computer /information security degree development people, product, and process dr. barbara belon
TRANSCRIPT
Computer /Information Security Degree Development
People, Product, and Process
Dr. Barbara Belon
2
From Here to There
• A journey
• Multiple players
• Small but frequent steps
• Walking in circles – eraser in hand
• Plenty of partners
3
People
• Faculty
• Adjuncts
• Community SMEs
• Management
4
People - Faculty
• Pre-existing skill sets
• Sheer numbers
• Willingness to enhance knowledge set
• Commitment over years
5
People - Adjuncts
• Mining the SMEs for instructors
• Balance between knowledge set and knowing how to deliver / educate
• Resource for classrooms
• Danger in single-pillared approach
6
People - SMEs
• Availability issue
• Relationship-building with college and program
• Benefits: guest lecturers, potential internship sites, event judges, conference speakers, job shadowing, grant support
• Don’t forget your national colleagues!
7
People - Management
• Must get complete buy-in and long-term commitment Equipment Space Faculty Program extras
8
Product
• Developed according to existing standards NWCET – being revised NSTISS – 40XX series ISC2 – Body of Common Knowledge
• Needs to be flexible enough to embrace change / developments
9
Product – End Result
• Your curriculum must provide the student with an “employable” set of skills AND allow them to transfer to a 4-year institution to compete their Bachelor’s degree
10
Product - Peripherals
• Hosted conferences and workshops
• Cyber Challenge
• PC “Doctor’s In” clinics
• Security Awareness lectures
11
Process
• Can be phased in 2 years to develop and deliver three new
security courses 2 additional courses added in year three
• Iterative in nature Addition of ethics course Modification to original plan
12
IA Professionals - The Need
• Won’t go away
• The Information Age demands security-savvy workers
• Can be partially filled by A.S. degree graduates –the foot soldiers
• Helps build the IA student pipeline for BS and MA/MS programs