Presentation is loading. Please wait.

Presentation is loading. Please wait.

Today we will learn to: Describe emerging and advanced information technologies. Identify the basic concepts, threats, and best practices associated with.

Similar presentations


Presentation on theme: "Today we will learn to: Describe emerging and advanced information technologies. Identify the basic concepts, threats, and best practices associated with."— Presentation transcript:

1 Today we will learn to: Describe emerging and advanced information technologies. Identify the basic concepts, threats, and best practices associated with cybersecurity in the DoD. Given acquisition scenarios with several software-reliant program issues, analyze how each issue may affect achieving the program's software quality objectives; Identify quality issues unique to software Compare and contrast the major DoD software development paradigms and recognize new development paradigms and trends Track how the DoD information technology systems engineering process supports DoD Acquisition Management processes Describe the keys to successful software sustainment and support. Recognize the benefits of consuming cloud services; Recognize public, private, community and hybrid cloud deployment models (NIST); Recognize some DoD Concerns of Using Cloud Services SLIDE INFORMATION*************************************************************************************************************************** *Slide Type: Exercise (Content or Exercise) *Supporting ELOs ID: ELO Describe emerging and advanced information technologies ELO ID: ELO Describe emerging and advanced information technologies. ELO Identify the basic concepts, threats, and best practices associated with cybersecurity in the DoD. ELO Given acquisition scenarios with several software-reliant program issues, analyze how each issue may affect achieving the program's software quality objectives ELO Identify quality issues unique to software ELO Recognize the benefits of consuming cloud services. ELO Recognize public, private, community and hybrid cloud deployment models (NIST). ELO Recognize some DoD Concerns of Using Cloud Services ELO Compare and contrast the major DoD software development paradigms and recognize new development paradigms and trends. ELO Track how the DoD information technology systems engineering process supports DoD Acquisition Management processes ELO Describe the keys to successful software sustainment and support. *Policy / Directive / Standard / DTM ID: ********************************************************************************************************************************************************** Key Points: Key Questions to Ask and Anticipated Answers: Terms \ Definitions \ Acronyms: Student Panels IRM 202 Financial Management October 2009

2 DISCUSSION PANEL SCORE SHEET
Coverage of Subject Matter and Team Knowledge of Subject Matter (40 Points) - See Overall Rubric (Tab 1) Cyber Score Cloud SW Dev / Quality SW / SYS ENG Emerging Tech SW Support Team Members KNOWLEDGE ELO: Identify the basic concepts, threats, and best practices associated with cybersecurity in the DoD. Exceeds information in the course material for the ELO (36-40) Primarily covers course material for the ELO with little elaboration (25-35) Does not even cover the content commensurate to what was presented in the course pertaining to the ELO and/or basic concepts. (10-24) INSIGHT Adds significant insight and answers questions intelligibly (36-40)or moderate additional insight and /or minor difficulty with questions (25-35) or No additional insight and has major difficulty answering questions (10-24) PRESENTATION presents the material in a professional and innovative way, leverages technology, and is "fun" (36-40) or Professional, stimulates discussion, leverages technology, and is informative (25-35) or Standard presentation that does not stimulate discussion (10-24) Total Average and Team Score


Download ppt "Today we will learn to: Describe emerging and advanced information technologies. Identify the basic concepts, threats, and best practices associated with."

Similar presentations


Ads by Google