LAKEFRONT SHERATON HOTEL COLUMBIA, MARYLAND 4-5 NOVEMBER 2014 CO-CHAIRS DAVID S. “HOOT” GIBSON, US AIR FORCE ACADEMY ELIZABETH “BETH” HAWTHORNE, UNION.

Slides:



Advertisements
Similar presentations
Dept. of Computing and Technology (CaT) School of Science and Technology B.S. in Computer Information Systems (CIS) CIP Code: Program Code: 411.
Advertisements

Back to Today’s ppt Introduction to Engineering l Definitions l Technology Team l Engineering Disciplines l Engineering Functions l Career Paths l ABET.
Assessment of Undergraduate Programs Neeraj Mittal Department of Computer Science The University of Texas at Dallas.
Columbia, MD Nov 4-5,  What is the goal of CEP? To facilitate an effort to … 1.create broad/inclusive guidance for the development of “Cyber Science”
Cyber Education Project Accreditation Committee November 2014.
Session 6 Integrated Emergency Management. Objectives of the Session Students will be able to 6.1 Define the principle of integration. 6.2Discuss the.
So Many Possibilities Dr. Vic MaconachyChris Inglis Capitol Technology University U. S. Naval Academy CAE Community Meeting, - Columbia, Maryland Accreditations.
Chapter 29 Ethics in Accounting
OPM Cybersecurity Competencies by Occupation (Technical Competencies) Information Technology Management Series Electronics Engineering.
1 General Education Senate discussion scheduled for April 11 and 25 1.Proposal to base General Education on outcomes that can be assessed 2.Proposal for.
Introduction to Student Learning Outcomes in the Major
Overview of the Rose-Hulman Bachelor of Science in Software Engineering Don Bagert SE Faculty Retreat – New Faculty Tutorial August 23, 2005.
Software Assurance CBK and University Curricula Matt Bishop Sophie Engle.
Mohammad Alshayeb 19 May Agenda Update on Computer Science Program Assessment/Accreditation Work Update on Software Engineering Program Assessment/Accreditation.
4 August st Century Computing Curricula 1 Richard J. LeBlanc, Jr. Professor, College of Computing Georgia Institute of Tech nology Atlanta, Georgia,
Program Improvement Committee Report Larry Caretto College Faculty Meeting December 3, 2004.
ABET Accreditation Board for Engineering and Technology
Diploma of Project Management Course Outline NSW Course Number Qualification Code BSB51407.
Purpose Program The purpose of this presentation is to clarify the process for conducting Student Learning Outcomes Assessment at the Program Level. At.
T OWARDS S TANDARDS IN D IGITAL F ORENSICS E DUCATION.
JIC ABET WORKSHOP No.4 Guidelines on: II Faculty Survey Questionnaire.
Report from the ACM CCECC IT Curriculum Project
Learning outcomes and introduction to assessment Pg Certificate in Higher Education Professional Practice Jannie Roed and Sue Moron-Garcia 6 th May 2009.
Whitacre College of Engineering Panel Interdisciplinary Cybersecurity Education Texas Tech University NSF-SFS Workshop on Educational Initiatives in Cybersecurity.
CDU – School of Information Technology HIT241 Professional Practice… - Slide 1 IT Project Management ACS - Core Body of Knowledge In Australia in November.
COMP1940 Professional Development Lecture 1 Semester 1 30 th September 2013 School of Computing FACULTY OF ENGINEERING.
Diploma of Project Management Course Outline NSW Course Number Qualification Code BSB51407.
Overview of NIPP 2013: Partnering for Critical Infrastructure Security and Resilience October 2013 DRAFT.
AL-QADISIYIA UNIVERSITY COLLEGE OF ENGINEERING SELF ASSESSMENT REPORT Submitted by SAR committee.
AFCEA/AFA July 23,  There are 35 colleges and universities across the state that are members of the University System of Georgia.  All of them.
Whitacre College of Engineering Panel Interdisciplinary Cybersecurity Education Texas Tech University NSF-SFS Workshop on Educational Initiatives in Cybersecurity.
Resources to Support Training Programs for CSIRTs.
Year Seven Self-Evaluation Workshop OR Getting from Here to There Northwest Commission on Colleges and Universities.
Certified Software Development Associate. Slide 2 What Is the IEEE Computer Society? l The IEEE CS was established in 1946, has nearly 100,000 members.
Informatics Institute 6/19/081 A Draft Plan for the Informatics Institute (Graduate Program) Informatics Institute A Draft Plan for the Informatics Institute.
 ACM/IEEE-CS Computer Science Curriculum Approximately every decade since “Curriculum ’68” ACM & IEEE-CS jointly publish curricular guidance.
Computing and Technology Department School of Science and Technology BS in Information Technology CIP Code Program Code 414 Fall 2010 Program Quality.
Writing Learning Outcomes David Steer & Stephane Booth Co-Chairs Learning Outcomes Committee.
The Engineering Body of Knowledge Joint Engineers Conference 07 November 2014 Helena, MT Robert A. Green, P.E., F. NSPE President National Society.
1 Historical Perspective... Historical Perspective... Science Education Reform Efforts Leading to Standards-based Science Education.
Write On! Your Course Outline. Pedagogy Unbound Series Facilitated by: Deborah Richards Florence Daddey.
Emergency Management Training and Education System Protection and National Preparedness National Preparedness Directorate National Training and Education.
NCATE for Dummies AKA: Everything You Wanted to Know About NCATE, But Didn’t Want to Ask.
Center for Cybersecurity Research and Education (CCRE)
Information Assurance – A Technology Transfer Success Story Deidre W. Evans, Edward L. Jones, Christy L. Chatmon Computer and Information Sciences Department.
Tips for Writing Learning Objectives Based upon Bloom’s Taxonomy Presented by IFEX and IDS.
Accreditation Update and Institutional Student Learning Outcomes Deborah Moeckel, SUNY Assistant Provost SCoA Drive in Workshops Fall 2015
Chapter 9 The People in Information Systems. Learning Objectives Upon successful completion of this chapter, you will be able to: Describe each of the.
The NIST Special Publications for Security Management By: Waylon Coulter.
Minimum Qualifications for Faculty in the California Community Colleges May 5, 2016 CTE Leadership Academy Pre-Conference Session John Stanskas, ASCCC.
Risk Controls in IA Zachary Rensko COSC 481. Outline Definition Risk Control Strategies Risk Control Categories The Human Firewall Project OCTAVE.
Learning Objectives Online Course Improvement Program (OCIP) Susie Bussmann & Miley Grandjean, IIQ.
1 IT/Cybersecurity - ICRDCE Conference Day Aligning Program, Course, and Class Objectives / Outcomes.
1 Institutional Quality and Accreditation: A Workshop on the Basics.
Industry Advisory Board
Secure Software Workforce Development Panel Session
Department of Computer and Information Sciences

C-ID IT Model Curriculum Update
The National Initiative for Cybersecurity Education (NICE)  AFCEA International Cyber Education, Research, and Training Symposium January 17, 2018 Bill.
I have many checklists: how do I get started with cyber security?
8 Building Blocks of National Cyber Strategies
CSEC2017 Update: Joint Task Force on Cybersecurity Education Diana Burley, Matt Bishop, and the members of the Joint Task Force.
ACM/IEEE-CS Computer Science Curriculum
Department of Computer Science The University of Texas at Dallas
Information Technology (IT)
Presented by: Skyline College SLOAC Committee Fall 2007
MODULE B - PROCESS SUBMODULES B1. Organizational Structure
Group Meeting Ming Hong Tsai Date :
Unit # 1: Overview of the Course Dr. Bhavani Thuraisingham
Presentation transcript:

LAKEFRONT SHERATON HOTEL COLUMBIA, MARYLAND 4-5 NOVEMBER 2014 CO-CHAIRS DAVID S. “HOOT” GIBSON, US AIR FORCE ACADEMY ELIZABETH “BETH” HAWTHORNE, UNION COUNTY COLLEGE, ACM EDUCATION BOARD Cyber Science Learning Outcomes Cyber Education Project Learning Outcomes Committee

Learning Outcomes Committee Charter The primary objective of this effort is to provide the cyber education community with useful guidance on developing undergraduate cyber science curricula. The Committee will build upon previous works to define related bodies of knowledge and seek diverse perspectives to build an interdisciplinary set of learning outcomes which broadly define cyber science education a the undergraduate level. The outcomes developed will also be used to guide the development of criteria for cyber science program accreditation. The Committee will develop learning outcomes which characterize the knowledge, skills, and abilities gained by students in an undergraduate cyber science program. Ultimately the work of the Committee should lead to a cyber science curricular guidance report formally endorsed by a professional society such as the Association for Computing Machinery (ACM).

Other Cyber Curriculum Development Work NSA/DHS Center for Academic Excellence (CAE) in Information Assurance/Cyber Defense (IA/CD) Knowledge Units (2014) NICE National Cybersecurity Workforce Framework version 2 (2014) - niccs.us-cert.gov/research/draft-national- cybersecurity-workforce-framework-version-20 niccs.us-cert.gov/research/draft-national- cybersecurity-workforce-framework-version-20 Department of Labor Cybersecurity Industry Model (2014) - models/cybersecurity.aspx models/cybersecurity.aspx Military Academy CYBER Education Working Group, Draft Body of Knowledge and Draft Outcomes, unpublished, 2014.

Other Cyber Curriculum Development Work cont’d ACM ITiCSE Working Group Papers ( )  An Exploration of the Current State of Information Assurance Education (2009) - dl.acm.org/citation.cfm?id= dl.acm.org/citation.cfm?id=  Towards Information Assurance (IA) Curricular Guidelines (2010) - dl.acm.org/citation.cfm?id= dl.acm.org/citation.cfm?id=  Information Assurance Education in Two- and Four-Year Institutions (2011) - dl.acm.org/citation.cfm?id= dl.acm.org/citation.cfm?id= ACM/IEEE-CS Curriculum Guidelines for Undergraduate Degree Programs in Computer Science: IAS KA (2013, p. 99) – cs2013.org cs2013.org ACM Toward Curricular Guidelines for Cybersecurity: Report of a Workshop on Cybersecurity Education and Training (2013) –

Other Cyber Curriculum Development Work cont’d CERT Software Assurance Curricula All Volumes CERT Software Assurance Curriculum Project Volume II: Undergraduate Course Outlines (2010) - resources.sei.cmu.edu/library/asset-view.cfm?assetID=9543 resources.sei.cmu.edu/library/asset-view.cfm?assetID=9543 CERT Software Assurance Curriculum Project Volume IV: Community College Education (2011) - resources.sei.cmu.edu/library/asset-view.cfm?assetID=10009 resources.sei.cmu.edu/library/asset-view.cfm?assetID=10009

Other Cyber Curriculum Development Work cont’d U.S. Department of Energy Essential Body of Knowledge (EBK): A Competency and Functional Framework For Cyber Security Workforce Development (2010) - energy.gov/sites/prod/files/cioprod/documents/DOE_EBK_June_201 0_Revision_clean_v01public.pdf energy.gov/sites/prod/files/cioprod/documents/DOE_EBK_June_201 0_Revision_clean_v01public.pdf DHS IT Security Essential Body of Knowledge (EBK): A Competency and Functional Framework for IT Security Workforce Development (2007) (ISC) 2 Common Body of Knowledge -

Why the Learning Outcomes Approach? Focus is on student achievement rather than on existing disciplines and courses (minimizes turf wars concerning who is in and who is out) Supports inclusive approach (it is easier to add many outcomes than many whole courses of study) Supports development of new courses in a new and evolving discipline Avoids traditional body of knowledge focus on topics and contact hours that can grow unbounded as new technologies emerge  What topics are eliminated to make room for the new?

Why the Learning Outcomes Approach? LOs: statements describe what students will be able to do as a result of learning LOs: students understand expectations and faculty can focus on student achievement LOs: specific measurement of student achievement having a specific minimum acceptable standard to pass (a threshold level)

Why the Learning Outcomes Approach? Active LOs are Active  action verbs describe what students should be able to do Aligned LOs can be Aligned  aligned with the rest of the curriculum; so LOs contribute to achievement of course outcomes, which in turn contribute to program outcomes Achievable LOs are Achievable  written at the threshold level for a pass, not aspirational Assessed LOs can be Assessed  possible to assess several learning outcomes with one assignment and can also be assessed informally, based on classroom tasks or discussions

Example Learning Outcomes Bloom’s Revised Taxonomy – acmccecc.org/BloomsTaxonomy/ acmccecc.org/BloomsTaxonomy/ CS2013 – Information Assurance and Security Knowledge Area (IAS KA) Foundational Concepts in Security Knowledge Unit LOs  Analyze the tradeoffs of balancing key security properties (Confidentiality, Integrity, and Availability)  Describe the concepts of risk, threats, vulnerabilities and attack vectors (including the fact that there is no such thing as perfect security).

Example Learning Outcomes cont’d CS2013 IAS KA cont’d Defensive Programming KU LOs  Explain why input validation and data sanitization is necessary in the face of adversarial control of the input channel.  Demonstrate using a high-level programming language how to prevent a race condition from occurring and how to handle an exception. Network Security KU LOs  Describe the architecture for public and private key cryptography and how public key infrastructure (PKI) supports network security.  Describe virtues and limitations of security technologies at each layer of the network stack.

Example Learning Outcomes cont’d CS2013 IAS KA cont’d Security Policy and Governance KU LOs  Describe how privacy protection policies run in conflict with security mechanisms  Identify the risks and benefits of outsourcing to the cloud Digital Forensics KU LOs  Describe the legal requirements for use of seized data.  Conduct data collection on a hard drive.

Activity What should students learn in cyber science? What common categories have emerged? The following slides show the technical and non- technical categories of answers placed on sticky notes.

“Technical Sticky Clumps” In no particular order Attack Cryptography Data Analysis Database Defense Ethical Hacking Forensics Hardware ICS/SCADA Math Mobile Networks Operating Systems Programming Reverse Engineering Secure Software Telecom

“Non-Technical Sticky Clumps” In no particular order Basic Principles Education Ethics Human Factors Lifecycle Organizations Policy, Governance and Law Privacy & Confidentiality Recovery Risk Management Strategy

Additional topics from follow-up meeting Threat landscape Psychological operations Business continuity, recovery Risk management Governance (triad with policy and law) International standards, policy, and law Resilience Intelligence Economics Embedded systems Systems design System safety Supply chain Artificial intelligence Linguistics History

Follow-on Questions How should cyber science outcomes differ from computer science outcomes? What is the best technical and non-technical mix? Who are the subject matter experts? What other questions should we ask? Do you currently have a program in “cyber” or are you considering developing one? What makes your cyber program different from other computing-based programs?

Learning Outcomes Development Timeline Early Dec 2014 – on-line organizational meeting  Define roles of committee members and topic area leads  Establish learning outcome format and repository  Establish dates and locations for future meetings Jan-Feb 2015 – on-line meetings  Discuss development of cyber science learning outcomes March 2014 – Face-to-face meeting (2 days)  Draft cyber science learning outcomes document June 2015 – Present work at CEP Workshop Fall 2015 – Broad review and comment on outcomes Spring 2016 – Publish learning outcomes report

Getting Involved in Outcome Development Sign-up at: Or contact Committee Co-chairs Beth or Hoot:  Beth Hawthorne:  David “Hoot” Gibson: