1 / 13

Creating a Two-Year Information Security Program

Creating a Two-Year Information Security Program. Introduction. Pam Schmelz BSEE, MBA Global Information Assurance Certification Security Essentials (GSEC) CISSP Ivy Tech Community College Nation’s largest state-wide community college 200,000 students/year 14 regions/23 campuses

felix-noble
Download Presentation

Creating a Two-Year Information Security Program

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Creating a Two-Year Information Security Program

  2. Introduction • Pam Schmelz • BSEE, MBA • Global Information Assurance Certification Security Essentials (GSEC) • CISSP • Ivy Tech Community College • Nation’s largest state-wide community college • 200,000 students/year • 14 regions/23 campuses • Columbus/Franklin region

  3. The Need • From the DOL website, 286,600 new jobs 2008-2018 • http://www.bls.gov/oco/ocos305.htm • Global State of Information Security 2010: GlobalStateofInfoSec.pdf

  4. The Need

  5. How • Use existing classes • Commission approval • Grant • Federal Cyber Service Grant • Credentialed Faculty

  6. Challenges • Is degree different enough? • Confusion by admissions and advisors • Indiana Commission restricting credits • ACBSP credentialing • Interlink between CIS and CIT programs

  7. Building the Program • Need total buy-in from upper management • Marketing • Cybersecurity awareness month • Video • Recruit from networking classes • Student growth 2008-2011 • Curriculum

  8. Resources Used • Cengageofferings • “yellow books” • EC-Council series • iLabs • Infragard (infragard.org) • YouTube • Virtual machines (VirtualBox, Vmware Player)

  9. What jobs? • Security Analyst • Incident Responder • Security Architect • Intrusion Analyst • Vulnerability Researcher/Exploit Developer • Auditor • Security Specialist • Information Assurance Technician • Security Engineer • Security Administrator

  10. Other Organizations • CCDC - http://www.nationalccdc.org/ • CyberPatriot - http://www.uscyberpatriot.org/Pages/default.aspx • CyberWatch - http://www.cyberwatchcenter.org/ • Sans.org

  11. Next Steps • Moving from one region (Columbus) to five • Close gaps as identified in gap analysis • Continue marketing program • User awareness training

  12. Conclusion • 2-yr degree is: • Relevant • Needed • Flexible • Transferrable • Contact Information • pschmelz@ivytech.edu

  13. Questions?

More Related