Creating a Two-Year Information Security Program - PowerPoint PPT Presentation

felix-noble
creating a two year information security program n.
Skip this Video
Loading SlideShow in 5 Seconds..
Creating a Two-Year Information Security Program PowerPoint Presentation
Download Presentation
Creating a Two-Year Information Security Program

play fullscreen
1 / 13
Download Presentation
Creating a Two-Year Information Security Program
111 Views
Download Presentation

Creating a Two-Year Information Security Program

- - - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - - -
Presentation Transcript

  1. Creating a Two-Year Information Security Program

  2. Introduction • Pam Schmelz • BSEE, MBA • Global Information Assurance Certification Security Essentials (GSEC) • CISSP • Ivy Tech Community College • Nation’s largest state-wide community college • 200,000 students/year • 14 regions/23 campuses • Columbus/Franklin region

  3. The Need • From the DOL website, 286,600 new jobs 2008-2018 • http://www.bls.gov/oco/ocos305.htm • Global State of Information Security 2010: GlobalStateofInfoSec.pdf

  4. The Need

  5. How • Use existing classes • Commission approval • Grant • Federal Cyber Service Grant • Credentialed Faculty

  6. Challenges • Is degree different enough? • Confusion by admissions and advisors • Indiana Commission restricting credits • ACBSP credentialing • Interlink between CIS and CIT programs

  7. Building the Program • Need total buy-in from upper management • Marketing • Cybersecurity awareness month • Video • Recruit from networking classes • Student growth 2008-2011 • Curriculum

  8. Resources Used • Cengageofferings • “yellow books” • EC-Council series • iLabs • Infragard (infragard.org) • YouTube • Virtual machines (VirtualBox, Vmware Player)

  9. What jobs? • Security Analyst • Incident Responder • Security Architect • Intrusion Analyst • Vulnerability Researcher/Exploit Developer • Auditor • Security Specialist • Information Assurance Technician • Security Engineer • Security Administrator

  10. Other Organizations • CCDC - http://www.nationalccdc.org/ • CyberPatriot - http://www.uscyberpatriot.org/Pages/default.aspx • CyberWatch - http://www.cyberwatchcenter.org/ • Sans.org

  11. Next Steps • Moving from one region (Columbus) to five • Close gaps as identified in gap analysis • Continue marketing program • User awareness training

  12. Conclusion • 2-yr degree is: • Relevant • Needed • Flexible • Transferrable • Contact Information • pschmelz@ivytech.edu

  13. Questions?