RESEARCH SCHOOL OF COMPUTER SCIENCE (RSCS) CURRICULUM DEVELOPMENT COMMITTEE
|
|
- Lily Moody
- 5 years ago
- Views:
Transcription
1 RESEARCH SCHOOL OF COMPUTER SCIENCE (RSCS) CURRICULUM DEVELOPMENT COMMITTEE Meeting. 2/2017 of the will be held on Thursday 30 March 2017 at 12pm in Room R212, Ian Ross Building (31). Apologies and enquiries should be sent to: Summary S.1 Curriculum Proposals Recommendation: That the Committee endorse the proposals for submission to the CECS Education Committee. Attachment: Appendix A RSCS Curriculum Proposals For decision 2 3 Page 1
2 Item S.1 Curriculum Proposals Purpose To review curriculum proposals from the Research School of Computer Science submitted to the Committee for their endorsement. Recommendation That the Committee review the below proposals and endorse them for submission to the CECS Education Committee. ACTION REQUIRED For discussion For decision For information For response Background New Courses Page Course Code Title 3 COMP 2700 Cyber Security Foundations 6 COMP 3701 Defensive Cyber Security Operations 9 COMP 3702 Offensive Cyber Security Operations Sponsor Associate Director (Education) Research School of Computer Science Appendices Appendix A RSCS Curriculum Proposal forms Page 2
3 Send by Print Form Academic Course Form CEC Document Number Subject Area COMP Catalogue Number 2700 Date Approved Request Type New Course Course Status t Approved Amendment Type ne Amendment Description Rationale As part of a new Major in Cyber Security, this course is the foundational course in a group of three new courses (Comp2700, Comp3701, Comp3702) which are required to form a complete, technically oriented cyber security education. Long Course Title Cyber Security Foundations (100 characters) Short Course Title Cyber Security Foundations (30 characters) ACADEMIC USE To Take Effect From 01/01/2018 Course Minimum Unit Value 6 Course Maximum Unit Value 6 Does this course have an UG / PG Equivalent? Do you want this course to be offered as a variable unit course? Proposed Date Proposer Name Uwe R. Zimmer Primary Convenor's Primary Convenor's Name New appointment imminent who will convene this new course in Course Description Course Structure and Content Learning Outcomes Cyber Security Foundations introduces all essential cyber security principles. This includes principles of secure design, secrets minimization, least privilege, isolation, separation and encapsulation. The interplay between failed security principles and vulnerabilities is investigated in detail. The course provides the essential foundations which allow students to continue in a more in-depth cyber security career, yet can also be used a standalone unit to provide a self-contained set of knowledge. This is a general, second year course in our u/g programs which also serves as a foundational course for the Cyber Security Major. It will be offered on campus, as a combination of lectures and labs. The courses covers content in the areas of essential cyber security principles. 1. Demonstrate a thorough understanding of the fundamental principles underlying Cyber Security. 2. Define and identify cyber security principles and their violation. 3. Apply cyber security principles in a practical context. 4. Migrate insights from cyber security analysis into new designs. 5. Communicate a cyber security thread to a heterogenous team of professionals. Page 3
4 Workload Up to 60 hours of total face-time, which includes interactions with lectures and tutors. Up to 60 hours of total preparation, repeat, assignment and practical exercise time. Prescribed Texts (Reading to Support the Course) Preliminary Reading Indicative Reading List Assumed Knowledge, Required Skills and Recommended Courses (not prerequisites) Requisite Statement for Course (includes Prerequisite: Comp2420 Corequisite/Prerequisite and Incompatibility) (For more information please refer Requisite Design Guide) Indicative Assessment Assignments (50%); Final Exam (50%) Assessment Rationale Key learning outcomes are assessed using multiple and varied forms of assessment. Additional Assessment Learning Outcomes Mode of Delivery In person Quality Assurance Arrangements The standard RSCS's quality assurance arrangements will be applied to this course. Transitional Arrangements (if applicable) Relevant ANU internal and external consultation Intended Market and work undertaken to evaluate the market Estimated Enrolment Numbers and rationale Has gone through normal School and College processes. This is an optional course for undergraduate students and part of the Cyber Security Major. It is intended towards a diverse audience with an emphasis on technical Cyber Security. At least one quarter of the current undergraduate enrolments in Computer Science. Given the popularity and relevance of Cyber Security at this time, potentially more. Areas of Interest Please select Areas of Interest Is this required on a Sub-Plan? Major of Cyber Security ADMINISTRATION USE Responsible College Send tifications To ANU College of Engineering and Computer Science Melissa.Coppin@anu.edu.au Associate Dean / Dean/ College Dean Associate Professor Jochen Trumpf Page 4
5 Is Consent Required to Enrol? If yes, reason Eligibility for Graduate Studies (Graduate Coursework Only) Graduate Studies Classification 1 Graduate Studies Classification 2 List of course topics (Topics are descriptors on course names) (30 character limit each topic) Academic Organistion (Offered by) Research School of Computer Science Academic Group ENGIT (ANU College of Eng & Comp Sci) Academic Career How many times may this course be repeated after successful completion? (Please enter number only) 0 Course Grading Basis GRD (Graded) Course Component CRS (Course Enrolment Only) Is this a work experience or course internship? (Work Experience course are where student learning and performance is not directed by the university) If yes, to a work experience course, will the learning and assessment be directed by the ANU? Quota Proposed Scheduling (for the next three years) Semester 2 Does this course have more than one owner? Split Ownership Academic Organisation Percentage EFTSL COURSE FEES Field of Education Code Year Per Unit ISF Per Unit DTF Fee rate is same as existing course Department ID CE200 Submit by to Course Registry Page 5
6 Send by Print Form Academic Course Form CEC Document Number Subject Area COMP Catalogue Number 3701 Date Approved Request Type New Course Course Status t Approved Amendment Type ne Amendment Description Rationale As part of a new Major in Cyber Security, this course covers the defensive Cyber Security aspects in a group of three new courses (Comp2700, Comp3701, Comp3702) which are required to form a complete, technically oriented cyber security education. Long Course Title Defensive Cyber Security Operations (100 characters) Short Course Title Defensive Cyber Security Op (30 characters) ACADEMIC USE To Take Effect From 01/01/2018 Course Minimum Unit Value 6 Course Maximum Unit Value 6 Does this course have an UG / PG Equivalent? Do you want this course to be offered as a variable unit course? Proposed Date Proposer Name Uwe R. Zimmer Primary Convenor's Primary Convenor's Name New appointment imminent who will convene this new course in Course Description Course Structure and Content Learning Outcomes Defensive Cyber Security operations introduces and exercises a complete range of anomaly / intrusion detection and identification mechanisms. The students will also learn and exercise the handling of an existing intrusion which includes forensic operations and well as securing the remaining systems. This is a complete course in cyber defense which enables students on successful completion to operate systems under realworld exposure. This is a general, second year course in our u/g programs which also serves as an advanced course for the Cyber Security Major. It will be offered on campus, as a combination of lectures and labs. The courses covers content in the areas of essential, defensive Cyber Security operations. 1. Demonstrate a thorough understanding of the fundamental principles underlying the defence of systems and networks. 2. Define and identify defensive cyber security architectures and their purpose. 3. Operate defensive network architectures and systems in a practical context. 4. Extrapolate current threats and identify potential, future threats. 5. Communicate a cyber security situation and response to a heterogenous team of professionals. Page 6
7 Workload Up to 60 hours of total face-time, which includes interactions with lectures and tutors. Up to 60 hours of total preparation, repeat, assignment and practical exercise time. Prescribed Texts (Reading to Support the Course) Preliminary Reading Indicative Reading List Assumed Knowledge, Required Skills and Recommended Courses (not prerequisites) Requisite Statement for Course (includes Prerequisite: Comp2700 Corequisite/Prerequisite and Incompatibility) (For more information please refer Requisite Design Guide) Indicative Assessment Assignments (50%); Final Exam (50%) Assessment Rationale Key learning outcomes are assessed using multiple and varied forms of assessment. Additional Assessment Learning Outcomes Mode of Delivery In person Quality Assurance Arrangements The standard RSCS's quality assurance arrangements will be applied to this course. Transitional Arrangements (if applicable) Relevant ANU internal and external consultation Intended Market and work undertaken to evaluate the market Estimated Enrolment Numbers and rationale Has gone through normal School and College processes. This is an optional course for undergraduate students and part of the Cyber Security Major. It is intended towards a diverse audience with an emphasis on technical Cyber Security. About one quarter of the current undergraduate enrolments in Computer Science. Given the popularity and relevance of Cyber Security at this time, potentially more. Areas of Interest Please select Areas of Interest Is this required on a Sub-Plan? Major of Cyber Security ADMINISTRATION USE Responsible College Send tifications To ANU College of Engineering and Computer Science Melissa.Coppin@anu.edu.au Associate Dean / Dean/ College Dean Associate Professor Jochen Trumpf Page 7
8 Is Consent Required to Enrol? If yes, reason Eligibility for Graduate Studies (Graduate Coursework Only) Graduate Studies Classification 1 Graduate Studies Classification 2 List of course topics (Topics are descriptors on course names) (30 character limit each topic) Academic Organistion (Offered by) Research School of Computer Science Academic Group ENGIT (ANU College of Eng & Comp Sci) Academic Career How many times may this course be repeated after successful completion? (Please enter number only) 0 Course Grading Basis GRD (Graded) Course Component CRS (Course Enrolment Only) Is this a work experience or course internship? (Work Experience course are where student learning and performance is not directed by the university) If yes, to a work experience course, will the learning and assessment be directed by the ANU? Quota Proposed Scheduling (for the next three years) Semester 1 Does this course have more than one owner? Split Ownership Academic Organisation Percentage EFTSL COURSE FEES Field of Education Code Year Per Unit ISF Per Unit DTF Fee rate is same as existing course Department ID CE200 Submit by to Course Registry Page 8
9 Send by Print Form Academic Course Form CEC Document Number Subject Area COMP Catalogue Number 3702 Date Approved Request Type New Course Course Status t Approved Amendment Type ne Amendment Description Rationale As part of a new Major in Cyber Security, this course covers the offensive Cyber Security aspects in a group of three new courses (Comp2700, Comp3701, Comp3702) which are required to form a complete, technically oriented cyber security education. Long Course Title Offensive Cyber Security Operations (100 characters) Short Course Title Offensive Cyber Security Op (30 characters) ACADEMIC USE To Take Effect From 01/01/2018 Course Minimum Unit Value 6 Course Maximum Unit Value 6 Does this course have an UG / PG Equivalent? Do you want this course to be offered as a variable unit course? Proposed Date Proposer Name Uwe R. Zimmer Primary Convenor's Primary Convenor's Name New appointment imminent who will convene this new course in Course Description Course Structure and Content Learning Outcomes Offensive Cyber Security operations introduces and exercises a complete range of reverse engineering techniques and attack patterns. The students will also learn and exercise the analysis of systems based on minimal information. This is a complete course in cyber attacks which enables students on successful completion to identify and test systems for vulnerabilities without full knowledge or direct access. This is a general, second year course in our u/g programs which also serves as an advanced course for the Cyber Security Major. It will be offered on campus, as a combination of lectures and labs. The courses covers content in the areas of essential, offensive Cyber Security operations. 1. Demonstrate a thorough understanding of the fundamental principles underlying the identification and testing for vulnerabilities with limited information. 2. Analyze a system across all abstraction level, from basic hardware to complex cloud architectures. 3. Run cyber attacks, tests and probes in a practical context. 4. Expand conventional attack patterns to work in new system and network architectures. 5. Communicate a cyber security vulnerability and potential paths of attack to a heterogenous team of professionals. Page 9
10 Workload Up to 60 hours of total face-time, which includes interactions with lectures and tutors. Up to 60 hours of total preparation, repeat, assignment and practical exercise time. Prescribed Texts (Reading to Support the Course) Preliminary Reading Indicative Reading List Assumed Knowledge, Required Skills and Recommended Courses (not prerequisites) Requisite Statement for Course (includes Prerequisite: Comp2700 Corequisite/Prerequisite and Incompatibility) (For more information please refer Requisite Design Guide) Indicative Assessment Assignments (50%); Final Exam (50%) Assessment Rationale Key learning outcomes are assessed using multiple and varied forms of assessment. Additional Assessment Learning Outcomes Mode of Delivery In person Quality Assurance Arrangements The standard RSCS's quality assurance arrangements will be applied to this course. Transitional Arrangements (if applicable) Relevant ANU internal and external consultation Intended Market and work undertaken to evaluate the market Estimated Enrolment Numbers and rationale Has gone through normal School and College processes. This is an optional course for undergraduate students and part of the Cyber Security Major. It is intended towards a diverse audience with an emphasis on technical Cyber Security. About one quarter of the current undergraduate enrolments in Computer Science. Given the popularity and relevance of Cyber Security at this time, potentially more. Areas of Interest Please select Areas of Interest Is this required on a Sub-Plan? Major of Cyber Security ADMINISTRATION USE Responsible College Send tifications To ANU College of Engineering and Computer Science Melissa.Coppin@anu.edu.au Associate Dean / Dean/ College Dean Is Consent Required to Enrol? Associate Professor Jochen Trumpf Page 10
11 If yes, reason Eligibility for Graduate Studies (Graduate Coursework Only) Graduate Studies Classification 1 Graduate Studies Classification 2 List of course topics (Topics are descriptors on course names) (30 character limit each topic) Academic Organistion (Offered by) Research School of Computer Science Academic Group ENGIT (ANU College of Eng & Comp Sci) Academic Career How many times may this course be repeated after successful completion? (Please enter number only) 0 Course Grading Basis GRD (Graded) Course Component CRS (Course Enrolment Only) Is this a work experience or course internship? (Work Experience course are where student learning and performance is not directed by the university) If yes, to a work experience course, will the learning and assessment be directed by the ANU? Quota Proposed Scheduling (for the next three years) Semester 2 Does this course have more than one owner? Split Ownership Academic Organisation Percentage EFTSL COURSE FEES Field of Education Code Year Per Unit ISF Per Unit DTF Fee rate is same as existing course Department ID CE200 Submit by to Course Registry Page 11
Master of Cyber Security, Strategy and Risk Management. CECS PG Information Session April 17, 2018
Master of Cyber Security, Strategy and Risk Management CECS PG Information Session April 17, 2018 2 Program Purpose Provide a working understanding of information, network and software security, across
More informationFORM 7: Certificate Approval and Modification
FORM 7: Certificate Approval and Modification Select Action: New Certificate Modify Existing Certificate Certificate Title: Certificate Level: Undergraduate Graduate College/School/Center or Department
More informationSTUDENT LEARNING OUTCOMES Beacom College of Computer and Cyber Sciences
STUDENT LEARNING OUTCOMES Beacom College of Computer and Cyber Sciences Undergraduate Programs - Bachelor B.S. Computer Game Design Upon completion of the B.S. degree in Computer Game Design, students
More informationThis Programme Schedule applies to the Bachelor of Computing Systems (BCS) Level 7 credits 360.
PROGRAMME REGULATIONS Programme Schedule Bachelor of Computing Systems To be read in conjunction with Bachelors Generic Regulations. 1. Programme Schedule This Programme Schedule applies to the Bachelor
More informationInformation Systems and Tech (IST)
Information Systems and Tech (IST) 1 Information Systems and Tech (IST) Courses IST 101. Introduction to Information Technology. 4 Introduction to information technology concepts and skills. Survey of
More informationITSY Information Technology Security Course Syllabus Spring 2018
ITSY 1342 - Information Technology Security Course Syllabus Spring 2018 Instructor Course Reference Number (CRN) Course Description: Name: Fidelis Ngang Tel: 713-718-5552 Office: Spring Branch, Room 900L
More informationForm 18 Heriot-Watt University Graduate/Postgraduate Course Structure and Course Notes Template (RAY) 2009/2010
Form 18 Heriot-Watt University Graduate/Postgraduate Course Structure and Course Notes Template (RAY) 2009/2010 s / F2V0-ITS Information Technology (Software Engineering) 6. Course Accredited by 7. QAA
More informationAn Expert Panel was convened to review the submission of the following programme:
Explanatory Memorandum College of Computer Training (CCT) An Expert Panel was convened to review the submission of the following programme: Bachelor of Science (Honours) in Information Technology - 1 year
More informationWashtenaw Community College Comprehensive Report. CNT 216 Routing and Switching Essentials Effective Term: Fall 2018
1 of 5 3/7/2018, 3:03 PM Washtenaw Community College Comprehensive Report CNT 216 Routing and Switching Essentials Effective Term: Fall 2018 Course Cover Division: Business and Computer Technologies Department:
More informationBachelor of Information Technology (Course Code: C2000) Bachelor of Computer Science (Course Code: C2001)
Bachelor of Information Technology (Course Code: C2000) Bachelor of Computer Science (Course Code: C2001) Monash College Enrolment Information 1 2019 Faculty of Information Technology Academic and Student
More informationCourse Specifications M. Tech. / PG Diploma Programme
Course Specifications M. Tech. / PG Diploma Programme Faculty of Engineering & Technology M. S. Ramaiah University of Applied Sciences University House, New BEL Road, MSR Nagar, Bengaluru 560 054 www.msruas.ac.in
More informationPROGRAMME SPECIFICATION
PROGRAMME SPECIFICATION Master of Computing (Hons) in Computer Security Awarding institution Teaching institution UCAS Code JACS Code Programme Duration Language of Programme Liverpool John Moores University
More informationInformation Systems. Courses. Information Systems 1
Information Systems 1 Information Systems Courses INFSYS 1800 Computers and Information Systems: 3 This course develops skills in technology awareness, computer fluency, computing devices, ethical use
More information(FHEQ) level 6] 3 years full-time; 4 years full-time including a year of study abroad and/or work placement. I301 (4-years) Computing, Engineering
Faculty of Engineering and Informatics Programme Specification Programme title: BEng (Hons) Software Engineering Academic Year: 2018/19 Degree Awarding Body: Partner(s), delivery organisation or support
More informationBACHELOR OF SCIENCE IN INFORMATION TECHNOLOGY
Bachelor of Science in Information Technology BACHELOR OF SCIENCE IN INFORMATION TECHNOLOGY Description and Outcomes The objective of the Bachelor of Science in Information Technology program is to help
More informationCampus Solutions: Student Records. Quick Reference Guide
Campus Solutions: Student Records Table of Contents Unit I: Foundations of Student Records... 9 Unit II: Term Set-up... 10 Chapter 2 - Create and Maintain Terms and Sessions... 11 *Add/Update Term & Session...
More informationADMINISTRATIVE REGULATION Milwaukee Area Technical College Title: PROFESSIONAL GROWTH CREDIT EVALUATION FOR CERTIFIED POSITIONS
Certification is a process by which the Wisconsin Technical College System (WTCS) evaluates the occupational, academic, and teaching experience of an employee to determine his/her preparedness to work
More informationCYBERSECURITY: Scholarship and Job Opportunities
CYBERSECURITY: Scholarship and Job Opportunities Malware Invasion in Cyberspace Blackhole Malware Exploit Kit (2012) Shamoon Virus (2012) Stuxnet Worm (2010) Operation Aurora (2009) and many others Job
More informationOn Campus. Computing. School of Architecture, Computing and Engineering 11 November Taught by UEL staff
UNIVERSITY OF EAST LONDON UNDERGRADUATE PROGRAMME SPECIFICATION BSc (Hons) Computer Science Final award BSc (Hons) Intermediate awards available Cert. H. E., Dip. H. E., BSc Mode of delivery On Campus
More informationIntroducing Maryville University s CYBER SECURITY ONLINE PROGRAMS. Bachelor of Science in Cyber Security & Master of Science in Cyber Security
Introducing Maryville University s CYBER SECURITY ONLINE PROGRAMS Bachelor of Science in Cyber Security & Master of Science in Cyber Security The cyber security industry is calling for more experts. And
More informationDepartment of Computer Science
Department of Computer Science The Department of Computer Science offers a Master of Science degree and a Doctor of Philosophy degree in Computer Science. M.S. in Computer Science (p. 1) Ph.D. in Computer
More informationBachelor of Information Technology (Network Security)
Course information for Bachelor of Information Technology (Network Security) Course Number HE20524 Location Meadowbank Course Design The Bachelor of Information Technology (Network Security) is a three-year
More informationPart A: Course Outline
University of Macau Faculty of Science and Technology Course Title: Department of Electrical and Computer Engineering Part A: Course Outline Communication System and Data Network Course Code: ELEC460 Year
More informationInitial CITP and CSci (partial fulfilment). *Confirmation of full accreditation will be sought in 2020.
PROGRAMME SPECIFICATION Master of Computing (Hons) in Computer Forensics Awarding institution Teaching institution UCAS Code JACS Code Programme Duration Language of Programme Liverpool John Moores University
More informationINFORMATION SYSTEMS, BACHELOR OF SCIENCE (B.S.)
Information Systems, Bachelor of Science (B.S.) INFORMATION SYSTEMS, BACHELOR OF SCIENCE (B.S.) The mission of the Bachelor of Science in Information Systems is to prepare students for successful careers
More informationQuality Code for Higher Education. Application for Validation Part 1: Programme/Stage Specification Pro Forma
Quality Code for Higher Education Application for Validation Part 1: Programme/Stage Specification Pro Forma INTRODUCTION Identifiers (e.g. a, b, c etc) should be used throughout this document to indicate
More informationSoftware Assurance Education Overview
Software Assurance Education Overview Nancy Mead June 2011 ABSTRACT: Complex software systems affect nearly every aspect of our lives, in areas such as defense, government, energy, communication, transportation,
More informationCONCENTRATIONS: HIGH-PERFORMANCE COMPUTING & BIOINFORMATICS CYBER-SECURITY & NETWORKING
MAJOR: DEGREE: COMPUTER SCIENCE MASTER OF SCIENCE (M.S.) CONCENTRATIONS: HIGH-PERFORMANCE COMPUTING & BIOINFORMATICS CYBER-SECURITY & NETWORKING The Department of Computer Science offers a Master of Science
More informationComputer Information Systems
Computer Information Systems Technology 89 Computer Information Systems Location: Patterson Campus - Bldg. E Program Information The Computer Information Systems department at is progressive and innovative
More informationThe GenCyber Program. By Chris Ralph
The GenCyber Program By Chris Ralph The Mission of GenCyber Provide a cybersecurity camp experience for students and teachers at the K-12 level. The primary goal of the program is to increase interest
More informationSchool of Computer Science
School of Computer Science Computer Science (CS) modules CS1002 Object-Oriented Programming Computer Science - 1000 & 2000 Level - 2016/7 - December 2016 SCOTCAT Credits: 20 SCQF Level 7 Semester: 1 3.00
More informationITCC Cisco Exploration 1: Networking Fundamentals
Computer Science Technology Department Houston Community College System Department Website: http://csci.hccs.cc.tx.us CRN: 35007 Semester: Fall 2014 CAMPUS: Central Campus DAY/TIME: Thu 6pm -10pm Room:
More informationab Houston Community College
Computer Science Technology Department ab Houston Community College ITNW 1313 Computer Virtualization Course Syllabus Instructor Course Reference Number (CRN) Course Description: Course Prerequisite(s)
More informationThis programme is only offered at: Kazan State University for Architecture and Engineering (KSUAE)
UNIVERSITY OF EAST LONDON UNDERGRADUATE PROGRAMME SPECIFICATION BSc (Hons) Information Systems (Building & Architecture) This programme is only offered at: Kazan State University for Architecture and Engineering
More informationSAULT COLLEGE OF APPLIED ARTS AND TECHNOLOGY SAULT STE. MARIE, ONTARIO COURSE OUTLINE
SAULT COLLEGE OF APPLIED ARTS AND TECHNOLOGY SAULT STE. MARIE, ONTARIO Sault College COURSE OUTLINE COURSE TITLE: Cisco (CCNA) Certification II CODE NO. : SEMESTER: 3 PROGRAM: AUTHOR: Computer Network
More informationForm 18 Heriot-Watt University Graduate/Postgraduate Course Structure and Course Notes Template (RAY) Version 3.0 (2007/2008)
Form 18 Heriot-Watt University Graduate/Postgraduate Course Structure and Course Notes Template (RAY) Version 3.0 (2007/2008) 1. Course Codes 3. School/Institute Mathematical & Computer Sciences (University
More informationKEY PROGRAMME INFORMATION. Originating institution(s) Bournemouth University. Faculty responsible for the programme Faculty of Science and Technology
KEY PROGRAMME INFORMATION Originating institution(s) Bournemouth University Faculty responsible for the programme Faculty of Science and Technology Final award(s), title(s) and credits 20 (60 ECTS) Level
More informationPROPOSAL TO INTRODUCE A NEW COURSE
PROPOSAL TO INTRODUCE A NEW COURSE 1. COURSE DETAILS 1.1 Course ID COMP3021 1.2 Course name -- Long Object-Oriented Programming 1.3 Course name -- Abbreviated OOP 1.4 Course Authority Assoc. Professor
More informationFaculty of Engineering and Informatics. Programme Specification. School of Electrical Engineering and Computer Science
School of Electrical Engineering and Computer Science Programme Specification Faculty of Engineering and Informatics Programme title: BSc (Hons) Computer Science for Business Academic Year: 2017/18 Degree
More informationCATALOG 2017/2018 BINUS UNIVERSITY. Cyber Security. Introduction. Vision. Mission
Cyber Security Introduction Cyber attack is raising and threaten ubiquitous world on internet today. Industry and government need cyber security expert to counter and defend from this threaten. Cyber Security
More informationBACHELOR OF SCIENCE IN INFORMATION TECHNOLOGY
Purdue University Global 208-209 Catalog BACHELOR OF SCIENCE IN INFORMATION TECHNOLOGY Description and Outcomes The objective of the Bachelor of Science in Information Technology program is to help you
More informationNetwork Security
44-555 Network Security Instructor: Scott Bell Office: 2220 Colden Hall Email: sbell@nwmissouri.edu Phone: (660) 562-1699 Description: An introduction to the fundamentals of network security, including
More informationMODULE SPECIFICATIONS
S 1. Title of the module Leading Assurance Engagements PRSN7106 2. School or partner institution which will be responsible for management of the module 3. The level of the module (e.g. Level 4, Level 5,
More informationExpected start dates September Placements 30 weeks, optional Partnership model Not applicable
KEY PROGRAMME INFORMATION Originating institution(s) Bournemouth University Faculty responsible for the programme Faculty of Science and Technology Final award(s), title(s) and credits 20 (60 ECTS) Level
More informationSyllabus. Computer Science Information Technology 975. Information Storage and Management for Computer Networks
Syllabus Computer Science Information Technology 975 Information Storage and Management for Computer Networks Course: CSIT 975, 8525, Fall 2015, 3 Units Instructor: Associate Professor Marcus Butler E-mail:
More informationMSc in Information Systems
MSc in Information Systems Assoc Prof Dion Goh Programme Director WKWSCI 26 October 2018 Programme Objective To educate information systems professionals who are able to develop and manage user-centered
More informationBS in Information Technology
BS in Information Technology Key Changes: - Minimum credit hours required changed from 130 to 120 - Two management courses (co-listed with IT) added as required: IT462 and IT466-311 is replaced by 330
More informationProgramme Specification
Programme Specification 1 Awarding body University of London 2 Teaching Institution Birkbeck College 3 Programme Title(s) MSc Advanced Computing Technologies 4 Programme Code(s) TMSACTEC_ C 5 UCAS code
More informationQualification details
Qualification details Title New Zealand Diploma in Web Development and Design (Level 5) Version 1 Qualification type Diploma Level 5 Credits 120 NZSCED 020115 Information Technology > Computer Science
More informationCertification. What: Who: Where:
Certification What: Certification is a process by which the Wisconsin Technical College System Office evaluates the occupational, academic, and teaching experience of district employees to determine his/her
More informationBETHESDA CHEVY CHASE HIGH SCHOOL Career and Technology Education Department
BETHESDA CHEVY CHASE HIGH SCHOOL Career and Technology Education Department Mr. Jonathan Nateghi-Asli Jonathan_A_Nateghi-Asli@mcpsmd.org Resource Teacher http://bit.ly/bcctechnology Graduation Requirements
More informationThe fast track to top skills and top jobs in cyber. Guaranteed. FREE TO TRANSITIONING VETERANS
The fast track to top skills and top jobs in cyber. Guaranteed. FREE TO TRANSITIONING VETERANS WELCOME SANS Institute is presenting the SANS VetSuccess Immersion Academy in the DC Metro area. For transitioning
More informationAcademic Program Review Cyber Security College of Southern Nevada 2017
Academic Program Review Cyber Security College of Southern Nevada 2017 ACADEMIC EVALUATION WORKSHEET PROGRAM ASSESSMENT DATA Date Submitted: Submitted by: Margaret Taylor PROGRAM Assessment Data to be
More informationSAULT COLLEGE OF APPLIED ARTS & TECHNOLOGY SAULT STE MARIE, ON COURSE OUTLINE
SAULT COLLEGE OF APPLIED ARTS & TECHNOLOGY SAULT STE MARIE, ON COURSE OUTLINE Course Title: NETWORK CERTIFICATION I Code No.: Semester: 5 Program: COMPUTER NETWORK TECHNOLOGY Author TYCHO BLACK / DAN KACHUR
More informationResponse to the Validation Panel for the DIT Foundation Programmes
Response to the Validation Panel for the DIT Foundation Programmes Condition: The programme should be presented as two separate programmes with separate programme documentation, including programme aims,
More informationProgramme title: BSc (Hons) Forensic Archaeology and Anthropology
Faculty of Life Sciences Programme Specification Programme title: BSc (Hons) Forensic Archaeology and Anthropology Academic Year: 2017-18 Degree Awarding Body: Partner(s), delivery organisation or support
More informationDIABLO VALLEY COLLEGE CATALOG
COMPUTER NETWORK TECHNOLOGY CNT Despina Prapavessi, Dean Math and Computer Sciences Division Math Building, Room 267 Possible career opportunities These CNT-courses prepare students for a career path in
More informationCollege of Arts, Letters, and Education. Special Education and Elementary Education BAE
College of Arts, Letters, and Education Special Education and Elementary Education BAE Why study Special Education and Elementary Education? Teaching is an enormously challenging and rewarding profession.
More informationGRADUATE CURRICULUM COMMITTEE REPORT
GRADUATE CURRICULUM COMMITTEE REPORT Submitted to the Graduate Council November 15, 2016. For complete curriculum proposal information please see the University s Curriculum Proposal site: registrar.ilstu.edu/curriculumforms/
More informationCCNA Cybersecurity Operations. Program Overview
Table of Contents 1. Introduction 2. Target Audience 3. Prerequisites 4. Target Certification 5. Curriculum Description 6. Curriculum Objectives 7. Virtual Machine Requirements 8. Course Outline 9. System
More informationHonours in Information Systems
Honours in Information Systems Contents Admission - Honours ( Information Systems)... 2 Application... 2 Degree Overview... 2 Programme Objectives... 2 Programme Structure... 3 Programme Details... 4 Delivery...
More informationCSC 4992 Cyber Security Practice
CSC 4992 Cyber Security Practice Fengwei Zhang Wayne State University CSC 4992 Cyber Security Practice 1 Who Am I? Fengwei Zhang Assistant Professor of Computer Science Office: Maccabees Building, Room
More informationCurriculum for the Bachelor's Degree Programme in Software Development National section
Curriculum for the Bachelor's Degree Programme in Software Development National section Contents 1. Programme structure... 3 2. Core areas of study... 3 2.1 Large-scale system development... 3 2.2 Databases
More informationComputer Information Systems Technology (CIS)
Technology 104 The College for Real Careers Technology (CIS) Program Information The department at H. Councill Trenholm State Community College is progressive and innovative in its approach toward the
More informationAE Computer Programming for Aerospace Engineers
AE 030 - Computer Programming for Aerospace Engineers Instructor Information: Credit: Professor Long Lu Long.Lu@sjsu.edu 2 units Class Times & Locations: Section 01 (Lecture): M 16:30-17:20 in CL 226 Section
More informationLoyola Marymount University School of Education
Loyola Marymount University School of Education The California Teaching Performance Assessment (CalTPA) Frequently Asked Questions The information presented in this guide is meant to serve as introductory
More informationProgramme Specification
Programme Specification Awarding Body/Institution Teaching Institution Queen Mary University of London Queen Mary University of London Name of Final Award and Programme Title Certificate in Intellectual
More informationComputer Networks IT321
Computer Networks IT321 CS Program 3 rd Year (2 nd Semester) Page 1 Assiut University Faculty of Computers & Information Computer Science Department Quality Assurance Unit Computer Networks Course Specifications
More informationNew Zealand Diploma in Engineering
New Zealand Diploma in Engineering (Level 6) (Version 2.0) with strands in: Civil Engineering Electrical Engineering Electronic Engineering Mechanical Engineering Wintec code: EN1603 MoE: NZ2612 Level:
More informationINFORMATION SESSION. MS Software Engineering, specialization in Cybersecurity
INFORMATION SESSION MS Software Engineering, specialization in Cybersecurity Presenter Afifa Hamad Program Specialist Graduate & Extended Studies Charles W. Davidson College of Engineering San Jose State
More informationProgramme Specification
Programme Specification BSc Honours Forensic Computing 1. Awarding institution Middlesex University 2. Teaching institution Middlesex University 3. Programme accredited by 4. Final qualification BSc Honours
More informationSouth Portland, Maine Computer Information Technology. Web Site: blackboard.smccme.edu. Course Syllabus
South Portland, Maine 04106 Computer Information Technology Title: Routing & Switching Fundamentals Catalog Number: CMIT 225 D1 Credit Hours: 3 Total Contact Hours: 45 Lecture (or Lab): Lecture & Lab Instructor:
More informationSOFTWARE ENGINEERING. Curriculum in Software Engineering. Program Educational Objectives
Software Engineering 1 SOFTWARE ENGINEERING For the undergraduate curriculum in Software Engineering (http:// www.se.iastate.edu) leading to the degree Bachelor of Science. This curriculum is accredited
More informationRochester Institute of Technology Golisano College of Computing and Information Sciences Department of Information Sciences and Technologies
Rochester Institute of Technology Golisano College of Computing and Information Sciences Department of Information Sciences and Technologies 4002-360.01 ~ Introduction to Database & Data Modeling ~ Spring
More informationCyberSecurity Training and Capacity Building: A Starting Point for Collaboration and Partnerships. from the most trusted name in information security
CyberSecurity Training and Capacity Building: A Starting Point for Collaboration and Partnerships About SANS The SANS (SysAdmin, Audit, Network, Security) Institute Established in 1989 Cooperative research
More informationMake Your Statement. Master of Management in Library and Information Science online. Graduate Certificate in Library and Information Management online
Make Your Statement Master of Management in Library and Information Science online Graduate Certificate in Library and Information Management online Help shape the future of your field. The Master of Management
More informationMSIT Program Handbook. Master of Science in Information Technology
MSIT Program Handbook 2018-2019 Master of Science in Information Technology Information Technology Management Information Security and Assurance Business Intelligence and Data Analytics Software Design
More informationDESIGN. College of the Arts. Career Possibilities. Undergraduate Programs. Bachelor of Arts in Design (120 Units) 2014/2015 CSULB Catalog Design 335
DESIGN College of the Arts Department Chair: Martin Herman Department Office: Design (DESN), Room 101 Telephone / FAX: (562) 985 5089 / (562) 985 2284 Website: http://www.csulb.edu/depts/design/ Undergraduate
More informationDiscover Viterbi: Computer Science, Cyber Security & Informatics Programs. Viterbi School of Engineering University of Southern California Fall 2017
Discover Viterbi: Computer Science, Cyber Security & Informatics Programs Viterbi School of Engineering University of Southern California Fall 2017 WebEx Quick Facts Will I be able to get a copy of the
More informationIntroducing Cyber Resiliency Concerns Into Engineering Education
Introducing Cyber Resiliency Concerns Into Engineering Education Mr. Tom McDermott Georgia Tech Research Institute Mr. Barry Horowitz University of Virginia NDIA 20 th Annual Systems Engineering Conference
More informationCollege of Arts and Letters Interdisciplinary Studies. Program Guide. Version 4 May Program Description and Course Requirements
College of Arts and Letters Interdisciplinary Studies Program Guide Cybersecurity Major Version 4 May 2016 Contents 1. Program Description and Course Requirements 2. Sample 4-year Course Plan. Pre-requisites
More informationCSC 210 COMPUTER SCIENCE II
CSC 210 COMPUTER SCIENCE II PRESENTED AND APPROVED: NOVEMBER 2, 2012 EFFECTIVE: FALL 2013-14 Prefix & Number CSC 210 Course : Computer Science II Purpose of this submission: New Course New Change/Updated
More informationINFORMATION TECHNOLOGY, BS
Information Technology, BS 1 INFORMATION TECHNOLOGY, BS Banner Code: VS-BS-INFT Academic Advising 5400 Nguyen Engineering Building Fairfax Campus 101 Bull Run Hall Science and Technology Campus Phone:
More informationThis version of the programme is no longer recruiting. Please see the specification for BSc (Hons) Software Engineering.
Software Engineering This version of the programme is no longer recruiting. Please see the specification for BSc (Hons) Software Engineering. Final award B.Sc. (Hons) Intermediate awards available Cert.
More informationBEng (Hons) Civil Engineering E410 (Under Review)
BEng (Hons) Civil Engineering E410 (Under Review) 1.0 Introduction The aim of the degree programme is to provide students with a sound knowledge and understanding of the subject of Civil Engineering and
More informationFaculty of Engineering and Informatics. Programme Specification. School of Electrical Engineering and Computer Science. Academic Year: 2017/18
School of Electrical Engineering and Computer Science Programme Specification Faculty of Engineering and Informatics Programme title: BSc (Hons) Computer Science Academic Year: 2017/18 Degree Awarding
More informationComputer Science & IT
Computer Science & IT TIDEWATER COMMUNITY COLLEGE CLOUD COMPUTING The Career Studies Certificate program in Cloud Computing prepares students to install, deploy, configure, manage, secure, and analyze
More informationROJECT ANAGEMENT PROGRAM AND COURSE GUIDE
ROJECT ANAGEMENT PROGRAM AND COURSE GUIDE PROJECT MANAGEMENT CERTIFICATE PROGRAM Further your career and gain an understanding of what it takes to lead a project to successful completion functional skills,
More informationb. Remediation will only be offered for courses offered at the home school.
RECOVERING CREDIT THROUGH A MASTERY EXAM Responsible: Office of Academics Department of Assessment PURPOSE This administrative procedure shall establish guidelines related to the recovery of high school
More informationApplication Procedures: Fulbright English Teaching Assistantship IMPORTANT DATES AND DEADLINES - Application Year
Application Procedures: Fulbright English Teaching Assistantship IMPORTANT DATES AND DEADLINES - Application Year 2018-19 Step Description Date Due Complete 1 Register for Fulbright Program Interest List
More informationBETHESDA CHEVY CHASE HIGH SCHOOL Career and Technology Education Department
BETHESDA CHEVY CHASE HIGH SCHOOL Career and Technology Education Department Mr. Jonathan Nateghi-Asli Jonathan_A_Nateghi-Asli@mcpsmd.org Resource Teacher http://bit.ly/bcctechnology Graduation Requirements
More informationUniversity of Wisconsin-Stout Menomonie, WI
University of Wisconsin-Stout Menomonie, WI Applied Mathematics and Computer Science Program Diane Christie (Program Director) Terry Mason and Radi Teleb UW-Stout Menomonie, WI I-94 (~40 miles into Wisconsin)
More informationCourse Code(s): FS002H01UV Full-time 3 Years FS002H31UV Part-Time 6 Years
Course Specification Published Date: Produced By: Status: 15-Aug-2017 Haiden Novis Validated Core Information Awarding Body / Institution: School / Institute: University of Wolverhampton Wolverhampton
More informationCybersecurity Essentials
Cybersecurity Essentials University of Moratuwa Cisco Networking Center Cybersecurity Essentials Foundational Security Course Overview Cybersecurity Essentials covers foundational knowledge and essential
More informationSAULT COLLEGE OF APPLIED ARTS AND TECHNOLOGY SAULT STE. MARIE, ONTARIO. Sault College COURSE OUTLINE CODE NO. : CSD100 SEMESTER: 1
SAULT COLLEGE OF APPLIED ARTS AND TECHNOLOGY SAULT STE. MARIE, ONTARIO Sault College COURSE OUTLINE COURSE TITLE: CODE NO. : SEMESTER: 1 PROGRAM: AUTHOR: ALL COMPUTER STUDIES PROGRAMS Dennis Ochoski DATE:
More informationCSC 562: Graduate Introduction to Game Engine Design
CSC 562: Graduate Introduction to Game Engine Design In Workflow 1. 14CSC GR Director of Curriculum (rouskas@ncsu.edu) 2. COE CC Coordinator GR (rfillin@ncsu.edu) 3. COE CC Chair GR (reeves@ncsu.edu; rfillin@ncsu.edu;
More informationComputer Information Systems (CIS) CIS 105 Current Operating Systems/Security CIS 101 Introduction to Computers
Computer Information Systems (CIS) CIS 101 Introduction to Computers This course provides an overview of the computing field and its typical applications. Key terminology and components of computer hardware,
More informationCCNA Cybersecurity Operations 1.1 Scope and Sequence
CCNA Cybersecurity Operations 1.1 Scope and Sequence Last updated June 18, 2018 Introduction Today's organizations are challenged with rapidly detecting cybersecurity breaches and effectively responding
More informationUNDERGRADUATE PROGRAMME SPECIFICATION
UNDERGRADUATE PROGRAMME SPECIFICATION Programme Title: Awarding Body: Teaching Institution: Final Awards: BSc (Hons) Computer Networks (progression award) Staffordshire University Faculty of Computing,
More informationRYERSON UNIVERSITY Ted Rogers School of Information Technology Management And G. Raymond Chang School of Continuing Education
RYERSON UNIVERSITY Ted Rogers School of Information Technology Management And G. Raymond Chang School of Continuing Education COURSE OF STUDY 2017-2018 (C)ITM 820 Information Systems Security and Privacy
More information