1 / 27

Creating an Undergraduate IA Curriculum

Creating an Undergraduate IA Curriculum. Jacob D. Furst Jean-Philippe P. Labruyere. Background Information. Jacob Furst, Jean-Philippe Labruyere DePaul University, School of Computer Science, Telecommunication and Information Systems (CTI). Largest IT school in the nation.

fawzia
Download Presentation

Creating an Undergraduate IA Curriculum

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Creating an Undergraduate IA Curriculum Jacob D. Furst Jean-Philippe P. Labruyere

  2. Background Information • Jacob Furst, Jean-Philippe Labruyere • DePaul University, School of Computer Science, Telecommunication and Information Systems (CTI). • Largest IT school in the nation. • Undergraduate: 1200 students – 11 different degrees. • Graduate: 2,130 students - 17 graduate programs. • Doctoral degree program in computer science. • Recently awarded Center of Academic Excellence in Information Assurance designation by NSA/DHS.

  3. Information Assurance Curriculum • When we started the design of Bachelor Degree, we had already well developed IA courses and degree offerings: • Started teaching first security course in 1996 • Many existing undergrad (5) and graduate(9) courses. • Very successful MS degree with over 120 active students enrolled in. • Many current faculty specialized in security and have active research in the field.

  4. Getting Started • Meeting demands: • Local and national industry • Faculty stakeholders • School and University goals • Administration and university IS • Making demands: • New courses • Staffing • Lab space

  5. Local and National Industry • What do they want? • What do they look for in new hires? • What do they look for in new graduates? • Will your students stay local or move?

  6. What Positions We Aimed for • Information Security Engineer. • Security Auditor. • Network Security Engineer. • Information Assurance Analyst. • Forensics Engineer.

  7. National Standards • Will your program move you in the direction of becoming a CAE in IAE? • Does your curriculum match published standards from the CNSS?

  8. Faculty Stakeholders • Who is currently teaching security courses? • Who teaches security modules in other courses? • Who wants to do any of this? • How will this degree fit in with the other degrees?

  9. What’s in a Name? • At DePaul, we faced a significant battle with the use of “Engineering” in the title of our program • Despite research, compromise, and your most noble intentions, you might face opposition • Be prepared, be flexible, and be strong

  10. School and University Goals • What are the goals of your school and university? • How will your program address those goals?

  11. Our Goals • Have a working knowledge of many areas of information technology • Be able to communicate effectively at all levels of an organization • Understand the impact of information assurance on society • Understand the cultural aspects of information assurance and its global impact

  12. DePaul’s Goals • Mastery of Content • Articulate Communication • Accomplishment of Goals • Knowledge of and Respect for Diversity • Development of a Service-oriented, Socially Responsible Value and Ethical Framework

  13. DePaul’s Goals Continued • Critical and Creative Thinking • Development of Multiple Literacies • Personal Arts and Literature Aesthetic • Self-reflection and Life Skills • Historical Consciousness

  14. New Courses • How many new courses will this degree require? • Do you have the expertise to staff these courses? • Can you find it if you don’t have it? • Will the courses have enough students to carry? • Is there any other program you can base yours upon? In our case, the fact that we had a large, successful and mature grad program really helped us.

  15. Existing Programs • The Fairmont State University offers a BS in Information Security • Missouri Tech (St. Louis, MI) offers a BS in Network Administration Security • Norwich University (Northfield, VT) offers a BS in Information Assurance • Oklahoma State University (Okmulgee, OK) offers a Bachelor of Technology Degree in Information Assurance & Forensics

  16. Existing Programs Continued • Champlain College (Burlington, VT) offers a BS in Computer and Digital Forensics • Stroudsburg University of Pennsylvania (East Stroudsburg, PA) offers a BS in Computer Security. • University of Advancing Technology (Tempe, AZ) offers a BS in Network Security.

  17. Staffing • Are there current faculty who can teach security courses? • Are there adjuncts available? • Does the administration support the creation and teaching of these courses?

  18. Lab Space • A security curriculum just isn’t the same without dedicated and protected lab space • Do you have space for the new lab? • Do you have money for the new lab? • Do you have the required resources to manage and support the lab? • How will you monitor lab activities?

  19. Administration and University IS policies • An interesting experiment: go to your university IS and security team and tell them that you are developing a curriculum and security and part of that you will setup a security lab where students can experiment with tools like NMAP, NESSUS, Abel and Cain…. • … Oh then add that, for many reasons you do not want that lab totally isolated and you want to give them Internet access from the lab. • Survey question: record the color of the face of the university CISO when you tell him/her that! • In our case, we had a very receptive and open minded CISO willing to listen and work with us: your experience may be different.

  20. Choosing a focus • We recognize three major areas of security in IT: • telecommunications • software development • management • Can you do it all? • Is one area closer to the expertise and goals of your school?

  21. Distance Learning • Will you offer these courses remotely? • CTI has a significant, existing DL infrastructure… • With a matching commitment to offering DL courses • How will you integrate lab activities?

  22. Common Liberal Arts and Science component. Common CTI core – 2 years (with some minor changes) Programming language Basic web technologies Basic Networking and Telecommunication Math and statistics Basic Information Assurance Our Undergraduate Program: Bachelor of Science in Information assurance and Security Engineering

  23. Specialized IA and SE field: Host security course Network Security course Principles and Practices of Software Engineering Legal, Ethical and Social Issues in Information Security Computer Forensic and Incident Response Advanced telecommunication Security and telecom practicum Information Systems Security Engineering Basic accounting – finance Electives Capstone Our Undergraduate Program: Bachelor of Science in Information assurance and Security Engineering

  24. High Level View COMPONENT COURSES Liberal Studies Program 19 courses Allied field 4 courses Major requirements 19 courses Open Electives 6 courses Total 48 courses

  25. Major Requirements • Of the 19 required courses, we used 15 existing course • Once again, having a mature networking and master’s level security program helped • We needed only four new courses

  26. New Courses • CNS 320 - Computer forensic and incident response • CNS 330 - Legal, ethical, and social issues in information security • CNS 394 - Information Systems Security Engineering I • CNS 395 - Information Systems Security Engineering II

  27. Thank You • Questions and answers

More Related