BS in Computer and Information Systems Security A 2+2 degree program between Peninsula College and Western Washington University David Bover Professor,

Slides:



Advertisements
Similar presentations
ACADEMIC ADVISING Taking an Integrated Approach: General Education + Major.
Advertisements

Department of Mathematics and Computer Science
Computer Science Degree Plan Builder. Degree Requirements  Computer Science required courses ◦46 credits  Computer Science elective courses ◦12 credits.
Bachelor of Science Bachelor of Arts Computer Science Information Science and Technology Computational Science (BS only)
© Copyright CSAB 2013 Future Directions for the Computing Accreditation Criteria Report from CAC and CSAB Joint Criteria Committee Gayle Yaverbaum Barbara.
Group Advisement Economic Crime Investigation The First Two Years.
Academic Advising Freshmen will be advised this Fall by Jane Riggs or Sue Scheff for Spring 2004 In Spring, you will be assigned a Dept advisor for Fall.
OPM Cybersecurity Competencies by Occupation (Technical Competencies) Information Technology Management Series Electronics Engineering.
Mohammad Alshayeb 19 May Agenda Update on Computer Science Program Assessment/Accreditation Work Update on Software Engineering Program Assessment/Accreditation.
Masters in Information Science and Technology (IST) Thesis and Non-Thesis Option (30 Credits)
EDUCATION PLANNING WORKSHOP PLAN C. What are the ENGLISH and MATH requirements for an AA or AS Degree? English 101 MATH 080/081 ENGL N50  N60  061 
Computer Science at UCSB Phill Conrad CS Dept. Faculty Advisor Benji Dunson CS Dept. Staff Advisor CS Undergrad Students: – Melissa Gross – Sarah Jones.
Whitacre College of Engineering Panel Interdisciplinary Cybersecurity Education Texas Tech University NSF-SFS Workshop on Educational Initiatives in Cybersecurity.
School of Management & Information Systems
Computer Science and Engineering 1 Csilla Farkas Associate Professor Center for Information Assurance Engineering Dept. of Computer Science and Engineering.
Department of Computer Science and Engineering BS in Computer Science BS in Computer Engineering UNT Research Park (NTRP) F201 (940)
Advising Workshop for New Faculty CSE Department Ohio State University.
Undergraduate Technology Programs John Baker Johns Hopkins University Carey Business School
Computer Science Department Dr. Desh Ranjan, Department Chair Ms. Janet Brunelle, Chief Departmental Advisor 1 Computer Science 2013.
Dr. John Lowther, Associate Professor of CS Adjunct Associate Prof. of Cognitive and Learning Sciences Computer Graphics:
Computer Science Department 1 Undergraduate Degree Program Computer Science Chair Dr. Kurt Maly.
The job outlook?. What some fastest-growing jobs pay (from CNN.com/CareerBuilder.com) From Bureau of Labor Statistics' list of the 30 fastest-growing.
INTERNSHIP ELIGIBILITY REQUIREMENTS School of Criminal Justice.
Center for Cybersecurity Research and Education (CCRE)
CS Curriculum Changes Fall, BS Computer Science 2015 COMPUTER SCIENCE COURSES—64 Hours COMPUTER SCIENCE CORE (48 Hours) CS 258Intro to Object-Oriented.
Major Academic Plan (MAP) Why study chemistry? Chemistry is often referred to as the central science because of the way that it brings together mathematics,
Major Academic Plan (MAP) Why study computing? What aspect of modern life has not been affected by computing technologies? Personal computers, game machines,
Major Academic Plan (MAP) Why Environmental Science? Environmental challenges aren't going away. As global warming, ocean depopulation, soil contamination,
STEM Endorsement General Courses  The STEM endorsement must include Algebra II Chemistry Physics These three courses are required to meet the STEM endorsement.
Major Academic Plan (MAP) Why study Electrical Engineering? Electrical Engineering is both one of the country’s highest paid occupations and one with the.
EDUCATION PLAN C AND GRADUATION PETITION
Major Academic Plan (MAP) Why study International Business? The International Business major is for students with career objectives in the management of.
Major Academic Plan (MAP) Why study Electrical Engineering? Electrical Engineering is both one of the country’s highest paid occupations and one with the.
Major Academic Plan (MAP) Why study computing? What aspect of modern life has not been affected by computing technologies? Personal computers, game machines,
Major Academic Plan (MAP) Why study chemistry? Chemistry is often referred to as the central science because of the way that it brings together mathematics,
Interdisciplinary MS in Information Assurance Jim Wolfe Computer Science Department Indiana University of Pennsylvania EPASEC 2006.
Koji OKAMURA Cybersecurity Center, Kyushu University Cybersecurity Education.
Major Academic Plan (MAP) Why study economics? Economics helps us understand and explain a variety of topics such as employment, inflation, business cycles,
Major Academic Plan (MAP) Why study Applied Technology? This program is designed for students who have graduated with an associate degree in applied arts.
College of Science and Engineering Biology Majors.
Major Academic Plan (MAP) Why Environmental Science? Environmental challenges aren't going away. As global warming, ocean depopulation, soil contamination,
Major Academic Plan (MAP) Why study economics? Economics helps us understand and explain a variety of topics such as employment, inflation, business cycles,
Major Academic Plan (MAP) Why study chemistry? Chemistry is often referred to as the central science because of the way that it brings together mathematics,
C YBERSECURITY P ROGRAMS Computer Science Department Boise State University By Jyh-haw Yeh.
Major Academic Plan (MAP) Why study economics? Economics helps us understand and explain a variety of topics such as employment, inflation, business cycles,
Beginning 1956  Associate of Science Degree included 27 credits of mathematics  Math 12 Plane Trigonometry  Math 13 Analytical Geometry  Math 91 Calculus.
Major Academic Plan (MAP) Why study Applied Technology? This program is designed for students who have graduated with an associate degree in applied arts.
King William High School. Cyber Security Curriculum 4 year high school curriculum Up to 5 technology certifications upon successful completion of each.
COMPUTER SCIENCE Mercer University College of Liberal Arts
Major Academic Plan (MAP)
Major Academic Plan (MAP)
Major Academic Plan (MAP)
COMPUTER SCIENCE Mercer University College of Liberal Arts
College of Adult & Professional Studies Criminal Justice Program
Major Academic Plan (MAP)
COMPUTER SCIENCE Mercer University College of Liberal Arts
Major Academic Plan (MAP)
Major Academic Plan (MAP)
Major Academic Plan (MAP)
Virginia Union University
ACM/IEEE-CS Computer Science Curriculum
Major Academic Plan (MAP)
Eustis High School Course Progression and Sequencing
Major Academic Plan (MAP)
Engineering Skills.
Introduction to Information Assurance
COMPUTER SCIENCE Mercer University College of Liberal Arts
Undergraduate Degree Program
COMPUTER SCIENCE Mercer University College of Liberal Arts
CyberPaths Interdisciplinary Modules
Presentation transcript:

BS in Computer and Information Systems Security A 2+2 degree program between Peninsula College and Western Washington University David Bover Professor, Computer Science

BS in Computer and Information Systems Security Entry: completion of AAS-T in Cybersecurity & Computer Forensics at Peninsula College GPA >= 2.5

Courses at Peninsula College Core requirements (total 52 credit hours) –CSC 100 –CSIA 110, 185, 190, 195, 280, 285, 290 –IT 162 Support courses (total 35 credit hours) –ENGL& 101, 102 –MATH& 141, 142, 151 –PSYC& 100 –PHIL 130 –CJ& 101, 110

Security Professional Roles Computer network security administration –System administration with emphasis on security Secure software development –Works with software development teams, advising on security threats and risk mitigation Reactive forensics –Investigation and recovery from attack Proactive forensics –Analysis of malware

Body of Knowledge Security management Physical security Assets, access, integrity Legal and ethical Cryptography Security threats Defense tools and techniques Forensic analysis and recovery Software reverse engineering and dynamic analysis

Required CISS Courses CISS 247 “Computer Systems I” CISS 301 “Formal Languages” CISS 349 “Computer System Administration” CISS 360 “Operating System Concepts” CISS 461 “Computer Security” CISS 495 “Computer Security Project”

Required Support Courses ENG 302 “Technical Writing” MATH 125 “Calculus 2” MATH 341 “Probability and Statistics” PHYS 161 “Physics with Calculus I” PHYS 162 “Physics with Calculus II”

CISS Electives Select 4 from this list: CISS 346 “Secure Software Development” CISS 421 “Computer Forensics” CISS 422 “Dynamic Analysis of Software” CISS 423 “Software Reverse Engineering” CISS 464 “Penetration Testing” CISS 469 “Advanced Network System Security” CISS 478 “Cryptographic Techniques”

Recommended GUR Courses JOUR 190 “Introduction to Mass Media” JOUR 375 “Diversity, Mass Media and Social Change” MGMT 271 “Law and the Business Environment” PLSC 250 “The American Political System” PLSC 346 “The Politics of Inequality” Science GUR course Either: –LIBR 325 “Surveillance, Voyeurism and the Culture of Suspicion” –PHIL 360 “Society, Law and Morality”