SlideShare a Scribd company logo
1 of 9
AN INTERDISCIPLINARY CENTER FOR ACADEMIC,
RESEARCH, AND NON-CREDIT PROGRAMS
VISION
The Center for Public Safety and Cybersecurity Education will be a comprehensive source for leading-edge
research, training and education related to public safety and cybersecurity, specifically serving as a place to:
 Advance public safety and cybersecurity education.
 Develop partnerships that increase awareness and advance education.
 Address the convergence between public safety and cybersecurity education through an interdisciplinary
approach.
 Increase the number of individuals with the skills necessary to be employed in public safety and
cybersecurity.
 Collaborate with industry to solve the talent shortage in public safety and cybersecurity through
education and training.
INTERDISCIPLINARY APPROACH
BOARD OF ADVISORS
 Roni Burkes, Warden, Ohio Reformatory for
Women
 Lisa Chambers, National Executive Director, TECH
CORPS
 Kimberly Cocroft, Judge, Franklin County Court of
Common Pleas
 Lea Culver, President, Creek Technologies
 Matt Curtin, Founder, Interhack
 Fred Kauser, Deputy Fire Chief, Mifflin
 Zach Klein, Columbus City Attorney
 Allen Perk, President, XLN Systems
 Ned Pettus, Director of Public Safety
 Ervan Rodgers, Ohio Attorney General’s Office CIO
 Justin Root, Attorney, Dickinson Wright
 Robert Stewart, Assistant Director of Public Safety
 David White, Battelle CIO
 Anthony Wilson, Assistant Chief, Westerville
Police Department
 Matthew Yerkes, Executive Director, Cultivate
ACADEMIC PROGRAMS
Associate Degree
o Criminal Justice Administration
o Cybersecurity
Bachelor’s Degree
o Criminal Justice Administration
o Cybersecurity
o Emergency Management & Homeland
Security
o Public Safety Management & Leadership
Master’s Degree
o Public Administration (MPA)
o Criminal Justice Administration
Certificates
Public Safety
o Criminal Justice Leadership Graduate Certificate
Technology, Analytics and Project Management core:
o Introductory Certificate in Web Development
o Advanced Certificate in Business Analysis (credit)
o Advanced Certificate in Project Management (credit)
o Advanced Certificate in Web Development (non-credit)
o Advanced Certificate in Systems Administration (non-credit)
o Advanced Certificate in Data Analytics (non-credit)
Cyber core (non-credit offerings):
o Advanced Certificate in Information Assurance
o Advanced Certificate in Cybersecurity
o Advanced Certificate in Software Security
PARTNER SOLUTIONS & WORKFORCE TRAINING
 Provide education, training and awareness programs to industry professionals and the public.
 Facilitate customized training cohorts within individual organizations, agencies, and businesses.
 Work with students and employers to evaluate job training, certification, or experience and offer college credit where
applicable.
 Partner with professional certification agencies to offer introductory, intermediate and advanced certification courses in
public safety and cybersecurity.
 Lead interdisciplinary collaborative research activities to address practical industry, government and community
challenges.
 Offer course development and instructional design expertise to industry, community and academic clients in the public
safety and cybersecurity disciplines.
 Provide program evaluation services for programs and practices to support or respond to grant requirements.
 Expert consulting services available for an array of topics including, but not limited to, criminal justice, law enforcement, fire
services, emergency management, cyber forensics, cybersecurity, systems administration, network security, and more.
PROFESSIONAL TRAINING TOPICS
 Crypto Modules
 Cybersecurity Essentials
 EC-Council Certified Ethical Hacker
 EC-Council Certified Security Analyst
 EC-Council Computer Hacking Forensic Investigator
 Identity Access Management
 Overall Business Security
 Payment Card Industry (PCI) security
 Platform Specific Security
 Secure Software Development Life Cycle
 User Interface Security
 Web Application Security
 Community Policing Initiatives
 Fire Officer 1 & 2
 Law Enforcement Leadership
 Police & Youth
 Search & Seizure
Franklin University is an
industry leader in customized
workforce training and adult
education.
CASE STUDY:
CORE PARTNERSHIP (CENTRAL OHIO REGIONAL ENFORCEMENT)
Local Government Innovation Grant: Shared Law Enforcement Training Services Feasibility Project
CORE PARTNERSHIP (CENTRAL OHIO REGIONAL ENFORCEMENT)

More Related Content

What's hot

The EDUCAUSE Security Professionals Experience [ppt]
The EDUCAUSE Security Professionals Experience [ppt]The EDUCAUSE Security Professionals Experience [ppt]
The EDUCAUSE Security Professionals Experience [ppt]
Videoguy
 
CTO-Cybersecurity-Forum2010-Thomas-Machdonogh
CTO-Cybersecurity-Forum2010-Thomas-MachdonoghCTO-Cybersecurity-Forum2010-Thomas-Machdonogh
CTO-Cybersecurity-Forum2010-Thomas-Machdonogh
segughana
 

What's hot (10)

The EDUCAUSE Security Professionals Experience [ppt]
The EDUCAUSE Security Professionals Experience [ppt]The EDUCAUSE Security Professionals Experience [ppt]
The EDUCAUSE Security Professionals Experience [ppt]
 
March cybersecurity powerpoint
March cybersecurity powerpointMarch cybersecurity powerpoint
March cybersecurity powerpoint
 
CSCSS / DEFENCE INTELLIGENCE GROUP
CSCSS / DEFENCE INTELLIGENCE GROUPCSCSS / DEFENCE INTELLIGENCE GROUP
CSCSS / DEFENCE INTELLIGENCE GROUP
 
CTO-Cybersecurity-Forum2010-Thomas-Machdonogh
CTO-Cybersecurity-Forum2010-Thomas-MachdonoghCTO-Cybersecurity-Forum2010-Thomas-Machdonogh
CTO-Cybersecurity-Forum2010-Thomas-Machdonogh
 
CYBERSECURITY CYBERCRIME CYBER INTELLIGENCE GROUP
CYBERSECURITY CYBERCRIME CYBER INTELLIGENCE GROUPCYBERSECURITY CYBERCRIME CYBER INTELLIGENCE GROUP
CYBERSECURITY CYBERCRIME CYBER INTELLIGENCE GROUP
 
C3i Group Cyber Law
C3i Group Cyber LawC3i Group Cyber Law
C3i Group Cyber Law
 
Digital citizenship, briefly
Digital citizenship, brieflyDigital citizenship, briefly
Digital citizenship, briefly
 
National Cyber Security Policy 2013 (NCSP)
National Cyber Security Policy 2013 (NCSP)National Cyber Security Policy 2013 (NCSP)
National Cyber Security Policy 2013 (NCSP)
 
Enhanced Cryptographic Solution for Security Issues Faced by Saudi Arabian un...
Enhanced Cryptographic Solution for Security Issues Faced by Saudi Arabian un...Enhanced Cryptographic Solution for Security Issues Faced by Saudi Arabian un...
Enhanced Cryptographic Solution for Security Issues Faced by Saudi Arabian un...
 
Copenhagen Presentation
Copenhagen PresentationCopenhagen Presentation
Copenhagen Presentation
 

Similar to Center for Public Safety and Cybersecurity Education

Conference on Digital Forensics & Cyber Security 2016
Conference on Digital Forensics & Cyber Security 2016Conference on Digital Forensics & Cyber Security 2016
Conference on Digital Forensics & Cyber Security 2016
Kayisa Herman Dube
 
Cyber capability brochureCybersecurity Today A fresh l.docx
Cyber capability brochureCybersecurity Today  A fresh l.docxCyber capability brochureCybersecurity Today  A fresh l.docx
Cyber capability brochureCybersecurity Today A fresh l.docx
faithxdunce63732
 
neww mile new mile new mile new new.pptx
neww mile new mile new mile new new.pptxneww mile new mile new mile new new.pptx
neww mile new mile new mile new new.pptx
3aw307
 
Cybersecurity Management Principles, 12 - 15 Nov 2017 Dubai, UAE
Cybersecurity Management Principles, 12 - 15 Nov 2017 Dubai, UAECybersecurity Management Principles, 12 - 15 Nov 2017 Dubai, UAE
Cybersecurity Management Principles, 12 - 15 Nov 2017 Dubai, UAE
360 BSI
 
Cybersecurity Management Principles, 11 - 14 Sept 2017 KL, Malaysia / 17 - 20...
Cybersecurity Management Principles, 11 - 14 Sept 2017 KL, Malaysia / 17 - 20...Cybersecurity Management Principles, 11 - 14 Sept 2017 KL, Malaysia / 17 - 20...
Cybersecurity Management Principles, 11 - 14 Sept 2017 KL, Malaysia / 17 - 20...
360 BSI
 
CISSP Certification Training Course
CISSP Certification Training CourseCISSP Certification Training Course
CISSP Certification Training Course
Ricky Lionel Vaz
 
Fissea09 mgupta-day3-panel process-program-build-effective-training
Fissea09 mgupta-day3-panel process-program-build-effective-trainingFissea09 mgupta-day3-panel process-program-build-effective-training
Fissea09 mgupta-day3-panel process-program-build-effective-training
Swati Gupta
 
Cybersecurity Marketing
Cybersecurity MarketingCybersecurity Marketing
Cybersecurity Marketing
Alex Weishaupt
 
How Do You Create A Successful Information Security Program Hire A Great Iso!!
How Do You Create A Successful Information Security Program  Hire A Great Iso!!How Do You Create A Successful Information Security Program  Hire A Great Iso!!
How Do You Create A Successful Information Security Program Hire A Great Iso!!
Tammy Clark
 

Similar to Center for Public Safety and Cybersecurity Education (20)

UCISA cyber incident response toolkit.pptx
UCISA cyber incident response toolkit.pptxUCISA cyber incident response toolkit.pptx
UCISA cyber incident response toolkit.pptx
 
Communicating cybersecurity
Communicating cybersecurityCommunicating cybersecurity
Communicating cybersecurity
 
STAYING SAFE AND SECURED ON TODAY AND TOMORROW’S AFRICA CYBERSPACE WORKSHOP 2017
STAYING SAFE AND SECURED ON TODAY AND TOMORROW’S AFRICA CYBERSPACE WORKSHOP 2017STAYING SAFE AND SECURED ON TODAY AND TOMORROW’S AFRICA CYBERSPACE WORKSHOP 2017
STAYING SAFE AND SECURED ON TODAY AND TOMORROW’S AFRICA CYBERSPACE WORKSHOP 2017
 
Conference on Digital Forensics & Cyber Security 2016
Conference on Digital Forensics & Cyber Security 2016Conference on Digital Forensics & Cyber Security 2016
Conference on Digital Forensics & Cyber Security 2016
 
Cyber capability brochureCybersecurity Today A fresh l.docx
Cyber capability brochureCybersecurity Today  A fresh l.docxCyber capability brochureCybersecurity Today  A fresh l.docx
Cyber capability brochureCybersecurity Today A fresh l.docx
 
Enhancing Cyber Security Awareness: Building a Safer Digital World
Enhancing Cyber Security Awareness: Building a Safer Digital WorldEnhancing Cyber Security Awareness: Building a Safer Digital World
Enhancing Cyber Security Awareness: Building a Safer Digital World
 
neww mile new mile new mile new new.pptx
neww mile new mile new mile new new.pptxneww mile new mile new mile new new.pptx
neww mile new mile new mile new new.pptx
 
OpenText Cyber Resilience Fastrak
OpenText Cyber Resilience FastrakOpenText Cyber Resilience Fastrak
OpenText Cyber Resilience Fastrak
 
Cybersecurity Management Principles, 12 - 15 Nov 2017 Dubai, UAE
Cybersecurity Management Principles, 12 - 15 Nov 2017 Dubai, UAECybersecurity Management Principles, 12 - 15 Nov 2017 Dubai, UAE
Cybersecurity Management Principles, 12 - 15 Nov 2017 Dubai, UAE
 
Aceds 2015 Cyberseucity and the Legal Profession - NYC - April 7, 2015
Aceds 2015 Cyberseucity and the Legal Profession - NYC - April 7, 2015Aceds 2015 Cyberseucity and the Legal Profession - NYC - April 7, 2015
Aceds 2015 Cyberseucity and the Legal Profession - NYC - April 7, 2015
 
Cybersecurity Management Principles, 11 - 14 Sept 2017 KL, Malaysia / 17 - 20...
Cybersecurity Management Principles, 11 - 14 Sept 2017 KL, Malaysia / 17 - 20...Cybersecurity Management Principles, 11 - 14 Sept 2017 KL, Malaysia / 17 - 20...
Cybersecurity Management Principles, 11 - 14 Sept 2017 KL, Malaysia / 17 - 20...
 
CISSP Certification Training Course
CISSP Certification Training CourseCISSP Certification Training Course
CISSP Certification Training Course
 
Fissea09 mgupta-day3-panel process-program-build-effective-training
Fissea09 mgupta-day3-panel process-program-build-effective-trainingFissea09 mgupta-day3-panel process-program-build-effective-training
Fissea09 mgupta-day3-panel process-program-build-effective-training
 
Cybersecurity Marketing
Cybersecurity MarketingCybersecurity Marketing
Cybersecurity Marketing
 
Webinar - Reducing Your Cybersecurity Risk
Webinar - Reducing Your Cybersecurity RiskWebinar - Reducing Your Cybersecurity Risk
Webinar - Reducing Your Cybersecurity Risk
 
Session 1.2 Professor Sadie Creese
Session 1.2 Professor Sadie CreeseSession 1.2 Professor Sadie Creese
Session 1.2 Professor Sadie Creese
 
CYBER ARTICLE ON LMCO
CYBER ARTICLE ON LMCOCYBER ARTICLE ON LMCO
CYBER ARTICLE ON LMCO
 
How Do You Create A Successful Information Security Program Hire A Great Iso!!
How Do You Create A Successful Information Security Program  Hire A Great Iso!!How Do You Create A Successful Information Security Program  Hire A Great Iso!!
How Do You Create A Successful Information Security Program Hire A Great Iso!!
 
Ikeepsafe Cyber Safety, Ethics and Security Competencies
Ikeepsafe Cyber Safety, Ethics and Security CompetenciesIkeepsafe Cyber Safety, Ethics and Security Competencies
Ikeepsafe Cyber Safety, Ethics and Security Competencies
 
Comprehensive Health and Safety Consulting Services from Stream Data Centers
Comprehensive Health and Safety Consulting Services from Stream Data CentersComprehensive Health and Safety Consulting Services from Stream Data Centers
Comprehensive Health and Safety Consulting Services from Stream Data Centers
 

Recently uploaded

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Victor Rentea
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 

Recently uploaded (20)

AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering Developers
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital Adaptability
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Introduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDMIntroduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDM
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 

Center for Public Safety and Cybersecurity Education

  • 1. AN INTERDISCIPLINARY CENTER FOR ACADEMIC, RESEARCH, AND NON-CREDIT PROGRAMS
  • 2. VISION The Center for Public Safety and Cybersecurity Education will be a comprehensive source for leading-edge research, training and education related to public safety and cybersecurity, specifically serving as a place to:  Advance public safety and cybersecurity education.  Develop partnerships that increase awareness and advance education.  Address the convergence between public safety and cybersecurity education through an interdisciplinary approach.  Increase the number of individuals with the skills necessary to be employed in public safety and cybersecurity.  Collaborate with industry to solve the talent shortage in public safety and cybersecurity through education and training.
  • 4. BOARD OF ADVISORS  Roni Burkes, Warden, Ohio Reformatory for Women  Lisa Chambers, National Executive Director, TECH CORPS  Kimberly Cocroft, Judge, Franklin County Court of Common Pleas  Lea Culver, President, Creek Technologies  Matt Curtin, Founder, Interhack  Fred Kauser, Deputy Fire Chief, Mifflin  Zach Klein, Columbus City Attorney  Allen Perk, President, XLN Systems  Ned Pettus, Director of Public Safety  Ervan Rodgers, Ohio Attorney General’s Office CIO  Justin Root, Attorney, Dickinson Wright  Robert Stewart, Assistant Director of Public Safety  David White, Battelle CIO  Anthony Wilson, Assistant Chief, Westerville Police Department  Matthew Yerkes, Executive Director, Cultivate
  • 5. ACADEMIC PROGRAMS Associate Degree o Criminal Justice Administration o Cybersecurity Bachelor’s Degree o Criminal Justice Administration o Cybersecurity o Emergency Management & Homeland Security o Public Safety Management & Leadership Master’s Degree o Public Administration (MPA) o Criminal Justice Administration Certificates Public Safety o Criminal Justice Leadership Graduate Certificate Technology, Analytics and Project Management core: o Introductory Certificate in Web Development o Advanced Certificate in Business Analysis (credit) o Advanced Certificate in Project Management (credit) o Advanced Certificate in Web Development (non-credit) o Advanced Certificate in Systems Administration (non-credit) o Advanced Certificate in Data Analytics (non-credit) Cyber core (non-credit offerings): o Advanced Certificate in Information Assurance o Advanced Certificate in Cybersecurity o Advanced Certificate in Software Security
  • 6. PARTNER SOLUTIONS & WORKFORCE TRAINING  Provide education, training and awareness programs to industry professionals and the public.  Facilitate customized training cohorts within individual organizations, agencies, and businesses.  Work with students and employers to evaluate job training, certification, or experience and offer college credit where applicable.  Partner with professional certification agencies to offer introductory, intermediate and advanced certification courses in public safety and cybersecurity.  Lead interdisciplinary collaborative research activities to address practical industry, government and community challenges.  Offer course development and instructional design expertise to industry, community and academic clients in the public safety and cybersecurity disciplines.  Provide program evaluation services for programs and practices to support or respond to grant requirements.  Expert consulting services available for an array of topics including, but not limited to, criminal justice, law enforcement, fire services, emergency management, cyber forensics, cybersecurity, systems administration, network security, and more.
  • 7. PROFESSIONAL TRAINING TOPICS  Crypto Modules  Cybersecurity Essentials  EC-Council Certified Ethical Hacker  EC-Council Certified Security Analyst  EC-Council Computer Hacking Forensic Investigator  Identity Access Management  Overall Business Security  Payment Card Industry (PCI) security  Platform Specific Security  Secure Software Development Life Cycle  User Interface Security  Web Application Security  Community Policing Initiatives  Fire Officer 1 & 2  Law Enforcement Leadership  Police & Youth  Search & Seizure Franklin University is an industry leader in customized workforce training and adult education.
  • 8. CASE STUDY: CORE PARTNERSHIP (CENTRAL OHIO REGIONAL ENFORCEMENT) Local Government Innovation Grant: Shared Law Enforcement Training Services Feasibility Project
  • 9. CORE PARTNERSHIP (CENTRAL OHIO REGIONAL ENFORCEMENT)