Master of Cyber Security, Strategy and Risk Management. CECS PG Information Session April 17, 2018

Similar documents
RESEARCH SCHOOL OF COMPUTER SCIENCE (RSCS) CURRICULUM DEVELOPMENT COMMITTEE

STUDENT LEARNING OUTCOMES Beacom College of Computer and Cyber Sciences

The GenCyber Program. By Chris Ralph

CALENDAR FOR THE YEAR 2018

Programme Specification

Bachelor of Information Technology (Network Security)

COMPUTER FORENSICS (CFRS)

PROGRAMME SPECIFICATION

INFORMATION SESSION. MS Software Engineering, specialization in Cybersecurity

BACHELOR OF SCIENCE IN INFORMATION TECHNOLOGY

NEW JERSEY INSTITUTE OF TECHNOLOGY. Initiation of Cyber Defense Option. for the Master of Science in

Security Stream for Computer Science

Initial CITP and CSci (partial fulfilment). *Confirmation of full accreditation will be sought in 2020.

Cyber Security CYBER SECURITY

BTEC LEVEL 4 Higher National Certificate in Business

CyberSecurity Training and Capacity Building: A Starting Point for Collaboration and Partnerships. from the most trusted name in information security

Comparing Security Curricula and Accreditations to Industry Needs

Hacker Academy UK. Black Suits, White Hats!

MORGAN STATE UNIVERSITY DEPARTMENT OF ELECTRICAL AND COMPUTER ENGINEERING COURSE SYLLABUS FALL, 2015

STUDENT AND ACADEMIC SERVICES

Course Specifications M. Tech. / PG Diploma Programme

CompTIA Cybersecurity Analyst+

Standard Course Outline IS 656 Information Systems Security and Assurance

BACHELOR OF SCIENCE IN INFORMATION TECHNOLOGY

Abu Dhabi Polytechnic Information Security Engineering Technology

HOLY ANGEL UNIVERSITY COLLEGE OF INFORMATION AND COMMUNICATIONS TECHNOLOGY CYBER SECURITY COURSE SYLLABUS

Collaboration on Cybersecurity program between California University and Shippensburg University

DIGITAL SCIENCES - B.S.

The fast track to top skills and top jobs in cyber. Guaranteed.

School of Engineering & Built Environment

CYBERSECURITY: Scholarship and Job Opportunities

CRITERIA FOR ACCREDITING COMPUTING PROGRAMS

FOUNDATION CERTIFICATE IN INFORMATION SECURITY v2.0 INTRODUCING THE TOP 5 DISCIPLINES IN INFORMATION SECURITY SUMMARY

OVERVIEW OF SUBJECT REQUIREMENTS

Computer Information Science xxx

ENGINEERING AND TECHNOLOGY MANAGEMENT

E-guide Getting your CISSP Certification

University of Wisconsin-Stout Menomonie, WI

INFORMATION TECHNOLOGY, BS

Keeping Your SOCs Full. May 26, Strengthening Capacity in Cyber Talent sans.org/cybertalent

You will choose to study units from one of four specialist pathways depending on the career you wish to pursue. The four pathways are:

Bachelor of Applied Science Degree IT NETWORKING

PROGRAMME SPECIFICATION

ITSY Information Technology Security Course Syllabus Spring 2018

ITSY 2330 Intrusion Detection Course Syllabus

All LJMU programmes are delivered and assessed in English

Full-Time: 4 Years, Sandwich Thick: 5 Years All LJMU programmes are delivered and assessed in English

Cyber Risks in the Boardroom Conference

Quality Code for Higher Education. Application for Validation Part 1: Programme/Stage Specification Pro Forma

Cybersecurity Risk Mitigation: Protect Your Member Data. Introduction

ITSS Model Curriculum. - To get level 3 -

INFORMATION TECHNOLOGY - B.S.I.T.

PIONEER TRAINING INSTITUTE

PECB UNIVERSITY PECB UNIVERSITY

Cyber Analyst Academy. Closing the Cyber Security Skills Gap.

See Course and Program Development Policy and Procedures Iwww.ubalt.edu/Provostl for instructions. C5)PROGRAM ACTIONS. Original Program ntle:

Form 18 Heriot-Watt University Graduate/Postgraduate Course Structure and Course Notes Template (RAY) Version 3.0 (2007/2008)

align security instill confidence

Vulnerability Management Policy

Implementation Strategy for Cybersecurity Workshop ITU 2016

Software Reliability and Reusability CS614

CYBER SECURITY Program Planning Guides

Programme Specification

BUILDING CYBERSECURITY CAPABILITY, MATURITY, RESILIENCE

UNCLASSIFIED. National and Cyber Security Branch. Presentation for Gridseccon. Quebec City, October 18-21

COMPUTER SECURITY DESIGN METHODOLOGY FOR NUCLEAR FACILITY & PHYSICAL PROTECTION SYSTEMS

Web Security Vulnerabilities: Challenges and Solutions

MASTER OF INFORMATION TECHNOLOGY (Structure B)

CCNA Cybersecurity Operations 1.1 Scope and Sequence

Certified Cyber Security Analyst VS-1160

KEY PROGRAMME INFORMATION. Originating institution(s) Bournemouth University. Faculty responsible for the programme Faculty of Science and Technology

Tiger Scheme QST/CTM Standard

CCNA Cybersecurity Operations. Program Overview

Computer Information Systems (CIS) CIS 105 Current Operating Systems/Security CIS 101 Introduction to Computers

Certified Cyber Security Specialist

Information Technology

Expected start dates September Placements 30 weeks, optional Partnership model Not applicable

OUR CAMPUS OUR COURSE. 2 P a g e

CATALOG 2017/2018 BINUS UNIVERSITY. Cyber Security. Introduction. Vision. Mission

Access Control and Physical Security Management. Contents are subject to change. For the latest updates visit

Section 1: Program Abstract

COMESA CYBER SECURITY PROGRAM KHARTOUM, SUDAN

School of Engineering & Computational Sciences

School of Engineering & Built Environment

Angela McKay Director, Government Security Policy and Strategy Microsoft

Log in to a Distinguished Tradition. Since MASTER OF SCIENCE IN. Information Security & Assurance. Online

Instructor: Eric Rettke Phone: (every few days)

Developing the Next Generation Cyber Army VINCENT NESTLER, PH. D., CALIFORNIA STATE UNIVERSITY, SAN BERNARDINO

Computing Accreditation Commission Version 2.0 CRITERIA FOR ACCREDITING COMPUTING PROGRAMS

Cracking the code on an IT career

BSIT 1 Technology Skills: Apply current technical tools and methodologies to solve problems.

Updated with information about the new certificate programs THE KU MSIT HANDBOOK 1

COUNTERING IMPROVISED EXPLOSIVE DEVICES

IT Technician Pathways Course Guide

Federal Virtual Training Environment (FedVTE) Pre-Approved for CompTIA CEUs

Commonwealth Cyber Declaration

Strengthening Capacity in Cyber Talent sans.org/cybertalent

Apprenticeships CYBER SECURITY ADVANCED TO TECHNICAL MODERN APPRENTICESHIP FROM NQ-LEVEL TO SKILLED SECURITY ENGINEER

Bradford J. Willke. 19 September 2007

Unit 3 Cyber security

Transcription:

Master of Cyber Security, Strategy and Risk Management CECS PG Information Session April 17, 2018

2 Program Purpose Provide a working understanding of information, network and software security, across technical, legal, business, and policy dimensions, with a deeper understanding within one of these areas.

Program Structure 3

4 Required courses (Master) C1 C2 C3 C4 COMP6301 Computing Foundations for Cyber Security COMP6340 Networked Information Systems COMP6420 Introduction to Data Management, Analysis and Security COMP7500 Software Security

5 Required courses (Master) CL1 LAWS8077 Cyber Law CL2 CRIM8002 Cyber Security and Cyber Crime P1 P2 B1 B2 NSPO8006 National Security and Policy Making NSPO8021 Statecraft and National Security in Cyberspace MGMT7203 Risk Analysis for Business Management MGMT8005 Project Risk and Issues Management

6 Depth Pathway C5/6 COMP8701 Cyber Defensive Operations (AQF9 version of COMP3701) COMP8702 Cyber Offensive Operations (AQF9 version of COMP3702) P3/4 NSP8014: Ethics and Technologies of War NSP8017: Malicious Networks: Transnational Terrorism and Crime Other Other depth pathways will be offered as available and as approved by the convenor

7 Learning outcome Leadership in cyber security strategy: Develop and apply effective cyber security strategies, provide leadership direction for an organization to best prepare itself for operations in a contested environment. Cyber security policy assessment: Assess the role policy plays in engineering secure systems, technology for policy implementation, and the role of policy in driving the composition of cyber security solutions.

8 Learning outcome Legal and ethical aspects: Compare and contrast the legal and ethical aspects of cyber security at the national and international level. Negotiate the legal, social, regulatory, ethical, and technical issues related to securing information systems and critical infrastructures.

9 Learning outcome Technical aspects: Integrate acquired knowledge in cyber security to propose solutions for real world problems. Monitor, direct, and enhance the protection of cyber systems through widely accepted standards, procedures and policies. Assess vulnerability of existing and proposed ICT systems. Manage for cyber security risks, focusing on decision making, trade-offs, requirements building, team building, and leading. Demonstrate awareness of and responses to a diverse range of cyber threats

10 Course overview (CS) COMP6301 Computing Foundations for Cyber Security: 1. Intro to computer systems 2. Linux fundamentals 3. Intro to programming 4. Overview of software designs fundamentals 5. Vulnerability basics

11 Course overview (CS) COMP7500 Software Security Basic principles: security properties, security models, design principles Memory safety Reverse engineering Defense mechanisms Bug finding Exploitation OS security Web security Mobile security

12 Course overview (CS) COMP8701 Cyber Defensive Operations (AQF9 version of COMP3701) Defensive Cyber Security operations introduces and exercises a complete range of anomaly / intrusion detection and identification mechanisms. Students will also learn and exercise handling of an existing intrusion which includes forensic operations as well as securing the remaining systems. This is a complete course in cyber defense which enables students on successful completion to operate systems under real-world exposure.

13 Course overview (CS) COMP8702 Cyber Offensive Operations (AQF9 version of COMP3702) Offensive Cyber Security operations introduces and exercises a complete range of reverse engineering techniques and attack patterns. Students will also learn and exercise analysis of systems based on minimal information. This is a complete course in cyber attacks which enables students on successful completion to identify and test systems for vulnerabilities without full knowledge or direct access.

14 Delivery mode All courses listed on the Cyber Security course schedule are online intensive courses. These are delivered in 4+1+4 mode 4 weeks of online teaching and assessment, followed by one full-time week on campus at the ANU, followed by another 4 weeks of online teaching and assessment.

15 Course schedule (indicative) Academic session 2018 Start-finish dates (9 weeks total) On-campus intensive (Week 5 out of 9) Census date Indicative application closing date Winter 6 Aug 5 Oct 3-7 Sept 24 Aug ~30 June Spring 1 Oct 30 Nov 29 Oct 2 Nov 19 Oct ~ 28 Aug

16 Admission Open to domestic students Currently not available for international students Applicants for the Graduate Diploma must hold either an Honours degree (AQF8) or a Bachelor degree (AQF7) with a GPA of 4.0 / 7.0, plus one year s relevant work experience. Applicants for the Masters must hold a Bachelor degree with a GPA of 5.0 / 7.0, plus three years relevant work experience.

17 Contact Website: https://cecs.anu.edu.au/study For further information and expressions of interests, contact: dataanalytics.cecs@anu.edu.au Program convener: alwen.tiu@anu.edu.au