CNSS Re-Certification. Why do this? Two reasons: It is very important that we work with industry and government to ensure that we are teaching what we.

Slides:



Advertisements
Similar presentations
Quality Matters Building a Quality Online Course.
Advertisements

A Quality Matters “Quickie”
Jennifer Strickland, PhD,
You may already have a vita that is kept up to date, that’s great. Your vita should be tailored so that it supports the rank and tenure process. This document.
ESEA: Developing the Paraprofessional Portfolio Prepared by Carolyn Ellis Logan, Consultant Professional Development/Human Rights Department Michigan Education.
Orientation for New Site Visitors CIDA’s Mission, Value, and the Guiding Principles of Peer Review.
Writing an Effective Proposal for Innovations in Teaching Grant
1 Why is the Core important? To set high expectations – for all students – for educators To attend to the learning needs of students To break through the.
C e n t e r f o r E x c e l l e n c e i n T e a c h i n g Preparing a CV and Portfolio Prof. Armand R. Tanguay, Jr. University of Southern California Departments.
Overview of the Rose-Hulman Bachelor of Science in Software Engineering Don Bagert SE Faculty Retreat – New Faculty Tutorial August 23, 2005.
Quality evaluation and improvement for Internal Audit
Overview CSE 465 Information Assurance
Mohammad Alshayeb 19 May Agenda Update on Computer Science Program Assessment/Accreditation Work Update on Software Engineering Program Assessment/Accreditation.
Graduate Program Review Prof. Emad Ali. Major Review Steps Self-study Report External evaluation Apply actions for improvement.
Standards and Guidelines for Quality Assurance in the European
Continuing Professional Development Standards, principles, and practices.
8-1 Copyright © 2013 McGraw-Hill Education (Australia) Pty Ltd Hill, Hill, Perlitz, Professional Training & Assessment, 1e C HAPTER 8 TAEASS502B Design.
DRAFT Building Our Future 2017 Fulton County Schools Strategic Plan Name of Meeting Date.
UNIVERSIDAD CARLOS III DE MADRID CENTRO DE AMPLIACIÓN DE ESTUDIOS CRITERIA AND GUIDELINES FOR THE ACCREDITATION OF MASTER’S DEGREES IN SPAIN 1.
Federalwide Assurance Presentation for IRB Members.
CONNECTICUT STATE DEPARTMENT OF EDUCATION BUREAU OF EARLY CHILDHOOD EDUCATION Laboratory School and Model Early Childhood Learning Grant
ACADEMIC PERFORMANCE AUDIT
Corrinne Sande Whatcom Community College Bellingham, WA.
1. 2 Why is the Core important? To set high expectations –for all students –for educators To attend to the learning needs of students To break through.
Teachers Discovering Computers Integrating Technology and Digital Media in the Classroom 7 th Edition Evaluating Educational Technology and Integration.
Creating a Teaching Dossier Shea Wang, Ph.D Interim Faculty Evaluation Coordinator Oct. 21, 2013.
The Structure and Role of QA Bodies at the University and faculty/department levels UNIVERSITY OF BELGRADE Serbia.
GUIDELINES ON CRITERIA AND STANDARDS FOR PROGRAM ACCREDITATION (AREA 1, 2, 3 AND 8)
Wayne Patterson Director of the Cybersecurity Research Center November 28, 2011 Howard University Cybersecurity Research Center.
Responsible Conduct of Research (RCR) What is RCR? New Requirements for RCR Who Does it Affect? When? Data Management What is the Institutional Plan? What.
Leadership Certificate Program Fall 2009 Center for Leadership & Involvement.
Institutional Effectiveness &. Institutional Effectiveness & Strategic Planning IE & SP Committees have developed a new system that integrates these two.
Basic Workshop For Reviewers NQAAC Recognize the developmental engagements Ensure that they operate smoothly and effectively” Ensure that all team members.
Promotion in the Clinical Track Lois J. Geist, M.D. Associate Dean for Faculty Affairs and Development.
1. Housekeeping Items June 8 th and 9 th put on calendar for 2 nd round of Iowa Core ***Shenandoah participants*** Module 6 training on March 24 th will.
Practicing Meaningful Learning Outcomes Assessment at UGA Department of Crop and Soil Sciences August 10, 2015 Dr. Leslie Gordon Associate Director for.
Making Applications: Research Plan, Curriculum Vitae, List of Publications etc. Prof. Kaisa Miettinen
Formative Peer Review at Ocean County College. Guiding Principle “Ideally, the peer review of teaching is a critically reflective and collaborative process.
Serve the Professional, Advance the Profession SHRM Student Member Benefits Presented by SHRM Student Programs Updated April 2007.
Center for Cybersecurity Research and Education (CCRE)
Systems Accreditation Berkeley County School District School Facilitator Training October 7, 2014 Dr. Rodney Thompson Superintendent.
Consistency of Assessment (Validation) Webinar – Part 1 Renae Guthridge WA Training Institute (WATI)
Distance Learning and Accreditation Heather G. Hartman, Ph.D. Brenau University Online Studies and SACS Liaison.
Promotions on the Physician Scientist/Basic Science Investigator Track Larry L. Swift, Ph.D. Vice Chair for Faculty Affairs Department of Pathology, Microbiology.
Assessment Validation. MORE THAN YOU IMAGINE ASQA (Australian Skills Quality Authority) New National Regulator ASQA as of 1 July, 2011.
PERKINS IV AND THE WORKFORCE INNOVATION AND OPPORTUNITY ACT (WIOA): INTERSECTIONS AND OPPORTUNITIES.
ACADEMIC PROMOTIONS Promotions Criteria Please note, these slides only contain a summary of the promotions information – full details can be found.
OAsIS National Centers of Academic Excellence in Information Assurance Education (CAEIAE) Program: OAsIS.
2007. Faculty of Education ► Staff 300 (incl.100 in Teacher training school) ► 20 professorships ► 80 lecturers ► 9 senior assistants ► 12 assistants.
NCSLI 2007 Training Records from an Auditors Viewpoint Shawn Mason Boston Scientific.
Teaching Network Security - Lessons Learned Homeland Defense and Security Education Summit February 27 &28, 2007 Margaret Leary Associate Professor Northern.
College of Arts & Sciences Lecturer Promotion Dossier assembly workshop fall 2016.
Connect Grant and College Collaborations
1st Steering Committee Meeting activities from WP3 –
GlobaLIS: An Effort to Describe Trends in Japanese LIS Education for Global Collaboration MAKIKO MIWA Center of ICT and Distance Education, The Open University.
College of Arts & Sciences Lecturer Promotion Dossier assembly workshop fall 2017.
1st Steering Committee Meeting activities from WP3 –
ACM/IEEE-CS Computer Science Curriculum
Considerations in Engineering
European TRAINING FOUNDATION
Topic Principles and Theories in Curriculum Development
Quality assurance and curriculum development
College of Arts & Sciences Lecturer Promotion Dossier assembly workshop fall 2018.
UNM Information Assurance Scholarship for Service (SFS) Program
Computer Science Section
Cybersecurity Workforce Development for the Nation
Finalization of the Action Plans and Development of Syllabus
UNM Information Assurance Scholarship for Service (SFS) Program
Digital Library and Plan for Institutional Repository
Digital Library and Plan for Institutional Repository
Presentation transcript:

CNSS Re-Certification

Why do this? Two reasons: It is very important that we work with industry and government to ensure that we are teaching what we should be teaching – in this case in cyber-security related courses This gives some assurance to students (and parents) that our programs are certified by an authoritative outside body (CNSS).

CNSS Re-Certification Our current certification ends on June 30, 2015 NSA changed the rules for certification Institutional requirements Specific course mappings New certificate I worked with Peng Liu and many other faculty to gather the required data and submitted it before the March 31, 2014 deadline There was a site visit. Re-certified June, 2014 – good until 2020

CNSS Re-Certification – upon re-certification The Institution (all campuses) is certified as a Center of Academic Excellence in Information Assurance and Cyber- Defense The old certificates are gone as of June, 2015 Students taking all courses in the set that satisfies the CNSS required knowledge units will receive a certificate Student with SRA major or minor, who do not qualify for the above certificate will get a certificate stating that certain classes they have taken satisfy CNSS requirements

CNSS Re-Certification 1.Outreach/Collaboration. The institution must demonstrate how IA/CD is extended beyond the normal boundaries of the Institution. a. Shared curriculum (e.g., IA/CD teaching materials provided to minority colleges/universities, two-year community colleges, technical schools, or K-12 schools) or shared faculty b. Reciprocity of credits Evidence in the form of written agreements must demonstrate that IA/CD- related courses from the above types of schools are accepted for credit at the applying institution. c. Sponsorship of or participation in Cyber Defense or Forensics Exercises and competitions within 3 years of submission. d. CAE Collaboration. Partner in research/shared classes or shared events with other institutions. Institutions are encouraged to partner with other CAEs on cyber or IA/CD research/instruction. e. Community Outreach. Sponsorship of community events such as cybersecurity education for local schools, adult education centers, senior centers, etc. (e.g., schools in a target region are encouraged to participate in cybersecurity education events, like community computer diagnostic “check-ups” and IA/CD awareness days.)

CNSS Re-Certification 2. Center for IA/CD Education. The institution must have a formal organization for use as a resource for faculty and students. The Center should provide program guidance, general IA/CD information and promote collaboration and interaction with other students, faculty, and programs. (For the purpose of this document, the word “Center” is used in a general sense). a. Show formal documentation of the designation of the IA/CD/Cybersecurity “Center” and provide a hyperlink to the “Center.” b. Demonstrate the “Center” website is operational, dynamic and current: contains up-to-date links to key IA/CD resources such as other academic institutions, government sites, conferences, workshops, IA/CD news, center POCs, IA/CD courses, etc. The website must be easy to find and easily accessible. Demonstrate how students know about the website. c. Provide evidence that subscription-based, on-line IA/CD journals are available for student and faculty use.. Demonstrate that hyperlinks to key IA/CD.on-line resources are provided in course syllabus and/or professors’ webpage or provided to students during class instruction. d. Demonstrate that physical and/or virtual IA/CD labs and equipment are available and used for hands-on learning (provide examples of student lab projects/exercises/case studies – syllabus, links to assignments, etc.).

CNSS Re-Certification 3. A robust and active IA/CD academic program. Demonstrate how students successfully participate in the academic program requirements to meet the IA/CD curriculum. a. Provide evidence that students who participate sufficiently in the IA/CD curriculum (i.e., take and pass courses that satisfy all of the mandatory KU requirements and at least five of the optional KU requirements) will receive a certificate, or a reference to completing the CAE IA/CD course of study on their transcript and/or degree. Provide evidence in the form of a letter, transcript notation, and/or degree (student information may be redacted)

CNSS Re-Certification 4. IA/CD is multidisciplinary within the institution. The institution must demonstrate that IA/CD is not treated as a separate discipline, but as a multidisciplinary science with the body of IA/CD knowledge incorporated into various disciplines. a. Evidence that IA/CD is taught as modules in existing non-IA/CD courses and that non- technical/non-IA/CD students are being introduced to IA/CD. For example: IA topics such as security countermeasures are covered in courses for managers/leaders/non-technical students. b. Non-IA courses encourage papers in IA topics or projects. Provide links to 5 to 10 best thesis, dissertation, or projects in IA within 3 years of application. Link to actual papers required – not a subscription service.

CNSS Re-Certification 5. Practice of IA encouraged throughout the Institution. The academic program must demonstrate how it encourages the practice of IA, not merely that it teaches IA. a. Provide a link to the Institution IA security plan. (required) b. Provide name, position and job description for person or persons responsible for information security at the institution. c. Provide evidence of the implementation of the Institution’s IA security plan that encourages IA awareness throughout the campus (e.g., Students, faculty and staff are required to take computer based training or on-line tutorials; a security banner statement is present on institution or department computers; security related help screens are available; students are provided with a guide on good security practices, etc. - 2pts awarded per item).

CNSS Re-Certification 6. Student-based IA/CD/Cybersecurity research. The institution must demonstrate how it encourages research in IA/CD. This criterion focuses on STUDENT-based research and is important because research fuels the relevancy and currency of IA curricula. Research should relate back to one or more KUs. a. Program with IA/CD focus has thesis, dissertation, student papers, or independent research project requirements. Focus areas include declared majors, declared minors, established certificates of study within a major that produce research papers/projects. Provide links to 5 to 10 best actual thesis, dissertation, student papers, or projects in IA within 3 years of application (student information may be redacted). b. List IA/CD courses that require research paper(s) or virtual/physical lab project(s). Provide IA course titles that require these papers/lab projects within 3 years of application. Provide link to course syllabus.

CNSS Re-Certification 7. Number of IA/CD/Cybersecurity faculty and course load. The institution must demonstrate that IA/CD faculty consists of a sufficient number of full time IA/CD faculty members and additional faculty members (may be part-time, adjunct, visiting professor, etc.) teaching at least one IA/CD course. This criterion requires a link to a biography or curriculum vitae for each faculty member. a. Identify by name full-time employee or employees, as defined above, either faculty or member of the administration working in IA with overall responsibility for the IA Instructional Program. Provide evidence, i.e., letter of testimony or job description. Provide link to biography or CV. b. Identify by name additional full-time IA faculty members (not listed in 7.a.), teaching IA/CD courses within the department that sponsors IA/CD programs. Provide link to biography or CV. c. Identify by name part-time, shared (inter departmental, other institution, etc.), adjunct (industry expert, etc.) teaching IA/CD courses within the department that sponsors IA/CD programs. Provide link to biography or CV.

CNSS Re-Certification 8. Faculty active in current IA/CD/Cybersecurity practice and research. The institution must clearly demonstrate that the faculty is active in current IA/Cyber practice and research, contributes to IA literature, and are members of IA professional societies are subject matter experts or attend/present at professional IA conferences. a. Peer reviewed publications – papers (electronic or traditional) on IA/CD/Cybersecurity as evidenced in refereed journals or conference proceedings within the past 3 years. Provide links to actual papers not subscription service. b. Published books or chapters of books on IA/CD/Cybersecurity. Books/chapters must focus on IA and have been published within the last 5 years. Provide title, authors and date published. ID specific chapters if authoring a chapter of a book. c. Faculty is involved in writing grants and obtaining funding for IA education and/or research development or lab equipment. Provide synopsis of IA related grants, funding, equipment donations, or other funding to include date and approximate monetary value for the past 3 years. d. Faculty members are subject matter experts (IA/CD/Cybersecurity) for accrediting bodies and professional societies for IA/CD/Cybersecurity, (e.g., ACM, IEEE, regional accreditation, professional accreditation, etc.). Faculty members are active members in IA/CD/Cybersecurity organizations (e.g., ISSA, Cyberwatch, Infraguard, etc.) List involvement for the last 3 years. e. Faculty members are engaged in and/or initiate student IA programs.

Required areas Basic Data Analysis Basic Scripting or Introductory Programming (4 yr core) Cyber Defense Cyber Threats Fundamental Security Design Principles IA Fundamentals Intro to Cryptography IT Systems Components Networking Concepts Policy, Legal, Ethics, and Compliance System Administration Databases Network Defense Networking Technology and Protocols Operating Systems Concepts Probability and Statistics Programming

Additional Required areas Cybersecurity Planning and Management Database Management Systems Digital Forensics Security Programs Security Risk Analysis

Example: CAE Knowledge Units Page 33 June 2013 Digital Forensics Definition: The intent of this Knowledge Unit is to provide students with the skills to apply forensics techniques throughout an investigation life cycle with a focus on complying with legal requirements. Topics:  Legal Compliance o Applicable Laws o Affidavits o How to Testify o Case Law o Chain of custody  Digital Investigations o E-Discovery o Authentication of Evidence o Chain of Custody Procedures o Metadata o Root Cause Analysis o Using Virtual Machines for Analysis Outcomes:  Students shall be able to discuss the rules, laws, policies, and procedures that affect digital forensics  Students shall be able to use one or more common DF tools, such as EnCase, FTK, ProDiscover, Xways, SleuthKit.  Students will be able to describe the steps in performing digital forensics from the initial recognition of an incident through the steps of evidence

CNSS Re-Certification – upon re-certification The required courses: SRA-497a or Stat-200 IST-297d (intro app. prog.) or Compsci-101 IST-210 IST-220 SRA-111 SRA-221 IST-451 IST-454 IST-456