SlideShare a Scribd company logo
1 of 1
Download to read offline
What is
the Gibbs
BSIT Program With a
Security focus
{
Network
Track
Security
Track
Information
Technology
Track
General
Studies
Track
Liberal Arts
Course Work
Systems
Configuration
and
Problem
Solving
Software
and
Hardware
Security
Configurations
Computer
Usage
Concepts
Advanced Course Work (Senior Level)
Capstone/Intership course work
Graduation/Career Utilization
Introductory Course Work (Foundation)
ecrem
m
oc-E
row kteN
Inter
net
Web
Deploy
Ma
s
n
s
a
e
lg ee riW
Co eun rigf
uc rie tyS
Sy
e
t
i
c
r
u
u
r
c
it
e
y
S
S
y
e
ti
c
r
u
u
r
c
i
t
e
y S
S ye tc iru
How does system security integrate
into the Gibbs BSIT
escu arit hy ti
f
w
oc
e
u
e
s
rge
G
D
ib
T
b
I
s SBCo el egl
eThï Ak tc taat ct kA ïe Th hT eï
A
k
t
c
ta
at
c
t
k
A
ï
e
T
h
h
T
e
ï
A
k
t
c
ta
at
c
t
k
A
ï
e
T
h
h
T
e
ï
A
k
t
c
t
a
a
t ct kA ehT ï ïk Tc ha ettA
Why the Gibbs BSIT Degree with
a focus on system
security is so
important
Virus Fire
Walls
Cleaning
Anti
Virus
Hackers
Stealing
Unauthorized
Add in’s
Planned
Operations
Non-secure
File Transfers
Logic
Bombs
Locks &
Passwords
Covert Outside
Activity
PGP
IDS
Server
Up-grades
Denial of
Service
Malicious
Code ïes Thne efe DeD
f
e
en
hT
se
ï
ï
es
Th
ne
e
f
D
eD
ef
e
e
h
n
T
s
ï
ee ïsne Tf he eD

More Related Content

Viewers also liked

BannersBroker
BannersBrokerBannersBroker
BannersBrokerkhaikeo
 
ecolab eco97fin
ecolab  eco97finecolab  eco97fin
ecolab eco97finfinance37
 
인정사정볼것없다
인정사정볼것없다인정사정볼것없다
인정사정볼것없다parkkyung
 
A Discourse on e-Discovery - MCS Management Services
A Discourse on e-Discovery - MCS Management ServicesA Discourse on e-Discovery - MCS Management Services
A Discourse on e-Discovery - MCS Management ServicesMCS Management Services
 
In Search of Simplicity: Redesigning the Digital Bleek and Lloyd
In Search of Simplicity: Redesigning the Digital Bleek and LloydIn Search of Simplicity: Redesigning the Digital Bleek and Lloyd
In Search of Simplicity: Redesigning the Digital Bleek and LloydLighton Phiri
 
Bri’ann merit
Bri’ann meritBri’ann merit
Bri’ann meritdawsonela
 
2002 통일백서
2002 통일백서2002 통일백서
2002 통일백서unikorea
 
SaaS case Study Mortgage Industry
SaaS case Study Mortgage IndustrySaaS case Study Mortgage Industry
SaaS case Study Mortgage IndustryEkartha Inc
 
Cold war in the 60's
Cold war in the 60'sCold war in the 60's
Cold war in the 60'sBlixkrieg
 
[TEDxHUFS] 한글과 다시 소통하다 강병인
[TEDxHUFS]  한글과 다시 소통하다   강병인[TEDxHUFS]  한글과 다시 소통하다   강병인
[TEDxHUFS] 한글과 다시 소통하다 강병인Jinho Jung
 
Project: Improving Reputation of The Favelas. Brazil
Project: Improving Reputation of The Favelas. BrazilProject: Improving Reputation of The Favelas. Brazil
Project: Improving Reputation of The Favelas. BrazilCachi Chien
 

Viewers also liked (18)

BannersBroker
BannersBrokerBannersBroker
BannersBroker
 
ecolab eco97fin
ecolab  eco97finecolab  eco97fin
ecolab eco97fin
 
5강
5강5강
5강
 
Rails + mongo db
Rails + mongo dbRails + mongo db
Rails + mongo db
 
Colours
ColoursColours
Colours
 
Unit 1 2.0
Unit 1 2.0Unit 1 2.0
Unit 1 2.0
 
인정사정볼것없다
인정사정볼것없다인정사정볼것없다
인정사정볼것없다
 
A Discourse on e-Discovery - MCS Management Services
A Discourse on e-Discovery - MCS Management ServicesA Discourse on e-Discovery - MCS Management Services
A Discourse on e-Discovery - MCS Management Services
 
My ITDi Summer MOOC preso
My ITDi Summer MOOC presoMy ITDi Summer MOOC preso
My ITDi Summer MOOC preso
 
In Search of Simplicity: Redesigning the Digital Bleek and Lloyd
In Search of Simplicity: Redesigning the Digital Bleek and LloydIn Search of Simplicity: Redesigning the Digital Bleek and Lloyd
In Search of Simplicity: Redesigning the Digital Bleek and Lloyd
 
I got the news
I got the newsI got the news
I got the news
 
Bri’ann merit
Bri’ann meritBri’ann merit
Bri’ann merit
 
2002 통일백서
2002 통일백서2002 통일백서
2002 통일백서
 
SaaS case Study Mortgage Industry
SaaS case Study Mortgage IndustrySaaS case Study Mortgage Industry
SaaS case Study Mortgage Industry
 
Cold war in the 60's
Cold war in the 60'sCold war in the 60's
Cold war in the 60's
 
La manta de dayana
La manta de dayanaLa manta de dayana
La manta de dayana
 
[TEDxHUFS] 한글과 다시 소통하다 강병인
[TEDxHUFS]  한글과 다시 소통하다   강병인[TEDxHUFS]  한글과 다시 소통하다   강병인
[TEDxHUFS] 한글과 다시 소통하다 강병인
 
Project: Improving Reputation of The Favelas. Brazil
Project: Improving Reputation of The Favelas. BrazilProject: Improving Reputation of The Favelas. Brazil
Project: Improving Reputation of The Favelas. Brazil
 

Similar to Gibbs BSIT Program Security Focus

GSU IT Program Fact Sheet
GSU IT Program Fact SheetGSU IT Program Fact Sheet
GSU IT Program Fact SheetWilliam Roman
 
120321 IAPS Some things Prep Heads need to know about ICT
120321 IAPS Some things Prep Heads need to know about ICT120321 IAPS Some things Prep Heads need to know about ICT
120321 IAPS Some things Prep Heads need to know about ICTMark S. Steed
 
Securing the ‘Wild Wild West’: USM for Universities
Securing the ‘Wild Wild West’: USM for UniversitiesSecuring the ‘Wild Wild West’: USM for Universities
Securing the ‘Wild Wild West’: USM for UniversitiesAlienVault
 
Cybersecurity and Privacy in ESG Digital Transformation
Cybersecurity and Privacy in ESG Digital TransformationCybersecurity and Privacy in ESG Digital Transformation
Cybersecurity and Privacy in ESG Digital TransformationAlex G. Lee, Ph.D. Esq. CLP
 
Saint leo university Cybersecurity
Saint leo university CybersecuritySaint leo university Cybersecurity
Saint leo university CybersecurityAbhishek Bajaj
 
Cisco ite ds
Cisco ite dsCisco ite ds
Cisco ite dsJulio RS
 
2008: Web Application Security Tutorial
2008: Web Application Security Tutorial2008: Web Application Security Tutorial
2008: Web Application Security TutorialNeil Matatall
 
Ajit - Immune IT: Moving from Security to Immunity - ClubHack2008
Ajit - Immune IT: Moving from Security to Immunity - ClubHack2008Ajit - Immune IT: Moving from Security to Immunity - ClubHack2008
Ajit - Immune IT: Moving from Security to Immunity - ClubHack2008ClubHack
 
Immune IT: Moving from Security to Immunity
Immune IT: Moving from Security to ImmunityImmune IT: Moving from Security to Immunity
Immune IT: Moving from Security to Immunityamiable_indian
 
What BACnet/SC can do to improve BAS cybersecurity, and what it won’t do
What BACnet/SC can do to improve BAS cybersecurity, and what it won’t doWhat BACnet/SC can do to improve BAS cybersecurity, and what it won’t do
What BACnet/SC can do to improve BAS cybersecurity, and what it won’t doCimetrics Inc
 
Metholodogies and Security Standards
Metholodogies and Security StandardsMetholodogies and Security Standards
Metholodogies and Security StandardsConferencias FIST
 
Cybersecurity Summit AHR20 Protect Cimetrics
Cybersecurity Summit AHR20 Protect CimetricsCybersecurity Summit AHR20 Protect Cimetrics
Cybersecurity Summit AHR20 Protect CimetricsCimetrics Inc
 
Cisco Phy Sec Overview Netversant
Cisco Phy Sec Overview   NetversantCisco Phy Sec Overview   Netversant
Cisco Phy Sec Overview NetversantJayCase
 
Microsoft-CISO-Workshop-Security-Strategy-and-Program (1).pdf
Microsoft-CISO-Workshop-Security-Strategy-and-Program (1).pdfMicrosoft-CISO-Workshop-Security-Strategy-and-Program (1).pdf
Microsoft-CISO-Workshop-Security-Strategy-and-Program (1).pdfParishSummer
 
All Saints Schhol - ICT BTEC Course
All Saints Schhol - ICT BTEC CourseAll Saints Schhol - ICT BTEC Course
All Saints Schhol - ICT BTEC Course28097
 
Safe Internet Banking Cyber Security
Safe  Internet Banking Cyber SecuritySafe  Internet Banking Cyber Security
Safe Internet Banking Cyber SecurityKushantha Gunawardana
 
Cybersecurity brochure flyer version-small
Cybersecurity brochure flyer version-smallCybersecurity brochure flyer version-small
Cybersecurity brochure flyer version-smallMeg Weber
 
S nandakumar
S nandakumarS nandakumar
S nandakumarIPPAI
 
S nandakumar_banglore
S nandakumar_bangloreS nandakumar_banglore
S nandakumar_bangloreIPPAI
 
LOUCA23 Yusuf Hadiwinata Linux Security BestPractice
LOUCA23 Yusuf Hadiwinata Linux Security BestPracticeLOUCA23 Yusuf Hadiwinata Linux Security BestPractice
LOUCA23 Yusuf Hadiwinata Linux Security BestPracticeYusuf Hadiwinata Sutandar
 

Similar to Gibbs BSIT Program Security Focus (20)

GSU IT Program Fact Sheet
GSU IT Program Fact SheetGSU IT Program Fact Sheet
GSU IT Program Fact Sheet
 
120321 IAPS Some things Prep Heads need to know about ICT
120321 IAPS Some things Prep Heads need to know about ICT120321 IAPS Some things Prep Heads need to know about ICT
120321 IAPS Some things Prep Heads need to know about ICT
 
Securing the ‘Wild Wild West’: USM for Universities
Securing the ‘Wild Wild West’: USM for UniversitiesSecuring the ‘Wild Wild West’: USM for Universities
Securing the ‘Wild Wild West’: USM for Universities
 
Cybersecurity and Privacy in ESG Digital Transformation
Cybersecurity and Privacy in ESG Digital TransformationCybersecurity and Privacy in ESG Digital Transformation
Cybersecurity and Privacy in ESG Digital Transformation
 
Saint leo university Cybersecurity
Saint leo university CybersecuritySaint leo university Cybersecurity
Saint leo university Cybersecurity
 
Cisco ite ds
Cisco ite dsCisco ite ds
Cisco ite ds
 
2008: Web Application Security Tutorial
2008: Web Application Security Tutorial2008: Web Application Security Tutorial
2008: Web Application Security Tutorial
 
Ajit - Immune IT: Moving from Security to Immunity - ClubHack2008
Ajit - Immune IT: Moving from Security to Immunity - ClubHack2008Ajit - Immune IT: Moving from Security to Immunity - ClubHack2008
Ajit - Immune IT: Moving from Security to Immunity - ClubHack2008
 
Immune IT: Moving from Security to Immunity
Immune IT: Moving from Security to ImmunityImmune IT: Moving from Security to Immunity
Immune IT: Moving from Security to Immunity
 
What BACnet/SC can do to improve BAS cybersecurity, and what it won’t do
What BACnet/SC can do to improve BAS cybersecurity, and what it won’t doWhat BACnet/SC can do to improve BAS cybersecurity, and what it won’t do
What BACnet/SC can do to improve BAS cybersecurity, and what it won’t do
 
Metholodogies and Security Standards
Metholodogies and Security StandardsMetholodogies and Security Standards
Metholodogies and Security Standards
 
Cybersecurity Summit AHR20 Protect Cimetrics
Cybersecurity Summit AHR20 Protect CimetricsCybersecurity Summit AHR20 Protect Cimetrics
Cybersecurity Summit AHR20 Protect Cimetrics
 
Cisco Phy Sec Overview Netversant
Cisco Phy Sec Overview   NetversantCisco Phy Sec Overview   Netversant
Cisco Phy Sec Overview Netversant
 
Microsoft-CISO-Workshop-Security-Strategy-and-Program (1).pdf
Microsoft-CISO-Workshop-Security-Strategy-and-Program (1).pdfMicrosoft-CISO-Workshop-Security-Strategy-and-Program (1).pdf
Microsoft-CISO-Workshop-Security-Strategy-and-Program (1).pdf
 
All Saints Schhol - ICT BTEC Course
All Saints Schhol - ICT BTEC CourseAll Saints Schhol - ICT BTEC Course
All Saints Schhol - ICT BTEC Course
 
Safe Internet Banking Cyber Security
Safe  Internet Banking Cyber SecuritySafe  Internet Banking Cyber Security
Safe Internet Banking Cyber Security
 
Cybersecurity brochure flyer version-small
Cybersecurity brochure flyer version-smallCybersecurity brochure flyer version-small
Cybersecurity brochure flyer version-small
 
S nandakumar
S nandakumarS nandakumar
S nandakumar
 
S nandakumar_banglore
S nandakumar_bangloreS nandakumar_banglore
S nandakumar_banglore
 
LOUCA23 Yusuf Hadiwinata Linux Security BestPractice
LOUCA23 Yusuf Hadiwinata Linux Security BestPracticeLOUCA23 Yusuf Hadiwinata Linux Security BestPractice
LOUCA23 Yusuf Hadiwinata Linux Security BestPractice
 

More from Valley and Associates

More from Valley and Associates (9)

Banners
BannersBanners
Banners
 
How the Distance Learning Market will Expand in the Coming Years
How the Distance Learning Market will Expand in the Coming YearsHow the Distance Learning Market will Expand in the Coming Years
How the Distance Learning Market will Expand in the Coming Years
 
Personal brand and Social Media
Personal brand and Social MediaPersonal brand and Social Media
Personal brand and Social Media
 
Social Media Week Reputation Management Presentation
Social Media Week Reputation Management PresentationSocial Media Week Reputation Management Presentation
Social Media Week Reputation Management Presentation
 
Mobile Update 2010
Mobile Update 2010Mobile Update 2010
Mobile Update 2010
 
NFCU Blog pitch
NFCU Blog pitchNFCU Blog pitch
NFCU Blog pitch
 
Successful landing page implementation and use for new business acquisition
Successful landing page implementation and use for new business acquisitionSuccessful landing page implementation and use for new business acquisition
Successful landing page implementation and use for new business acquisition
 
Analytics Process Review
Analytics Process ReviewAnalytics Process Review
Analytics Process Review
 
Social media presentation
Social media presentationSocial media presentation
Social media presentation
 

Gibbs BSIT Program Security Focus

  • 1. What is the Gibbs BSIT Program With a Security focus { Network Track Security Track Information Technology Track General Studies Track Liberal Arts Course Work Systems Configuration and Problem Solving Software and Hardware Security Configurations Computer Usage Concepts Advanced Course Work (Senior Level) Capstone/Intership course work Graduation/Career Utilization Introductory Course Work (Foundation) ecrem m oc-E row kteN Inter net Web Deploy Ma s n s a e lg ee riW Co eun rigf uc rie tyS Sy e t i c r u u r c it e y S S y e ti c r u u r c i t e y S S ye tc iru How does system security integrate into the Gibbs BSIT escu arit hy ti f w oc e u e s rge G D ib T b I s SBCo el egl eThï Ak tc taat ct kA ïe Th hT eï A k t c ta at c t k A ï e T h h T e ï A k t c ta at c t k A ï e T h h T e ï A k t c t a a t ct kA ehT ï ïk Tc ha ettA Why the Gibbs BSIT Degree with a focus on system security is so important Virus Fire Walls Cleaning Anti Virus Hackers Stealing Unauthorized Add in’s Planned Operations Non-secure File Transfers Logic Bombs Locks & Passwords Covert Outside Activity PGP IDS Server Up-grades Denial of Service Malicious Code ïes Thne efe DeD f e en hT se ï ï es Th ne e f D eD ef e e h n T s ï ee ïsne Tf he eD