyber. Guaranteed. FREE TO TRANSITIONING VETERANS

The fast track to top skills and top jobs in cyber. Guaranteed. FREE TO TRANSITIONING VETERANS The fast track to top skills and top jobs in cyber. Guaranteed. FREE TO TRANSITIONING VETERANS WELCOME SANS Institute, in collaboration with RP6, is presenting the SANS VetSuccess CyberTalent Immersion

More information

New York State Teacher Certification Process

New York State Teacher Certification Process New York State Teacher Certification Process A Better Understanding Presented by: Edward A. Salina, Jr., Ed.D. Superintendent of Schools Origins of Certification The first school dedicated to teacher training

More information

TEXAS STATE VITA. A. Name: David L. Gibbs Title: Assistant Professor

TEXAS STATE VITA. A. Name: David L. Gibbs Title: Assistant Professor TEXAS STATE VITA I. Academic/Professional Background A. Name: David L. Gibbs Title: Assistant Professor B. Educational Background Degree Year University Major Thesis/Dissertation PhD 2015 Texas State University

More information

A United States Cyber Academy Program

A United States Cyber Academy Program The GIAC certifications I earned in the Academy really helped open doors for me as a cybersecurity professional. Justin Sappington, Information Security Analyst at Umpqua Bank A United States Cyber Academy

More information

Immersion Academy Annual Report 2017

Immersion Academy Annual Report 2017 Immersion Academy Annual Report 2017 Accelerated, intensive training and certification program that develops the real-world knowledge and hands-on skills needed to defend today s information security systems.

More information

College Of. Technological Innovation

College Of. Technological Innovation College Of Technological Innovation Contact Us 00971-2-5993111 (Abu Dhabi) 00971-4-4021111 (Dubai) 00971-4-4021408 (College of Technological Innovation) @Zayed_U zayeduniversity ZayedU www.zu.ac.ae Introduction

More information

STUDENT LEARNING OUTCOMES Beacom College of Computer and Cyber Sciences

STUDENT LEARNING OUTCOMES Beacom College of Computer and Cyber Sciences STUDENT LEARNING OUTCOMES Beacom College of Computer and Cyber Sciences Undergraduate Programs - Bachelor B.S. Computer Game Design Upon completion of the B.S. degree in Computer Game Design, students

More information

AVP/CIO IT Candidate Campus Visit Friday, April 17, 2015 Mr. Kenneth Ihrer

AVP/CIO IT Candidate Campus Visit Friday, April 17, 2015 Mr. Kenneth Ihrer AVP/CIO IT Candidate Campus Visit Friday, April 17, 2015 Mr. Kenneth Ihrer 8:30 9:00AM Breakfast with Various Members of the Search Comm./Chair @ A306A 9:00 9:45AM Meeting with Provost and Deans @ A310

More information

What can I do with a major in Computer Science?

What can I do with a major in Computer Science? Lewis-Clark State College offers a Bachelor of Arts or Science Degree in Computer Science through the Natural Sciences and Mathematics Division. You can learn more about the Natural Sciences and Mathematics

More information

Department of Computer Science and Engineering

Department of Computer Science and Engineering Department of Computer Science and Engineering 1 Department of Computer Science and Engineering Department Head: Professor Edward Swan Office: 300 Butler Hall The Department of Computer Science and Engineering

More information

Faculty of Engineering and Informatics. Programme Specification. School of Electrical Engineering and Computer Science

Faculty of Engineering and Informatics. Programme Specification. School of Electrical Engineering and Computer Science School of Electrical Engineering and Computer Science Programme Specification Faculty of Engineering and Informatics Programme title: BSc (Hons) Computer Science for Business Academic Year: 2017/18 Degree

More information

RESUME. David Lynwood Deal

RESUME. David Lynwood Deal Resume David Lynwood Deal 1 RESUME 1608 Meadowview Lane Martinsville, Virginia 24112 (276) 252-8820 (Home) (276) 656-0258 (Work) email: ddeal@patrickhenry.edu David Lynwood Deal Education: June 1978 April

More information

Academic Program Review Cyber Security College of Southern Nevada 2017

Academic Program Review Cyber Security College of Southern Nevada 2017 Academic Program Review Cyber Security College of Southern Nevada 2017 ACADEMIC EVALUATION WORKSHEET PROGRAM ASSESSMENT DATA Date Submitted: Submitted by: Margaret Taylor PROGRAM Assessment Data to be

More information

KENYA SCHOOL OF GOVERNMENT EMPLOYMENT OPORTUNITY (EXTERNAL ADVERTISEMENT)

KENYA SCHOOL OF GOVERNMENT EMPLOYMENT OPORTUNITY (EXTERNAL ADVERTISEMENT) KENYA SCHOOL OF GOVERNMENT EMPLOYMENT OPORTUNITY (EXTERNAL ADVERTISEMENT) 1. DIRECTOR, LEARNING & DEVELOPMENT - LOWER KABETE Reporting to the Director General, Campus Directors will be responsible for

More information

Certification. What: Who: Where:

Certification. What: Who: Where: Certification What: Certification is a process by which the Wisconsin Technical College System Office evaluates the occupational, academic, and teaching experience of district employees to determine his/her

More information

BACHELOR OF SCIENCE IN INFORMATION TECHNOLOGY

BACHELOR OF SCIENCE IN INFORMATION TECHNOLOGY Bachelor of Science in Information Technology BACHELOR OF SCIENCE IN INFORMATION TECHNOLOGY Description and Outcomes The objective of the Bachelor of Science in Information Technology program is to help

More information

Security. Protect your business from security threats with Pearl Technology. The Connection That Matters Most

Security. Protect your business from security threats with Pearl Technology. The Connection That Matters Most Security Protect your business from security threats with Pearl Technology The Connection That Matters Most Committed to Your Future When it comes to your business, security can mean many things. But to

More information

Immersion Academy Annual Report 2018

Immersion Academy Annual Report 2018 Immersion Academy Annual Report 2018 An accelerated, intensive training and certification program that develops the real-world knowledge and hands-on skills needed to defend today s information security

More information

Cyber Security School

Cyber Security School Cyber Cyber Security School FUTURE PROOF Y SECURITY TALENT "The UK needs to tackle the systemic issues at the heart of the Cyber skills shortage..." National Cyber Security Strategy 2016-2021, HM Government

More information

Your Student s Head Start on Career Goals and College Aspirations

Your Student s Head Start on Career Goals and College Aspirations Your Student s Head Start on Career Goals and College Aspirations INFORMATION TECHNOLOGY (IT) NETWORKING PATHWAY The Destinations Networking Pathway prepares students to test and evaluate computer network

More information

Section 1: Program Abstract

Section 1: Program Abstract Section 1: Program Abstract The Bachelor or Applied s ( ) degree provides students with a critical understanding of the complex and integrated and Communication Technology (ICT) security issues in todayʼs

More information

CATALOG 2017/2018 BINUS UNIVERSITY. Cyber Security. Introduction. Vision. Mission

CATALOG 2017/2018 BINUS UNIVERSITY. Cyber Security. Introduction. Vision. Mission Cyber Security Introduction Cyber attack is raising and threaten ubiquitous world on internet today. Industry and government need cyber security expert to counter and defend from this threaten. Cyber Security

More information

Computer Information Systems Technology (CIS)

Computer Information Systems Technology (CIS) Technology 104 The College for Real Careers Technology (CIS) Program Information The department at H. Councill Trenholm State Community College is progressive and innovative in its approach toward the

More information

Developing Career-Relevant Academic Programs

Developing Career-Relevant Academic Programs 2016 USENIX Summit for Educators in System Administration Developing Career-Relevant Academic Programs A Case Study: UMUC s B.S. Program in Computer Networks & Cybersecurity S. K. Bhaskar (S.Bhaskar@umuc.edu)

More information

CYBERSECURITY: Scholarship and Job Opportunities

CYBERSECURITY: Scholarship and Job Opportunities CYBERSECURITY: Scholarship and Job Opportunities Malware Invasion in Cyberspace Blackhole Malware Exploit Kit (2012) Shamoon Virus (2012) Stuxnet Worm (2010) Operation Aurora (2009) and many others Job

More information

CPLP and APTD Recertification Policies Table of Contents

CPLP and APTD Recertification Policies Table of Contents CPLP and APTD Recertification Policies Table of Contents Recertification Policies... 2 Recertification Categories... 2 Continuing Education... 2 Speaking and Instructing... 3 On-the-Job Experience... 4

More information

SANS/REN-ISAC PARTNERSHIP AGGREGATE BUY PROGRAM

SANS/REN-ISAC PARTNERSHIP AGGREGATE BUY PROGRAM SANS/REN-ISAC PARTNERSHIP AGGREGATE BUY PROGRAM www.sans.org/partnership/education SANS s mission is to ensure that InfoSec practitioners in critical organizations have the skills needed to protect national

More information

CPLP Recertification Policies... 2 Recertification Categories... 2

CPLP Recertification Policies... 2 Recertification Categories... 2 Table of Contents CPLP Recertification Policies... 2 Recertification Categories... 2 Continuing Education... 2 Speaking and Instructing... 3 On-the-Job Experience... 4 Research and Publishing... 4 Leadership

More information

PECB UNIVERSITY PECB UNIVERSITY

PECB UNIVERSITY PECB UNIVERSITY PECB UNIVERSITY In today s dynamic world a degree with no specialization can hardly yield well-rounded qualifications and serve as a substantial baggage for climbing the career ladder. Taking control over

More information

The Information Technology Program (ITS) Contents What is Information Technology?... 2

The Information Technology Program (ITS) Contents What is Information Technology?... 2 The Information Technology Program (ITS) Contents What is Information Technology?... 2 Program Objectives... 2 ITS Program Major... 3 Web Design & Development Sequence... 3 The Senior Sequence... 3 ITS

More information

Bachelor Business Engineering Technology (Hons) in Networking System (BNS)

Bachelor Business Engineering Technology (Hons) in Networking System (BNS) NAME OF PROGRAMME Bachelor Business Engineering Technology (Hons) in Networking System (BNS) SHORT DESCRIPTION With embedded curriculum of professional bodies such Microsoft, COMPTIA to equip students

More information

University Core Curriculum Requirements

University Core Curriculum Requirements School of Education Adolescent/Young Adult Minor (Grades 7-1) Program Outline For Students Entering 018-019 Academic Year AYA Minor/ 017-018 Name ID# Advisor University Core Curriculum Requirements First

More information

Opportunities to Integrate Technology Into the Classroom. Presented by:

Opportunities to Integrate Technology Into the Classroom. Presented by: Opportunities to Integrate Technology Into the Classroom Presented by: Mark Salamasick, CIA, CISA, CRMA, CSP Executive Director of Audit University of Texas System Discussion Topics Internal Audit Textbook

More information

DIABLO VALLEY COLLEGE CATALOG

DIABLO VALLEY COLLEGE CATALOG COMPUTER NETWORK TECHNOLOGY CNT Despina Prapavessi, Dean Math and Computer Sciences Division Math Building, Room 267 Possible career opportunities These CNT-courses prepare students for a career path in

More information

Comprehensive Program Review Report

Comprehensive Program Review Report Comprehensive Program Review Report Program Review - Information Technology Prepared by: Ramyar Alavi-Moghaddam What are the strengths of your area?: 1. The current program has close alignment with industry

More information

School of Engineering & Computational Sciences

School of Engineering & Computational Sciences Catalog: Undergraduate Catalog 2014-2015 [Archived Catalog] Title: School of Engineering and Computational Sciences School of Engineering & Computational Sciences Administration David Donahoo, B.S., M.S.

More information

Article II - Standards Section V - Continuing Education Requirements

Article II - Standards Section V - Continuing Education Requirements Article II - Standards Section V - Continuing Education Requirements 2.5.1 CONTINUING PROFESSIONAL EDUCATION Internal auditors are responsible for maintaining their knowledge and skills. They should update

More information

Academic Program Review Networking College of Southern Nevada 2017

Academic Program Review Networking College of Southern Nevada 2017 Academic Program Review Networking College of Southern Nevada 2017 ACADEMIC EVALUATION WORKSHEET PROGRAM ASSESSMENT DATA Date Submitted: Submitted by: Margaret Taylor PROGRAM Assessment Data to be provided

More information

Computer Networking Technologies and Information Assurance & Cybersecurity

Computer Networking Technologies and Information Assurance & Cybersecurity Computer Networking Technologies and Information Assurance & Cybersecurity Admissions Information Application Materials Students wanting to apply for a degree seeking program at the College of Eastern

More information

Cyber Security Advanced Education: Preparing the Emerging Workforce

Cyber Security Advanced Education: Preparing the Emerging Workforce Cyber Security Advanced Education: Preparing the Emerging Workforce Scott vonfischer, CISO We are all apprentices in a craft where no one ever becomes a master. Ernest Hemingway A Unique Perspective on

More information

Education and technology are two of our greatest social equalizers.

Education and technology are two of our greatest social equalizers. Corporate Social Responsibility Education and technology are two of our greatest social equalizers. As the worldwide leader in networking, Cisco knows technology can be used to improve access to education.

More information

Susan Smith ECISD Audio Video Production 1415 South Seventh Ave Edinburg, TX Office Phone: 956/

Susan Smith ECISD Audio Video Production 1415 South Seventh Ave Edinburg, TX Office Phone: 956/ Susan Smith ECISD Audio Video Production 1415 South Seventh Ave Edinburg, TX 78539 Office Phone: 956/289-2421 Email: s.smith@ecisd.us EDUCATION: Vocational Industrial Teacher Certification, Corpus Christi

More information

CAREER SERVICES RESUME WORKSHEET

CAREER SERVICES RESUME WORKSHEET INFORMATION AS YOU WOULD LIKE TO APPEAR ON YOUR RESUME Name: Address: Zip: Home: ( ) School:( ) - Cell: ( ) E-mail: CAREER/GRADUATE SCHOOL GOALS What are your goals what do you want to do? EDUCATIONAL

More information

Management Information Systems (MIS)

Management Information Systems (MIS) Management Information Systems (MIS) 1 Management Information Systems (MIS) Courses MIS 5001. Information Technology Management. 1 to 3 Credit Hour. Organizations that strategically select, manage, and

More information

USF Sarasota-Manatee - New Undergraduate Course Proposal Form

USF Sarasota-Manatee - New Undergraduate Course Proposal Form USF Sarasota-Manatee - New Undergraduate Course Proposal Form 1. College/School Contact Information Tracking Number Date & Time Submitted 2 2010-03-29 16:54:18 Discipline College/School Budget Account

More information

CENT - COMPUTING, ELECTRONICS, AND NETWORKING TECHNOLOGY

CENT - COMPUTING, ELECTRONICS, AND NETWORKING TECHNOLOGY CENT - COMPUTING, ELECTRONICS, AND NETWORKING TECHNOLOGY Liaison: Website: Faculty: Aaron Tanaka (845-9109, tanaka@hawaii.edu) www.honolulu.hawaii.edu/cent Sally Dunan, Aaron Tanaka, Bradley Ramos Program

More information

ADMINISTRATIVE REGULATION Milwaukee Area Technical College Title: PROFESSIONAL GROWTH CREDIT EVALUATION FOR CERTIFIED POSITIONS

ADMINISTRATIVE REGULATION Milwaukee Area Technical College Title: PROFESSIONAL GROWTH CREDIT EVALUATION FOR CERTIFIED POSITIONS Certification is a process by which the Wisconsin Technical College System (WTCS) evaluates the occupational, academic, and teaching experience of an employee to determine his/her preparedness to work

More information

Faculty of Engineering and Informatics. Programme Specification. School of Electrical Engineering and Computer Science. Academic Year: 2017/18

Faculty of Engineering and Informatics. Programme Specification. School of Electrical Engineering and Computer Science. Academic Year: 2017/18 School of Electrical Engineering and Computer Science Programme Specification Faculty of Engineering and Informatics Programme title: BSc (Hons) Computer Science Academic Year: 2017/18 Degree Awarding

More information

CRITERIA FOR ACCREDITING COMPUTING PROGRAMS

CRITERIA FOR ACCREDITING COMPUTING PROGRAMS CRITERIA FOR ACCREDITING COMPUTING PROGRAMS Effective for Reviews During the 2014-2015 Accreditation Cycle Incorporates all changes approved by the ABET Board of Directors as of October 26, 2013 Computing

More information

What can I do with a major in? Major in Computer Science?

What can I do with a major in? Major in Computer Science? W h What can I do with a major in? Major in Computer Science? I CAN GO IN TO CAREER AREA Programming/Software Development Operating systems Application systems: Scientific Business Engineering Maintenance

More information

Computer Information Science xxx

Computer Information Science xxx 1 xxx The mission of the Faculty is to provide future-focused, studentcentred programmes that prepare students for the dynamic Information Systems and Information sectors of the UAE. CIS programme graduates

More information

Information Technology

Information Technology SCHOOL OF Information Technology STUDENT ORIENTATION BOOKLET Dean s Welcome Welcome to the School of Information Technology at Monroe College! Whether you are already part of the Monroe family or exploring

More information

School of Engineering and Computational Sciences

School of Engineering and Computational Sciences Catalog: Undergraduate Catalog 2012-2013 [Archived Catalog] Title: School of Engineering and Computational Sciences School of Engineering and Computational Sciences David Donahoo, B.S., M.S. Interim Dean,

More information

Strengthening Capacity in Cyber Talent sans.org/cybertalent

Strengthening Capacity in Cyber Talent sans.org/cybertalent SANS Security Awareness Summit August 4th, 2016 Strengthening Capacity in Cyber Talent sans.org/cybertalent Cybersecurity: The Current State Skills Mismatch Emphasis on theory over practice Education focus

More information

School of Engineering & Built Environment

School of Engineering & Built Environment School of Engineering & Built Environment BEng (Hons) in Digital Security, Forensics & Ethical Hacking Programme Specification Proforma (PSP) August 2015 P a g e 1 GLASGOW CALEDONIAN UNIVERSITY Programme

More information

(FHEQ) level 6] 3 years full-time; 4 years full-time including a year of study abroad and/or work placement. I301 (4-years) Computing, Engineering

(FHEQ) level 6] 3 years full-time; 4 years full-time including a year of study abroad and/or work placement. I301 (4-years) Computing, Engineering Faculty of Engineering and Informatics Programme Specification Programme title: BEng (Hons) Software Engineering Academic Year: 2018/19 Degree Awarding Body: Partner(s), delivery organisation or support

More information

1.2 Applicant An individual applying for initial, upgraded, reciprocity or renewal by submission of a standard application to the administrator.

1.2 Applicant An individual applying for initial, upgraded, reciprocity or renewal by submission of a standard application to the administrator. WATER QUALITY LABORATORY ANALYST Rules Governing Certification Definitions: 2013 1 Definitions - These terms, as defined, apply explicitly to the California-Nevada Section of the American Water Works Association

More information

Master of Science (MS) in Information Assurance and Cybersecurity with a specialization in. Health Care Security

Master of Science (MS) in Information Assurance and Cybersecurity with a specialization in. Health Care Security Master of Science (MS) in Information Assurance and Cybersecurity with a specialization in Health Care Security Effective January 8, 2018 Master of Science (MS) in Information Assurance and Cybersecurity

More information

Course Specifications M. Tech. / PG Diploma Programme

Course Specifications M. Tech. / PG Diploma Programme Course Specifications M. Tech. / PG Diploma Programme Faculty of Engineering & Technology M. S. Ramaiah University of Applied Sciences University House, New BEL Road, MSR Nagar, Bengaluru 560 054 www.msruas.ac.in

More information

University Core Curriculum Requirements

University Core Curriculum Requirements School of Education Intervention Specialist: Mild/Moderate (Grades K-1) Program Outline For Students Entering 018-019 Academic Year Name ID# Advisor University Core Curriculum Requirements First Year Experience

More information

NEW JERSEY INSTITUTE OF TECHNOLOGY. Initiation of Cyber Defense Option. for the Master of Science in

NEW JERSEY INSTITUTE OF TECHNOLOGY. Initiation of Cyber Defense Option. for the Master of Science in NEW JERSEY INSTITUTE OF TECHNOLOGY Initiation of Cyber Defense Option for the Master of Science in Cyber Security and Privacy (MS CSP) Degree Program With the approval of the Faculty Senate (and its Committee

More information

ROJECT ANAGEMENT PROGRAM AND COURSE GUIDE

ROJECT ANAGEMENT PROGRAM AND COURSE GUIDE ROJECT ANAGEMENT PROGRAM AND COURSE GUIDE PROJECT MANAGEMENT CERTIFICATE PROGRAM Further your career and gain an understanding of what it takes to lead a project to successful completion functional skills,

More information

Cisco Networking Academy: Utah Profile

Cisco Networking Academy: Utah Profile Cisco Networking Academy: Utah Profile Educating the Architects of the Networked Economy Now in its second decade, Cisco Networking Academy has provided more than two million students worldwide with the

More information

Apprenticeships CYBER SECURITY HIGHER APPRENTICESHIP FROM IT TECHNICIAN TO SKILLED INFORMATION SECURITY PROFESSIONAL

Apprenticeships CYBER SECURITY HIGHER APPRENTICESHIP FROM IT TECHNICIAN TO SKILLED INFORMATION SECURITY PROFESSIONAL Apprenticeships CYBER SECURITY HIGHER APPRENTICESHIP FROM IT TECHNICIAN TO SKILLED INFORMATION SECURITY PROFESSIONAL WHY CHOOSE QA? There are lots of apprenticeship providers out there but we think we

More information

Greg T. Harber Faculty Vita (September 1, August 31, 2013)

Greg T. Harber Faculty Vita (September 1, August 31, 2013) Greg T. Harber Faculty Vita (September 1, 2008 - August 31, 2013) Department: Computer Science Rank: Instructor Qualification Status: Other Tenure Status: Non-Tenure Track EDUCATION MS, 1994. Institution:

More information

Standard School Librarian Certificate Handbook

Standard School Librarian Certificate Handbook School of Information 1616 Guadalupe Suite #5.202 Austin, Texas 78701 Phone: 512-471-3821 Fax: 512-471-3971 E-Mail: info@ischool.utexas.edu Web: www.ischool.utexas.edu Standard School Librarian Certificate

More information

PROFESSIONAL MASTER S IN

PROFESSIONAL MASTER S IN I m in a new job I love. ERIC LAFONTAINE Service Operations Manager GE Healthcare Class of 2013 PROFESSIONAL MASTER S IN APPLIED SYSTEMS ENGINEERING GAIN A COMPETITIVE EDGE WITH A GEORGIA TECH DEGREE TODAY

More information

B.A. in Information Systems

B.A. in Information Systems General Elective 1 Term Credits 15 B.A. in Information Systems 1 B.A. in Information Systems (120 credits minimum) Course Title Credits First Year CS 100 Roadmap to Computing HUM 101 English Composition:

More information

School of Engineering and Technology. Department of Engineering

School of Engineering and Technology. Department of Engineering 1 2 School of Engineering and Technology Department of Engineering 3 Bachelor of Science in Communication Engineering The program focuses on the technical aspects of digital and analog communications,

More information

School of Engineering & Built Environment

School of Engineering & Built Environment School of Engineering & Built Environment BSc (Hons) in Cyber Security and Networks Programme Specification Proforma (PSP) 2015/2016 Programme Specification Document 2015/2016 BSc (Hons) in Cyber Security

More information

Computer Information Systems Technology (CIS)

Computer Information Systems Technology (CIS) Technology 118 The College for Real Careers Technology (CIS) Program Information The department at H. Councill Trenholm State Community College is progressive and innovative in its approach toward the

More information

Discover Viterbi: Computer Science, Cyber Security & Informatics Programs. Viterbi School of Engineering University of Southern California Fall 2017

Discover Viterbi: Computer Science, Cyber Security & Informatics Programs. Viterbi School of Engineering University of Southern California Fall 2017 Discover Viterbi: Computer Science, Cyber Security & Informatics Programs Viterbi School of Engineering University of Southern California Fall 2017 WebEx Quick Facts Will I be able to get a copy of the

More information

GRADUATE PROGRAMS IN ENTERPRISE AND CLOUD COMPUTING

GRADUATE PROGRAMS IN ENTERPRISE AND CLOUD COMPUTING GRADUATE PROGRAMS IN ENTERPRISE AND CLOUD COMPUTING MASTER OF SCIENCE DOCTORAL DEGREE GRADUATE CERTIFICATES STEVENS.EDU/GRAD-ECC MASTER OF SCIENCE IN Enterprise and Cloud Computing Enterprise and cloud

More information

Implementing SolidWorks Certifications into an Engineering Technology Curriculum

Implementing SolidWorks Certifications into an Engineering Technology Curriculum Implementing SolidWorks Certifications into an Engineering Technology Curriculum Abstract The job market for recent and perspective Engineering Technology graduates is more competitive than ever. Increasing

More information

Overview of ABET Kent Hamlin Director Institute of Nuclear Power Operations Commissioner TAC of ABET

Overview of ABET Kent Hamlin Director Institute of Nuclear Power Operations Commissioner TAC of ABET Overview of ABET Kent Hamlin Director Institute of Nuclear Power Operations Commissioner TAC of ABET 1 st National Meeting on Improving Education and Training For Chinese Nuclear Power Industry Personnel

More information

High School Course Guide

High School Course Guide 8D120 Business Computer Information Management I (R) 1 credit Gr: 9-12 8D125 Business Computer Information Management I (DC) R. Prerequisite: Touch Systems Data Entry Keyboarding Description: In Business

More information

Business & Technology Department

Business & Technology Department Accounting & Management Introduction to Business Personal Finance+ Microsoft Office+ Accounting 1 Accounting 2+ Accounting 3*+ Business Management Entrepreneurship: Virtual Enterprise International** Business

More information

Cyber Security Day 1 Workforce Ready Graduates

Cyber Security Day 1 Workforce Ready Graduates Cyber Security Day 1 Workforce Ready Graduates Susan Moon Career Academy Coordinator November 6, 2014 Huntsville City Schools has implemented a that is: networked collaborative interactive personalized

More information

Education and technology are two of the greatest social equalizers. Education helps people

Education and technology are two of the greatest social equalizers. Education helps people Corporate Social Responsibility Impact Profile Cisco Networking Academy Newfoundland and Labrador Education and technology are two of the greatest social equalizers. Education helps people improve their

More information

CyberSecurity Training and Capacity Building: A Starting Point for Collaboration and Partnerships. from the most trusted name in information security

CyberSecurity Training and Capacity Building: A Starting Point for Collaboration and Partnerships. from the most trusted name in information security CyberSecurity Training and Capacity Building: A Starting Point for Collaboration and Partnerships About SANS The SANS (SysAdmin, Audit, Network, Security) Institute Established in 1989 Cooperative research

More information

CCNP ROUTING & SWITCHING

CCNP ROUTING & SWITCHING CCNP ROUTING & SWITCHING ABOUT US WHO WE ARE CRAW Security is a Training and Consulting Company with high industry training and consulting Standards. CRAW Security Deals with various kinds of products

More information

WELCOME. CAREER & TECHNICAL EDUCATION Beginning-of-Year Meeting August 12, Sponsored by : Miami Dade College Wolfson Campus

WELCOME. CAREER & TECHNICAL EDUCATION Beginning-of-Year Meeting August 12, Sponsored by : Miami Dade College Wolfson Campus WELCOME CAREER & TECHNICAL EDUCATION Beginning-of-Year Meeting August 12, 2014 Sponsored by : Miami Dade College Wolfson Campus WELCOME Introductions HTTP://DCTE.DADESCHOOLS.NET/NEW-SITE/CTEPROGRAMS.HTML

More information

Biotech Academy Cisco Academy Global Academy STEM Marin

Biotech Academy Cisco Academy Global Academy STEM Marin STEM@SMHS Biotech Academy Cisco Academy Global Academy STEM Marin Project-Based Learning Integrated Curriculum Use of Technology Small Program Size Empowering Students to Manage Their Own Learning Work-Based

More information