RESEARCH SCHOOL OF COMPUTER SCIENCE (RSCS) CURRICULUM DEVELOPMENT COMMITTEE

Size: px
Start display at page:

Download "RESEARCH SCHOOL OF COMPUTER SCIENCE (RSCS) CURRICULUM DEVELOPMENT COMMITTEE"

Transcription

1 RESEARCH SCHOOL OF COMPUTER SCIENCE (RSCS) CURRICULUM DEVELOPMENT COMMITTEE Meeting. 2/2017 of the will be held on Thursday 30 March 2017 at 12pm in Room R212, Ian Ross Building (31). Apologies and enquiries should be sent to: Summary S.1 Curriculum Proposals Recommendation: That the Committee endorse the proposals for submission to the CECS Education Committee. Attachment: Appendix A RSCS Curriculum Proposals For decision 2 3 Page 1

2 Item S.1 Curriculum Proposals Purpose To review curriculum proposals from the Research School of Computer Science submitted to the Committee for their endorsement. Recommendation That the Committee review the below proposals and endorse them for submission to the CECS Education Committee. ACTION REQUIRED For discussion For decision For information For response Background New Courses Page Course Code Title 3 COMP 2700 Cyber Security Foundations 6 COMP 3701 Defensive Cyber Security Operations 9 COMP 3702 Offensive Cyber Security Operations Sponsor Associate Director (Education) Research School of Computer Science Appendices Appendix A RSCS Curriculum Proposal forms Page 2

3 Send by Print Form Academic Course Form CEC Document Number Subject Area COMP Catalogue Number 2700 Date Approved Request Type New Course Course Status t Approved Amendment Type ne Amendment Description Rationale As part of a new Major in Cyber Security, this course is the foundational course in a group of three new courses (Comp2700, Comp3701, Comp3702) which are required to form a complete, technically oriented cyber security education. Long Course Title Cyber Security Foundations (100 characters) Short Course Title Cyber Security Foundations (30 characters) ACADEMIC USE To Take Effect From 01/01/2018 Course Minimum Unit Value 6 Course Maximum Unit Value 6 Does this course have an UG / PG Equivalent? Do you want this course to be offered as a variable unit course? Proposed Date Proposer Name Uwe R. Zimmer Primary Convenor's Primary Convenor's Name New appointment imminent who will convene this new course in Course Description Course Structure and Content Learning Outcomes Cyber Security Foundations introduces all essential cyber security principles. This includes principles of secure design, secrets minimization, least privilege, isolation, separation and encapsulation. The interplay between failed security principles and vulnerabilities is investigated in detail. The course provides the essential foundations which allow students to continue in a more in-depth cyber security career, yet can also be used a standalone unit to provide a self-contained set of knowledge. This is a general, second year course in our u/g programs which also serves as a foundational course for the Cyber Security Major. It will be offered on campus, as a combination of lectures and labs. The courses covers content in the areas of essential cyber security principles. 1. Demonstrate a thorough understanding of the fundamental principles underlying Cyber Security. 2. Define and identify cyber security principles and their violation. 3. Apply cyber security principles in a practical context. 4. Migrate insights from cyber security analysis into new designs. 5. Communicate a cyber security thread to a heterogenous team of professionals. Page 3

4 Workload Up to 60 hours of total face-time, which includes interactions with lectures and tutors. Up to 60 hours of total preparation, repeat, assignment and practical exercise time. Prescribed Texts (Reading to Support the Course) Preliminary Reading Indicative Reading List Assumed Knowledge, Required Skills and Recommended Courses (not prerequisites) Requisite Statement for Course (includes Prerequisite: Comp2420 Corequisite/Prerequisite and Incompatibility) (For more information please refer Requisite Design Guide) Indicative Assessment Assignments (50%); Final Exam (50%) Assessment Rationale Key learning outcomes are assessed using multiple and varied forms of assessment. Additional Assessment Learning Outcomes Mode of Delivery In person Quality Assurance Arrangements The standard RSCS's quality assurance arrangements will be applied to this course. Transitional Arrangements (if applicable) Relevant ANU internal and external consultation Intended Market and work undertaken to evaluate the market Estimated Enrolment Numbers and rationale Has gone through normal School and College processes. This is an optional course for undergraduate students and part of the Cyber Security Major. It is intended towards a diverse audience with an emphasis on technical Cyber Security. At least one quarter of the current undergraduate enrolments in Computer Science. Given the popularity and relevance of Cyber Security at this time, potentially more. Areas of Interest Please select Areas of Interest Is this required on a Sub-Plan? Major of Cyber Security ADMINISTRATION USE Responsible College Send tifications To ANU College of Engineering and Computer Science Melissa.Coppin@anu.edu.au Associate Dean / Dean/ College Dean Associate Professor Jochen Trumpf Page 4

5 Is Consent Required to Enrol? If yes, reason Eligibility for Graduate Studies (Graduate Coursework Only) Graduate Studies Classification 1 Graduate Studies Classification 2 List of course topics (Topics are descriptors on course names) (30 character limit each topic) Academic Organistion (Offered by) Research School of Computer Science Academic Group ENGIT (ANU College of Eng & Comp Sci) Academic Career How many times may this course be repeated after successful completion? (Please enter number only) 0 Course Grading Basis GRD (Graded) Course Component CRS (Course Enrolment Only) Is this a work experience or course internship? (Work Experience course are where student learning and performance is not directed by the university) If yes, to a work experience course, will the learning and assessment be directed by the ANU? Quota Proposed Scheduling (for the next three years) Semester 2 Does this course have more than one owner? Split Ownership Academic Organisation Percentage EFTSL COURSE FEES Field of Education Code Year Per Unit ISF Per Unit DTF Fee rate is same as existing course Department ID CE200 Submit by to Course Registry Page 5

6 Send by Print Form Academic Course Form CEC Document Number Subject Area COMP Catalogue Number 3701 Date Approved Request Type New Course Course Status t Approved Amendment Type ne Amendment Description Rationale As part of a new Major in Cyber Security, this course covers the defensive Cyber Security aspects in a group of three new courses (Comp2700, Comp3701, Comp3702) which are required to form a complete, technically oriented cyber security education. Long Course Title Defensive Cyber Security Operations (100 characters) Short Course Title Defensive Cyber Security Op (30 characters) ACADEMIC USE To Take Effect From 01/01/2018 Course Minimum Unit Value 6 Course Maximum Unit Value 6 Does this course have an UG / PG Equivalent? Do you want this course to be offered as a variable unit course? Proposed Date Proposer Name Uwe R. Zimmer Primary Convenor's Primary Convenor's Name New appointment imminent who will convene this new course in Course Description Course Structure and Content Learning Outcomes Defensive Cyber Security operations introduces and exercises a complete range of anomaly / intrusion detection and identification mechanisms. The students will also learn and exercise the handling of an existing intrusion which includes forensic operations and well as securing the remaining systems. This is a complete course in cyber defense which enables students on successful completion to operate systems under realworld exposure. This is a general, second year course in our u/g programs which also serves as an advanced course for the Cyber Security Major. It will be offered on campus, as a combination of lectures and labs. The courses covers content in the areas of essential, defensive Cyber Security operations. 1. Demonstrate a thorough understanding of the fundamental principles underlying the defence of systems and networks. 2. Define and identify defensive cyber security architectures and their purpose. 3. Operate defensive network architectures and systems in a practical context. 4. Extrapolate current threats and identify potential, future threats. 5. Communicate a cyber security situation and response to a heterogenous team of professionals. Page 6

7 Workload Up to 60 hours of total face-time, which includes interactions with lectures and tutors. Up to 60 hours of total preparation, repeat, assignment and practical exercise time. Prescribed Texts (Reading to Support the Course) Preliminary Reading Indicative Reading List Assumed Knowledge, Required Skills and Recommended Courses (not prerequisites) Requisite Statement for Course (includes Prerequisite: Comp2700 Corequisite/Prerequisite and Incompatibility) (For more information please refer Requisite Design Guide) Indicative Assessment Assignments (50%); Final Exam (50%) Assessment Rationale Key learning outcomes are assessed using multiple and varied forms of assessment. Additional Assessment Learning Outcomes Mode of Delivery In person Quality Assurance Arrangements The standard RSCS's quality assurance arrangements will be applied to this course. Transitional Arrangements (if applicable) Relevant ANU internal and external consultation Intended Market and work undertaken to evaluate the market Estimated Enrolment Numbers and rationale Has gone through normal School and College processes. This is an optional course for undergraduate students and part of the Cyber Security Major. It is intended towards a diverse audience with an emphasis on technical Cyber Security. About one quarter of the current undergraduate enrolments in Computer Science. Given the popularity and relevance of Cyber Security at this time, potentially more. Areas of Interest Please select Areas of Interest Is this required on a Sub-Plan? Major of Cyber Security ADMINISTRATION USE Responsible College Send tifications To ANU College of Engineering and Computer Science Melissa.Coppin@anu.edu.au Associate Dean / Dean/ College Dean Associate Professor Jochen Trumpf Page 7

8 Is Consent Required to Enrol? If yes, reason Eligibility for Graduate Studies (Graduate Coursework Only) Graduate Studies Classification 1 Graduate Studies Classification 2 List of course topics (Topics are descriptors on course names) (30 character limit each topic) Academic Organistion (Offered by) Research School of Computer Science Academic Group ENGIT (ANU College of Eng & Comp Sci) Academic Career How many times may this course be repeated after successful completion? (Please enter number only) 0 Course Grading Basis GRD (Graded) Course Component CRS (Course Enrolment Only) Is this a work experience or course internship? (Work Experience course are where student learning and performance is not directed by the university) If yes, to a work experience course, will the learning and assessment be directed by the ANU? Quota Proposed Scheduling (for the next three years) Semester 1 Does this course have more than one owner? Split Ownership Academic Organisation Percentage EFTSL COURSE FEES Field of Education Code Year Per Unit ISF Per Unit DTF Fee rate is same as existing course Department ID CE200 Submit by to Course Registry Page 8

9 Send by Print Form Academic Course Form CEC Document Number Subject Area COMP Catalogue Number 3702 Date Approved Request Type New Course Course Status t Approved Amendment Type ne Amendment Description Rationale As part of a new Major in Cyber Security, this course covers the offensive Cyber Security aspects in a group of three new courses (Comp2700, Comp3701, Comp3702) which are required to form a complete, technically oriented cyber security education. Long Course Title Offensive Cyber Security Operations (100 characters) Short Course Title Offensive Cyber Security Op (30 characters) ACADEMIC USE To Take Effect From 01/01/2018 Course Minimum Unit Value 6 Course Maximum Unit Value 6 Does this course have an UG / PG Equivalent? Do you want this course to be offered as a variable unit course? Proposed Date Proposer Name Uwe R. Zimmer Primary Convenor's Primary Convenor's Name New appointment imminent who will convene this new course in Course Description Course Structure and Content Learning Outcomes Offensive Cyber Security operations introduces and exercises a complete range of reverse engineering techniques and attack patterns. The students will also learn and exercise the analysis of systems based on minimal information. This is a complete course in cyber attacks which enables students on successful completion to identify and test systems for vulnerabilities without full knowledge or direct access. This is a general, second year course in our u/g programs which also serves as an advanced course for the Cyber Security Major. It will be offered on campus, as a combination of lectures and labs. The courses covers content in the areas of essential, offensive Cyber Security operations. 1. Demonstrate a thorough understanding of the fundamental principles underlying the identification and testing for vulnerabilities with limited information. 2. Analyze a system across all abstraction level, from basic hardware to complex cloud architectures. 3. Run cyber attacks, tests and probes in a practical context. 4. Expand conventional attack patterns to work in new system and network architectures. 5. Communicate a cyber security vulnerability and potential paths of attack to a heterogenous team of professionals. Page 9

10 Workload Up to 60 hours of total face-time, which includes interactions with lectures and tutors. Up to 60 hours of total preparation, repeat, assignment and practical exercise time. Prescribed Texts (Reading to Support the Course) Preliminary Reading Indicative Reading List Assumed Knowledge, Required Skills and Recommended Courses (not prerequisites) Requisite Statement for Course (includes Prerequisite: Comp2700 Corequisite/Prerequisite and Incompatibility) (For more information please refer Requisite Design Guide) Indicative Assessment Assignments (50%); Final Exam (50%) Assessment Rationale Key learning outcomes are assessed using multiple and varied forms of assessment. Additional Assessment Learning Outcomes Mode of Delivery In person Quality Assurance Arrangements The standard RSCS's quality assurance arrangements will be applied to this course. Transitional Arrangements (if applicable) Relevant ANU internal and external consultation Intended Market and work undertaken to evaluate the market Estimated Enrolment Numbers and rationale Has gone through normal School and College processes. This is an optional course for undergraduate students and part of the Cyber Security Major. It is intended towards a diverse audience with an emphasis on technical Cyber Security. About one quarter of the current undergraduate enrolments in Computer Science. Given the popularity and relevance of Cyber Security at this time, potentially more. Areas of Interest Please select Areas of Interest Is this required on a Sub-Plan? Major of Cyber Security ADMINISTRATION USE Responsible College Send tifications To ANU College of Engineering and Computer Science Melissa.Coppin@anu.edu.au Associate Dean / Dean/ College Dean Is Consent Required to Enrol? Associate Professor Jochen Trumpf Page 10

11 If yes, reason Eligibility for Graduate Studies (Graduate Coursework Only) Graduate Studies Classification 1 Graduate Studies Classification 2 List of course topics (Topics are descriptors on course names) (30 character limit each topic) Academic Organistion (Offered by) Research School of Computer Science Academic Group ENGIT (ANU College of Eng & Comp Sci) Academic Career How many times may this course be repeated after successful completion? (Please enter number only) 0 Course Grading Basis GRD (Graded) Course Component CRS (Course Enrolment Only) Is this a work experience or course internship? (Work Experience course are where student learning and performance is not directed by the university) If yes, to a work experience course, will the learning and assessment be directed by the ANU? Quota Proposed Scheduling (for the next three years) Semester 2 Does this course have more than one owner? Split Ownership Academic Organisation Percentage EFTSL COURSE FEES Field of Education Code Year Per Unit ISF Per Unit DTF Fee rate is same as existing course Department ID CE200 Submit by to Course Registry Page 11

Master of Cyber Security, Strategy and Risk Management. CECS PG Information Session April 17, 2018

Master of Cyber Security, Strategy and Risk Management. CECS PG Information Session April 17, 2018 Master of Cyber Security, Strategy and Risk Management CECS PG Information Session April 17, 2018 2 Program Purpose Provide a working understanding of information, network and software security, across

More information

FORM 7: Certificate Approval and Modification

FORM 7: Certificate Approval and Modification FORM 7: Certificate Approval and Modification Select Action: New Certificate Modify Existing Certificate Certificate Title: Certificate Level: Undergraduate Graduate College/School/Center or Department

More information

STUDENT LEARNING OUTCOMES Beacom College of Computer and Cyber Sciences

STUDENT LEARNING OUTCOMES Beacom College of Computer and Cyber Sciences STUDENT LEARNING OUTCOMES Beacom College of Computer and Cyber Sciences Undergraduate Programs - Bachelor B.S. Computer Game Design Upon completion of the B.S. degree in Computer Game Design, students

More information

This Programme Schedule applies to the Bachelor of Computing Systems (BCS) Level 7 credits 360.

This Programme Schedule applies to the Bachelor of Computing Systems (BCS) Level 7 credits 360. PROGRAMME REGULATIONS Programme Schedule Bachelor of Computing Systems To be read in conjunction with Bachelors Generic Regulations. 1. Programme Schedule This Programme Schedule applies to the Bachelor

More information

Information Systems and Tech (IST)

Information Systems and Tech (IST) Information Systems and Tech (IST) 1 Information Systems and Tech (IST) Courses IST 101. Introduction to Information Technology. 4 Introduction to information technology concepts and skills. Survey of

More information

ITSY Information Technology Security Course Syllabus Spring 2018

ITSY Information Technology Security Course Syllabus Spring 2018 ITSY 1342 - Information Technology Security Course Syllabus Spring 2018 Instructor Course Reference Number (CRN) Course Description: Name: Fidelis Ngang Tel: 713-718-5552 Office: Spring Branch, Room 900L

More information

Form 18 Heriot-Watt University Graduate/Postgraduate Course Structure and Course Notes Template (RAY) 2009/2010

Form 18 Heriot-Watt University Graduate/Postgraduate Course Structure and Course Notes Template (RAY) 2009/2010 Form 18 Heriot-Watt University Graduate/Postgraduate Course Structure and Course Notes Template (RAY) 2009/2010 s / F2V0-ITS Information Technology (Software Engineering) 6. Course Accredited by 7. QAA

More information

An Expert Panel was convened to review the submission of the following programme:

An Expert Panel was convened to review the submission of the following programme: Explanatory Memorandum College of Computer Training (CCT) An Expert Panel was convened to review the submission of the following programme: Bachelor of Science (Honours) in Information Technology - 1 year

More information

Washtenaw Community College Comprehensive Report. CNT 216 Routing and Switching Essentials Effective Term: Fall 2018

Washtenaw Community College Comprehensive Report. CNT 216 Routing and Switching Essentials Effective Term: Fall 2018 1 of 5 3/7/2018, 3:03 PM Washtenaw Community College Comprehensive Report CNT 216 Routing and Switching Essentials Effective Term: Fall 2018 Course Cover Division: Business and Computer Technologies Department:

More information

Bachelor of Information Technology (Course Code: C2000) Bachelor of Computer Science (Course Code: C2001)

Bachelor of Information Technology (Course Code: C2000) Bachelor of Computer Science (Course Code: C2001) Bachelor of Information Technology (Course Code: C2000) Bachelor of Computer Science (Course Code: C2001) Monash College Enrolment Information 1 2019 Faculty of Information Technology Academic and Student

More information

Course Specifications M. Tech. / PG Diploma Programme

Course Specifications M. Tech. / PG Diploma Programme Course Specifications M. Tech. / PG Diploma Programme Faculty of Engineering & Technology M. S. Ramaiah University of Applied Sciences University House, New BEL Road, MSR Nagar, Bengaluru 560 054 www.msruas.ac.in

More information

PROGRAMME SPECIFICATION

PROGRAMME SPECIFICATION PROGRAMME SPECIFICATION Master of Computing (Hons) in Computer Security Awarding institution Teaching institution UCAS Code JACS Code Programme Duration Language of Programme Liverpool John Moores University

More information

Information Systems. Courses. Information Systems 1

Information Systems. Courses. Information Systems 1 Information Systems 1 Information Systems Courses INFSYS 1800 Computers and Information Systems: 3 This course develops skills in technology awareness, computer fluency, computing devices, ethical use

More information

(FHEQ) level 6] 3 years full-time; 4 years full-time including a year of study abroad and/or work placement. I301 (4-years) Computing, Engineering

(FHEQ) level 6] 3 years full-time; 4 years full-time including a year of study abroad and/or work placement. I301 (4-years) Computing, Engineering Faculty of Engineering and Informatics Programme Specification Programme title: BEng (Hons) Software Engineering Academic Year: 2018/19 Degree Awarding Body: Partner(s), delivery organisation or support

More information

BACHELOR OF SCIENCE IN INFORMATION TECHNOLOGY

BACHELOR OF SCIENCE IN INFORMATION TECHNOLOGY Bachelor of Science in Information Technology BACHELOR OF SCIENCE IN INFORMATION TECHNOLOGY Description and Outcomes The objective of the Bachelor of Science in Information Technology program is to help

More information

Campus Solutions: Student Records. Quick Reference Guide

Campus Solutions: Student Records. Quick Reference Guide Campus Solutions: Student Records Table of Contents Unit I: Foundations of Student Records... 9 Unit II: Term Set-up... 10 Chapter 2 - Create and Maintain Terms and Sessions... 11 *Add/Update Term & Session...

More information

ADMINISTRATIVE REGULATION Milwaukee Area Technical College Title: PROFESSIONAL GROWTH CREDIT EVALUATION FOR CERTIFIED POSITIONS

ADMINISTRATIVE REGULATION Milwaukee Area Technical College Title: PROFESSIONAL GROWTH CREDIT EVALUATION FOR CERTIFIED POSITIONS Certification is a process by which the Wisconsin Technical College System (WTCS) evaluates the occupational, academic, and teaching experience of an employee to determine his/her preparedness to work

More information

CYBERSECURITY: Scholarship and Job Opportunities

CYBERSECURITY: Scholarship and Job Opportunities CYBERSECURITY: Scholarship and Job Opportunities Malware Invasion in Cyberspace Blackhole Malware Exploit Kit (2012) Shamoon Virus (2012) Stuxnet Worm (2010) Operation Aurora (2009) and many others Job

More information

On Campus. Computing. School of Architecture, Computing and Engineering 11 November Taught by UEL staff

On Campus. Computing. School of Architecture, Computing and Engineering 11 November Taught by UEL staff UNIVERSITY OF EAST LONDON UNDERGRADUATE PROGRAMME SPECIFICATION BSc (Hons) Computer Science Final award BSc (Hons) Intermediate awards available Cert. H. E., Dip. H. E., BSc Mode of delivery On Campus

More information

Introducing Maryville University s CYBER SECURITY ONLINE PROGRAMS. Bachelor of Science in Cyber Security & Master of Science in Cyber Security

Introducing Maryville University s CYBER SECURITY ONLINE PROGRAMS. Bachelor of Science in Cyber Security & Master of Science in Cyber Security Introducing Maryville University s CYBER SECURITY ONLINE PROGRAMS Bachelor of Science in Cyber Security & Master of Science in Cyber Security The cyber security industry is calling for more experts. And

More information

Department of Computer Science

Department of Computer Science Department of Computer Science The Department of Computer Science offers a Master of Science degree and a Doctor of Philosophy degree in Computer Science. M.S. in Computer Science (p. 1) Ph.D. in Computer

More information

Bachelor of Information Technology (Network Security)

Bachelor of Information Technology (Network Security) Course information for Bachelor of Information Technology (Network Security) Course Number HE20524 Location Meadowbank Course Design The Bachelor of Information Technology (Network Security) is a three-year

More information

Part A: Course Outline

Part A: Course Outline University of Macau Faculty of Science and Technology Course Title: Department of Electrical and Computer Engineering Part A: Course Outline Communication System and Data Network Course Code: ELEC460 Year

More information

Initial CITP and CSci (partial fulfilment). *Confirmation of full accreditation will be sought in 2020.

Initial CITP and CSci (partial fulfilment). *Confirmation of full accreditation will be sought in 2020. PROGRAMME SPECIFICATION Master of Computing (Hons) in Computer Forensics Awarding institution Teaching institution UCAS Code JACS Code Programme Duration Language of Programme Liverpool John Moores University

More information

INFORMATION SYSTEMS, BACHELOR OF SCIENCE (B.S.)

INFORMATION SYSTEMS, BACHELOR OF SCIENCE (B.S.) Information Systems, Bachelor of Science (B.S.) INFORMATION SYSTEMS, BACHELOR OF SCIENCE (B.S.) The mission of the Bachelor of Science in Information Systems is to prepare students for successful careers

More information

Quality Code for Higher Education. Application for Validation Part 1: Programme/Stage Specification Pro Forma

Quality Code for Higher Education. Application for Validation Part 1: Programme/Stage Specification Pro Forma Quality Code for Higher Education Application for Validation Part 1: Programme/Stage Specification Pro Forma INTRODUCTION Identifiers (e.g. a, b, c etc) should be used throughout this document to indicate

More information

Software Assurance Education Overview

Software Assurance Education Overview Software Assurance Education Overview Nancy Mead June 2011 ABSTRACT: Complex software systems affect nearly every aspect of our lives, in areas such as defense, government, energy, communication, transportation,

More information

CONCENTRATIONS: HIGH-PERFORMANCE COMPUTING & BIOINFORMATICS CYBER-SECURITY & NETWORKING

CONCENTRATIONS: HIGH-PERFORMANCE COMPUTING & BIOINFORMATICS CYBER-SECURITY & NETWORKING MAJOR: DEGREE: COMPUTER SCIENCE MASTER OF SCIENCE (M.S.) CONCENTRATIONS: HIGH-PERFORMANCE COMPUTING & BIOINFORMATICS CYBER-SECURITY & NETWORKING The Department of Computer Science offers a Master of Science

More information

Computer Information Systems

Computer Information Systems Computer Information Systems Technology 89 Computer Information Systems Location: Patterson Campus - Bldg. E Program Information The Computer Information Systems department at is progressive and innovative

More information

The GenCyber Program. By Chris Ralph

The GenCyber Program. By Chris Ralph The GenCyber Program By Chris Ralph The Mission of GenCyber Provide a cybersecurity camp experience for students and teachers at the K-12 level. The primary goal of the program is to increase interest

More information

School of Computer Science

School of Computer Science School of Computer Science Computer Science (CS) modules CS1002 Object-Oriented Programming Computer Science - 1000 & 2000 Level - 2016/7 - December 2016 SCOTCAT Credits: 20 SCQF Level 7 Semester: 1 3.00

More information

ITCC Cisco Exploration 1: Networking Fundamentals

ITCC Cisco Exploration 1: Networking Fundamentals Computer Science Technology Department Houston Community College System Department Website: http://csci.hccs.cc.tx.us CRN: 35007 Semester: Fall 2014 CAMPUS: Central Campus DAY/TIME: Thu 6pm -10pm Room:

More information

ab Houston Community College

ab Houston Community College Computer Science Technology Department ab Houston Community College ITNW 1313 Computer Virtualization Course Syllabus Instructor Course Reference Number (CRN) Course Description: Course Prerequisite(s)

More information

This programme is only offered at: Kazan State University for Architecture and Engineering (KSUAE)

This programme is only offered at: Kazan State University for Architecture and Engineering (KSUAE) UNIVERSITY OF EAST LONDON UNDERGRADUATE PROGRAMME SPECIFICATION BSc (Hons) Information Systems (Building & Architecture) This programme is only offered at: Kazan State University for Architecture and Engineering

More information

SAULT COLLEGE OF APPLIED ARTS AND TECHNOLOGY SAULT STE. MARIE, ONTARIO COURSE OUTLINE

SAULT COLLEGE OF APPLIED ARTS AND TECHNOLOGY SAULT STE. MARIE, ONTARIO COURSE OUTLINE SAULT COLLEGE OF APPLIED ARTS AND TECHNOLOGY SAULT STE. MARIE, ONTARIO Sault College COURSE OUTLINE COURSE TITLE: Cisco (CCNA) Certification II CODE NO. : SEMESTER: 3 PROGRAM: AUTHOR: Computer Network

More information

Form 18 Heriot-Watt University Graduate/Postgraduate Course Structure and Course Notes Template (RAY) Version 3.0 (2007/2008)

Form 18 Heriot-Watt University Graduate/Postgraduate Course Structure and Course Notes Template (RAY) Version 3.0 (2007/2008) Form 18 Heriot-Watt University Graduate/Postgraduate Course Structure and Course Notes Template (RAY) Version 3.0 (2007/2008) 1. Course Codes 3. School/Institute Mathematical & Computer Sciences (University

More information

KEY PROGRAMME INFORMATION. Originating institution(s) Bournemouth University. Faculty responsible for the programme Faculty of Science and Technology

KEY PROGRAMME INFORMATION. Originating institution(s) Bournemouth University. Faculty responsible for the programme Faculty of Science and Technology KEY PROGRAMME INFORMATION Originating institution(s) Bournemouth University Faculty responsible for the programme Faculty of Science and Technology Final award(s), title(s) and credits 20 (60 ECTS) Level

More information

PROPOSAL TO INTRODUCE A NEW COURSE

PROPOSAL TO INTRODUCE A NEW COURSE PROPOSAL TO INTRODUCE A NEW COURSE 1. COURSE DETAILS 1.1 Course ID COMP3021 1.2 Course name -- Long Object-Oriented Programming 1.3 Course name -- Abbreviated OOP 1.4 Course Authority Assoc. Professor

More information

Faculty of Engineering and Informatics. Programme Specification. School of Electrical Engineering and Computer Science

Faculty of Engineering and Informatics. Programme Specification. School of Electrical Engineering and Computer Science School of Electrical Engineering and Computer Science Programme Specification Faculty of Engineering and Informatics Programme title: BSc (Hons) Computer Science for Business Academic Year: 2017/18 Degree

More information

CATALOG 2017/2018 BINUS UNIVERSITY. Cyber Security. Introduction. Vision. Mission

CATALOG 2017/2018 BINUS UNIVERSITY. Cyber Security. Introduction. Vision. Mission Cyber Security Introduction Cyber attack is raising and threaten ubiquitous world on internet today. Industry and government need cyber security expert to counter and defend from this threaten. Cyber Security

More information

BACHELOR OF SCIENCE IN INFORMATION TECHNOLOGY

BACHELOR OF SCIENCE IN INFORMATION TECHNOLOGY Purdue University Global 208-209 Catalog BACHELOR OF SCIENCE IN INFORMATION TECHNOLOGY Description and Outcomes The objective of the Bachelor of Science in Information Technology program is to help you

More information

Network Security

Network Security 44-555 Network Security Instructor: Scott Bell Office: 2220 Colden Hall Email: sbell@nwmissouri.edu Phone: (660) 562-1699 Description: An introduction to the fundamentals of network security, including

More information

MODULE SPECIFICATIONS

MODULE SPECIFICATIONS S 1. Title of the module Leading Assurance Engagements PRSN7106 2. School or partner institution which will be responsible for management of the module 3. The level of the module (e.g. Level 4, Level 5,

More information

Expected start dates September Placements 30 weeks, optional Partnership model Not applicable

Expected start dates September Placements 30 weeks, optional Partnership model Not applicable KEY PROGRAMME INFORMATION Originating institution(s) Bournemouth University Faculty responsible for the programme Faculty of Science and Technology Final award(s), title(s) and credits 20 (60 ECTS) Level

More information

Syllabus. Computer Science Information Technology 975. Information Storage and Management for Computer Networks

Syllabus. Computer Science Information Technology 975. Information Storage and Management for Computer Networks Syllabus Computer Science Information Technology 975 Information Storage and Management for Computer Networks Course: CSIT 975, 8525, Fall 2015, 3 Units Instructor: Associate Professor Marcus Butler E-mail:

More information

MSc in Information Systems

MSc in Information Systems MSc in Information Systems Assoc Prof Dion Goh Programme Director WKWSCI 26 October 2018 Programme Objective To educate information systems professionals who are able to develop and manage user-centered

More information

BS in Information Technology

BS in Information Technology BS in Information Technology Key Changes: - Minimum credit hours required changed from 130 to 120 - Two management courses (co-listed with IT) added as required: IT462 and IT466-311 is replaced by 330

More information

Programme Specification

Programme Specification Programme Specification 1 Awarding body University of London 2 Teaching Institution Birkbeck College 3 Programme Title(s) MSc Advanced Computing Technologies 4 Programme Code(s) TMSACTEC_ C 5 UCAS code

More information

Qualification details

Qualification details Qualification details Title New Zealand Diploma in Web Development and Design (Level 5) Version 1 Qualification type Diploma Level 5 Credits 120 NZSCED 020115 Information Technology > Computer Science

More information

Certification. What: Who: Where:

Certification. What: Who: Where: Certification What: Certification is a process by which the Wisconsin Technical College System Office evaluates the occupational, academic, and teaching experience of district employees to determine his/her

More information

BETHESDA CHEVY CHASE HIGH SCHOOL Career and Technology Education Department

BETHESDA CHEVY CHASE HIGH SCHOOL Career and Technology Education Department BETHESDA CHEVY CHASE HIGH SCHOOL Career and Technology Education Department Mr. Jonathan Nateghi-Asli Jonathan_A_Nateghi-Asli@mcpsmd.org Resource Teacher http://bit.ly/bcctechnology Graduation Requirements

More information

The fast track to top skills and top jobs in cyber. Guaranteed. FREE TO TRANSITIONING VETERANS

The fast track to top skills and top jobs in cyber. Guaranteed. FREE TO TRANSITIONING VETERANS The fast track to top skills and top jobs in cyber. Guaranteed. FREE TO TRANSITIONING VETERANS WELCOME SANS Institute is presenting the SANS VetSuccess Immersion Academy in the DC Metro area. For transitioning

More information

Academic Program Review Cyber Security College of Southern Nevada 2017

Academic Program Review Cyber Security College of Southern Nevada 2017 Academic Program Review Cyber Security College of Southern Nevada 2017 ACADEMIC EVALUATION WORKSHEET PROGRAM ASSESSMENT DATA Date Submitted: Submitted by: Margaret Taylor PROGRAM Assessment Data to be

More information

SAULT COLLEGE OF APPLIED ARTS & TECHNOLOGY SAULT STE MARIE, ON COURSE OUTLINE

SAULT COLLEGE OF APPLIED ARTS & TECHNOLOGY SAULT STE MARIE, ON COURSE OUTLINE SAULT COLLEGE OF APPLIED ARTS & TECHNOLOGY SAULT STE MARIE, ON COURSE OUTLINE Course Title: NETWORK CERTIFICATION I Code No.: Semester: 5 Program: COMPUTER NETWORK TECHNOLOGY Author TYCHO BLACK / DAN KACHUR

More information

Response to the Validation Panel for the DIT Foundation Programmes

Response to the Validation Panel for the DIT Foundation Programmes Response to the Validation Panel for the DIT Foundation Programmes Condition: The programme should be presented as two separate programmes with separate programme documentation, including programme aims,

More information

Programme title: BSc (Hons) Forensic Archaeology and Anthropology

Programme title: BSc (Hons) Forensic Archaeology and Anthropology Faculty of Life Sciences Programme Specification Programme title: BSc (Hons) Forensic Archaeology and Anthropology Academic Year: 2017-18 Degree Awarding Body: Partner(s), delivery organisation or support

More information

DIABLO VALLEY COLLEGE CATALOG

DIABLO VALLEY COLLEGE CATALOG COMPUTER NETWORK TECHNOLOGY CNT Despina Prapavessi, Dean Math and Computer Sciences Division Math Building, Room 267 Possible career opportunities These CNT-courses prepare students for a career path in

More information

College of Arts, Letters, and Education. Special Education and Elementary Education BAE

College of Arts, Letters, and Education. Special Education and Elementary Education BAE College of Arts, Letters, and Education Special Education and Elementary Education BAE Why study Special Education and Elementary Education? Teaching is an enormously challenging and rewarding profession.

More information

GRADUATE CURRICULUM COMMITTEE REPORT

GRADUATE CURRICULUM COMMITTEE REPORT GRADUATE CURRICULUM COMMITTEE REPORT Submitted to the Graduate Council November 15, 2016. For complete curriculum proposal information please see the University s Curriculum Proposal site: registrar.ilstu.edu/curriculumforms/

More information

CCNA Cybersecurity Operations. Program Overview

CCNA Cybersecurity Operations. Program Overview Table of Contents 1. Introduction 2. Target Audience 3. Prerequisites 4. Target Certification 5. Curriculum Description 6. Curriculum Objectives 7. Virtual Machine Requirements 8. Course Outline 9. System

More information

Honours in Information Systems

Honours in Information Systems Honours in Information Systems Contents Admission - Honours ( Information Systems)... 2 Application... 2 Degree Overview... 2 Programme Objectives... 2 Programme Structure... 3 Programme Details... 4 Delivery...

More information

CSC 4992 Cyber Security Practice

CSC 4992 Cyber Security Practice CSC 4992 Cyber Security Practice Fengwei Zhang Wayne State University CSC 4992 Cyber Security Practice 1 Who Am I? Fengwei Zhang Assistant Professor of Computer Science Office: Maccabees Building, Room

More information

Curriculum for the Bachelor's Degree Programme in Software Development National section

Curriculum for the Bachelor's Degree Programme in Software Development National section Curriculum for the Bachelor's Degree Programme in Software Development National section Contents 1. Programme structure... 3 2. Core areas of study... 3 2.1 Large-scale system development... 3 2.2 Databases

More information

Computer Information Systems Technology (CIS)

Computer Information Systems Technology (CIS) Technology 104 The College for Real Careers Technology (CIS) Program Information The department at H. Councill Trenholm State Community College is progressive and innovative in its approach toward the

More information

AE Computer Programming for Aerospace Engineers

AE Computer Programming for Aerospace Engineers AE 030 - Computer Programming for Aerospace Engineers Instructor Information: Credit: Professor Long Lu Long.Lu@sjsu.edu 2 units Class Times & Locations: Section 01 (Lecture): M 16:30-17:20 in CL 226 Section

More information

Loyola Marymount University School of Education

Loyola Marymount University School of Education Loyola Marymount University School of Education The California Teaching Performance Assessment (CalTPA) Frequently Asked Questions The information presented in this guide is meant to serve as introductory

More information

Programme Specification

Programme Specification Programme Specification Awarding Body/Institution Teaching Institution Queen Mary University of London Queen Mary University of London Name of Final Award and Programme Title Certificate in Intellectual

More information

Computer Networks IT321

Computer Networks IT321 Computer Networks IT321 CS Program 3 rd Year (2 nd Semester) Page 1 Assiut University Faculty of Computers & Information Computer Science Department Quality Assurance Unit Computer Networks Course Specifications

More information

New Zealand Diploma in Engineering

New Zealand Diploma in Engineering New Zealand Diploma in Engineering (Level 6) (Version 2.0) with strands in: Civil Engineering Electrical Engineering Electronic Engineering Mechanical Engineering Wintec code: EN1603 MoE: NZ2612 Level:

More information

INFORMATION SESSION. MS Software Engineering, specialization in Cybersecurity

INFORMATION SESSION. MS Software Engineering, specialization in Cybersecurity INFORMATION SESSION MS Software Engineering, specialization in Cybersecurity Presenter Afifa Hamad Program Specialist Graduate & Extended Studies Charles W. Davidson College of Engineering San Jose State

More information

Programme Specification

Programme Specification Programme Specification BSc Honours Forensic Computing 1. Awarding institution Middlesex University 2. Teaching institution Middlesex University 3. Programme accredited by 4. Final qualification BSc Honours

More information

South Portland, Maine Computer Information Technology. Web Site: blackboard.smccme.edu. Course Syllabus

South Portland, Maine Computer Information Technology. Web Site: blackboard.smccme.edu. Course Syllabus South Portland, Maine 04106 Computer Information Technology Title: Routing & Switching Fundamentals Catalog Number: CMIT 225 D1 Credit Hours: 3 Total Contact Hours: 45 Lecture (or Lab): Lecture & Lab Instructor:

More information

SOFTWARE ENGINEERING. Curriculum in Software Engineering. Program Educational Objectives

SOFTWARE ENGINEERING. Curriculum in Software Engineering. Program Educational Objectives Software Engineering 1 SOFTWARE ENGINEERING For the undergraduate curriculum in Software Engineering (http:// www.se.iastate.edu) leading to the degree Bachelor of Science. This curriculum is accredited

More information

Rochester Institute of Technology Golisano College of Computing and Information Sciences Department of Information Sciences and Technologies

Rochester Institute of Technology Golisano College of Computing and Information Sciences Department of Information Sciences and Technologies Rochester Institute of Technology Golisano College of Computing and Information Sciences Department of Information Sciences and Technologies 4002-360.01 ~ Introduction to Database & Data Modeling ~ Spring

More information

CyberSecurity Training and Capacity Building: A Starting Point for Collaboration and Partnerships. from the most trusted name in information security

CyberSecurity Training and Capacity Building: A Starting Point for Collaboration and Partnerships. from the most trusted name in information security CyberSecurity Training and Capacity Building: A Starting Point for Collaboration and Partnerships About SANS The SANS (SysAdmin, Audit, Network, Security) Institute Established in 1989 Cooperative research

More information

Make Your Statement. Master of Management in Library and Information Science online. Graduate Certificate in Library and Information Management online

Make Your Statement. Master of Management in Library and Information Science online. Graduate Certificate in Library and Information Management online Make Your Statement Master of Management in Library and Information Science online Graduate Certificate in Library and Information Management online Help shape the future of your field. The Master of Management

More information

MSIT Program Handbook. Master of Science in Information Technology

MSIT Program Handbook. Master of Science in Information Technology MSIT Program Handbook 2018-2019 Master of Science in Information Technology Information Technology Management Information Security and Assurance Business Intelligence and Data Analytics Software Design

More information

DESIGN. College of the Arts. Career Possibilities. Undergraduate Programs. Bachelor of Arts in Design (120 Units) 2014/2015 CSULB Catalog Design 335

DESIGN. College of the Arts. Career Possibilities. Undergraduate Programs. Bachelor of Arts in Design (120 Units) 2014/2015 CSULB Catalog Design 335 DESIGN College of the Arts Department Chair: Martin Herman Department Office: Design (DESN), Room 101 Telephone / FAX: (562) 985 5089 / (562) 985 2284 Website: http://www.csulb.edu/depts/design/ Undergraduate

More information

Discover Viterbi: Computer Science, Cyber Security & Informatics Programs. Viterbi School of Engineering University of Southern California Fall 2017

Discover Viterbi: Computer Science, Cyber Security & Informatics Programs. Viterbi School of Engineering University of Southern California Fall 2017 Discover Viterbi: Computer Science, Cyber Security & Informatics Programs Viterbi School of Engineering University of Southern California Fall 2017 WebEx Quick Facts Will I be able to get a copy of the

More information

Introducing Cyber Resiliency Concerns Into Engineering Education

Introducing Cyber Resiliency Concerns Into Engineering Education Introducing Cyber Resiliency Concerns Into Engineering Education Mr. Tom McDermott Georgia Tech Research Institute Mr. Barry Horowitz University of Virginia NDIA 20 th Annual Systems Engineering Conference

More information

College of Arts and Letters Interdisciplinary Studies. Program Guide. Version 4 May Program Description and Course Requirements

College of Arts and Letters Interdisciplinary Studies. Program Guide. Version 4 May Program Description and Course Requirements College of Arts and Letters Interdisciplinary Studies Program Guide Cybersecurity Major Version 4 May 2016 Contents 1. Program Description and Course Requirements 2. Sample 4-year Course Plan. Pre-requisites

More information

CSC 210 COMPUTER SCIENCE II

CSC 210 COMPUTER SCIENCE II CSC 210 COMPUTER SCIENCE II PRESENTED AND APPROVED: NOVEMBER 2, 2012 EFFECTIVE: FALL 2013-14 Prefix & Number CSC 210 Course : Computer Science II Purpose of this submission: New Course New Change/Updated

More information

INFORMATION TECHNOLOGY, BS

INFORMATION TECHNOLOGY, BS Information Technology, BS 1 INFORMATION TECHNOLOGY, BS Banner Code: VS-BS-INFT Academic Advising 5400 Nguyen Engineering Building Fairfax Campus 101 Bull Run Hall Science and Technology Campus Phone:

More information

This version of the programme is no longer recruiting. Please see the specification for BSc (Hons) Software Engineering.

This version of the programme is no longer recruiting. Please see the specification for BSc (Hons) Software Engineering. Software Engineering This version of the programme is no longer recruiting. Please see the specification for BSc (Hons) Software Engineering. Final award B.Sc. (Hons) Intermediate awards available Cert.

More information

BEng (Hons) Civil Engineering E410 (Under Review)

BEng (Hons) Civil Engineering E410 (Under Review) BEng (Hons) Civil Engineering E410 (Under Review) 1.0 Introduction The aim of the degree programme is to provide students with a sound knowledge and understanding of the subject of Civil Engineering and

More information

Faculty of Engineering and Informatics. Programme Specification. School of Electrical Engineering and Computer Science. Academic Year: 2017/18

Faculty of Engineering and Informatics. Programme Specification. School of Electrical Engineering and Computer Science. Academic Year: 2017/18 School of Electrical Engineering and Computer Science Programme Specification Faculty of Engineering and Informatics Programme title: BSc (Hons) Computer Science Academic Year: 2017/18 Degree Awarding

More information

Computer Science & IT

Computer Science & IT Computer Science & IT TIDEWATER COMMUNITY COLLEGE CLOUD COMPUTING The Career Studies Certificate program in Cloud Computing prepares students to install, deploy, configure, manage, secure, and analyze

More information

ROJECT ANAGEMENT PROGRAM AND COURSE GUIDE

ROJECT ANAGEMENT PROGRAM AND COURSE GUIDE ROJECT ANAGEMENT PROGRAM AND COURSE GUIDE PROJECT MANAGEMENT CERTIFICATE PROGRAM Further your career and gain an understanding of what it takes to lead a project to successful completion functional skills,

More information

b. Remediation will only be offered for courses offered at the home school.

b. Remediation will only be offered for courses offered at the home school. RECOVERING CREDIT THROUGH A MASTERY EXAM Responsible: Office of Academics Department of Assessment PURPOSE This administrative procedure shall establish guidelines related to the recovery of high school

More information

Application Procedures: Fulbright English Teaching Assistantship IMPORTANT DATES AND DEADLINES - Application Year

Application Procedures: Fulbright English Teaching Assistantship IMPORTANT DATES AND DEADLINES - Application Year Application Procedures: Fulbright English Teaching Assistantship IMPORTANT DATES AND DEADLINES - Application Year 2018-19 Step Description Date Due Complete 1 Register for Fulbright Program Interest List

More information

BETHESDA CHEVY CHASE HIGH SCHOOL Career and Technology Education Department

BETHESDA CHEVY CHASE HIGH SCHOOL Career and Technology Education Department BETHESDA CHEVY CHASE HIGH SCHOOL Career and Technology Education Department Mr. Jonathan Nateghi-Asli Jonathan_A_Nateghi-Asli@mcpsmd.org Resource Teacher http://bit.ly/bcctechnology Graduation Requirements

More information

University of Wisconsin-Stout Menomonie, WI

University of Wisconsin-Stout Menomonie, WI University of Wisconsin-Stout Menomonie, WI Applied Mathematics and Computer Science Program Diane Christie (Program Director) Terry Mason and Radi Teleb UW-Stout Menomonie, WI I-94 (~40 miles into Wisconsin)

More information

Course Code(s): FS002H01UV Full-time 3 Years FS002H31UV Part-Time 6 Years

Course Code(s): FS002H01UV Full-time 3 Years FS002H31UV Part-Time 6 Years Course Specification Published Date: Produced By: Status: 15-Aug-2017 Haiden Novis Validated Core Information Awarding Body / Institution: School / Institute: University of Wolverhampton Wolverhampton

More information

Cybersecurity Essentials

Cybersecurity Essentials Cybersecurity Essentials University of Moratuwa Cisco Networking Center Cybersecurity Essentials Foundational Security Course Overview Cybersecurity Essentials covers foundational knowledge and essential

More information

SAULT COLLEGE OF APPLIED ARTS AND TECHNOLOGY SAULT STE. MARIE, ONTARIO. Sault College COURSE OUTLINE CODE NO. : CSD100 SEMESTER: 1

SAULT COLLEGE OF APPLIED ARTS AND TECHNOLOGY SAULT STE. MARIE, ONTARIO. Sault College COURSE OUTLINE CODE NO. : CSD100 SEMESTER: 1 SAULT COLLEGE OF APPLIED ARTS AND TECHNOLOGY SAULT STE. MARIE, ONTARIO Sault College COURSE OUTLINE COURSE TITLE: CODE NO. : SEMESTER: 1 PROGRAM: AUTHOR: ALL COMPUTER STUDIES PROGRAMS Dennis Ochoski DATE:

More information

CSC 562: Graduate Introduction to Game Engine Design

CSC 562: Graduate Introduction to Game Engine Design CSC 562: Graduate Introduction to Game Engine Design In Workflow 1. 14CSC GR Director of Curriculum (rouskas@ncsu.edu) 2. COE CC Coordinator GR (rfillin@ncsu.edu) 3. COE CC Chair GR (reeves@ncsu.edu; rfillin@ncsu.edu;

More information

Computer Information Systems (CIS) CIS 105 Current Operating Systems/Security CIS 101 Introduction to Computers

Computer Information Systems (CIS) CIS 105 Current Operating Systems/Security CIS 101 Introduction to Computers Computer Information Systems (CIS) CIS 101 Introduction to Computers This course provides an overview of the computing field and its typical applications. Key terminology and components of computer hardware,

More information

CCNA Cybersecurity Operations 1.1 Scope and Sequence

CCNA Cybersecurity Operations 1.1 Scope and Sequence CCNA Cybersecurity Operations 1.1 Scope and Sequence Last updated June 18, 2018 Introduction Today's organizations are challenged with rapidly detecting cybersecurity breaches and effectively responding

More information

UNDERGRADUATE PROGRAMME SPECIFICATION

UNDERGRADUATE PROGRAMME SPECIFICATION UNDERGRADUATE PROGRAMME SPECIFICATION Programme Title: Awarding Body: Teaching Institution: Final Awards: BSc (Hons) Computer Networks (progression award) Staffordshire University Faculty of Computing,

More information

RYERSON UNIVERSITY Ted Rogers School of Information Technology Management And G. Raymond Chang School of Continuing Education

RYERSON UNIVERSITY Ted Rogers School of Information Technology Management And G. Raymond Chang School of Continuing Education RYERSON UNIVERSITY Ted Rogers School of Information Technology Management And G. Raymond Chang School of Continuing Education COURSE OF STUDY 2017-2018 (C)ITM 820 Information Systems Security and Privacy

More information