Presentation is loading. Please wait.

Presentation is loading. Please wait.

 ACM/IEEE-CS Computer Science Curriculum www.cs2013.org Approximately every decade since “Curriculum ’68” ACM & IEEE-CS jointly publish curricular guidance.

Similar presentations


Presentation on theme: " ACM/IEEE-CS Computer Science Curriculum www.cs2013.org Approximately every decade since “Curriculum ’68” ACM & IEEE-CS jointly publish curricular guidance."— Presentation transcript:

1  ACM/IEEE-CS Computer Science Curriculum www.cs2013.org Approximately every decade since “Curriculum ’68” ACM & IEEE-CS jointly publish curricular guidance for computer science

2   18 Knowledge Areas  New KA Information Assurance and Security (IAS)  ~21 Core Tier-1 Learning Outcomes  ~25 Core Tier-2 Learning Outcomes  ~59 elective Learning Outcomes CS2013 Body of Knowledge

3  “In CS2013, the Information Assurance and Security (IAS) KA is added to the Body of Knowledge in recognition of the world’s reliance on information technology and its critical role in computer science education … Information assurance and security education includes all efforts to prepare a workforce with the needed knowledge, skills, and abilities to protect our information systems…“ IAS Knowledge Area

4  Total Core Hours IAS KA 9 17 Other KAs63.5 Total Security Hours in BoK 72.5 Security Core in BoK

5  Knowledge UnitCore Tier-1Core Tier-2Electives Included Foundational Concepts in Security1 Principles of Secure Design11 Defensive Programming11yes Threats and Attacks1 Network Security2yes Cryptography1 Web Securityyes Platform Securityyes Security Policy and Governanceyes Digital Forensicsyes Secure Software Engineeringyes IAS Knowledge Area

6  Knowledge Area/ Knowledge UnitCore Tier-1Core Tier-2Elective AR/Assembly Level Machine Organization 1 AR/Memory System Organization and Architecture 0.5 AR/Multiprocessing and Alternative Architectures yes HCI/Foundations 1 HCI/Human Factors and Security yes IM/Information Management Concepts 0.5 IM/Transaction Processing yes IM/Distributed Databases yes IS/Reasoning Under Uncertainty yes 17 Other KAs (Table p. 99 in CS2013 Final Report)

7  Knowledge Area/ Knowledge UnitCore Tier-1Core Tier-2Elective NC/Introduction 1 NC/Networked Applications 0.5 NC/Reliable Data Delivery 1.5 NC/Routing and Forwarding 1 NC/Local Area Networks 1 NC/Resource Allocation 0.5 NC/Mobility 1 OS/Overview of OS 2 OS/OS Principles 1 OS/Concurrency 1.5 OS/Scheduling and Dispatch 2 17 Other KAs cont’d

8  Knowledge Area/ Knowledge UnitCore Tier-1Core Tier-2Elective OS/Memory Management 2 OS/Security and Protection 2 OS/Virtual Machines yes OS/Device Management yes OS/File Systems yes OS/Real Time and Embedded Systems yes OS/Fault Tolerance yes OS/System Performance Evaluation yes PBD/Web Platforms yes PBD/Mobile Platforms yes PBD/Industrial Platforms yes 17 Other KAs cont’d

9  Knowledge Area/ Knowledge UnitCore Tier-1Core Tier-2Elective PD/Parallelism Fundamentals 1 PD/Parallel Decomposition 0.5 PD/Communication and Coordination 11yes PD/Parallel Architecture 1yes PD/Distributed Systems yes PD/Cloud Computing yes PL/Object-Oriented Programming 13 PL/Functional Programming 1 PL/Basic Type Systems 0.52 PL/Language Translation and Execution 1 PL/Runtime Systems yes 17 Other KAs cont’d

10  Knowledge Area/ Knowledge UnitCore Tier-1Core Tier-2Elective PL/Static Analysis yes PL/Concurrency and Parallelism yes PL/Type Systems yes SDF/Fundamental Programming Concepts 1 SDF/Development Methods 8 SE/Software Processes 1 SE/Software Project Management 1yes SE/Tools and Environments 1 SE/Software Construction 2 SE/Software Verification and Validation 1 SE/Software Evolution 1.5 SE/Software Reliability 1 17 Other KAs cont’d

11  Knowledge Area/ Knowledge UnitCore Tier-1Core Tier-2Elective SF/Cross-Layer Communications 3 SF/Parallelism 1 SF/Resource Allocation and Scheduling 0.5 SF/Virtualization and Isolation 1 SF/Reliability through Redundancy 2 SP/Social Context 0.5 SP/Analytical Tools 1 SP/Professional Ethics 10.5 SP/Intellectual Property 2yes SP/Privacy and Civil Liberties 0.5 SP/Security Policies, Laws and Computer Crimes yes 17 Other KAs cont’d

12   Table of information assurance and security distributed throughout Body of Knowledge  www.cs2013.org www.cs2013.org  Introductory Programming Course  Comprised of several Knowledge Areas  e.g., SDF + IAS + PL + Platform-based Development (web, game)  Focus of “Security Injections” is core Learning Outcomes for introductory programming courses  www.towson.edu/securityinjections www.towson.edu/securityinjections KA = Course

13  NSA/DHS CAE.* Designations National Centers of Academic Excellence (CAE) in Information Assurance & Cyber Defense www.nsa.gov/ia/academic_outreach/nat_cae/ www.nsa.gov/ia/academic_outreach/nat_cae/ Towson University Security Injections listed as resource


Download ppt " ACM/IEEE-CS Computer Science Curriculum www.cs2013.org Approximately every decade since “Curriculum ’68” ACM & IEEE-CS jointly publish curricular guidance."

Similar presentations


Ads by Google