SlideShare a Scribd company logo
Welcome to the April 2018
Webinar Plus Degree Briefing
1
2
Our Agenda Today:
1. Introduction and Overview of ERAU
--Bill Gibbs
2. Bachelor of Science in Aviation Security
--Dr. Daniel Benny
3. Master of Science in Cybersecurity Management and Policy
--Dr. Glenn Dardick
4. Master of Science in Cybersecurity Engineering
5. Professional Education Non-Degree Program in Cybersecurity
--Sarah Ochs
Embry-Riddle Aeronautical University
• Fully-accredited, independent, nonprofit university based in Daytona Beach, Florida
• Oldest (1926) and most prestigious aviation-related university in the world
• More than 70 undergraduate and graduate degrees (Associates to Ph.D.) + Professional Education
• 32,000 students
Worldwide Campus
• 130 campuses around the world
• Classroom, Real-time Virtual Classroom, Online
About ERAU
3
AVIATION SECURITY
Bachelor of Science
Daniel J. Benny, Ph.D., CPP, CM, ACE
Program Chair
• Designed to meet the needs and demands of:
– Aviation/Aerospace Industry
– Security Industry
• Program Launch Date: January, 2014
• Modality: Online, Eagle Vision/Home, Classroom
BS Aviation Security
• Students will be introduced to aviation security
courses related to:
– Airport Security
– Airline Security
– General Aviation Security
– Corporate Security
– Physical Security
– Aviation Legislation
– Airport Management
– National Security and Intelligence
Science and Practical
Application
• High School Graduates
• Two Year College Graduates
• Security Professionals
• Aviation Professionals
• Active and Transitioning Military
Focus Market
• Transportation Security Administration
• Federal Intelligence Agencies
• U.S. Air Force Security Police
• Airline or Airport Security
• Corporate Aviation Security
• Law Enforcement
• Other Security
Career
Interest
TSA Salary Range
• Screener $29,300-$44,000
• Supervisor $33,600-$50,400
• Inspector $48,000-$74,300
• Federal Security Director $120,200-$155,500
Source: TSA
Entry
Salary Ranges
Federal Intelligence Agencies
• $28,500-$36,500
U.S. Air Force Security Police
• $23,000-$28,000
Airline or Airport Security
• $27,000-$35,000
Corporate Aviation Security
• $30,000-$40,000
Law Enforcement
• $45,000-$55,000
Source: ASIS International
Salary Ranges
Other Security
Entry Security Officer
• $18,000- $21,000
Security Manager
• $30,000-$50,000
Security Director
• $75,000- $100,000
Chief Security Officer/Global Security Director
• $125,000-$250,000
Source: ASIS International
Professional
Certifications
The degree can also prepare the student for testing to obtain the following
professional security and aviation certifications.
ASIS International
• Certified Protection Professional - CPP
American Association of Airport Executives
• Certified Member - CM (Security Component)
• Accredited Airport Executive - AAE (Security Component)
• Airport Certified Employee/Security - ACE
• Airport Security Coordinator - ASC
• Specialized to the Aviation Security
Profession
• Covers Current Aviation Regulations,
Industry Standards and Practices
• Prepares the Student for Any Security
Environment
• It is an Embry-Riddle Degree
Value of the Degree
1962 Cessna C-150 Questions?
DR. GLENN S. DARDICK
MASTER OF SCIENCE
CYBERSECURITY MANAGEMENT & POLICY
• Geared for non-technical students as well as
students with prior technical expertise
• Project and policy expertise for managers
• Oversight of human and digital resources
• Homeland Security
THE NEED
• Recent cyber attacks
 Target, Home Depot, Goodwill
• Economic incentives for cyber attacks
 Threats from China, Russia
• Information driven society
 Need to protect financial and medical information
• All levels of government, industry and academia
 Need for policies, security of information, cloud
computing
PROGRAM GOALS
& FOCUS
• Answers the need for cyber security expertise
 Government and industry
• Support multiple disciplinary group of professionals
 Management policy, law, leadership, security, defense
• Target Audience
 Homeland Security, military, business, government
• Focused on management and policy
 Differs from other degree programs focusing on technology
expertise
PROGRAM
• 100% Online
• 30 Credit hour program
• Developed by the Daytona Beach Faculty
• AND …
• Graduate Certificate in Aviation Cybersecurity Management & Policy
• adding two new courses to be developed. Grad. Cert. can be started in fall
(take two existing courses), presuming that the new courses are available
by October/November
• Aviation track in M.S, Cybersecurity Management & Policy
• Can be started at any time; two new courses (same as above) should be
completed by October/November
THE DIFFERENCE
• Complements, does not compete with, the
Daytona Beach Cybersecurity Engineering
degree program. This is not a program
focused on technology expertise.
• Differs from the Intelligence degree program
at Prescott. Again, the MCMP degree is
focused more on Management and Policy.
OPPORTUNITIES
• The MCMP degree is intended to assist those
in technology careers to advance to
supervisory and management roles
• The MCMP degree is intended to assist those
already in supervisory and management roles
to better understand how to manage areas
having responsibilities for cybersecurity.
MASTER OF SCIENCE IN CYBERSECURITY
MANAGEMENT & POLICY
MCMP 501
THE INTERNET, GOVERNANCE AND SECURITY
• This course examines how the Internet and associated communication
technologies have created new means for people to organize, both within
their local communities and across great distances, changing the nature
of the relationship between society and the institutions of government.
• The Internet has allowed people to communicate, often without detection,
that has resulted in both positive and negative effects; e.g., Internet-
based communications have been a significant factor in the both the
growth of transnational terrorism and popular uprisings such as the Arab
Spring.
• In response, governments have often attempted to control the Internet, in
some cases to aid legitimate law enforcement, in others to repress
restless populations seeking change. State institutions can also use
these technologies to create more effective governance and better
response to humanitarian crises.
MCMP 510
THE PRACTICE OF CYBERSECURITY
• The course introduces principles of cybersecurity, providing a framework covering
technical, legal, and managerial issues.
• Students will examine computer and network security from the perspectives of the
industry-standard ten core bodies of knowledge:
• access control;
• telecommunications and network
security;
• information security governance
and risk management;
• software development security;
• cryptography;
• security architecture and design;
• operations security;
• business continuity and disaster
recovery planning;
• legal, regulations, investigations and
compliance; and
• physical (environmental) security.
MCMP 520
SECURITY ENGINEERING AND MANAGEMENT
• This course is designed to teach how cybersecurity should be integrated
early on in any project or other use of information in a computer or
network setting.
• Emphasis is placed on the relationship between information and the
operation and mission of an agency, business, organization, or other
entity.
• This course specifically ties together information and communications
technology (ICT), cybersecurity, business, policies, and ethics.
• Topics include security engineering concepts (although this is not an
engineering course), distributed systems, network attacks and defense,
security management, encryption, the role of training and education, and
more.
MCMP 615
POLICY AND LAW IN CYBERSPACE
• Cyberspace has emerged as a "real" place where people
congregate, crimes occur, social changes are initiated, and a
majority of our work takes place.
• Whereas the physical world — and law and policy that impact the
physical world — can be constrained by geopolitical boundaries, it
is literally impossible to similarly constrain activities in cyberspace.
• For that reason, cyberspace itself is a virtual universe — one that
is global and where every Internet user is a citizen.
• This course describes emerging policies and laws that affect
cyberspace, particularly those related to information security and
cybercrime. The clash between real space and cyberspace is also
examined.
MCMP 650
EMERGING TOPICS IN CYBERSECURITY
• This course examines the current research literature
concerning issues related to cybersecurity.
• Topics will include, but not be limited to, current research
topics in information assurance, cybersecurity policy,
information warfare and the Advanced Persistent Threat,
policy and law in cyberspace, evolving information security
technologies and methods, new approaches to incident
response and digital forensics, emerging threats and
adversaries, and the impact of cybersecurity on society and
organizations.
• Students will focus on research techniques, as well as the
presentation of results, legal issues, and relevant
technologies.
MCMP 690/691
CYBERSECURITY MANAGEMENT AND POLICY
CAPSTONE
• The capstone provides students with the opportunity to
integrate all disciplines and competencies that have been
learned in this program, plus their past experiences and
professional goals, into a single work-based project,
internship experience, or other appropriate activity.
• The project will be the culmination of a student's studies
integrated in their area of specialization or expertise.
• In cooperation with an advisor, the student will design,
research, and implement a project that is comprehensive in
nature and which addresses, to the extent feasible, all core
areas of knowledge around which the program has been built
QUESTIONS
Dr. Gary Kessler, Dept. Chair SSIA,
kessleg1@erau.edu
Dr. Glenn S. Dardick Program Chair,
dardickg@erau.edu
•Bureau of Labor Statistics states
Cybersecurity jobs will have 18%
growth rate (much higher than average)
for 2014-2024
•Forbes states that cybersecurity engineers
command almost 10% more salary than other
areas in IT
Over 209,000 cybersecurity jobs in the
U.S. are unfilled
Postings are up 74% over the past five
years
Master of Cybersecurity Engineering
(MSCybE)
Jobs
• Cybersecurity Engineer
• System Design & Implementation
• Information Security Analyst
• Penetration Tester
• Malware Analyst
• Offense/Defense Ops Member
• Digital Forensics Investigator
Focus Areas
• Cybersecurity in Aviation & Aerospace
Systems
• UAS
• Satellite Systems
• Embedded Systems Security
• Aviation and Aerospace Cybersecurity
• Digital Forensics for Unmanned
Autonomous Systems
Program Overview
32
ERAU NextGen Task E
UAS Demonstration
Project
ERAU Project Lead Task E
Todd Waller
Date: October 9-11, 2018 (8am – 5pm)
Location: Daytona Beach, FL
Web: www.erau.edu/cyber
A professional short-course with a focus on
cybersecurity vulnerabilities to the aviation industry,
taught by industry experts.
Want to know how to ….
 Increase your awareness of how to identify cyber-related
vulnerabilities?
 Develop and apply mitigation strategies?
 Recognize threats and vulnerabilities to airport, aircraft,
and supporting systems?
Contact
 Email: dbproed@erau.edu
 Tel: 386.226.6928
 Web: erau.edu/cyber
Upcoming Webinar:
webinars.erau.edu

More Related Content

What's hot

IT Security Architecture & Leadership, 24 - 27 November 2013 Dubai UAE
IT Security Architecture & Leadership, 24 - 27 November 2013 Dubai UAEIT Security Architecture & Leadership, 24 - 27 November 2013 Dubai UAE
IT Security Architecture & Leadership, 24 - 27 November 2013 Dubai UAE
360 BSI
 
Internet safety and security strategies for building an internet safety wall
Internet safety and security strategies for building an internet safety wallInternet safety and security strategies for building an internet safety wall
Internet safety and security strategies for building an internet safety wall
Commonwealth Telecommunications Organisation
 
The Cyber Security Training Gap: Rotarian Reach
The Cyber Security Training Gap: Rotarian ReachThe Cyber Security Training Gap: Rotarian Reach
The Cyber Security Training Gap: Rotarian Reach
Rotary International
 
Cybersecurity education for the next generation
Cybersecurity education for the next generationCybersecurity education for the next generation
Cybersecurity education for the next generation
IBM Security
 
Webinar slides march 2022 nikki robinson
Webinar slides march 2022 nikki robinson Webinar slides march 2022 nikki robinson
Webinar slides march 2022 nikki robinson
CapitolTechU
 
IT Information Security Management Principles, 15 - 18 May 2016 Dubai UAE
IT Information Security Management Principles, 15 - 18 May 2016 Dubai UAEIT Information Security Management Principles, 15 - 18 May 2016 Dubai UAE
IT Information Security Management Principles, 15 - 18 May 2016 Dubai UAE
360 BSI
 
IT Information Security Management Principles, 28 February - 02 March 2016 Du...
IT Information Security Management Principles, 28 February - 02 March 2016 Du...IT Information Security Management Principles, 28 February - 02 March 2016 Du...
IT Information Security Management Principles, 28 February - 02 March 2016 Du...
360 BSI
 
ConnieJusticeCV-2016
ConnieJusticeCV-2016ConnieJusticeCV-2016
ConnieJusticeCV-2016
Connie Justice
 
Top schools in noida
Top schools in noidaTop schools in noida
Top schools in noida
Edhole.com
 
OCR cybersecurity
OCR cybersecurityOCR cybersecurity
OCR cybersecurity
UIUC Corporate Relations
 
AAS Cybersecurity 2 pages
AAS Cybersecurity 2 pagesAAS Cybersecurity 2 pages
AAS Cybersecurity 2 pages
Craig Chott, CISSP
 
12 security policies
12 security policies12 security policies
12 security policies
Saqib Raza
 
Erau webinar-applied information technologies
Erau webinar-applied information technologiesErau webinar-applied information technologies
Erau webinar-applied information technologies
ERAUWebinars
 
STAYING SAFE AND SECURED ON TODAY AND TOMORROW’S AFRICA CYBERSPACE WORKSHOP 2017
STAYING SAFE AND SECURED ON TODAY AND TOMORROW’S AFRICA CYBERSPACE WORKSHOP 2017STAYING SAFE AND SECURED ON TODAY AND TOMORROW’S AFRICA CYBERSPACE WORKSHOP 2017
STAYING SAFE AND SECURED ON TODAY AND TOMORROW’S AFRICA CYBERSPACE WORKSHOP 2017
Maurice Dawson
 
Fundamentals of threats and risk management course, cybersecurity
Fundamentals of threats and risk management course, cybersecurityFundamentals of threats and risk management course, cybersecurity
Fundamentals of threats and risk management course, cybersecurity
Tonex
 
Hacking the Helpdesk, Craig Clark
Hacking the Helpdesk, Craig ClarkHacking the Helpdesk, Craig Clark
Hacking the Helpdesk, Craig Clark
Service Desk Institute
 
2019-09-11 Workshop incident response n handling honeynet Universitas Indonesia
2019-09-11 Workshop incident response n handling honeynet Universitas Indonesia2019-09-11 Workshop incident response n handling honeynet Universitas Indonesia
2019-09-11 Workshop incident response n handling honeynet Universitas Indonesia
IGN MANTRA
 
Web profile
Web profileWeb profile
Web profile
Nuuko, Inc.
 
Using the CGC's Fully Automated Vulnerability Detection Tools in Security Eva...
Using the CGC's Fully Automated Vulnerability Detection Tools in Security Eva...Using the CGC's Fully Automated Vulnerability Detection Tools in Security Eva...
Using the CGC's Fully Automated Vulnerability Detection Tools in Security Eva...
Seungjoo Kim
 
Ikeepsafe Cyber Safety, Ethics and Security Competencies
Ikeepsafe Cyber Safety, Ethics and Security CompetenciesIkeepsafe Cyber Safety, Ethics and Security Competencies
Ikeepsafe Cyber Safety, Ethics and Security Competencies
John Macasio
 

What's hot (20)

IT Security Architecture & Leadership, 24 - 27 November 2013 Dubai UAE
IT Security Architecture & Leadership, 24 - 27 November 2013 Dubai UAEIT Security Architecture & Leadership, 24 - 27 November 2013 Dubai UAE
IT Security Architecture & Leadership, 24 - 27 November 2013 Dubai UAE
 
Internet safety and security strategies for building an internet safety wall
Internet safety and security strategies for building an internet safety wallInternet safety and security strategies for building an internet safety wall
Internet safety and security strategies for building an internet safety wall
 
The Cyber Security Training Gap: Rotarian Reach
The Cyber Security Training Gap: Rotarian ReachThe Cyber Security Training Gap: Rotarian Reach
The Cyber Security Training Gap: Rotarian Reach
 
Cybersecurity education for the next generation
Cybersecurity education for the next generationCybersecurity education for the next generation
Cybersecurity education for the next generation
 
Webinar slides march 2022 nikki robinson
Webinar slides march 2022 nikki robinson Webinar slides march 2022 nikki robinson
Webinar slides march 2022 nikki robinson
 
IT Information Security Management Principles, 15 - 18 May 2016 Dubai UAE
IT Information Security Management Principles, 15 - 18 May 2016 Dubai UAEIT Information Security Management Principles, 15 - 18 May 2016 Dubai UAE
IT Information Security Management Principles, 15 - 18 May 2016 Dubai UAE
 
IT Information Security Management Principles, 28 February - 02 March 2016 Du...
IT Information Security Management Principles, 28 February - 02 March 2016 Du...IT Information Security Management Principles, 28 February - 02 March 2016 Du...
IT Information Security Management Principles, 28 February - 02 March 2016 Du...
 
ConnieJusticeCV-2016
ConnieJusticeCV-2016ConnieJusticeCV-2016
ConnieJusticeCV-2016
 
Top schools in noida
Top schools in noidaTop schools in noida
Top schools in noida
 
OCR cybersecurity
OCR cybersecurityOCR cybersecurity
OCR cybersecurity
 
AAS Cybersecurity 2 pages
AAS Cybersecurity 2 pagesAAS Cybersecurity 2 pages
AAS Cybersecurity 2 pages
 
12 security policies
12 security policies12 security policies
12 security policies
 
Erau webinar-applied information technologies
Erau webinar-applied information technologiesErau webinar-applied information technologies
Erau webinar-applied information technologies
 
STAYING SAFE AND SECURED ON TODAY AND TOMORROW’S AFRICA CYBERSPACE WORKSHOP 2017
STAYING SAFE AND SECURED ON TODAY AND TOMORROW’S AFRICA CYBERSPACE WORKSHOP 2017STAYING SAFE AND SECURED ON TODAY AND TOMORROW’S AFRICA CYBERSPACE WORKSHOP 2017
STAYING SAFE AND SECURED ON TODAY AND TOMORROW’S AFRICA CYBERSPACE WORKSHOP 2017
 
Fundamentals of threats and risk management course, cybersecurity
Fundamentals of threats and risk management course, cybersecurityFundamentals of threats and risk management course, cybersecurity
Fundamentals of threats and risk management course, cybersecurity
 
Hacking the Helpdesk, Craig Clark
Hacking the Helpdesk, Craig ClarkHacking the Helpdesk, Craig Clark
Hacking the Helpdesk, Craig Clark
 
2019-09-11 Workshop incident response n handling honeynet Universitas Indonesia
2019-09-11 Workshop incident response n handling honeynet Universitas Indonesia2019-09-11 Workshop incident response n handling honeynet Universitas Indonesia
2019-09-11 Workshop incident response n handling honeynet Universitas Indonesia
 
Web profile
Web profileWeb profile
Web profile
 
Using the CGC's Fully Automated Vulnerability Detection Tools in Security Eva...
Using the CGC's Fully Automated Vulnerability Detection Tools in Security Eva...Using the CGC's Fully Automated Vulnerability Detection Tools in Security Eva...
Using the CGC's Fully Automated Vulnerability Detection Tools in Security Eva...
 
Ikeepsafe Cyber Safety, Ethics and Security Competencies
Ikeepsafe Cyber Safety, Ethics and Security CompetenciesIkeepsafe Cyber Safety, Ethics and Security Competencies
Ikeepsafe Cyber Safety, Ethics and Security Competencies
 

Similar to Erau cybersecurity and security degrees

Cyber Security and Digital Forensics, BSc(Hons) (ESOFT) 2022-23 (1).doc
Cyber Security and Digital Forensics, BSc(Hons) (ESOFT) 2022-23 (1).docCyber Security and Digital Forensics, BSc(Hons) (ESOFT) 2022-23 (1).doc
Cyber Security and Digital Forensics, BSc(Hons) (ESOFT) 2022-23 (1).doc
ThowfeekFayees
 
Supervising undergraduate-cybersecurity-projects
Supervising undergraduate-cybersecurity-projectsSupervising undergraduate-cybersecurity-projects
Supervising undergraduate-cybersecurity-projects
Arun Singh
 
July 20, 2016 Webcast for the Cybersecurity MS at NYU Tandon Online
July 20, 2016 Webcast for the Cybersecurity MS at NYU Tandon OnlineJuly 20, 2016 Webcast for the Cybersecurity MS at NYU Tandon Online
July 20, 2016 Webcast for the Cybersecurity MS at NYU Tandon Online
NYU Tandon Online
 
Online MS in Cybersecurity at NYU
Online MS in Cybersecurity at NYUOnline MS in Cybersecurity at NYU
Online MS in Cybersecurity at NYU
NYU Tandon Online
 
Saint Leo University by Study Metro
Saint Leo University by Study MetroSaint Leo University by Study Metro
Saint Leo University by Study Metro
Abhishek Bajaj
 
NYU Tandon Online M.S. In Cybersecurity Webinar
NYU Tandon Online M.S. In Cybersecurity WebinarNYU Tandon Online M.S. In Cybersecurity Webinar
NYU Tandon Online M.S. In Cybersecurity Webinar
NYU Tandon Online
 
AWS Educate: Accelerating Cybersecurity and Cloud Workforce Preparation with AWS
AWS Educate: Accelerating Cybersecurity and Cloud Workforce Preparation with AWSAWS Educate: Accelerating Cybersecurity and Cloud Workforce Preparation with AWS
AWS Educate: Accelerating Cybersecurity and Cloud Workforce Preparation with AWS
Amazon Web Services
 
Cybersecurity Management: Preventing Data Breaches in the Age of Big Data, 25...
Cybersecurity Management: Preventing Data Breaches in the Age of Big Data, 25...Cybersecurity Management: Preventing Data Breaches in the Age of Big Data, 25...
Cybersecurity Management: Preventing Data Breaches in the Age of Big Data, 25...
360 BSI
 
Erau webinar plus dec 2016 security degrees
Erau webinar plus dec 2016 security degreesErau webinar plus dec 2016 security degrees
Erau webinar plus dec 2016 security degrees
ERAUWebinars
 
Get training in cyber security & place yourself in good companies through...
Get training in cyber security & place yourself in good companies through...Get training in cyber security & place yourself in good companies through...
Get training in cyber security & place yourself in good companies through...
CCI Training Center
 
Cybersecurity for Automation Control and SCADA Systems
Cybersecurity for Automation Control and SCADA SystemsCybersecurity for Automation Control and SCADA Systems
Cybersecurity for Automation Control and SCADA Systems
Living Online
 
Get training in cyber security & place yourself in good companies through...
Get training in cyber security & place yourself in good companies through...Get training in cyber security & place yourself in good companies through...
Get training in cyber security & place yourself in good companies through...
CCI Training Center
 
Cyber Security_Presentation_KTH
Cyber Security_Presentation_KTHCyber Security_Presentation_KTH
Cyber Security_Presentation_KTH
Awais Shibli
 
Erau webinar plus jan2017 safety degrees
Erau webinar plus jan2017 safety degreesErau webinar plus jan2017 safety degrees
Erau webinar plus jan2017 safety degrees
ERAUWebinars
 
How to Get into Cybersecurity 2024 Action Plan.pptx
How to Get into Cybersecurity  2024 Action Plan.pptxHow to Get into Cybersecurity  2024 Action Plan.pptx
How to Get into Cybersecurity 2024 Action Plan.pptx
AkhilKumar529314
 
Pmd prospective students 2.22.2222
Pmd prospective students 2.22.2222Pmd prospective students 2.22.2222
Pmd prospective students 2.22.2222
KevinAlt1
 
chapter 1. Introduction to Information Security
chapter 1. Introduction to Information Security chapter 1. Introduction to Information Security
chapter 1. Introduction to Information Security
elmuhammadmuhammad
 
mille2.pptx
mille2.pptxmille2.pptx
mille2.pptx
yehyaibrahem2
 
A Strategy for Addressing Cyber Security Challenges
A Strategy for Addressing Cyber Security Challenges A Strategy for Addressing Cyber Security Challenges
A Strategy for Addressing Cyber Security Challenges
Cybersecurity Education and Research Centre
 
Business cases internet 30 use cases
Business cases internet 30 use casesBusiness cases internet 30 use cases
Business cases internet 30 use cases
Priyanka Aash
 

Similar to Erau cybersecurity and security degrees (20)

Cyber Security and Digital Forensics, BSc(Hons) (ESOFT) 2022-23 (1).doc
Cyber Security and Digital Forensics, BSc(Hons) (ESOFT) 2022-23 (1).docCyber Security and Digital Forensics, BSc(Hons) (ESOFT) 2022-23 (1).doc
Cyber Security and Digital Forensics, BSc(Hons) (ESOFT) 2022-23 (1).doc
 
Supervising undergraduate-cybersecurity-projects
Supervising undergraduate-cybersecurity-projectsSupervising undergraduate-cybersecurity-projects
Supervising undergraduate-cybersecurity-projects
 
July 20, 2016 Webcast for the Cybersecurity MS at NYU Tandon Online
July 20, 2016 Webcast for the Cybersecurity MS at NYU Tandon OnlineJuly 20, 2016 Webcast for the Cybersecurity MS at NYU Tandon Online
July 20, 2016 Webcast for the Cybersecurity MS at NYU Tandon Online
 
Online MS in Cybersecurity at NYU
Online MS in Cybersecurity at NYUOnline MS in Cybersecurity at NYU
Online MS in Cybersecurity at NYU
 
Saint Leo University by Study Metro
Saint Leo University by Study MetroSaint Leo University by Study Metro
Saint Leo University by Study Metro
 
NYU Tandon Online M.S. In Cybersecurity Webinar
NYU Tandon Online M.S. In Cybersecurity WebinarNYU Tandon Online M.S. In Cybersecurity Webinar
NYU Tandon Online M.S. In Cybersecurity Webinar
 
AWS Educate: Accelerating Cybersecurity and Cloud Workforce Preparation with AWS
AWS Educate: Accelerating Cybersecurity and Cloud Workforce Preparation with AWSAWS Educate: Accelerating Cybersecurity and Cloud Workforce Preparation with AWS
AWS Educate: Accelerating Cybersecurity and Cloud Workforce Preparation with AWS
 
Cybersecurity Management: Preventing Data Breaches in the Age of Big Data, 25...
Cybersecurity Management: Preventing Data Breaches in the Age of Big Data, 25...Cybersecurity Management: Preventing Data Breaches in the Age of Big Data, 25...
Cybersecurity Management: Preventing Data Breaches in the Age of Big Data, 25...
 
Erau webinar plus dec 2016 security degrees
Erau webinar plus dec 2016 security degreesErau webinar plus dec 2016 security degrees
Erau webinar plus dec 2016 security degrees
 
Get training in cyber security & place yourself in good companies through...
Get training in cyber security & place yourself in good companies through...Get training in cyber security & place yourself in good companies through...
Get training in cyber security & place yourself in good companies through...
 
Cybersecurity for Automation Control and SCADA Systems
Cybersecurity for Automation Control and SCADA SystemsCybersecurity for Automation Control and SCADA Systems
Cybersecurity for Automation Control and SCADA Systems
 
Get training in cyber security & place yourself in good companies through...
Get training in cyber security & place yourself in good companies through...Get training in cyber security & place yourself in good companies through...
Get training in cyber security & place yourself in good companies through...
 
Cyber Security_Presentation_KTH
Cyber Security_Presentation_KTHCyber Security_Presentation_KTH
Cyber Security_Presentation_KTH
 
Erau webinar plus jan2017 safety degrees
Erau webinar plus jan2017 safety degreesErau webinar plus jan2017 safety degrees
Erau webinar plus jan2017 safety degrees
 
How to Get into Cybersecurity 2024 Action Plan.pptx
How to Get into Cybersecurity  2024 Action Plan.pptxHow to Get into Cybersecurity  2024 Action Plan.pptx
How to Get into Cybersecurity 2024 Action Plan.pptx
 
Pmd prospective students 2.22.2222
Pmd prospective students 2.22.2222Pmd prospective students 2.22.2222
Pmd prospective students 2.22.2222
 
chapter 1. Introduction to Information Security
chapter 1. Introduction to Information Security chapter 1. Introduction to Information Security
chapter 1. Introduction to Information Security
 
mille2.pptx
mille2.pptxmille2.pptx
mille2.pptx
 
A Strategy for Addressing Cyber Security Challenges
A Strategy for Addressing Cyber Security Challenges A Strategy for Addressing Cyber Security Challenges
A Strategy for Addressing Cyber Security Challenges
 
Business cases internet 30 use cases
Business cases internet 30 use casesBusiness cases internet 30 use cases
Business cases internet 30 use cases
 

More from ERAUWebinars

ERAU Webinar june 2019 Resumes that Work!
ERAU Webinar june 2019 Resumes that Work!ERAU Webinar june 2019 Resumes that Work!
ERAU Webinar june 2019 Resumes that Work!
ERAUWebinars
 
ERAU Webinar May 2019 NTSB Accicent Investigation
ERAU Webinar May 2019 NTSB Accicent InvestigationERAU Webinar May 2019 NTSB Accicent Investigation
ERAU Webinar May 2019 NTSB Accicent Investigation
ERAUWebinars
 
ERAU Webinar April 2019 Are Drones a Threat?
ERAU Webinar April 2019 Are Drones a Threat?ERAU Webinar April 2019 Are Drones a Threat?
ERAU Webinar April 2019 Are Drones a Threat?
ERAUWebinars
 
ERAU Webinar March 2019 Leadership Fatal Flaws
ERAU Webinar March 2019 Leadership Fatal FlawsERAU Webinar March 2019 Leadership Fatal Flaws
ERAU Webinar March 2019 Leadership Fatal Flaws
ERAUWebinars
 
Webinar ERAU personality webinar Jan 2019
Webinar ERAU personality webinar Jan 2019Webinar ERAU personality webinar Jan 2019
Webinar ERAU personality webinar Jan 2019
ERAUWebinars
 
Erau webinar may 2018 resumes
Erau webinar may 2018 resumesErau webinar may 2018 resumes
Erau webinar may 2018 resumes
ERAUWebinars
 
Erau webinar april 2018 Aviation Cybersecurity
Erau webinar april 2018 Aviation CybersecurityErau webinar april 2018 Aviation Cybersecurity
Erau webinar april 2018 Aviation Cybersecurity
ERAUWebinars
 
ERAU webinar: Aviation English for Flight Training
ERAU webinar: Aviation English for Flight Training ERAU webinar: Aviation English for Flight Training
ERAU webinar: Aviation English for Flight Training
ERAUWebinars
 
ERAU webinar plus march 15 2018
ERAU webinar plus march 15 2018 ERAU webinar plus march 15 2018
ERAU webinar plus march 15 2018
ERAUWebinars
 
Embry-Riddle Unmanned Systems Degrees and Programs
Embry-Riddle Unmanned Systems Degrees and ProgramsEmbry-Riddle Unmanned Systems Degrees and Programs
Embry-Riddle Unmanned Systems Degrees and Programs
ERAUWebinars
 
Erau webinar jan 24 2018 -pilot profiling
Erau webinar jan 24 2018 -pilot profilingErau webinar jan 24 2018 -pilot profiling
Erau webinar jan 24 2018 -pilot profiling
ERAUWebinars
 
Slides erau webinar jan 2018 pittenger
Slides erau webinar jan 2018 pittengerSlides erau webinar jan 2018 pittenger
Slides erau webinar jan 2018 pittenger
ERAUWebinars
 
Erau webinar UAS-a european perspective
Erau webinar UAS-a european perspective Erau webinar UAS-a european perspective
Erau webinar UAS-a european perspective
ERAUWebinars
 
erau webinar october 2017 Commanding presentations
erau webinar october 2017 Commanding presentationserau webinar october 2017 Commanding presentations
erau webinar october 2017 Commanding presentations
ERAUWebinars
 
erau webinar sept 2018 pilot careers
erau webinar sept 2018 pilot careerserau webinar sept 2018 pilot careers
erau webinar sept 2018 pilot careers
ERAUWebinars
 
Aerospace Coatings Applicator
Aerospace Coatings ApplicatorAerospace Coatings Applicator
Aerospace Coatings Applicator
ERAUWebinars
 
Embry-Riddle Degree Briefing BS Interdisciplinary Studies
Embry-Riddle Degree Briefing BS Interdisciplinary StudiesEmbry-Riddle Degree Briefing BS Interdisciplinary Studies
Embry-Riddle Degree Briefing BS Interdisciplinary Studies
ERAUWebinars
 
erau webinar- career portfolios
erau webinar- career portfolioserau webinar- career portfolios
erau webinar- career portfolios
ERAUWebinars
 
Slides erau webinar june 13 2017 international students
Slides erau webinar june 13 2017 international studentsSlides erau webinar june 13 2017 international students
Slides erau webinar june 13 2017 international students
ERAUWebinars
 
Slides erau webinar international students Part 1
Slides erau webinar international students Part 1Slides erau webinar international students Part 1
Slides erau webinar international students Part 1
ERAUWebinars
 

More from ERAUWebinars (20)

ERAU Webinar june 2019 Resumes that Work!
ERAU Webinar june 2019 Resumes that Work!ERAU Webinar june 2019 Resumes that Work!
ERAU Webinar june 2019 Resumes that Work!
 
ERAU Webinar May 2019 NTSB Accicent Investigation
ERAU Webinar May 2019 NTSB Accicent InvestigationERAU Webinar May 2019 NTSB Accicent Investigation
ERAU Webinar May 2019 NTSB Accicent Investigation
 
ERAU Webinar April 2019 Are Drones a Threat?
ERAU Webinar April 2019 Are Drones a Threat?ERAU Webinar April 2019 Are Drones a Threat?
ERAU Webinar April 2019 Are Drones a Threat?
 
ERAU Webinar March 2019 Leadership Fatal Flaws
ERAU Webinar March 2019 Leadership Fatal FlawsERAU Webinar March 2019 Leadership Fatal Flaws
ERAU Webinar March 2019 Leadership Fatal Flaws
 
Webinar ERAU personality webinar Jan 2019
Webinar ERAU personality webinar Jan 2019Webinar ERAU personality webinar Jan 2019
Webinar ERAU personality webinar Jan 2019
 
Erau webinar may 2018 resumes
Erau webinar may 2018 resumesErau webinar may 2018 resumes
Erau webinar may 2018 resumes
 
Erau webinar april 2018 Aviation Cybersecurity
Erau webinar april 2018 Aviation CybersecurityErau webinar april 2018 Aviation Cybersecurity
Erau webinar april 2018 Aviation Cybersecurity
 
ERAU webinar: Aviation English for Flight Training
ERAU webinar: Aviation English for Flight Training ERAU webinar: Aviation English for Flight Training
ERAU webinar: Aviation English for Flight Training
 
ERAU webinar plus march 15 2018
ERAU webinar plus march 15 2018 ERAU webinar plus march 15 2018
ERAU webinar plus march 15 2018
 
Embry-Riddle Unmanned Systems Degrees and Programs
Embry-Riddle Unmanned Systems Degrees and ProgramsEmbry-Riddle Unmanned Systems Degrees and Programs
Embry-Riddle Unmanned Systems Degrees and Programs
 
Erau webinar jan 24 2018 -pilot profiling
Erau webinar jan 24 2018 -pilot profilingErau webinar jan 24 2018 -pilot profiling
Erau webinar jan 24 2018 -pilot profiling
 
Slides erau webinar jan 2018 pittenger
Slides erau webinar jan 2018 pittengerSlides erau webinar jan 2018 pittenger
Slides erau webinar jan 2018 pittenger
 
Erau webinar UAS-a european perspective
Erau webinar UAS-a european perspective Erau webinar UAS-a european perspective
Erau webinar UAS-a european perspective
 
erau webinar october 2017 Commanding presentations
erau webinar october 2017 Commanding presentationserau webinar october 2017 Commanding presentations
erau webinar october 2017 Commanding presentations
 
erau webinar sept 2018 pilot careers
erau webinar sept 2018 pilot careerserau webinar sept 2018 pilot careers
erau webinar sept 2018 pilot careers
 
Aerospace Coatings Applicator
Aerospace Coatings ApplicatorAerospace Coatings Applicator
Aerospace Coatings Applicator
 
Embry-Riddle Degree Briefing BS Interdisciplinary Studies
Embry-Riddle Degree Briefing BS Interdisciplinary StudiesEmbry-Riddle Degree Briefing BS Interdisciplinary Studies
Embry-Riddle Degree Briefing BS Interdisciplinary Studies
 
erau webinar- career portfolios
erau webinar- career portfolioserau webinar- career portfolios
erau webinar- career portfolios
 
Slides erau webinar june 13 2017 international students
Slides erau webinar june 13 2017 international studentsSlides erau webinar june 13 2017 international students
Slides erau webinar june 13 2017 international students
 
Slides erau webinar international students Part 1
Slides erau webinar international students Part 1Slides erau webinar international students Part 1
Slides erau webinar international students Part 1
 

Recently uploaded

Data Structure using C by Dr. K Adisesha .ppsx
Data Structure using C by Dr. K Adisesha .ppsxData Structure using C by Dr. K Adisesha .ppsx
Data Structure using C by Dr. K Adisesha .ppsx
Prof. Dr. K. Adisesha
 
220711130082 Srabanti Bag Internet Resources For Natural Science
220711130082 Srabanti Bag Internet Resources For Natural Science220711130082 Srabanti Bag Internet Resources For Natural Science
220711130082 Srabanti Bag Internet Resources For Natural Science
Kalna College
 
INTRODUCTION TO HOSPITALS & AND ITS ORGANIZATION
INTRODUCTION TO HOSPITALS & AND ITS ORGANIZATION INTRODUCTION TO HOSPITALS & AND ITS ORGANIZATION
INTRODUCTION TO HOSPITALS & AND ITS ORGANIZATION
ShwetaGawande8
 
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 8 - CẢ NĂM - FRIENDS PLUS - NĂM HỌC 2023-2024 (B...
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 8 - CẢ NĂM - FRIENDS PLUS - NĂM HỌC 2023-2024 (B...BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 8 - CẢ NĂM - FRIENDS PLUS - NĂM HỌC 2023-2024 (B...
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 8 - CẢ NĂM - FRIENDS PLUS - NĂM HỌC 2023-2024 (B...
Nguyen Thanh Tu Collection
 
Creation or Update of a Mandatory Field is Not Set in Odoo 17
Creation or Update of a Mandatory Field is Not Set in Odoo 17Creation or Update of a Mandatory Field is Not Set in Odoo 17
Creation or Update of a Mandatory Field is Not Set in Odoo 17
Celine George
 
adjectives.ppt for class 1 to 6, grammar
adjectives.ppt for class 1 to 6, grammaradjectives.ppt for class 1 to 6, grammar
adjectives.ppt for class 1 to 6, grammar
7DFarhanaMohammed
 
NIPER 2024 MEMORY BASED QUESTIONS.ANSWERS TO NIPER 2024 QUESTIONS.NIPER JEE 2...
NIPER 2024 MEMORY BASED QUESTIONS.ANSWERS TO NIPER 2024 QUESTIONS.NIPER JEE 2...NIPER 2024 MEMORY BASED QUESTIONS.ANSWERS TO NIPER 2024 QUESTIONS.NIPER JEE 2...
NIPER 2024 MEMORY BASED QUESTIONS.ANSWERS TO NIPER 2024 QUESTIONS.NIPER JEE 2...
Payaamvohra1
 
THE SACRIFICE HOW PRO-PALESTINE PROTESTS STUDENTS ARE SACRIFICING TO CHANGE T...
THE SACRIFICE HOW PRO-PALESTINE PROTESTS STUDENTS ARE SACRIFICING TO CHANGE T...THE SACRIFICE HOW PRO-PALESTINE PROTESTS STUDENTS ARE SACRIFICING TO CHANGE T...
THE SACRIFICE HOW PRO-PALESTINE PROTESTS STUDENTS ARE SACRIFICING TO CHANGE T...
indexPub
 
Information and Communication Technology in Education
Information and Communication Technology in EducationInformation and Communication Technology in Education
Information and Communication Technology in Education
MJDuyan
 
Andreas Schleicher presents PISA 2022 Volume III - Creative Thinking - 18 Jun...
Andreas Schleicher presents PISA 2022 Volume III - Creative Thinking - 18 Jun...Andreas Schleicher presents PISA 2022 Volume III - Creative Thinking - 18 Jun...
Andreas Schleicher presents PISA 2022 Volume III - Creative Thinking - 18 Jun...
EduSkills OECD
 
Oliver Asks for More by Charles Dickens (9)
Oliver Asks for More by Charles Dickens (9)Oliver Asks for More by Charles Dickens (9)
Oliver Asks for More by Charles Dickens (9)
nitinpv4ai
 
Accounting for Restricted Grants When and How To Record Properly
Accounting for Restricted Grants  When and How To Record ProperlyAccounting for Restricted Grants  When and How To Record Properly
Accounting for Restricted Grants When and How To Record Properly
TechSoup
 
How to Download & Install Module From the Odoo App Store in Odoo 17
How to Download & Install Module From the Odoo App Store in Odoo 17How to Download & Install Module From the Odoo App Store in Odoo 17
How to Download & Install Module From the Odoo App Store in Odoo 17
Celine George
 
Pharmaceutics Pharmaceuticals best of brub
Pharmaceutics Pharmaceuticals best of brubPharmaceutics Pharmaceuticals best of brub
Pharmaceutics Pharmaceuticals best of brub
danielkiash986
 
Diversity Quiz Prelims by Quiz Club, IIT Kanpur
Diversity Quiz Prelims by Quiz Club, IIT KanpurDiversity Quiz Prelims by Quiz Club, IIT Kanpur
Diversity Quiz Prelims by Quiz Club, IIT Kanpur
Quiz Club IIT Kanpur
 
HYPERTENSION - SLIDE SHARE PRESENTATION.
HYPERTENSION - SLIDE SHARE PRESENTATION.HYPERTENSION - SLIDE SHARE PRESENTATION.
HYPERTENSION - SLIDE SHARE PRESENTATION.
deepaannamalai16
 
CIS 4200-02 Group 1 Final Project Report (1).pdf
CIS 4200-02 Group 1 Final Project Report (1).pdfCIS 4200-02 Group 1 Final Project Report (1).pdf
CIS 4200-02 Group 1 Final Project Report (1).pdf
blueshagoo1
 
Bonku-Babus-Friend by Sathyajith Ray (9)
Bonku-Babus-Friend by Sathyajith Ray  (9)Bonku-Babus-Friend by Sathyajith Ray  (9)
Bonku-Babus-Friend by Sathyajith Ray (9)
nitinpv4ai
 
Elevate Your Nonprofit's Online Presence_ A Guide to Effective SEO Strategies...
Elevate Your Nonprofit's Online Presence_ A Guide to Effective SEO Strategies...Elevate Your Nonprofit's Online Presence_ A Guide to Effective SEO Strategies...
Elevate Your Nonprofit's Online Presence_ A Guide to Effective SEO Strategies...
TechSoup
 
CapTechTalks Webinar Slides June 2024 Donovan Wright.pptx
CapTechTalks Webinar Slides June 2024 Donovan Wright.pptxCapTechTalks Webinar Slides June 2024 Donovan Wright.pptx
CapTechTalks Webinar Slides June 2024 Donovan Wright.pptx
CapitolTechU
 

Recently uploaded (20)

Data Structure using C by Dr. K Adisesha .ppsx
Data Structure using C by Dr. K Adisesha .ppsxData Structure using C by Dr. K Adisesha .ppsx
Data Structure using C by Dr. K Adisesha .ppsx
 
220711130082 Srabanti Bag Internet Resources For Natural Science
220711130082 Srabanti Bag Internet Resources For Natural Science220711130082 Srabanti Bag Internet Resources For Natural Science
220711130082 Srabanti Bag Internet Resources For Natural Science
 
INTRODUCTION TO HOSPITALS & AND ITS ORGANIZATION
INTRODUCTION TO HOSPITALS & AND ITS ORGANIZATION INTRODUCTION TO HOSPITALS & AND ITS ORGANIZATION
INTRODUCTION TO HOSPITALS & AND ITS ORGANIZATION
 
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 8 - CẢ NĂM - FRIENDS PLUS - NĂM HỌC 2023-2024 (B...
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 8 - CẢ NĂM - FRIENDS PLUS - NĂM HỌC 2023-2024 (B...BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 8 - CẢ NĂM - FRIENDS PLUS - NĂM HỌC 2023-2024 (B...
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 8 - CẢ NĂM - FRIENDS PLUS - NĂM HỌC 2023-2024 (B...
 
Creation or Update of a Mandatory Field is Not Set in Odoo 17
Creation or Update of a Mandatory Field is Not Set in Odoo 17Creation or Update of a Mandatory Field is Not Set in Odoo 17
Creation or Update of a Mandatory Field is Not Set in Odoo 17
 
adjectives.ppt for class 1 to 6, grammar
adjectives.ppt for class 1 to 6, grammaradjectives.ppt for class 1 to 6, grammar
adjectives.ppt for class 1 to 6, grammar
 
NIPER 2024 MEMORY BASED QUESTIONS.ANSWERS TO NIPER 2024 QUESTIONS.NIPER JEE 2...
NIPER 2024 MEMORY BASED QUESTIONS.ANSWERS TO NIPER 2024 QUESTIONS.NIPER JEE 2...NIPER 2024 MEMORY BASED QUESTIONS.ANSWERS TO NIPER 2024 QUESTIONS.NIPER JEE 2...
NIPER 2024 MEMORY BASED QUESTIONS.ANSWERS TO NIPER 2024 QUESTIONS.NIPER JEE 2...
 
THE SACRIFICE HOW PRO-PALESTINE PROTESTS STUDENTS ARE SACRIFICING TO CHANGE T...
THE SACRIFICE HOW PRO-PALESTINE PROTESTS STUDENTS ARE SACRIFICING TO CHANGE T...THE SACRIFICE HOW PRO-PALESTINE PROTESTS STUDENTS ARE SACRIFICING TO CHANGE T...
THE SACRIFICE HOW PRO-PALESTINE PROTESTS STUDENTS ARE SACRIFICING TO CHANGE T...
 
Information and Communication Technology in Education
Information and Communication Technology in EducationInformation and Communication Technology in Education
Information and Communication Technology in Education
 
Andreas Schleicher presents PISA 2022 Volume III - Creative Thinking - 18 Jun...
Andreas Schleicher presents PISA 2022 Volume III - Creative Thinking - 18 Jun...Andreas Schleicher presents PISA 2022 Volume III - Creative Thinking - 18 Jun...
Andreas Schleicher presents PISA 2022 Volume III - Creative Thinking - 18 Jun...
 
Oliver Asks for More by Charles Dickens (9)
Oliver Asks for More by Charles Dickens (9)Oliver Asks for More by Charles Dickens (9)
Oliver Asks for More by Charles Dickens (9)
 
Accounting for Restricted Grants When and How To Record Properly
Accounting for Restricted Grants  When and How To Record ProperlyAccounting for Restricted Grants  When and How To Record Properly
Accounting for Restricted Grants When and How To Record Properly
 
How to Download & Install Module From the Odoo App Store in Odoo 17
How to Download & Install Module From the Odoo App Store in Odoo 17How to Download & Install Module From the Odoo App Store in Odoo 17
How to Download & Install Module From the Odoo App Store in Odoo 17
 
Pharmaceutics Pharmaceuticals best of brub
Pharmaceutics Pharmaceuticals best of brubPharmaceutics Pharmaceuticals best of brub
Pharmaceutics Pharmaceuticals best of brub
 
Diversity Quiz Prelims by Quiz Club, IIT Kanpur
Diversity Quiz Prelims by Quiz Club, IIT KanpurDiversity Quiz Prelims by Quiz Club, IIT Kanpur
Diversity Quiz Prelims by Quiz Club, IIT Kanpur
 
HYPERTENSION - SLIDE SHARE PRESENTATION.
HYPERTENSION - SLIDE SHARE PRESENTATION.HYPERTENSION - SLIDE SHARE PRESENTATION.
HYPERTENSION - SLIDE SHARE PRESENTATION.
 
CIS 4200-02 Group 1 Final Project Report (1).pdf
CIS 4200-02 Group 1 Final Project Report (1).pdfCIS 4200-02 Group 1 Final Project Report (1).pdf
CIS 4200-02 Group 1 Final Project Report (1).pdf
 
Bonku-Babus-Friend by Sathyajith Ray (9)
Bonku-Babus-Friend by Sathyajith Ray  (9)Bonku-Babus-Friend by Sathyajith Ray  (9)
Bonku-Babus-Friend by Sathyajith Ray (9)
 
Elevate Your Nonprofit's Online Presence_ A Guide to Effective SEO Strategies...
Elevate Your Nonprofit's Online Presence_ A Guide to Effective SEO Strategies...Elevate Your Nonprofit's Online Presence_ A Guide to Effective SEO Strategies...
Elevate Your Nonprofit's Online Presence_ A Guide to Effective SEO Strategies...
 
CapTechTalks Webinar Slides June 2024 Donovan Wright.pptx
CapTechTalks Webinar Slides June 2024 Donovan Wright.pptxCapTechTalks Webinar Slides June 2024 Donovan Wright.pptx
CapTechTalks Webinar Slides June 2024 Donovan Wright.pptx
 

Erau cybersecurity and security degrees

  • 1. Welcome to the April 2018 Webinar Plus Degree Briefing 1
  • 2. 2 Our Agenda Today: 1. Introduction and Overview of ERAU --Bill Gibbs 2. Bachelor of Science in Aviation Security --Dr. Daniel Benny 3. Master of Science in Cybersecurity Management and Policy --Dr. Glenn Dardick 4. Master of Science in Cybersecurity Engineering 5. Professional Education Non-Degree Program in Cybersecurity --Sarah Ochs
  • 3. Embry-Riddle Aeronautical University • Fully-accredited, independent, nonprofit university based in Daytona Beach, Florida • Oldest (1926) and most prestigious aviation-related university in the world • More than 70 undergraduate and graduate degrees (Associates to Ph.D.) + Professional Education • 32,000 students Worldwide Campus • 130 campuses around the world • Classroom, Real-time Virtual Classroom, Online About ERAU 3
  • 4. AVIATION SECURITY Bachelor of Science Daniel J. Benny, Ph.D., CPP, CM, ACE Program Chair
  • 5. • Designed to meet the needs and demands of: – Aviation/Aerospace Industry – Security Industry • Program Launch Date: January, 2014 • Modality: Online, Eagle Vision/Home, Classroom BS Aviation Security
  • 6. • Students will be introduced to aviation security courses related to: – Airport Security – Airline Security – General Aviation Security – Corporate Security – Physical Security – Aviation Legislation – Airport Management – National Security and Intelligence Science and Practical Application
  • 7. • High School Graduates • Two Year College Graduates • Security Professionals • Aviation Professionals • Active and Transitioning Military Focus Market
  • 8. • Transportation Security Administration • Federal Intelligence Agencies • U.S. Air Force Security Police • Airline or Airport Security • Corporate Aviation Security • Law Enforcement • Other Security Career Interest
  • 9. TSA Salary Range • Screener $29,300-$44,000 • Supervisor $33,600-$50,400 • Inspector $48,000-$74,300 • Federal Security Director $120,200-$155,500 Source: TSA
  • 10. Entry Salary Ranges Federal Intelligence Agencies • $28,500-$36,500 U.S. Air Force Security Police • $23,000-$28,000 Airline or Airport Security • $27,000-$35,000 Corporate Aviation Security • $30,000-$40,000 Law Enforcement • $45,000-$55,000 Source: ASIS International
  • 11. Salary Ranges Other Security Entry Security Officer • $18,000- $21,000 Security Manager • $30,000-$50,000 Security Director • $75,000- $100,000 Chief Security Officer/Global Security Director • $125,000-$250,000 Source: ASIS International
  • 12. Professional Certifications The degree can also prepare the student for testing to obtain the following professional security and aviation certifications. ASIS International • Certified Protection Professional - CPP American Association of Airport Executives • Certified Member - CM (Security Component) • Accredited Airport Executive - AAE (Security Component) • Airport Certified Employee/Security - ACE • Airport Security Coordinator - ASC
  • 13. • Specialized to the Aviation Security Profession • Covers Current Aviation Regulations, Industry Standards and Practices • Prepares the Student for Any Security Environment • It is an Embry-Riddle Degree Value of the Degree
  • 14. 1962 Cessna C-150 Questions?
  • 15. DR. GLENN S. DARDICK
  • 16. MASTER OF SCIENCE CYBERSECURITY MANAGEMENT & POLICY • Geared for non-technical students as well as students with prior technical expertise • Project and policy expertise for managers • Oversight of human and digital resources • Homeland Security
  • 17. THE NEED • Recent cyber attacks  Target, Home Depot, Goodwill • Economic incentives for cyber attacks  Threats from China, Russia • Information driven society  Need to protect financial and medical information • All levels of government, industry and academia  Need for policies, security of information, cloud computing
  • 18. PROGRAM GOALS & FOCUS • Answers the need for cyber security expertise  Government and industry • Support multiple disciplinary group of professionals  Management policy, law, leadership, security, defense • Target Audience  Homeland Security, military, business, government • Focused on management and policy  Differs from other degree programs focusing on technology expertise
  • 19. PROGRAM • 100% Online • 30 Credit hour program • Developed by the Daytona Beach Faculty • AND … • Graduate Certificate in Aviation Cybersecurity Management & Policy • adding two new courses to be developed. Grad. Cert. can be started in fall (take two existing courses), presuming that the new courses are available by October/November • Aviation track in M.S, Cybersecurity Management & Policy • Can be started at any time; two new courses (same as above) should be completed by October/November
  • 20. THE DIFFERENCE • Complements, does not compete with, the Daytona Beach Cybersecurity Engineering degree program. This is not a program focused on technology expertise. • Differs from the Intelligence degree program at Prescott. Again, the MCMP degree is focused more on Management and Policy.
  • 21. OPPORTUNITIES • The MCMP degree is intended to assist those in technology careers to advance to supervisory and management roles • The MCMP degree is intended to assist those already in supervisory and management roles to better understand how to manage areas having responsibilities for cybersecurity.
  • 22. MASTER OF SCIENCE IN CYBERSECURITY MANAGEMENT & POLICY
  • 23. MCMP 501 THE INTERNET, GOVERNANCE AND SECURITY • This course examines how the Internet and associated communication technologies have created new means for people to organize, both within their local communities and across great distances, changing the nature of the relationship between society and the institutions of government. • The Internet has allowed people to communicate, often without detection, that has resulted in both positive and negative effects; e.g., Internet- based communications have been a significant factor in the both the growth of transnational terrorism and popular uprisings such as the Arab Spring. • In response, governments have often attempted to control the Internet, in some cases to aid legitimate law enforcement, in others to repress restless populations seeking change. State institutions can also use these technologies to create more effective governance and better response to humanitarian crises.
  • 24. MCMP 510 THE PRACTICE OF CYBERSECURITY • The course introduces principles of cybersecurity, providing a framework covering technical, legal, and managerial issues. • Students will examine computer and network security from the perspectives of the industry-standard ten core bodies of knowledge: • access control; • telecommunications and network security; • information security governance and risk management; • software development security; • cryptography; • security architecture and design; • operations security; • business continuity and disaster recovery planning; • legal, regulations, investigations and compliance; and • physical (environmental) security.
  • 25. MCMP 520 SECURITY ENGINEERING AND MANAGEMENT • This course is designed to teach how cybersecurity should be integrated early on in any project or other use of information in a computer or network setting. • Emphasis is placed on the relationship between information and the operation and mission of an agency, business, organization, or other entity. • This course specifically ties together information and communications technology (ICT), cybersecurity, business, policies, and ethics. • Topics include security engineering concepts (although this is not an engineering course), distributed systems, network attacks and defense, security management, encryption, the role of training and education, and more.
  • 26. MCMP 615 POLICY AND LAW IN CYBERSPACE • Cyberspace has emerged as a "real" place where people congregate, crimes occur, social changes are initiated, and a majority of our work takes place. • Whereas the physical world — and law and policy that impact the physical world — can be constrained by geopolitical boundaries, it is literally impossible to similarly constrain activities in cyberspace. • For that reason, cyberspace itself is a virtual universe — one that is global and where every Internet user is a citizen. • This course describes emerging policies and laws that affect cyberspace, particularly those related to information security and cybercrime. The clash between real space and cyberspace is also examined.
  • 27. MCMP 650 EMERGING TOPICS IN CYBERSECURITY • This course examines the current research literature concerning issues related to cybersecurity. • Topics will include, but not be limited to, current research topics in information assurance, cybersecurity policy, information warfare and the Advanced Persistent Threat, policy and law in cyberspace, evolving information security technologies and methods, new approaches to incident response and digital forensics, emerging threats and adversaries, and the impact of cybersecurity on society and organizations. • Students will focus on research techniques, as well as the presentation of results, legal issues, and relevant technologies.
  • 28. MCMP 690/691 CYBERSECURITY MANAGEMENT AND POLICY CAPSTONE • The capstone provides students with the opportunity to integrate all disciplines and competencies that have been learned in this program, plus their past experiences and professional goals, into a single work-based project, internship experience, or other appropriate activity. • The project will be the culmination of a student's studies integrated in their area of specialization or expertise. • In cooperation with an advisor, the student will design, research, and implement a project that is comprehensive in nature and which addresses, to the extent feasible, all core areas of knowledge around which the program has been built
  • 29. QUESTIONS Dr. Gary Kessler, Dept. Chair SSIA, kessleg1@erau.edu Dr. Glenn S. Dardick Program Chair, dardickg@erau.edu
  • 30.
  • 31. •Bureau of Labor Statistics states Cybersecurity jobs will have 18% growth rate (much higher than average) for 2014-2024 •Forbes states that cybersecurity engineers command almost 10% more salary than other areas in IT Over 209,000 cybersecurity jobs in the U.S. are unfilled Postings are up 74% over the past five years Master of Cybersecurity Engineering (MSCybE) Jobs • Cybersecurity Engineer • System Design & Implementation • Information Security Analyst • Penetration Tester • Malware Analyst • Offense/Defense Ops Member • Digital Forensics Investigator Focus Areas • Cybersecurity in Aviation & Aerospace Systems • UAS • Satellite Systems • Embedded Systems Security • Aviation and Aerospace Cybersecurity • Digital Forensics for Unmanned Autonomous Systems Program Overview
  • 32. 32
  • 33. ERAU NextGen Task E UAS Demonstration Project ERAU Project Lead Task E Todd Waller
  • 34.
  • 35. Date: October 9-11, 2018 (8am – 5pm) Location: Daytona Beach, FL Web: www.erau.edu/cyber
  • 36. A professional short-course with a focus on cybersecurity vulnerabilities to the aviation industry, taught by industry experts. Want to know how to ….  Increase your awareness of how to identify cyber-related vulnerabilities?  Develop and apply mitigation strategies?  Recognize threats and vulnerabilities to airport, aircraft, and supporting systems?
  • 37. Contact  Email: dbproed@erau.edu  Tel: 386.226.6928  Web: erau.edu/cyber