American Public University System (NASDAQ:APEI) - Dr. Clay Wilson is the Program Director for Cybersecurity
Dr. Clay Wilson is the Program Director for Cybersecurity graduate studies at the American Public University, where he has responsibility for designing new courses. He is past Program Director for Cybersecurity Policy at the University of Maryland University College (UMUC), where he oversaw development of new graduate-level courses. Dr. Wilson is also a former analyst for national defense policy at the Congressional Research Service where he analyzed cyber intelligence reports for the U.S. Congress and NATO committees on net-centric warfare, cybersecurity, nanotechnology, and other vulnerabilities of high-technology military systems and critical infrastructures. More info: http://www.apu.apus.edu/academic/faculty-members/bio/4438/clay-wilson
About American Public University System (NASDAQ:APEI) American Public University System, winner of the Sloan Consortium's Ralph E. Gomory Award for Quality Online Education and first three-time recipient of Sloan's Effective Practice Award, offers more than 90 online degree programs through American Public University and American Military University. APUS's relevant curriculum, affordability and flexibility help more than 100,000 working adults worldwide pursue degrees in a diverse variety of subjects. For further information, visit www.apus.edu. http://www.apus.edu/about-us/facts.htm
This 3-day experience combines independent learning, group exercises and instructor lead discussions to provide those considering a career in cybersecurity with an opportunity to explore the various occupations and certifications available. If you are looking to pivot your career…this course is for you!
Get training in cyber security & place yourself in good companies through...CCI Training Center
Get Cyber Security Training Program Information, Why Should You Learn?, What Will You Learn? Cyber Security Courses & Place Yourself in Good Companies Through This Courses. https://medium.com/@ccitrainingc/get-training-in-cyber-security-place-yourself-in-good-companies-through-this-course-7bd8aa675a65
What is Social Engineering? What risk does it pose to your organisation and how can you protect the service desk from being attacked? Craig Clark explains.
Erau cybersecurity and security degreesERAUWebinars
Slides from a degree briefing presented in April 2018 covering Embry-Riddle degrees in Aviation Security and Cybersecurity. Covers the BS in Aviation Security, the MS in Cybersecurity Management and Policy, the MS in Cybersecurity Engineering, and Non-credit Aviation Cybersecurity 3-day course.
This 3-day experience combines independent learning, group exercises and instructor lead discussions to provide those considering a career in cybersecurity with an opportunity to explore the various occupations and certifications available. If you are looking to pivot your career…this course is for you!
Get training in cyber security & place yourself in good companies through...CCI Training Center
Get Cyber Security Training Program Information, Why Should You Learn?, What Will You Learn? Cyber Security Courses & Place Yourself in Good Companies Through This Courses. https://medium.com/@ccitrainingc/get-training-in-cyber-security-place-yourself-in-good-companies-through-this-course-7bd8aa675a65
What is Social Engineering? What risk does it pose to your organisation and how can you protect the service desk from being attacked? Craig Clark explains.
Erau cybersecurity and security degreesERAUWebinars
Slides from a degree briefing presented in April 2018 covering Embry-Riddle degrees in Aviation Security and Cybersecurity. Covers the BS in Aviation Security, the MS in Cybersecurity Management and Policy, the MS in Cybersecurity Engineering, and Non-credit Aviation Cybersecurity 3-day course.
Intelligent Buildings can use the skills of the control experts in the process field like the ISA Chapter members. Recent IEC Standard on cybersecurity is applicable to the building automation field.
As cyber threats continue to grow in volume and intensity, companies need top-tier cybersecurity talent to successfully fend off these attacks. Here are some things employers should know.
Course Tech 2013, Mark Ciampa, Helping Students Stay SecureCengage Learning
Smartphones, socialmedia, downloading MP3music files,watchingmovies on tablet computers—these are the types
of activities that our students are constantly engaged in. However, these are the same activities that attackers are
targeting today, yet very fewof our students knowhowto protectthemselves fromthese targeted attacks. In this
presentation we will look at practical security instruction that can be added to any computer course in order to help
our students stay secure.
PresIDIo 1 & 2 WhAT shoulD I geT ouT
Autonomous and Semi-Autonomous Cybersecurity TrainingBryan Len
Cybersecurity in Autonomous and Semi-Autonomous Systems is a 3-day particular program, focuses on vulnerabilities in autonomous and semi-autonomous systems, implanted systems, apparatuses, methods, methodologies and techniques to dissect and plan.
The course will cover existing in-vehicle correspondence conventions, and related vulnerabilities just as the constraints of existing computerized crime scene investigation.
Learning Objectives :
Understand the basics of cybersecurity
Recognize the cybersecurity applied to autonomous and semi-autonomous systems
Identify basics of threat models
Determine industry standards
Describe basic functions of sensors, ECUs and CAN bus
Acquire and analyze in-vehicle communication data
Hack autonomous and semi-autonomous systems, ECUs, sensors and communication buses such as CAN
Use tools for autonomous and semi-autonomous systems anomaly detection
Prerequisites :
Basics of electronics in vehicle systems, autonomous and semi-autonomous systems is recommended.
Who Should Attend?
Law Enforcement Professionals
Motor Manufacturers
Systems and Part Manufacturers
Software Developers
Course Outlines :
Cybersecurity applied to embedded systems
Autonomous and semi-autonomous cybersecurity
Autonomous and semi-autonomous systems network security evaluation
Functional safety testing
Cyber security threats and strategies
Automotive end-to-end security solutions
Case study and labs: machine learning can detect and prevent attacks and more
Request more information.
Visit tonex.com for course and workshop detail
Cybersecurity in Autonomous and Semi-Autonomous Systems
https://www.tonex.com/training-courses/cyber-security-in-
autonomous-and-semi-autonomous-systems/
Cybersecurity education for the next generationIBM Security
In a world of increasing information security threats, academic initiatives focused on cybersecurity are proliferating – yet, there is still the danger of falling short in addressing the long-term threat.
To avoid becoming too focused on near-term issues, academic programs must be more collaborative across their own institutions, with industry, government and among the global academic community.
Only by working in concert can we meet today’s demand while educating the next generation to create a more secure future.
Learn more about IBM Security: http://ibm.com/security
This is a working document for presentation to Cyber Security Professionals concerning a tactical mindset in securing cyberspace within organizations. High level, can add in case studies, more content to come Dec 2010 for the European, UK and German presentation. Feel free to respond to add to brief. Requires Notes
Cyber Security is the most important constituent of Information Technology
that protects all kinds of information systems, (personal or professional) against
all the vulnerabilities and potential attacks via the internet.
Talk that Prof. Mustaque Ahamad from GaTech gave at Global Cybersecurity Leaders Program http://www.cisoacademy.com/gclp2-prof-mustaque-ahamad-april-2015/
Cyber Security introduction. Cyber security definition. Vulnerabilities. Social engineering and human error. Financial cost of security breaches. Computer protection. The cyber security job market
This training creates the awareness of the security threats facing individuals, business owner’s, and corporations in today’s society and induces a’ plan-protection’ attitude. It enriches individuals, students’, business owners’ and workers’ approach to handling these threats and responding appropriately when these threats occur.
Intelligent Buildings can use the skills of the control experts in the process field like the ISA Chapter members. Recent IEC Standard on cybersecurity is applicable to the building automation field.
As cyber threats continue to grow in volume and intensity, companies need top-tier cybersecurity talent to successfully fend off these attacks. Here are some things employers should know.
Course Tech 2013, Mark Ciampa, Helping Students Stay SecureCengage Learning
Smartphones, socialmedia, downloading MP3music files,watchingmovies on tablet computers—these are the types
of activities that our students are constantly engaged in. However, these are the same activities that attackers are
targeting today, yet very fewof our students knowhowto protectthemselves fromthese targeted attacks. In this
presentation we will look at practical security instruction that can be added to any computer course in order to help
our students stay secure.
PresIDIo 1 & 2 WhAT shoulD I geT ouT
Autonomous and Semi-Autonomous Cybersecurity TrainingBryan Len
Cybersecurity in Autonomous and Semi-Autonomous Systems is a 3-day particular program, focuses on vulnerabilities in autonomous and semi-autonomous systems, implanted systems, apparatuses, methods, methodologies and techniques to dissect and plan.
The course will cover existing in-vehicle correspondence conventions, and related vulnerabilities just as the constraints of existing computerized crime scene investigation.
Learning Objectives :
Understand the basics of cybersecurity
Recognize the cybersecurity applied to autonomous and semi-autonomous systems
Identify basics of threat models
Determine industry standards
Describe basic functions of sensors, ECUs and CAN bus
Acquire and analyze in-vehicle communication data
Hack autonomous and semi-autonomous systems, ECUs, sensors and communication buses such as CAN
Use tools for autonomous and semi-autonomous systems anomaly detection
Prerequisites :
Basics of electronics in vehicle systems, autonomous and semi-autonomous systems is recommended.
Who Should Attend?
Law Enforcement Professionals
Motor Manufacturers
Systems and Part Manufacturers
Software Developers
Course Outlines :
Cybersecurity applied to embedded systems
Autonomous and semi-autonomous cybersecurity
Autonomous and semi-autonomous systems network security evaluation
Functional safety testing
Cyber security threats and strategies
Automotive end-to-end security solutions
Case study and labs: machine learning can detect and prevent attacks and more
Request more information.
Visit tonex.com for course and workshop detail
Cybersecurity in Autonomous and Semi-Autonomous Systems
https://www.tonex.com/training-courses/cyber-security-in-
autonomous-and-semi-autonomous-systems/
Cybersecurity education for the next generationIBM Security
In a world of increasing information security threats, academic initiatives focused on cybersecurity are proliferating – yet, there is still the danger of falling short in addressing the long-term threat.
To avoid becoming too focused on near-term issues, academic programs must be more collaborative across their own institutions, with industry, government and among the global academic community.
Only by working in concert can we meet today’s demand while educating the next generation to create a more secure future.
Learn more about IBM Security: http://ibm.com/security
This is a working document for presentation to Cyber Security Professionals concerning a tactical mindset in securing cyberspace within organizations. High level, can add in case studies, more content to come Dec 2010 for the European, UK and German presentation. Feel free to respond to add to brief. Requires Notes
Cyber Security is the most important constituent of Information Technology
that protects all kinds of information systems, (personal or professional) against
all the vulnerabilities and potential attacks via the internet.
Talk that Prof. Mustaque Ahamad from GaTech gave at Global Cybersecurity Leaders Program http://www.cisoacademy.com/gclp2-prof-mustaque-ahamad-april-2015/
Cyber Security introduction. Cyber security definition. Vulnerabilities. Social engineering and human error. Financial cost of security breaches. Computer protection. The cyber security job market
This training creates the awareness of the security threats facing individuals, business owner’s, and corporations in today’s society and induces a’ plan-protection’ attitude. It enriches individuals, students’, business owners’ and workers’ approach to handling these threats and responding appropriately when these threats occur.
Webinar - Reducing the Risk of a Cyber Attack on UtilitiesWPICPE
Jim Girouard, Sr. Product Development Manager at Worcester Polytechnic Institute, outlines the growing menace of cyber attacks on utility companies and how to educate yourself to reduce risk.
Get training in cyber security & place yourself in good companies through...CCI Training Center
Get Cyber Security Training Program Information, Why Should You Learn?, What Will You Learn? Cyber Security Courses & Place Yourself in Good Companies Through This Courses. https://medium.com/@ccitrainingc/get-training-in-cyber-security-place-yourself-in-good-companies-through-this-course-7bd8aa675a65
Safety, trust and security are core to customer
retention, growth, and the long term
success of every company. While companies
must continually look for new ways to
increase efficiency and productivity, security
of accounts and sensitive customer
information is a top priority. For more info: www.nafcu.org/cyveillance
01Introduction to Information Security.pptit160320737038
A distributed system is a collection of computer programs that utilize computational resources across multiple, separate computation nodes to achieve a common, shared goal. Distributed systems aim to remove bottlenecks or central points of failure from a system.
Learn about current cybersecurity threats, what new threats are on the rise, and how to train the next generation of cyberprofessionals to help keep us secure.
This course covers effective strategies, techniques, systems, polices, and procedures to establish stronger cybersecurity and cybercrime controls, reduce operational risk, and improve online working whilst covering international best practices, ISO standards, compliance, audit, and industry regulations.
In today’s world and further into the digital future, all organizations face an ever-increasing number of information-related security challenges and risks against a backdrop of increasing national and global compliance, and audit standards and legislation.
Cybersecurity is the protection of data from theft and damage, business information, people’s identities, and how all businesses can be better equipped to work more safely in an increasingly online world where sensitive and personal information is stored, shared, and communicated.
This 4 day intensive training workshop addresses the latest concerns on IT infrastructure and cybersecurity. Participants will develop key skills and core competencies that will allow them to meet the ever-changing information security demands of the 21st century.
Course Participants will:
Understand today’s and tomorrow’s cybersecurity and cybercrime threats, issues, and risks; how to set up policies, train users, create strategies, and implement systems and tools to help protect data, information and people’s identities
Manage the growing volume of confidential, sensitive business information and data to protect, keep safe, and communicate securely against a backdrop of increasing cyber threats, as well as privacy, legal, and compliance regulations
Develop strategies and ways of working to improve detection of cybersecurity threats and improve information compliance
Understand the security-related international information compliance and regulations, including industry specific standards
Expand the expertise of personnel involved in developing skills and knowledge in the latest techniques, processes, and systems on cybersecurity
Who should attend:
Vice Presidents, Directors, General Managers
Chief Information Officers
Chief Security Officers
Chief Information Security Officers
Chief Technology Officers
Heads of Departments in Information Security Management Information Systems, IT Infrastructure, IT Architecture, Network Operations, IT Operations, IT Data Center, DataBase Management, IT Deployment, IT Business Enterprise, IT Risk Management, IT Quality Assurance, IT Audit, Risk Management, Internal Audit, Business Continuity Planning
This course covers effective strategies, techniques, systems, polices, and procedures to establish stronger cybersecurity and cybercrime controls, reduce operational risk, and improve online working whilst covering international best practices, ISO standards, compliance, audit, and industry regulations.
In today’s world and further into the digital future, all organizations face an ever-increasing number of information-related security challenges and risks against a backdrop of increasing national and global compliance, and audit standards and legislation.
Cybersecurity is the protection of data from theft and damage, business information, people’s identities, and how all businesses can be better equipped to work more safely in an increasingly online world where sensitive and personal information is stored, shared, and communicated.
This 4 day intensive training workshop addresses the latest concerns on IT infrastructure and cybersecurity. Participants will develop key skills and core competencies that will allow them to meet the ever-changing information security demands of the 21st century.
Course Participants will:
Understand today’s and tomorrow’s cybersecurity and cybercrime threats, issues, and risks; how to set up policies, train users, create strategies, and implement systems and tools to help protect data, information and people’s identities
Manage the growing volume of confidential, sensitive business information and data to protect, keep safe, and communicate securely against a backdrop of increasing cyber threats, as well as privacy, legal, and compliance regulations
Develop strategies and ways of working to improve detection of cybersecurity threats and improve information compliance
Understand the security-related international information compliance and regulations, including industry specific standards
Expand the expertise of personnel involved in developing skills and knowledge in the latest techniques, processes, and systems on cybersecurity
Who should attend:
Vice Presidents, Directors, General Managers
Chief Information Officers
Chief Security Officers
Chief Information Security Officers
Chief Technology Officers
Heads of Departments in Information Security Management Information Systems, IT Infrastructure, IT Architecture, Network Operations, IT Operations, IT Data Center, DataBase Management, IT Deployment, IT Business Enterprise, IT Risk Management, IT Quality Assurance, IT Audit, Risk Management, Internal Audit, Business Continuity Planning
Speaker Scott Greiper, President and Founding Partner, Secure Strategy GroupInvestorideas.com
Mr. Greiper is the President and Founding Partner of Secure Strategy Group. He has had a distinguished 15-year career in the security and defense technology sectors as both a research analyst and investment banker, and is known as a thought leader in the industry. Before forming Secure Strategy Group, he was a Managing Director at Legend Merchant Group and Head of the firm's Convergent Security Group, which provided capital, strategic advisory and M&A services to growth companies in the security and defense technology markets. Previously, Mr. Greiper was a Principal and Senior Analyst at C. E. Unterberg, Towbin, where he covered public companies in the Global Security industry and was consistently ranked as one of the top analysts in the sector. He has worked with a range of industry leaders and is a frequent guest speaker and moderator at conferences and seminars across the country. Mr. Greiper attended the Executive MBA program at Columbia University and holds a B. A. in Economics from The University of Chicago. He is a member of the FBI InfraGard program, BENS (Business Executives for National Security), ASIS (American Society for Industrial Security) and NYSSA (New York Society for Security Analysts).
Speaker Kiersten E. Todt, President and Managing Partner, Liberty Group Ventu...Investorideas.com
Kiersten E. Todt
President and Managing Partner
Liberty Group Ventures, LLC (LGV)
Kiersten Todt is the President and Managing Partner of Liberty Group Ventures, LLC (LGV). She develops risk and crisis management solutions for infrastructure, emergency management, cybersecurity, higher education, and homeland security clients in the public, private, and non-profit sectors. She has served in senior positions in both the executive and legislative branches of government. Ms. Todt has commented on homeland security and sport security issues in multiple media outlets, including MSNBC, NPR, Bloomberg, and The Wall Street Journal. Her work on sport security has been published in two editions of The International Centre for Sport Security Journal.
Prior to LGV, Ms. Todt was a partner at Good Harbor Consulting and was responsible for the company's North America crisis management practice, which had a concentration in cyber security. Clients included states and quasi-public institutions, maritime entities, small and large businesses, and college and university systems. Before joining Good Harbor, she worked for Business Executives for National Security (BENS) and was responsible for integrating the private sector into state and local emergency management capabilities; she also developed and executed federal and regional port and cyber security projects. Prior to BENS, she was a consultant for Sandia National Laboratories and worked with the California Governor's Office and Bay Area Economic Forum to develop the homeland security preparedness plan for the Bay Area. Ms. Todt was also an adjunct lecturer at Stanford University.
Ms. Todt served as a Professional Staff Member on the U.S. Senate Committee on Governmental Affairs (now the Committee on Homeland Security and Governmental Affairs); she worked for the Committee Chairman, Senator Joseph Lieberman, and was responsible for drafting the bioterror, infrastructure protection, emergency preparedness, and science and technology directorates of the legislation that created the Department of Homeland Security. She also served as Senator Lieberman's Appropriations Director and managed his drug policy portfolio.
Before working in the Senate, Ms. Todt served in Vice President Gore's domestic policy office and was responsible for coordinating federal resources with locally-defined needs, specifically focusing on energy challenges in California and housing issues. She was also the senior advisor on demand-reduction issues to Director Barry. R. McCaffrey at the Office of National Drug Control Policy (ONDCP).
Ms. Todt graduated from Princeton University, with a degree in public policy from The Woodrow Wilson School of Public and International Affairs. She holds a master's degree in Public Policy from the John F. Kennedy School of Government at Harvard University and was selected to be a Presidential Management Fellow in 1999. She earned the Outstanding Service Award at ONDCP.
Speaker Scott Sacknoff, President, The Spade Defense IndexInvestorideas.com
Mr. Scott Sacknoff is the Index Manager of the SPADE Defense Index (NYSE: ^DXS), the underlying index for the Powershares Aerospace & Defense ETF (NYSE: PPA). The SPADE® Defense Index (NYSE: ^DXS) is a modified capitalization-weighted index comprised of publicly traded companies that benchmarks the performance of companies involved with defense, homeland security, and space. The Index is composed of more than 50 firms with representative business activities including: naval vessels, military aircraft, missiles and munitions, battlespace awareness, C4ISR, network centric warfare, homeland security including border security and biometric and screening systems, and space systems. Index values are distributed by the NYSEarca under the ticker 'DXS'. The Powershares Aerospace & Defense Portfolio ETF, designed to track the SPADE Defense Index, trades under the ticker 'PPA'. Historical data for the Index is available from 30 December 1997. The ETF was launched on 26 October 2005 and is highly liquid.
Viscount Systems (OTCQB:VSYS), a Canadian manufacturer of advanced physical access control systems combines traditional access control performance with cyber security (true convergence of logical and physical access) to increase security while driving down facility costs to secure offices, hospitals, critical infrastructure, schools, banks, and manufacturing. Our unique offering satisfies new US Federal Government standards for increased protection of facilities from external threats. http://viscount.com/
About NXT- ID Inc. - Mobile Security for a Mobile World
NXT-ID, Inc.'s (OTCQB:NXTD) innovative MobileBio™ solution mitigates consumer risks associated with mobile computing, m-commerce and smart OS-enabled devices. The company is focused on the growing m-commerce market, launching its innovative MobileBio™ suite of biometric solutions that secure consumers' mobile platforms led by the Wocket™; a next generation smart wallet designed to replace all the cards in your wallet, no smart phone required. The Wocket works anywhere credit cards are accepted and only works with your biometric stamp of approval. http://www.thewocket.com/, http://www.wocketwallet.com/
NXT-ID's wholly owned subsidiary, 3D-ID LLC, is engaged in biometric identification has 22 licensed patents in the field of 3D facial recognition http://www.nxt-id.com/, http://3d-id.net/
Keynote Speaker Janice Kephart - Founder and CEO of The Secure Identity and B...Investorideas.com
Janice recently returned from a Special Counsel position with the Senate Judiciary Committee, where she was asked to testify and then return to staff to support the national, border and identity security aspects of the now Senate-passed immigration reform legislation. Ms. Kephart is an internationally recognized border and ID security expert, who served as counsel to the 9/11 Commission and was a key author of the Staff Monograph, 9/11 and Terrorist Travel as well as the immigration and identity security-related facts and recommendations in the 9/11 Commission Report.
More info: http://www.sibassoc.org/#!aboutsiba/csgz
Janice speaks regularly at conferences, to international media, publishes articles and opeds around the world, and has testified before Congress 16 times on issues of border and ID security.
Positive id PositiveID Corporation (OTCBB:PSID) Conference PresentationInvestorideas.com
PositiveID Corporation (OTCBB:PSID) develops unique medical devices and molecular diagnostic systems, focused primarily on diabetes management, rapid medical testing and airborne bio-threat detection. Its wholly-owned subsidiary, MFS, is focused on the development of microfluidic systems for automated preparation of and performance of biological assays.
Implant Sciences (OTCQB:IMSC) is the leader in next generation Explosives Trace Detection (ETD), and established counter-terrorism technology that detects and identifies threats from the small amounts left behind after a person handles explosives. Implant Sciences' security solutions are used worldwide for aviation, public transport, customs, air cargo, critical infrastructure, ports/ borders, and emergency response. The Company has thousands of units deployed to over 50 countries, and its trace detectors have been successfully used at the Sochi Olympics, Beijing Olympics, the Universiade Games, and the Special Olympics.
In January 2013, the Company became only the third ETD manufacturer, and the sole American-owned company, to have product approval from the US Transportation Security Administration. With advanced capabilities including superior sensitivity, automatic internal calibration, rapid clear-down, ush button maintenance, and administration of trace detection. Company's handheld QS-H150 and desktop QS-B220 simplify the use, maintenance, and administration of trace detection. www.implantsciences.com
Facial Recognition: The Science, The Technology, and Market ApplicationsInvestorideas.com
Ravi Das
Technical Writer
BiometricNews.net
Ravi is a technical writer for BiometricNews.net, Inc., and independent news and information business about the Biometrics Industry. Ravi has been involved in Biometrics for 10+ years. He holds a BS in Ag Econ from Purdue, and MS in Ag Bus Economics (International Trade) from Southern Illinois University, Carbondale, and an MBA (MIS) from Bowling Green State University.
New Tax Regime User Guide Flexi Plan Revised (1).pptx
American Public University System (NASDAQ:APEI) - Dr. Clay Wilson is the Program Director for Cybersecurity
1. American Public University System -
A Multi-Disciplinary Approach to
Cybersecurity Education
Dr. Clay Wilson, CISSP
Program Director, Cybersecurity Studies
American Public University System
2. Overview
• About American Public University System (APUS)
• What is a Multi-Disciplinary Approach?
• What Problems does it help solve?
Complex Malicious Code
Cascade Failures for Infrastructures
Hackers Bypass Defensive Technologies
• Problems require a Multi-Disciplinary Education
Management and Coordination of Cybersecurity Technologies
• APUS Goal for Cybersecurity Education
Summarized Admission Requirements
Overview of the APUS Cybersecurity Program
APUS Offers Undergrad Certificates
• APUS awarded National Certifications for Cybersecurity Education
3. About APUS
• Founded in 1991 as American Military University
(AMU) by James P. Etter, USMC
• Fully-online; intended for military and working adults
with focus on counter-terrorism, military intelligence
• In 2002 expanded to American Public University System,
adding American Public University for public service
courses, i.e. criminal justice and national security
• APUS accredited by the Higher Learning Commission,
North Central Association
4. About APUS (con‟t)
• Today more than 100,000 students from all 50 states/DC
and 100+ countries
• Approximately 53% active-duty all branches; 47% civilian
or other military
• Recent Awards
• US News & World Report 2014 Online Rankings: APUS
Undergraduate Programs Rated Among Best in Overall Quality
• First Three-Time Recipient of Sloan Consortium Effective
Practice Award
5. About APUS (con‟t)
Some of the Organizations that Partner with APUS --
Education Institutions of all Military Service Branches
Department of Homeland Security
FBI
Lockheed Martin Center for Security Analysis
- and many other universities and organizations
6. What is a Multi-Disciplinary Approach to Cybersecurity?
Definition of Multi-Disciplinary – cooperation and participation across
different sectors to solve problems.
Why is a Multi-Disciplinary approach to Cybersecurity now
important?
• Sometimes, skill-centered specialists cultivate a traditional boundary
around their expertise.
• This can be a restrictive way of finding solutions to a problem.
• Cybersecurity is being hit with newer types of problems that bypass
traditional boundaries
7. What Problems does a Multi-Disciplinary Approach Help Solve?
Problem #1 – Cyberattacks are becoming more complex.
• Complexity shows in newer, advanced persistent threats that
defeat increasingly sophisticated cybersecurity defensive
technologies.
• Cybersecurity experts are always playing catch up after
newer methods of cyberattack are discovered.
8. Complex Malicious Code Operates Undetected for Years
Complex malicious code can reside and operate undetected
inside computers for years before discovery.
• The STUXNET malicious code operated inside Iranian
nuclear facilities for several years before it was eventually
discovered.
• The new SNAKE malicious code, recently announced as a
new discovery inside Ukrainian computers, may also have
infected other computers worldwide and operated secretly
for the past several years.
9. Cascade Failures May Connect Critical Infrastructures
Problem #2 - Critical infrastructures are subject to complex
cascade-failures due to vulnerabilities in other distantly-
related infrastructures.
• During Sandy, the hospitals in New Jersey lost electricity
when the local power utility flooded.
• When Hospital backup diesel generators ran out of
fuel, filling stations had no electricity to pump fuel into
delivery tankers.
10. Hackers Bypass Defensive Technology – Attack Users
Problem #3 - Hackers defeat sophisticated technical
cybersecurity defenses by directly targeting the users
instead of the computers.
• With „Phishing attacks‟, users are tricked by email
attachments, or by false web sites, that enable hackers
to steal personal secrets and passwords.
11. Problems Require a Multi-Disciplinary Education
Problems of Complexity, Cascade Failures, and Targeted
Users now require a multi-disciplinary approach to
cybersecurity education.
– Leaders in all professions, all disciplines must develop a
“cybersecurity mindset”.
The ACM Education Board in 2013 acknowledged that “a system-
wide perspective has become an important part of cybersecurity
education, and that education must be multi-disciplinary, to include
many sectors.”
12. Management and Coordination of Cybersecurity Technology
Traditional cybersecurity education courses were initially
designed to expand the technical skills of technology experts.
• Management and Coordination of technology must now be
emphasized in Cybersecurity Education.
• Cybersecurity Education must now range across many
sectors, not focus just on the development and operation of
security technology.
13. APUS Goal for Cybersecurity Education
Leaders in All Disciplines need Cybersecurity Education to help
manage and coordinate technology for cybersecurity -
Business Education
Public Safety International Relations
Environmental Science Space Studies
Sports and Healthcare Transportation and Logistics
Students may enroll in the APUS Cybersecurity Program with an
IT certificate, or with a non-technical work background
14. APUS Admissions Requirements
Students enrolling for Cybersecurity must meet one of these
requirements ---
– Undergraduate degree in Information Technology or a related field
or
– Undergraduate IT Certificate
or
– FIVE years of work experience at the senior level in Criminal
Justice, Emergency Management, Intelligence, Homeland Security or
other non-technical background
15. APUS Cybersecurity Programs
• First half of the graduate cybersecurity program focuses on network security, information
assurance, cybercrime, and digital forensics. Second half of grad program focuses on policies,
practices, perspectives of different disciplines, including emergency management, homeland
security, intelligence, law and ethics, risk management and cyber warfare.
• The capstone course is a multi-disciplinary group project where individual participants
represent different sectors, agencies, and disciplines.
• Graduate certificates are available in:
• Cybercrime
• Digital Forensics
• Information Assurance
• Information Systems Security
• Undergraduate certificates also available in:
• Digital Forensics
• Information Assurance
• Homeland Security
• National Security
• Emergency Management
16. APUS Awarded National Certifications for Cybersecurity Education
2013 - APUS received two National Training Standards
certifications for Information Systems Security Professionals
from the Committee on National Security Systems (CNSS)
NSTISSI no. 4011 and CNSSI no. 4013
2014 - APUS is also applying for the CAE/IA/CD designation
from DHA and NSA.
17. For Further Information
Clay Wilson, Phd, CISSP
Program Director, Cybersecurity Studies
American Public University System
cwilson@apus.edu
Undergraduate programs
http://www.amu.apus.edu/lp2/cybersecurity/bachelors.htm
Graduate programs
http://www.amu.apus.edu/lp2/cybersecurity/masters.htm