Koji OKAMURA Cybersecurity Center, Kyushu University Cybersecurity Education.

Slides:



Advertisements
Similar presentations
10,000 Issues Testing In a Tough Economy Jonathan Miller Director, Global Channel Sales & Development Pearson VUE Ryan Ulwelling Manager, Global PVTC Selects.
Advertisements

Programs of Study. Performing Arts Career Goal: Musician Dancer Production Manager Cinematographer Play Writer Director Actor Make-up Artist Set Designer.
Using CTE Courses to Meet High School Graduation Requirements.
OVERVIEW OF NETWORKING RESEARCH IN NETLAB 1 Dr. Jim Martin Associate Professor School of Computing Clemson University
OPM Cybersecurity Competencies by Occupation (Technical Competencies) Information Technology Management Series Electronics Engineering.
INFORMATION TECHNOLOGY MODULES IN THE DEPARTMENT OF ACCOUNTANCY IN TEI OF LARISSA Dr Ilias Santouridis Assistant Professor of Applied Information Technology.
Angel: Interactive Computer Graphics 4E © Addison-Wesley 2005 Sampling and Aliasing Ed Angel Professor of Computer Science, Electrical and Computer Engineering,
Masters in Information Science and Technology (IST) Thesis and Non-Thesis Option (30 Credits)
ICT Driving Licence at the University of Helsinki: Meeting the Needs of Diverse Study Fields Tiina Heino Päivi Helminen 31 March, 2009 Helsinki University.
FACULTY OF POLITICAL SCIENCIES. University of Belgrade The University of Belgrade comprises: 31 faculties (organized into 4 groups: social sciences and.
Texas Tech University NSF-SFS Workshop on Educational Initiatives in Cybersecurity for Critical Infrastructure Course Flow Diagrams May 2-3, 2013 Support.
NNSA Consortium Cybersecurity Education: Needs and Capabilities Dr. Jonathan M. Graham, Director IA-REDI Dr. Claude Turner, Associate Professor Computer.
Computer Science and Engineering 1 Csilla Farkas Associate Professor Center for Information Assurance Engineering Dept. of Computer Science and Engineering.
The BTech (IT) Program Xing Liu, Ph.D, Chair Computer Science & Information Technology School of Business Kwantlen Polytechnic University April 30, 2014.
Computer Networks Working Group Prof. Dr. E. Milovanović.
Informatics Institute 6/19/081 A Draft Plan for the Informatics Institute (Graduate Program) Informatics Institute A Draft Plan for the Informatics Institute.
Georgia Institute of Technology. Georgia Tech is an innovative intellectual environment with more than 900 full-time instructional faculty and more than.
Information Technology Lonnie Bentley, Professor and Head Department of Computer Technology (CPT) - and - H. E. (Buster) Dunsmore, Professor Department.
CSCE 727 Information Warfare
Steve Wicker Cornell University 1 TRUST Autumn 2011 Conference.
Training and Certification. Who needs digital forensic training and professional certification? Forensic examiners Investigators Crime scene specialists.
BISI: short presentation ● Persons ● Working environment ● Research and development ● Education ● Support.
Technologies for Teaching and Learning: Janice Fournier, PhD, Research Scientist Cara Lane, PhD, Research Scientist Learning & Scholarly Technologies What.
ICC Module 3 Lesson 5 – IT Security 1 / 4 © 2015 Ph. Janson Information, Computing & Communication Security – Clip 0 – Introduction School of Computer.
Promoting Research and Education of IA & CyberSecurity Gordon W. Romney Ph.D Professor and Senior Research Scientist School of Engineering and Technology.
TopicColumbiaUC Davis CollegesArchitecture » Arts & Sciences, Graduate School of » Barnard College »Business Dental Medicine » Engineering »
STEM Endorsement General Courses  The STEM endorsement must include Algebra II Chemistry Physics These three courses are required to meet the STEM endorsement.
Credit:  Cyber law refers to any laws relating to protecting the Internet and other online communication technologies.
MIDN Zac Dannelly. May 2009: President's 60-day Cyberspace Policy Review – "expand and train the workforce” May 2010: The Ad Hoc Committee on Cyber Security.
Sharjah Higher Colleges of Technology Women’s Campus Program of Studies.
Mrs. Ramirez.   Certificate Degree  Associates Degree  Bachelor Degree Undergraduate.
BS in Computer and Information Systems Security A 2+2 degree program between Peninsula College and Western Washington University David Bover Professor,
Required and Elective Courses in Power Area. Required Power Courses u ECE 320/321 Energy Systems I/Energy Systems I lab: Covers single-phase AC measurements,
The School of Electrical Engineering and Computer Science (EECS) CS/ECE Advanced Network Security Dr. Attila Altay Yavuz Topic 1.0 Big Picture, Vision.
Koji OKAMURA Cybersecurity Center, Kyushu University Advanced Cybersecurity Education Course Program using Cyber Range.
Introduction to “Future Internet” Course Kyung Hee Univ. & Chonnan National Univ. & Tsinghua Univ.
Interdisciplinary MS in Information Assurance Jim Wolfe Computer Science Department Indiana University of Pennsylvania EPASEC 2006.
Who am I? Mikhail I. Gofman Assistant Professor of Computer Science at CSUF since Fall Education: Ph.D. in Computer Science at State University of.
The changing landscape of CTE in Nevada A need to focus on middle-skill jobs through career pathways of promise to close the skills gap.
Examination of the Current Educational Contents in Information Assurance Bill Oblitey Indiana University of Pennsylvania Computer Science Department EPASEC.
Harvard University By …... History Harvard was founded in 1636, the College trained many Puritan ministers The takeover of Harvard by the Unitarians in.
Welcome and introductions Professor Chris Pole Deputy Vice-Chancellor External Examiners’ Workshop 2016.
Medical Students: Addressing Concerns and Complaints of Mistreatment Faculty of Medicine, University of Calgary.
FACTE Information Technology Update
Présentation des compétences
INTERNET OF THINGS A SEMINAR By SHIKHA M A seminar by Shikha m.
Présentation de l’idée de projet
Mission Davenport University prepares and transforms students to achieve the highest levels of academic performance, leading them to excel and advance.
Career and Technical Center
MS Economic Crime Forensics
E-Commerce: Doing Business on the Internet
Cyber Security Challenges & Opportunities.
Technology, Careers, and Job Hunting
Information Security at Florida State University
Information Security at Florida State University
Cyber Security & Embedded Systems Training Bootcamp VISIT TONEX.COM.
North Dakota Cybersecurity Conference Cybersecurity Education
Information Security at Florida State University
Information Security at Florida State University
Case Discussion Farzad Rahmani
Infusing Technology into Community College Courses
Smart Learning concepts to enhance SMART Universities in Africa
Career and Technical Education
Introduction to Information Assurance
1 Advanced Cyber Security Forensics Training for Law Enforcement Building Advanced Forensics & Digital Evidence Human Resource in the Law Enforcement sector.
World-Leading Research with Real-World Impact!
Data and Applications Security Developments and Directions
Présentation de l’idée de projet
Présentation des compétences
World-Leading Research with Real-World Impact!
Presentation transcript:

Koji OKAMURA Cybersecurity Center, Kyushu University Cybersecurity Education

Cybersecurity Education of Kyushu Univ. Primary –Cybersecurity Education for all students Advanced –Advanced Cybersecurity Education –Cybersecurity Education which is upgraded from advanced class with security items injection Specialist –Cybersecurity Education for specialist with Cyber Range

Cybersecurity Primary Course 2014 Autumn, 2015 Spring and Autumn Fresh Students for every undergraduate school –Optional Course (not “All” now) 100 Students (from 2,600) –Art Engineering, Economics, Law, Letters, Medical, Medicine, Science, Engineering, Education, Agriculture –Dental Science Contents (14+1) –Introduction (1) –Case Studies (3) –Technical Issues (3) –Laws (3) –Privacy and Morals (1) –Social Science (1) –Copyright (2) –Examination (1)

Cybersecurity Primary Courses 2016 Introduction –Latest incidents Case Studies –General incidents –Hospital –Company Technical Issues –Computer and Network –Wireless Cryptography Law –General Laws –Company Copyrights –Primary –Advanced Informational Moral Moral for research Social Science –SNS –Hospital

Advanced Class of/with Cybersecurity Advanced Cybersecurity Education –Networking –Operating System –System Security –Wireless –Cryptography –Digital Signature –Digital Forensics –IoT –SDN Injection security items into existing class –Programing Stack overflow –Embedded Computing Confidential, Integrity, Availability for Data –Medical Privacy –Art Copyright –Law Case study of Cyber incidents

Cybersecurity Specialist Course Campus Network Internet Each student study by him/her self. Paired students study together. Beginner Course Advanced Course

Cybersecurity Center, Kyushu Univ. Education Project Plan 2016 Primary Advanced Professional New Associate Professor New Associate Professor New Professor New Assistant Professor Director Dedicated Floating