Augusta University: NSA Curriculum Grant

Slides:



Advertisements
Similar presentations
Security Education and Awareness Workshop January 15-16, 2004 Baltimore, MD.
Advertisements

Recommendations on Designing a Valuable and Relevant Course on Cybersecurity Tuesday, June 3, th Emergency Management Higher Education Program.
M.A. in Homeland Security and Emergency Preparedness (HSEP) L. Douglas Wilder School of Government and Public Affairs, Virginia Commonwealth University.
Halifax, 31 Oct – 3 Nov 2011ICT Accessibility For All CYBERSECURITY-RELATED STANDARDS ACTIVITY IN THE TELECOMMUNICATIONS INDUSTRY ASSOCIATION Eric Barnhart,
Higher Education Challenge Grant: University of Missouri, Oregon State University and Pennsylvania State University Outcomes Published manuscript of case.
Leveraging Integration Techniques
SEC835 Database and Web application security Information Security Architecture.
Test One Review Technology Integration Technology Perspectives Learning Theory Learning Theorists Issues
November 6, 2003 Leveraging Resources and Building Partnerships for Critical Infrastructure Protection John B. Noftsinger, Jr., Associate Vice President.
Promoting Research and Application of Information Assurance and Cybersecurity 6 th Annual Security Summit May 20, 2009 Mark Weatherford, Chief Information.
UCSF IT Update November 2013 Presenter: Joe Bengfort.
IAEA International Atomic Energy Agency IAEA Nuclear Security Programme Enhancing cybersecurity in nuclear infrastructure TWG-NPPIC – IAEA May 09 – A.
Graduate Curriculum FEMA Higher Ed Project June 9, 2004 Discussion Group Mick Maurer - MCNY.
Center of Ocean-Land- Atmosphere Studies CLIM101: Weather, Climate and Global Society Course Overview, Logistics 1 September 2009 CLIM 101 Weather, Climate.
Promoting CARICOM/CARIFORUM Food Security (Project GTFS/RLA/141/ITA) (FAO Trust Fund for Food Security and Food Safety – Government of Italy Contribution)
PAGE Intelligence Meets Vulnerability Management NYC ISSA January 24, 2013.
Technical Assistance PREFERENCES and PRIORITIES Bureau of Health Professions HRSA September 2012.
Healthcare Consortium How Do We Expand on this Opportunity?
Working with Health IT Systems Protecting Privacy, Security, and Confidentiality in HIT Systems Lecture b This material (Comp7_Unit7b) was developed by.
Environmental Science at Baylor - Institute of Environmental Studies was founded in Interdisciplinary degrees (BA, BS, MS, PhD) - Excellent research.
Dan Collins artCORE Coordinator Professor of Intermedia School of Art Arizona State University Principles of Core Art Instruction (ARA 598) August 23,
CARVER+Shock Vulnerability Assessment Tool “As Agile As the Enemy” The Foundation for Institutional Development.
DRAFT 1 Belfast th World Cyber Security Technology Research Summit Suren Gupta Allstate Corporation Executive Vice President Allstate Technology.
Working in Team, Unit 5 Leveraging Integration Techniques Working in Teams / Unit 5 Health IT Workforce Curriculum Version 1.0/Fall
Why does my Elementary Student Need to Know about Maryland's New CyberSecurity CTE Track? Friday 11: :30 Davina Pruitt Mentle, Ph.D. Educational.
Multiplication Facts X 3 = 2. 8 x 4 = 3. 7 x 2 =
Developing Effective Partnerships with State Government CDC Public Health Preparedness Conference 2005 Marsha Morien, MSBA, FACHE Nebraska Center for Rural.
UNCLASSIFIED 1 National Security in Cyberspace: It Takes a Nation Sandra Stanar-Johnson NSA/CSS Representative to the Department of Homeland Security February.
NATIONAL CYBER SECURITY GOVERNANCE & EMERGING CYBER SECURITY THREATS
Results of the Organizational Self Assessment Surveys Summary of the findings.
Fiscal Year 2007 Urban Area Security Initiative Nonprofit Security Grant Program Investment Justification Questions, Criteria, and Prioritization Methodology.
SCHOLARSHIP Teaching Faculty members are responsible for teaching effectively by employing useful methods and approaches that facilitate learning. Faculty.
Case Study: Applying Authentication Technologies as Part of a HIPAA Compliance Strategy.
Knowledge Management: Using the Baldrige Model to Promote Evidence-Based Decision Making and Guide Institutional Reform Dr. Fiona Baxter
IAB Notesfrom discussion Nov 12, Should globalization be included in curriculum Not specifically at the undergrad level Things that come to mind.
How to Make Cyber Threat Intelligence Actionable
SEC 470 Entire Course (UOP) For more course tutorials visit  SEC 470 Week 1 US Patriot Act Paper  SEC 470 Week 2 Federal Agencies.
Department of Computer and Information Sciences
FY 2001 CDBG Budget $16,377,000 Administration 427,540
Figure 1. Critical Infrastructure Organizations Believe that the Cyber-threat Landscape Is Getting Worse From: ESG Brief: Critical Infrastructure Organizations.
Research Translation: Lessons from Dissemination and Implementation Research for Interventions Promoting Walking and Walkability August 18, am Pacific,
U.S. COAST GUARD CYBERSECURITY POLICY and CYBERSECURITY PLANNING
Cyber attacks are increasing in number and severity every day…
CAPABILITY BRIEFING July 21, 2017 Joe Guirreri, PMP, ITIL Mobile: Office: Isaac Newton Square Suite.
Smartcrypt Data Discovery
National Cybersecurity Curriculum Program
Wenjing Lou Complex Networks and Security Research (CNSR) Lab
The National Initiative for Cybersecurity Education (NICE)  AFCEA International Cyber Education, Research, and Training Symposium January 17, 2018 Bill.
CIS 333 RANK Perfect Education/ cis333rank.com.
CyberPaths Interdisciplinary Modules
Attacks on The Manufacturing Industry
Cybersecurity Involves systems and practices to prevent and mitigate cyber attacks and cyber crimes aimed at global, national, organizational, or personal.
Advancing Cybersecurity Education: What Can We Do?
Type your title here Your name, Colleague 1, Colleague 21, Colleague 3
The Practical Side of Meaningful Use:
Cyber Security Culture
Academic Alliance Initiative
Securing Critical Chemical Assets: The Responsible Care® Security Code
Type your title here Your name, Colleague 1, Colleague 21, Colleague 3
Institute for Cyber Security Overview
Eric Baran, WIRAB Staff April 30, 2018
Cybersecurity Workforce Development for the Nation
Homeland Security Program School of Health, Science & Criminal Justice Fall 2015 Assessment Report
Type your title here Your name, Colleague 1, Colleague 21, Colleague 3
OUR HISTORY & MISSION ABOUT US. OUR HISTORY & MISSION ABOUT US.
Counter APT Counter APT HUNT operations combine best of breed endpoint detection response technology with an experienced cadre of cybersecurity experts.
Multiplication Facts 3 x Table.
CyberPaths Interdisciplinary Modules
Type your title here Your name, Colleague 1, Colleague 21, Colleague 3
Presentation transcript:

Augusta University: NSA Curriculum Grant Who here knows what is an APT? Who here has heard of Operation Buckshot Yankee or Agent Btz? John J. Heslen, PhD Augusta University Cyber Institute

Agenda Deliverables Description of “strategic” cybersecurity Development of strategic cyber curriculum Demonstration of lecture material

Deliverables 3 Courses (15 lectures per course) Video presentation Whiteboard animation Guest lecturers Textbooks/Journal articles Assessments (multiple choice/short answer) Supplementary activities

“Strategic” Cyber Education Cyber intelligence analyst Little technical background = “Strategic” What is “strategic” cybersecurity? Addresses how adversaries are organized Cyber capabilities Understand economic/Nat’l Sec policies Need for a “strategic” cybersecurity education evolved out of my own experiences

Strategic Cybersecurity Courses Intro to Strategic Cybersecurity Non-technical survey course Cyber Warfare: History and Theory Addresses major historical cyber attacks Global Cyber Threat Environment Focuses on our 4 major cyber adversaries

Augusta – Location, Location, Location As you can see from this map, Augusta is uniquely positioned to take advantage of these cyber workforce needs and, despite its rural location, it is very representative of National Situation with respect to cyber infrastructure and cybersecurity needs.   There is obviously a need to service the growing workforce needs at the various units residing at Ft Gordon, but also the need to service the large medical infrastructure in Augusta, (Health Info Security, and Medical Device Security research) as well as needs of the nearby DOE facilities. In fact, Savannah River National Lab just funded an interdisciplinary faculty position at AU…(ICS Vulnerabilities)

Lecture Demonstration

Questions? John J. Heslen, PhD Jheslen@augusta.edu