SlideShare a Scribd company logo
AN INTERDISCIPLINARY CENTER FOR ACADEMIC,
RESEARCH, AND NON-CREDIT PROGRAMS
VISION
The Center for Public Safety and Cybersecurity Education will be a comprehensive source for leading-edge
research, training and education related to public safety and cybersecurity, specifically serving as a place to:
 Advance public safety and cybersecurity education.
 Develop partnerships that increase awareness and advance education.
 Address the convergence between public safety and cybersecurity education through an interdisciplinary
approach.
 Increase the number of individuals with the skills necessary to be employed in public safety and
cybersecurity.
 Collaborate with industry to solve the talent shortage in public safety and cybersecurity through
education and training.
INTERDISCIPLINARY APPROACH
BOARD OF ADVISORS
 Roni Burkes, Warden, Ohio Reformatory for
Women
 Lisa Chambers, National Executive Director, TECH
CORPS
 Kimberly Cocroft, Judge, Franklin County Court of
Common Pleas
 Lea Culver, President, Creek Technologies
 Matt Curtin, Founder, Interhack
 Fred Kauser, Deputy Fire Chief, Mifflin
 Zach Klein, Columbus City Attorney
 Allen Perk, President, XLN Systems
 Ned Pettus, Director of Public Safety
 Ervan Rodgers, Ohio Attorney General’s Office CIO
 Justin Root, Attorney, Dickinson Wright
 Robert Stewart, Assistant Director of Public Safety
 David White, Battelle CIO
 Anthony Wilson, Assistant Chief, Westerville
Police Department
 Matthew Yerkes, Executive Director, Cultivate
ACADEMIC PROGRAMS
Associate Degree
o Criminal Justice Administration
o Cybersecurity
Bachelor’s Degree
o Criminal Justice Administration
o Cybersecurity
o Emergency Management & Homeland
Security
o Public Safety Management & Leadership
Master’s Degree
o Public Administration (MPA)
o Criminal Justice Administration
Certificates
Public Safety
o Criminal Justice Leadership Graduate Certificate
Technology, Analytics and Project Management core:
o Introductory Certificate in Web Development
o Advanced Certificate in Business Analysis (credit)
o Advanced Certificate in Project Management (credit)
o Advanced Certificate in Web Development (non-credit)
o Advanced Certificate in Systems Administration (non-credit)
o Advanced Certificate in Data Analytics (non-credit)
Cyber core (non-credit offerings):
o Advanced Certificate in Information Assurance
o Advanced Certificate in Cybersecurity
o Advanced Certificate in Software Security
PARTNER SOLUTIONS & WORKFORCE TRAINING
 Provide education, training and awareness programs to industry professionals and the public.
 Facilitate customized training cohorts within individual organizations, agencies, and businesses.
 Work with students and employers to evaluate job training, certification, or experience and offer college credit where
applicable.
 Partner with professional certification agencies to offer introductory, intermediate and advanced certification courses in
public safety and cybersecurity.
 Lead interdisciplinary collaborative research activities to address practical industry, government and community
challenges.
 Offer course development and instructional design expertise to industry, community and academic clients in the public
safety and cybersecurity disciplines.
 Provide program evaluation services for programs and practices to support or respond to grant requirements.
 Expert consulting services available for an array of topics including, but not limited to, criminal justice, law enforcement, fire
services, emergency management, cyber forensics, cybersecurity, systems administration, network security, and more.
PROFESSIONAL TRAINING TOPICS
 Crypto Modules
 Cybersecurity Essentials
 EC-Council Certified Ethical Hacker
 EC-Council Certified Security Analyst
 EC-Council Computer Hacking Forensic Investigator
 Identity Access Management
 Overall Business Security
 Payment Card Industry (PCI) security
 Platform Specific Security
 Secure Software Development Life Cycle
 User Interface Security
 Web Application Security
 Community Policing Initiatives
 Fire Officer 1 & 2
 Law Enforcement Leadership
 Police & Youth
 Search & Seizure
Franklin University is an
industry leader in customized
workforce training and adult
education.
CASE STUDY:
CORE PARTNERSHIP (CENTRAL OHIO REGIONAL ENFORCEMENT)
Local Government Innovation Grant: Shared Law Enforcement Training Services Feasibility Project
CORE PARTNERSHIP (CENTRAL OHIO REGIONAL ENFORCEMENT)

More Related Content

What's hot

The EDUCAUSE Security Professionals Experience [ppt]
The EDUCAUSE Security Professionals Experience [ppt]The EDUCAUSE Security Professionals Experience [ppt]
The EDUCAUSE Security Professionals Experience [ppt]
Videoguy
 
March cybersecurity powerpoint
March cybersecurity powerpointMarch cybersecurity powerpoint
March cybersecurity powerpoint
Courtney King
 
CSCSS / DEFENCE INTELLIGENCE GROUP
CSCSS / DEFENCE INTELLIGENCE GROUPCSCSS / DEFENCE INTELLIGENCE GROUP
CSCSS / DEFENCE INTELLIGENCE GROUP
Centre for Strategic Cyberspace + Security Science
 
CTO-Cybersecurity-Forum2010-Thomas-Machdonogh
CTO-Cybersecurity-Forum2010-Thomas-MachdonoghCTO-Cybersecurity-Forum2010-Thomas-Machdonogh
CTO-Cybersecurity-Forum2010-Thomas-Machdonogh
segughana
 
CYBERSECURITY CYBERCRIME CYBER INTELLIGENCE GROUP
CYBERSECURITY CYBERCRIME CYBER INTELLIGENCE GROUPCYBERSECURITY CYBERCRIME CYBER INTELLIGENCE GROUP
CYBERSECURITY CYBERCRIME CYBER INTELLIGENCE GROUP
Centre for Strategic Cyberspace + Security Science
 
C3i Group Cyber Law
C3i Group Cyber LawC3i Group Cyber Law
Digital citizenship, briefly
Digital citizenship, brieflyDigital citizenship, briefly
Digital citizenship, briefly
ConnectSafely
 
National Cyber Security Policy 2013 (NCSP)
National Cyber Security Policy 2013 (NCSP)National Cyber Security Policy 2013 (NCSP)
National Cyber Security Policy 2013 (NCSP)
Gopal Choudhary
 
Enhanced Cryptographic Solution for Security Issues Faced by Saudi Arabian un...
Enhanced Cryptographic Solution for Security Issues Faced by Saudi Arabian un...Enhanced Cryptographic Solution for Security Issues Faced by Saudi Arabian un...
Enhanced Cryptographic Solution for Security Issues Faced by Saudi Arabian un...
MajedahAlkharji
 
Copenhagen Presentation
Copenhagen PresentationCopenhagen Presentation
Copenhagen Presentation
seancostigan
 

What's hot (10)

The EDUCAUSE Security Professionals Experience [ppt]
The EDUCAUSE Security Professionals Experience [ppt]The EDUCAUSE Security Professionals Experience [ppt]
The EDUCAUSE Security Professionals Experience [ppt]
 
March cybersecurity powerpoint
March cybersecurity powerpointMarch cybersecurity powerpoint
March cybersecurity powerpoint
 
CSCSS / DEFENCE INTELLIGENCE GROUP
CSCSS / DEFENCE INTELLIGENCE GROUPCSCSS / DEFENCE INTELLIGENCE GROUP
CSCSS / DEFENCE INTELLIGENCE GROUP
 
CTO-Cybersecurity-Forum2010-Thomas-Machdonogh
CTO-Cybersecurity-Forum2010-Thomas-MachdonoghCTO-Cybersecurity-Forum2010-Thomas-Machdonogh
CTO-Cybersecurity-Forum2010-Thomas-Machdonogh
 
CYBERSECURITY CYBERCRIME CYBER INTELLIGENCE GROUP
CYBERSECURITY CYBERCRIME CYBER INTELLIGENCE GROUPCYBERSECURITY CYBERCRIME CYBER INTELLIGENCE GROUP
CYBERSECURITY CYBERCRIME CYBER INTELLIGENCE GROUP
 
C3i Group Cyber Law
C3i Group Cyber LawC3i Group Cyber Law
C3i Group Cyber Law
 
Digital citizenship, briefly
Digital citizenship, brieflyDigital citizenship, briefly
Digital citizenship, briefly
 
National Cyber Security Policy 2013 (NCSP)
National Cyber Security Policy 2013 (NCSP)National Cyber Security Policy 2013 (NCSP)
National Cyber Security Policy 2013 (NCSP)
 
Enhanced Cryptographic Solution for Security Issues Faced by Saudi Arabian un...
Enhanced Cryptographic Solution for Security Issues Faced by Saudi Arabian un...Enhanced Cryptographic Solution for Security Issues Faced by Saudi Arabian un...
Enhanced Cryptographic Solution for Security Issues Faced by Saudi Arabian un...
 
Copenhagen Presentation
Copenhagen PresentationCopenhagen Presentation
Copenhagen Presentation
 

Similar to Center for Public Safety and Cybersecurity Education

UCISA cyber incident response toolkit.pptx
UCISA cyber incident response toolkit.pptxUCISA cyber incident response toolkit.pptx
UCISA cyber incident response toolkit.pptx
ucisa
 
Communicating cybersecurity
Communicating cybersecurityCommunicating cybersecurity
Communicating cybersecurity
Jisc
 
STAYING SAFE AND SECURED ON TODAY AND TOMORROW’S AFRICA CYBERSPACE WORKSHOP 2017
STAYING SAFE AND SECURED ON TODAY AND TOMORROW’S AFRICA CYBERSPACE WORKSHOP 2017STAYING SAFE AND SECURED ON TODAY AND TOMORROW’S AFRICA CYBERSPACE WORKSHOP 2017
STAYING SAFE AND SECURED ON TODAY AND TOMORROW’S AFRICA CYBERSPACE WORKSHOP 2017
Maurice Dawson
 
Conference on Digital Forensics & Cyber Security 2016
Conference on Digital Forensics & Cyber Security 2016Conference on Digital Forensics & Cyber Security 2016
Conference on Digital Forensics & Cyber Security 2016
Kayisa Herman Dube
 
Cyber capability brochureCybersecurity Today A fresh l.docx
Cyber capability brochureCybersecurity Today  A fresh l.docxCyber capability brochureCybersecurity Today  A fresh l.docx
Cyber capability brochureCybersecurity Today A fresh l.docx
faithxdunce63732
 
Enhancing Cyber Security Awareness: Building a Safer Digital World
Enhancing Cyber Security Awareness: Building a Safer Digital WorldEnhancing Cyber Security Awareness: Building a Safer Digital World
Enhancing Cyber Security Awareness: Building a Safer Digital World
cyberprosocial
 
neww mile new mile new mile new new.pptx
neww mile new mile new mile new new.pptxneww mile new mile new mile new new.pptx
neww mile new mile new mile new new.pptx
3aw307
 
OpenText Cyber Resilience Fastrak
OpenText Cyber Resilience FastrakOpenText Cyber Resilience Fastrak
OpenText Cyber Resilience Fastrak
Marc St-Pierre
 
Cybersecurity Management Principles, 12 - 15 Nov 2017 Dubai, UAE
Cybersecurity Management Principles, 12 - 15 Nov 2017 Dubai, UAECybersecurity Management Principles, 12 - 15 Nov 2017 Dubai, UAE
Cybersecurity Management Principles, 12 - 15 Nov 2017 Dubai, UAE
360 BSI
 
Aceds 2015 Cyberseucity and the Legal Profession - NYC - April 7, 2015
Aceds 2015 Cyberseucity and the Legal Profession - NYC - April 7, 2015Aceds 2015 Cyberseucity and the Legal Profession - NYC - April 7, 2015
Aceds 2015 Cyberseucity and the Legal Profession - NYC - April 7, 2015
Joe Bartolo
 
Cybersecurity Management Principles, 11 - 14 Sept 2017 KL, Malaysia / 17 - 20...
Cybersecurity Management Principles, 11 - 14 Sept 2017 KL, Malaysia / 17 - 20...Cybersecurity Management Principles, 11 - 14 Sept 2017 KL, Malaysia / 17 - 20...
Cybersecurity Management Principles, 11 - 14 Sept 2017 KL, Malaysia / 17 - 20...
360 BSI
 
CISSP Certification Training Course
CISSP Certification Training CourseCISSP Certification Training Course
CISSP Certification Training Course
Ricky Lionel Vaz
 
Fissea09 mgupta-day3-panel process-program-build-effective-training
Fissea09 mgupta-day3-panel process-program-build-effective-trainingFissea09 mgupta-day3-panel process-program-build-effective-training
Fissea09 mgupta-day3-panel process-program-build-effective-training
Swati Gupta
 
Cybersecurity Marketing
Cybersecurity MarketingCybersecurity Marketing
Cybersecurity Marketing
Alex Weishaupt
 
Webinar - Reducing Your Cybersecurity Risk
Webinar - Reducing Your Cybersecurity RiskWebinar - Reducing Your Cybersecurity Risk
Webinar - Reducing Your Cybersecurity Risk
WPICPE
 
Session 1.2 Professor Sadie Creese
Session 1.2 Professor Sadie CreeseSession 1.2 Professor Sadie Creese
Session 1.2 Professor Sadie Creese
Commonwealth Telecommunications Organisation
 
CYBER ARTICLE ON LMCO
CYBER ARTICLE ON LMCOCYBER ARTICLE ON LMCO
CYBER ARTICLE ON LMCO
Susan L. Martin
 
How Do You Create A Successful Information Security Program Hire A Great Iso!!
How Do You Create A Successful Information Security Program  Hire A Great Iso!!How Do You Create A Successful Information Security Program  Hire A Great Iso!!
How Do You Create A Successful Information Security Program Hire A Great Iso!!
Tammy Clark
 
Ikeepsafe Cyber Safety, Ethics and Security Competencies
Ikeepsafe Cyber Safety, Ethics and Security CompetenciesIkeepsafe Cyber Safety, Ethics and Security Competencies
Ikeepsafe Cyber Safety, Ethics and Security Competencies
John Macasio
 
Comprehensive Health and Safety Consulting Services from Stream Data Centers
Comprehensive Health and Safety Consulting Services from Stream Data CentersComprehensive Health and Safety Consulting Services from Stream Data Centers
Comprehensive Health and Safety Consulting Services from Stream Data Centers
kanew396
 

Similar to Center for Public Safety and Cybersecurity Education (20)

UCISA cyber incident response toolkit.pptx
UCISA cyber incident response toolkit.pptxUCISA cyber incident response toolkit.pptx
UCISA cyber incident response toolkit.pptx
 
Communicating cybersecurity
Communicating cybersecurityCommunicating cybersecurity
Communicating cybersecurity
 
STAYING SAFE AND SECURED ON TODAY AND TOMORROW’S AFRICA CYBERSPACE WORKSHOP 2017
STAYING SAFE AND SECURED ON TODAY AND TOMORROW’S AFRICA CYBERSPACE WORKSHOP 2017STAYING SAFE AND SECURED ON TODAY AND TOMORROW’S AFRICA CYBERSPACE WORKSHOP 2017
STAYING SAFE AND SECURED ON TODAY AND TOMORROW’S AFRICA CYBERSPACE WORKSHOP 2017
 
Conference on Digital Forensics & Cyber Security 2016
Conference on Digital Forensics & Cyber Security 2016Conference on Digital Forensics & Cyber Security 2016
Conference on Digital Forensics & Cyber Security 2016
 
Cyber capability brochureCybersecurity Today A fresh l.docx
Cyber capability brochureCybersecurity Today  A fresh l.docxCyber capability brochureCybersecurity Today  A fresh l.docx
Cyber capability brochureCybersecurity Today A fresh l.docx
 
Enhancing Cyber Security Awareness: Building a Safer Digital World
Enhancing Cyber Security Awareness: Building a Safer Digital WorldEnhancing Cyber Security Awareness: Building a Safer Digital World
Enhancing Cyber Security Awareness: Building a Safer Digital World
 
neww mile new mile new mile new new.pptx
neww mile new mile new mile new new.pptxneww mile new mile new mile new new.pptx
neww mile new mile new mile new new.pptx
 
OpenText Cyber Resilience Fastrak
OpenText Cyber Resilience FastrakOpenText Cyber Resilience Fastrak
OpenText Cyber Resilience Fastrak
 
Cybersecurity Management Principles, 12 - 15 Nov 2017 Dubai, UAE
Cybersecurity Management Principles, 12 - 15 Nov 2017 Dubai, UAECybersecurity Management Principles, 12 - 15 Nov 2017 Dubai, UAE
Cybersecurity Management Principles, 12 - 15 Nov 2017 Dubai, UAE
 
Aceds 2015 Cyberseucity and the Legal Profession - NYC - April 7, 2015
Aceds 2015 Cyberseucity and the Legal Profession - NYC - April 7, 2015Aceds 2015 Cyberseucity and the Legal Profession - NYC - April 7, 2015
Aceds 2015 Cyberseucity and the Legal Profession - NYC - April 7, 2015
 
Cybersecurity Management Principles, 11 - 14 Sept 2017 KL, Malaysia / 17 - 20...
Cybersecurity Management Principles, 11 - 14 Sept 2017 KL, Malaysia / 17 - 20...Cybersecurity Management Principles, 11 - 14 Sept 2017 KL, Malaysia / 17 - 20...
Cybersecurity Management Principles, 11 - 14 Sept 2017 KL, Malaysia / 17 - 20...
 
CISSP Certification Training Course
CISSP Certification Training CourseCISSP Certification Training Course
CISSP Certification Training Course
 
Fissea09 mgupta-day3-panel process-program-build-effective-training
Fissea09 mgupta-day3-panel process-program-build-effective-trainingFissea09 mgupta-day3-panel process-program-build-effective-training
Fissea09 mgupta-day3-panel process-program-build-effective-training
 
Cybersecurity Marketing
Cybersecurity MarketingCybersecurity Marketing
Cybersecurity Marketing
 
Webinar - Reducing Your Cybersecurity Risk
Webinar - Reducing Your Cybersecurity RiskWebinar - Reducing Your Cybersecurity Risk
Webinar - Reducing Your Cybersecurity Risk
 
Session 1.2 Professor Sadie Creese
Session 1.2 Professor Sadie CreeseSession 1.2 Professor Sadie Creese
Session 1.2 Professor Sadie Creese
 
CYBER ARTICLE ON LMCO
CYBER ARTICLE ON LMCOCYBER ARTICLE ON LMCO
CYBER ARTICLE ON LMCO
 
How Do You Create A Successful Information Security Program Hire A Great Iso!!
How Do You Create A Successful Information Security Program  Hire A Great Iso!!How Do You Create A Successful Information Security Program  Hire A Great Iso!!
How Do You Create A Successful Information Security Program Hire A Great Iso!!
 
Ikeepsafe Cyber Safety, Ethics and Security Competencies
Ikeepsafe Cyber Safety, Ethics and Security CompetenciesIkeepsafe Cyber Safety, Ethics and Security Competencies
Ikeepsafe Cyber Safety, Ethics and Security Competencies
 
Comprehensive Health and Safety Consulting Services from Stream Data Centers
Comprehensive Health and Safety Consulting Services from Stream Data CentersComprehensive Health and Safety Consulting Services from Stream Data Centers
Comprehensive Health and Safety Consulting Services from Stream Data Centers
 

Recently uploaded

UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
DianaGray10
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
Neo4j
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
名前 です男
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
panagenda
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
Zilliz
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
shyamraj55
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
Daiki Mogmet Ito
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
Zilliz
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
danishmna97
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
Matthew Sinclair
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
Matthew Sinclair
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
Neo4j
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
SOFTTECHHUB
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
innovationoecd
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
DianaGray10
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
Pixlogix Infotech
 

Recently uploaded (20)

UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
 

Center for Public Safety and Cybersecurity Education

  • 1. AN INTERDISCIPLINARY CENTER FOR ACADEMIC, RESEARCH, AND NON-CREDIT PROGRAMS
  • 2. VISION The Center for Public Safety and Cybersecurity Education will be a comprehensive source for leading-edge research, training and education related to public safety and cybersecurity, specifically serving as a place to:  Advance public safety and cybersecurity education.  Develop partnerships that increase awareness and advance education.  Address the convergence between public safety and cybersecurity education through an interdisciplinary approach.  Increase the number of individuals with the skills necessary to be employed in public safety and cybersecurity.  Collaborate with industry to solve the talent shortage in public safety and cybersecurity through education and training.
  • 4. BOARD OF ADVISORS  Roni Burkes, Warden, Ohio Reformatory for Women  Lisa Chambers, National Executive Director, TECH CORPS  Kimberly Cocroft, Judge, Franklin County Court of Common Pleas  Lea Culver, President, Creek Technologies  Matt Curtin, Founder, Interhack  Fred Kauser, Deputy Fire Chief, Mifflin  Zach Klein, Columbus City Attorney  Allen Perk, President, XLN Systems  Ned Pettus, Director of Public Safety  Ervan Rodgers, Ohio Attorney General’s Office CIO  Justin Root, Attorney, Dickinson Wright  Robert Stewart, Assistant Director of Public Safety  David White, Battelle CIO  Anthony Wilson, Assistant Chief, Westerville Police Department  Matthew Yerkes, Executive Director, Cultivate
  • 5. ACADEMIC PROGRAMS Associate Degree o Criminal Justice Administration o Cybersecurity Bachelor’s Degree o Criminal Justice Administration o Cybersecurity o Emergency Management & Homeland Security o Public Safety Management & Leadership Master’s Degree o Public Administration (MPA) o Criminal Justice Administration Certificates Public Safety o Criminal Justice Leadership Graduate Certificate Technology, Analytics and Project Management core: o Introductory Certificate in Web Development o Advanced Certificate in Business Analysis (credit) o Advanced Certificate in Project Management (credit) o Advanced Certificate in Web Development (non-credit) o Advanced Certificate in Systems Administration (non-credit) o Advanced Certificate in Data Analytics (non-credit) Cyber core (non-credit offerings): o Advanced Certificate in Information Assurance o Advanced Certificate in Cybersecurity o Advanced Certificate in Software Security
  • 6. PARTNER SOLUTIONS & WORKFORCE TRAINING  Provide education, training and awareness programs to industry professionals and the public.  Facilitate customized training cohorts within individual organizations, agencies, and businesses.  Work with students and employers to evaluate job training, certification, or experience and offer college credit where applicable.  Partner with professional certification agencies to offer introductory, intermediate and advanced certification courses in public safety and cybersecurity.  Lead interdisciplinary collaborative research activities to address practical industry, government and community challenges.  Offer course development and instructional design expertise to industry, community and academic clients in the public safety and cybersecurity disciplines.  Provide program evaluation services for programs and practices to support or respond to grant requirements.  Expert consulting services available for an array of topics including, but not limited to, criminal justice, law enforcement, fire services, emergency management, cyber forensics, cybersecurity, systems administration, network security, and more.
  • 7. PROFESSIONAL TRAINING TOPICS  Crypto Modules  Cybersecurity Essentials  EC-Council Certified Ethical Hacker  EC-Council Certified Security Analyst  EC-Council Computer Hacking Forensic Investigator  Identity Access Management  Overall Business Security  Payment Card Industry (PCI) security  Platform Specific Security  Secure Software Development Life Cycle  User Interface Security  Web Application Security  Community Policing Initiatives  Fire Officer 1 & 2  Law Enforcement Leadership  Police & Youth  Search & Seizure Franklin University is an industry leader in customized workforce training and adult education.
  • 8. CASE STUDY: CORE PARTNERSHIP (CENTRAL OHIO REGIONAL ENFORCEMENT) Local Government Innovation Grant: Shared Law Enforcement Training Services Feasibility Project
  • 9. CORE PARTNERSHIP (CENTRAL OHIO REGIONAL ENFORCEMENT)