SlideShare a Scribd company logo
1 of 1
Download to read offline
A10 EZ RE AN ADVERTISING SUPPLEMENT TO THE WASHINGTON POST TUESDAY, FEBRUARY 19, 2013
EARN YOUR MASTER OF SCIENCE IN HOMELAND SECURITY.
You’ve got the ideas. You’ve got the drive. We give you the insights and expertise to
take the next step in your career. Colorado Technical University is one of a handful of
universities in the U.S. that offer a Master of Science in Homeland Security degree, and our
distinguished faculty and challenging curriculum are designed to help you become a thought
leader and policy maker in the field. There’s only one question left to ask: ARE YOU IN?
Learn more at coloradotech.edu/HLS or call 1.855.388.8086
CTU cannot guarantee employment or salary. Not all programs are available to residents of all states. Find disclosures
on graduation rates, student financial obligations and more at www.coloradotech.edu/disclosures. 0413424 1/13
YOU’RE A STRATEGIC THINKER.
BECOME A STRATEGIC LEADER.
“My mom and the rest of my family doesn’t
really understand it,” she said of her passion for
codes. “My husband actually calls me a geek.”
Geek or not, Suggs, 37, has parlayed her
enthusiasm for encryption into a career in one
of the hottest fields going: homeland security.
She works for Cisco as a “national industrial
security specialist” for government clients
(don’t ask too much about what she does).
Suggs hopes one day to have a job with the
organization that bills itself as “the home of
America’s codemakers and codebreakers”: the
National Security Agency (NSA).
To help her develop the skills she needs to
achievehergoals,Suggsispursingbothamaster’s
and a doctorate in information assurance at
Capitol College in Laurel, Maryland. The degree
programs are offered entirely online, so you will
find Suggs at her computer on Wednesday and
Thursday evenings participating in classes such
as “Network Systems Security Concepts.” The
rest of the week, when she’s not working or
spending quality time with her husband and
two children, she does classwork.
“It’s a lot of work, but I am having fun,”
Suggs said.
The term “homeland security” was a new one
to most Americans in the aftermath of the attacks
of September 11, 2001. But it rapidly became
a catchall for a kaleidoscopic range of activities
undertaken in the public and private sectors alike
to protect the United States and its people and
communities from terrorism, natural disasters,
cyberattacks and other threats.
The new emphasis on homeland security
also gave rise to an entirely new category of
jobs. Today, the U.S. Department of Homeland
Security alone employs more than 200,000
people, making it the third largest federal
government agency after the Departments of
Defense and Veterans Affairs. And “homeland
security jobs” aren’t limited to DHS or even
to the federal government. From local law
enforcement to electric utilities to major
financial institutions, countless employers need
workers with a solid understanding of the
homeland security landscape, along with key
security-related skills.
Enter graduate schools like Capitol College
and Colorado Technical University. Capitol,
according to faculty member Jason Pittman,
has seen steady increases in applications and
enrollments in its undergraduate, master’s
and doctoral degree programs in information
assurance in recent years. The MS in Information
Assurance, he noted, is especially popular among
students working in database administration,
networking and related fields who want to shift
to jobs protecting and defending information
technology systems from cyberthreats.
“Cyberattacks are in the news every single
day, and people are seeing how these skills are
in demand so they’re looking for a chance to
be part of a growing field,” said Pittman.
Colorado Technical University (CTU),
for its part, recently joined a handful of
educational institutions offering a dedicated
MS in Homeland Security. Students in the CTU
program take core courses such as “Dynamics
of Terrorism,” “Intelligence Organizational and
Policy Challenges” and “Homeland Security
and Government.” In addition to the core
content, students choose one of two tracks:
Emergency Management and Public Health;
or Cybersecurity Policy. All classes are offered
entirely online via CTU’s virtual campus.
Nadav Morag is CTU’s Dean of Security
Studies. His curriculum vitae includes a job in
the early 2000s as senior director for foreign
policy with Israel’s National Security Council.
In that position, Morag worked with 10 other
senior government officials to develop policy
recommendations for the Israeli prime minister
on matters of national security, including
counterterrorism policy.
In developing the new degree program,
Morag said he and his colleagues at CTU aimed
to target mid-career professionals in fields from
law enforcement to emergency management
who need to “think more strategically” about
homeland security topics.
“These people tend to be really good at
what they do and they have risen through the
ranks and taken on more responsibility as their
careers continued,” Morag said. “But now
they want an understanding of the broader
homeland security picture, how their work fits
into it, and what they can do in their jobs and
careers to help their organizations be smarter
and more strategic about security.”
Students go through the MS program at
CTU as a cohort; the first group started early
in 2013. In addition to their coursework and
ongoing interactions with faculty and fellow
students, students have to write a thesis
identifying homeland security solutions for the
agencies where they work.
“The one big misconception about
homeland security is that it begins and ends
with DHS,” Morag said, referring to the U.S.
Department of Homeland Security. The truth,
he said, is that a homeland security degree can
benefit people in any number of professions
and jobs — including law enforcement officials
at all levels, FEMA personnel, local emergency
managers, fire and emergency medical services
workers and more. ■
FEBRUARY 19, 2013
“[Students] want an understanding of the
broader homeland security picture, how their
work fits into it, and what they can do in their
jobs and careers to help their organizations be
smarter and more strategic about security.”
– Nadav Morag, Dean of Security Studies,
Colorado Technical University
PROGRAMS
PREPARE STUDENTS
TO PROTECT USA FROM
CYBERATTACKS, OTHER THREATS
She loves the challenge of devising and cracking codes. “I just think it is so
interesting to look at something that is encrypted and to know there is a
hidden message behind it,” she said. Suggs’s bedside reading: “The Code
Book: The Science of Secrecy from Ancient Egypt to Quantum Cryptography.”
Chanel Suggs is a self-described
“encryption nut.”
HOMELANDSECURITYDEGREES
Homeland Security
Workers in Demand
• In areas from critical infrastructure
protection to customs and border security
to emergency response, homeland security
is an enormous and growing field. The
Department of Homeland Security alone
employs more than 200,000 workers.
• Demand for “information security analysts”
is expected to be high in the coming years
as government and businesses strive
to protect their information technology
systems and detect and thwart cyberattacks.
• A basic understanding of cyberthreats and
information security is growing increasingly
important in management and IT positions
in health care, finance and other industries.
More Information
For more information about the graduate
programs explored in this article, please go to
the following links:
Colorado Technical University
coloradotech.edu
Capitol College
capitol-college.edu
ABOUT THIS SECTION:
This special advertising section was prepared by independent writer and
editor William H.Woodwell, Jr. (whwoodwell.com).The production of this
section did not involve the news or editorial staff of The Washington Post.
MY DREAM: Protecting Cyber Assets
MY SCHOOL: Capitol College
Capitol College isn’t for everyone.
But it’s perfect for me.
It’s a dangerous world—especially for our information
assets and infrastructure. But it’s also dicey for cyber
terrorists who have Capitol College information assurance
graduates tracking them down. Capitol’s MS and certificate
programs in IA provide in-depth knowledge on overcoming
malicious intrusions and threats to government and private
sector environments. And courses are conducted online so
busy professionals like me can improve their expertise and
skills while balancing work and family. It’s clear Capitol
College provides me with the best way to secure information
assets as well as a better career.
To learn more about our DSc, MS, BS and certificate programs
in information assurance, visit capitol-college.edu/wpe
Capitol College is recognized as a
National Center of Academic Excellence
in Information Assurance Education
by the NSA and DHS.
A Leader in Cybersecurity
Education Since 2001
ENGINEERING • COMPUTER SCIENCE • INFORMATION TECHNOLOGY • BUSINESS • 800-950-1992

More Related Content

What's hot

A LITERATURE SURVEY AND ANALYSIS ON SOCIAL ENGINEERING DEFENSE MECHANISMS AND...
A LITERATURE SURVEY AND ANALYSIS ON SOCIAL ENGINEERING DEFENSE MECHANISMS AND...A LITERATURE SURVEY AND ANALYSIS ON SOCIAL ENGINEERING DEFENSE MECHANISMS AND...
A LITERATURE SURVEY AND ANALYSIS ON SOCIAL ENGINEERING DEFENSE MECHANISMS AND...IJNSA Journal
 
The Malicious Use of Artificial Intelligence: Forecasting, Prevention, and...
The Malicious Use   of Artificial Intelligence: Forecasting, Prevention,  and...The Malicious Use   of Artificial Intelligence: Forecasting, Prevention,  and...
The Malicious Use of Artificial Intelligence: Forecasting, Prevention, and...Willy Marroquin (WillyDevNET)
 
2904 supply chain_cyber_security
2904 supply chain_cyber_security2904 supply chain_cyber_security
2904 supply chain_cyber_securityRezgar Mohammad
 
Deepening the knowledge on information security management in developing coun...
Deepening the knowledge on information security management in developing coun...Deepening the knowledge on information security management in developing coun...
Deepening the knowledge on information security management in developing coun...Alexander Decker
 
Cybersecurity Business Risk, Literature Review
Cybersecurity Business Risk, Literature ReviewCybersecurity Business Risk, Literature Review
Cybersecurity Business Risk, Literature ReviewEnow Eyong
 
Racsko Réka-Kis-Tóth Lajos: iPad in public education: introduction to the pr...
Racsko Réka-Kis-Tóth Lajos: iPad in public education:  introduction to the pr...Racsko Réka-Kis-Tóth Lajos: iPad in public education:  introduction to the pr...
Racsko Réka-Kis-Tóth Lajos: iPad in public education: introduction to the pr...Reka Racsko
 

What's hot (6)

A LITERATURE SURVEY AND ANALYSIS ON SOCIAL ENGINEERING DEFENSE MECHANISMS AND...
A LITERATURE SURVEY AND ANALYSIS ON SOCIAL ENGINEERING DEFENSE MECHANISMS AND...A LITERATURE SURVEY AND ANALYSIS ON SOCIAL ENGINEERING DEFENSE MECHANISMS AND...
A LITERATURE SURVEY AND ANALYSIS ON SOCIAL ENGINEERING DEFENSE MECHANISMS AND...
 
The Malicious Use of Artificial Intelligence: Forecasting, Prevention, and...
The Malicious Use   of Artificial Intelligence: Forecasting, Prevention,  and...The Malicious Use   of Artificial Intelligence: Forecasting, Prevention,  and...
The Malicious Use of Artificial Intelligence: Forecasting, Prevention, and...
 
2904 supply chain_cyber_security
2904 supply chain_cyber_security2904 supply chain_cyber_security
2904 supply chain_cyber_security
 
Deepening the knowledge on information security management in developing coun...
Deepening the knowledge on information security management in developing coun...Deepening the knowledge on information security management in developing coun...
Deepening the knowledge on information security management in developing coun...
 
Cybersecurity Business Risk, Literature Review
Cybersecurity Business Risk, Literature ReviewCybersecurity Business Risk, Literature Review
Cybersecurity Business Risk, Literature Review
 
Racsko Réka-Kis-Tóth Lajos: iPad in public education: introduction to the pr...
Racsko Réka-Kis-Tóth Lajos: iPad in public education:  introduction to the pr...Racsko Réka-Kis-Tóth Lajos: iPad in public education:  introduction to the pr...
Racsko Réka-Kis-Tóth Lajos: iPad in public education: introduction to the pr...
 

Viewers also liked

Innovattive lesson plan
Innovattive lesson plan Innovattive lesson plan
Innovattive lesson plan aryasanal
 
Sonax direct marketing
Sonax direct marketingSonax direct marketing
Sonax direct marketingAdpr Son
 
Science fair and exhibitions
Science fair and exhibitionsScience fair and exhibitions
Science fair and exhibitionsarunrsr6
 
김연준과 최윤정
김연준과 최윤정김연준과 최윤정
김연준과 최윤정윤정 최
 

Viewers also liked (7)

protea ILMAC 07 -cam
protea ILMAC 07 -camprotea ILMAC 07 -cam
protea ILMAC 07 -cam
 
soberania alimenataria
soberania alimenatariasoberania alimenataria
soberania alimenataria
 
Ict
IctIct
Ict
 
Innovattive lesson plan
Innovattive lesson plan Innovattive lesson plan
Innovattive lesson plan
 
Sonax direct marketing
Sonax direct marketingSonax direct marketing
Sonax direct marketing
 
Science fair and exhibitions
Science fair and exhibitionsScience fair and exhibitions
Science fair and exhibitions
 
김연준과 최윤정
김연준과 최윤정김연준과 최윤정
김연준과 최윤정
 

Similar to MS in Homeland Security Degrees Prepare Students to Protect USA

Key findings from information security survey at higher education institution...
Key findings from information security survey at higher education institution...Key findings from information security survey at higher education institution...
Key findings from information security survey at higher education institution...MajedahAlkharji
 
cyber security certifications in Malaysia..pdf
cyber security certifications in Malaysia..pdfcyber security certifications in Malaysia..pdf
cyber security certifications in Malaysia..pdfCareerera
 
Hello dr. aguiar and classmates,for this week’s forum we were as
Hello dr. aguiar and classmates,for this week’s forum we were asHello dr. aguiar and classmates,for this week’s forum we were as
Hello dr. aguiar and classmates,for this week’s forum we were assimba35
 
Gsn 2014 digital yearbook of homeland security awards
Gsn 2014 digital yearbook of homeland security awardsGsn 2014 digital yearbook of homeland security awards
Gsn 2014 digital yearbook of homeland security awardsChuck Brooks
 
WiCyS Career Fair Handbook
WiCyS Career Fair HandbookWiCyS Career Fair Handbook
WiCyS Career Fair HandbookClearedJobs.Net
 
Enhanced Cryptographic Solution for Security Issues Faced by Saudi Arabian un...
Enhanced Cryptographic Solution for Security Issues Faced by Saudi Arabian un...Enhanced Cryptographic Solution for Security Issues Faced by Saudi Arabian un...
Enhanced Cryptographic Solution for Security Issues Faced by Saudi Arabian un...MajedahAlkharji
 
Institutional Cybersecurity from Military Perspective
Institutional Cybersecurity from Military PerspectiveInstitutional Cybersecurity from Military Perspective
Institutional Cybersecurity from Military PerspectiveGovernment
 
Safeguarding K-12 Organizations from Cybersecurity Threats WPGC.pdf
Safeguarding K-12 Organizations from Cybersecurity Threats  WPGC.pdfSafeguarding K-12 Organizations from Cybersecurity Threats  WPGC.pdf
Safeguarding K-12 Organizations from Cybersecurity Threats WPGC.pdfmeetsolanki44
 
Policy Guide for Legislators
Policy Guide for LegislatorsPolicy Guide for Legislators
Policy Guide for LegislatorsKristin Judge
 
F e B r U A r y 2 0 1 0 v O l . 5 3 n O . 2 .docx
F e B r U A r y  2 0 1 0      v O l .  5 3      n O .  2   .docxF e B r U A r y  2 0 1 0      v O l .  5 3      n O .  2   .docx
F e B r U A r y 2 0 1 0 v O l . 5 3 n O . 2 .docxssuser454af01
 
F e B r U A r y 2 0 1 0 v O l . 5 3 n O . 2 .docx
F e B r U A r y  2 0 1 0      v O l .  5 3      n O .  2   .docxF e B r U A r y  2 0 1 0      v O l .  5 3      n O .  2   .docx
F e B r U A r y 2 0 1 0 v O l . 5 3 n O . 2 .docxmecklenburgstrelitzh
 
Marriage of Cyber Security with Emergency Management -- NEMA
Marriage of Cyber Security with Emergency Management  --  NEMAMarriage of Cyber Security with Emergency Management  --  NEMA
Marriage of Cyber Security with Emergency Management -- NEMADavid Sweigert
 
Discussion Questions The difficulty in predicting the future is .docx
Discussion Questions The difficulty in predicting the future is .docxDiscussion Questions The difficulty in predicting the future is .docx
Discussion Questions The difficulty in predicting the future is .docxduketjoy27252
 
Alloy Cybersecurity Intro
Alloy Cybersecurity IntroAlloy Cybersecurity Intro
Alloy Cybersecurity IntroMark Stockman
 
Cyberwarfare focusing on higher education as a prime target
Cyberwarfare focusing on higher education as a prime targetCyberwarfare focusing on higher education as a prime target
Cyberwarfare focusing on higher education as a prime targetNicholas Davis
 
2015_ICMSS_Institutional_Cybersecurity_s02
2015_ICMSS_Institutional_Cybersecurity_s022015_ICMSS_Institutional_Cybersecurity_s02
2015_ICMSS_Institutional_Cybersecurity_s02Government
 
Women in security_ Is the tide turning_ - Print Article - SC Magazine UK
Women in security_ Is the tide turning_ - Print Article - SC Magazine UKWomen in security_ Is the tide turning_ - Print Article - SC Magazine UK
Women in security_ Is the tide turning_ - Print Article - SC Magazine UKCaroline Rivett
 
WHAT ARE THE METHODS THAT CAN BE EMPLOYED TO REDUCE THE TH.docx
WHAT ARE THE METHODS THAT CAN BE EMPLOYED TO REDUCE THE TH.docxWHAT ARE THE METHODS THAT CAN BE EMPLOYED TO REDUCE THE TH.docx
WHAT ARE THE METHODS THAT CAN BE EMPLOYED TO REDUCE THE TH.docxphilipnelson29183
 

Similar to MS in Homeland Security Degrees Prepare Students to Protect USA (20)

Key findings from information security survey at higher education institution...
Key findings from information security survey at higher education institution...Key findings from information security survey at higher education institution...
Key findings from information security survey at higher education institution...
 
Trends_in_my_profession(revised)
Trends_in_my_profession(revised)Trends_in_my_profession(revised)
Trends_in_my_profession(revised)
 
cyber security certifications in Malaysia..pdf
cyber security certifications in Malaysia..pdfcyber security certifications in Malaysia..pdf
cyber security certifications in Malaysia..pdf
 
Hello dr. aguiar and classmates,for this week’s forum we were as
Hello dr. aguiar and classmates,for this week’s forum we were asHello dr. aguiar and classmates,for this week’s forum we were as
Hello dr. aguiar and classmates,for this week’s forum we were as
 
Gsn 2014 digital yearbook of homeland security awards
Gsn 2014 digital yearbook of homeland security awardsGsn 2014 digital yearbook of homeland security awards
Gsn 2014 digital yearbook of homeland security awards
 
WiCyS Career Fair Handbook
WiCyS Career Fair HandbookWiCyS Career Fair Handbook
WiCyS Career Fair Handbook
 
Enhanced Cryptographic Solution for Security Issues Faced by Saudi Arabian un...
Enhanced Cryptographic Solution for Security Issues Faced by Saudi Arabian un...Enhanced Cryptographic Solution for Security Issues Faced by Saudi Arabian un...
Enhanced Cryptographic Solution for Security Issues Faced by Saudi Arabian un...
 
Institutional Cybersecurity from Military Perspective
Institutional Cybersecurity from Military PerspectiveInstitutional Cybersecurity from Military Perspective
Institutional Cybersecurity from Military Perspective
 
Safeguarding K-12 Organizations from Cybersecurity Threats WPGC.pdf
Safeguarding K-12 Organizations from Cybersecurity Threats  WPGC.pdfSafeguarding K-12 Organizations from Cybersecurity Threats  WPGC.pdf
Safeguarding K-12 Organizations from Cybersecurity Threats WPGC.pdf
 
Policy Guide for Legislators
Policy Guide for LegislatorsPolicy Guide for Legislators
Policy Guide for Legislators
 
F e B r U A r y 2 0 1 0 v O l . 5 3 n O . 2 .docx
F e B r U A r y  2 0 1 0      v O l .  5 3      n O .  2   .docxF e B r U A r y  2 0 1 0      v O l .  5 3      n O .  2   .docx
F e B r U A r y 2 0 1 0 v O l . 5 3 n O . 2 .docx
 
F e B r U A r y 2 0 1 0 v O l . 5 3 n O . 2 .docx
F e B r U A r y  2 0 1 0      v O l .  5 3      n O .  2   .docxF e B r U A r y  2 0 1 0      v O l .  5 3      n O .  2   .docx
F e B r U A r y 2 0 1 0 v O l . 5 3 n O . 2 .docx
 
Marriage of Cyber Security with Emergency Management -- NEMA
Marriage of Cyber Security with Emergency Management  --  NEMAMarriage of Cyber Security with Emergency Management  --  NEMA
Marriage of Cyber Security with Emergency Management -- NEMA
 
Discussion Questions The difficulty in predicting the future is .docx
Discussion Questions The difficulty in predicting the future is .docxDiscussion Questions The difficulty in predicting the future is .docx
Discussion Questions The difficulty in predicting the future is .docx
 
Alloy Cybersecurity Intro
Alloy Cybersecurity IntroAlloy Cybersecurity Intro
Alloy Cybersecurity Intro
 
Cyberwarfare focusing on higher education as a prime target
Cyberwarfare focusing on higher education as a prime targetCyberwarfare focusing on higher education as a prime target
Cyberwarfare focusing on higher education as a prime target
 
2015_ICMSS_Institutional_Cybersecurity_s02
2015_ICMSS_Institutional_Cybersecurity_s022015_ICMSS_Institutional_Cybersecurity_s02
2015_ICMSS_Institutional_Cybersecurity_s02
 
Women in security_ Is the tide turning_ - Print Article - SC Magazine UK
Women in security_ Is the tide turning_ - Print Article - SC Magazine UKWomen in security_ Is the tide turning_ - Print Article - SC Magazine UK
Women in security_ Is the tide turning_ - Print Article - SC Magazine UK
 
WHAT ARE THE METHODS THAT CAN BE EMPLOYED TO REDUCE THE TH.docx
WHAT ARE THE METHODS THAT CAN BE EMPLOYED TO REDUCE THE TH.docxWHAT ARE THE METHODS THAT CAN BE EMPLOYED TO REDUCE THE TH.docx
WHAT ARE THE METHODS THAT CAN BE EMPLOYED TO REDUCE THE TH.docx
 
CYBER ARTICLE ON LMCO
CYBER ARTICLE ON LMCOCYBER ARTICLE ON LMCO
CYBER ARTICLE ON LMCO
 

MS in Homeland Security Degrees Prepare Students to Protect USA

  • 1. A10 EZ RE AN ADVERTISING SUPPLEMENT TO THE WASHINGTON POST TUESDAY, FEBRUARY 19, 2013 EARN YOUR MASTER OF SCIENCE IN HOMELAND SECURITY. You’ve got the ideas. You’ve got the drive. We give you the insights and expertise to take the next step in your career. Colorado Technical University is one of a handful of universities in the U.S. that offer a Master of Science in Homeland Security degree, and our distinguished faculty and challenging curriculum are designed to help you become a thought leader and policy maker in the field. There’s only one question left to ask: ARE YOU IN? Learn more at coloradotech.edu/HLS or call 1.855.388.8086 CTU cannot guarantee employment or salary. Not all programs are available to residents of all states. Find disclosures on graduation rates, student financial obligations and more at www.coloradotech.edu/disclosures. 0413424 1/13 YOU’RE A STRATEGIC THINKER. BECOME A STRATEGIC LEADER. “My mom and the rest of my family doesn’t really understand it,” she said of her passion for codes. “My husband actually calls me a geek.” Geek or not, Suggs, 37, has parlayed her enthusiasm for encryption into a career in one of the hottest fields going: homeland security. She works for Cisco as a “national industrial security specialist” for government clients (don’t ask too much about what she does). Suggs hopes one day to have a job with the organization that bills itself as “the home of America’s codemakers and codebreakers”: the National Security Agency (NSA). To help her develop the skills she needs to achievehergoals,Suggsispursingbothamaster’s and a doctorate in information assurance at Capitol College in Laurel, Maryland. The degree programs are offered entirely online, so you will find Suggs at her computer on Wednesday and Thursday evenings participating in classes such as “Network Systems Security Concepts.” The rest of the week, when she’s not working or spending quality time with her husband and two children, she does classwork. “It’s a lot of work, but I am having fun,” Suggs said. The term “homeland security” was a new one to most Americans in the aftermath of the attacks of September 11, 2001. But it rapidly became a catchall for a kaleidoscopic range of activities undertaken in the public and private sectors alike to protect the United States and its people and communities from terrorism, natural disasters, cyberattacks and other threats. The new emphasis on homeland security also gave rise to an entirely new category of jobs. Today, the U.S. Department of Homeland Security alone employs more than 200,000 people, making it the third largest federal government agency after the Departments of Defense and Veterans Affairs. And “homeland security jobs” aren’t limited to DHS or even to the federal government. From local law enforcement to electric utilities to major financial institutions, countless employers need workers with a solid understanding of the homeland security landscape, along with key security-related skills. Enter graduate schools like Capitol College and Colorado Technical University. Capitol, according to faculty member Jason Pittman, has seen steady increases in applications and enrollments in its undergraduate, master’s and doctoral degree programs in information assurance in recent years. The MS in Information Assurance, he noted, is especially popular among students working in database administration, networking and related fields who want to shift to jobs protecting and defending information technology systems from cyberthreats. “Cyberattacks are in the news every single day, and people are seeing how these skills are in demand so they’re looking for a chance to be part of a growing field,” said Pittman. Colorado Technical University (CTU), for its part, recently joined a handful of educational institutions offering a dedicated MS in Homeland Security. Students in the CTU program take core courses such as “Dynamics of Terrorism,” “Intelligence Organizational and Policy Challenges” and “Homeland Security and Government.” In addition to the core content, students choose one of two tracks: Emergency Management and Public Health; or Cybersecurity Policy. All classes are offered entirely online via CTU’s virtual campus. Nadav Morag is CTU’s Dean of Security Studies. His curriculum vitae includes a job in the early 2000s as senior director for foreign policy with Israel’s National Security Council. In that position, Morag worked with 10 other senior government officials to develop policy recommendations for the Israeli prime minister on matters of national security, including counterterrorism policy. In developing the new degree program, Morag said he and his colleagues at CTU aimed to target mid-career professionals in fields from law enforcement to emergency management who need to “think more strategically” about homeland security topics. “These people tend to be really good at what they do and they have risen through the ranks and taken on more responsibility as their careers continued,” Morag said. “But now they want an understanding of the broader homeland security picture, how their work fits into it, and what they can do in their jobs and careers to help their organizations be smarter and more strategic about security.” Students go through the MS program at CTU as a cohort; the first group started early in 2013. In addition to their coursework and ongoing interactions with faculty and fellow students, students have to write a thesis identifying homeland security solutions for the agencies where they work. “The one big misconception about homeland security is that it begins and ends with DHS,” Morag said, referring to the U.S. Department of Homeland Security. The truth, he said, is that a homeland security degree can benefit people in any number of professions and jobs — including law enforcement officials at all levels, FEMA personnel, local emergency managers, fire and emergency medical services workers and more. ■ FEBRUARY 19, 2013 “[Students] want an understanding of the broader homeland security picture, how their work fits into it, and what they can do in their jobs and careers to help their organizations be smarter and more strategic about security.” – Nadav Morag, Dean of Security Studies, Colorado Technical University PROGRAMS PREPARE STUDENTS TO PROTECT USA FROM CYBERATTACKS, OTHER THREATS She loves the challenge of devising and cracking codes. “I just think it is so interesting to look at something that is encrypted and to know there is a hidden message behind it,” she said. Suggs’s bedside reading: “The Code Book: The Science of Secrecy from Ancient Egypt to Quantum Cryptography.” Chanel Suggs is a self-described “encryption nut.” HOMELANDSECURITYDEGREES Homeland Security Workers in Demand • In areas from critical infrastructure protection to customs and border security to emergency response, homeland security is an enormous and growing field. The Department of Homeland Security alone employs more than 200,000 workers. • Demand for “information security analysts” is expected to be high in the coming years as government and businesses strive to protect their information technology systems and detect and thwart cyberattacks. • A basic understanding of cyberthreats and information security is growing increasingly important in management and IT positions in health care, finance and other industries. More Information For more information about the graduate programs explored in this article, please go to the following links: Colorado Technical University coloradotech.edu Capitol College capitol-college.edu ABOUT THIS SECTION: This special advertising section was prepared by independent writer and editor William H.Woodwell, Jr. (whwoodwell.com).The production of this section did not involve the news or editorial staff of The Washington Post. MY DREAM: Protecting Cyber Assets MY SCHOOL: Capitol College Capitol College isn’t for everyone. But it’s perfect for me. It’s a dangerous world—especially for our information assets and infrastructure. But it’s also dicey for cyber terrorists who have Capitol College information assurance graduates tracking them down. Capitol’s MS and certificate programs in IA provide in-depth knowledge on overcoming malicious intrusions and threats to government and private sector environments. And courses are conducted online so busy professionals like me can improve their expertise and skills while balancing work and family. It’s clear Capitol College provides me with the best way to secure information assets as well as a better career. To learn more about our DSc, MS, BS and certificate programs in information assurance, visit capitol-college.edu/wpe Capitol College is recognized as a National Center of Academic Excellence in Information Assurance Education by the NSA and DHS. A Leader in Cybersecurity Education Since 2001 ENGINEERING • COMPUTER SCIENCE • INFORMATION TECHNOLOGY • BUSINESS • 800-950-1992