SlideShare uma empresa Scribd logo
1 de 17
American Public University System -
A Multi-Disciplinary Approach to
Cybersecurity Education
Dr. Clay Wilson, CISSP
Program Director, Cybersecurity Studies
American Public University System
Overview
• About American Public University System (APUS)
• What is a Multi-Disciplinary Approach?
• What Problems does it help solve?
Complex Malicious Code
Cascade Failures for Infrastructures
Hackers Bypass Defensive Technologies
• Problems require a Multi-Disciplinary Education
Management and Coordination of Cybersecurity Technologies
• APUS Goal for Cybersecurity Education
Summarized Admission Requirements
Overview of the APUS Cybersecurity Program
APUS Offers Undergrad Certificates
• APUS awarded National Certifications for Cybersecurity Education
About APUS
• Founded in 1991 as American Military University
(AMU) by James P. Etter, USMC
• Fully-online; intended for military and working adults
with focus on counter-terrorism, military intelligence
• In 2002 expanded to American Public University System,
adding American Public University for public service
courses, i.e. criminal justice and national security
• APUS accredited by the Higher Learning Commission,
North Central Association
About APUS (con‟t)
• Today more than 100,000 students from all 50 states/DC
and 100+ countries
• Approximately 53% active-duty all branches; 47% civilian
or other military
• Recent Awards
• US News & World Report 2014 Online Rankings: APUS
Undergraduate Programs Rated Among Best in Overall Quality
• First Three-Time Recipient of Sloan Consortium Effective
Practice Award
About APUS (con‟t)
Some of the Organizations that Partner with APUS --
Education Institutions of all Military Service Branches
Department of Homeland Security
FBI
Lockheed Martin Center for Security Analysis
- and many other universities and organizations
What is a Multi-Disciplinary Approach to Cybersecurity?
Definition of Multi-Disciplinary – cooperation and participation across
different sectors to solve problems.
Why is a Multi-Disciplinary approach to Cybersecurity now
important?
• Sometimes, skill-centered specialists cultivate a traditional boundary
around their expertise.
• This can be a restrictive way of finding solutions to a problem.
• Cybersecurity is being hit with newer types of problems that bypass
traditional boundaries
What Problems does a Multi-Disciplinary Approach Help Solve?
Problem #1 – Cyberattacks are becoming more complex.
• Complexity shows in newer, advanced persistent threats that
defeat increasingly sophisticated cybersecurity defensive
technologies.
• Cybersecurity experts are always playing catch up after
newer methods of cyberattack are discovered.
Complex Malicious Code Operates Undetected for Years
Complex malicious code can reside and operate undetected
inside computers for years before discovery.
• The STUXNET malicious code operated inside Iranian
nuclear facilities for several years before it was eventually
discovered.
• The new SNAKE malicious code, recently announced as a
new discovery inside Ukrainian computers, may also have
infected other computers worldwide and operated secretly
for the past several years.
Cascade Failures May Connect Critical Infrastructures
Problem #2 - Critical infrastructures are subject to complex
cascade-failures due to vulnerabilities in other distantly-
related infrastructures.
• During Sandy, the hospitals in New Jersey lost electricity
when the local power utility flooded.
• When Hospital backup diesel generators ran out of
fuel, filling stations had no electricity to pump fuel into
delivery tankers.
Hackers Bypass Defensive Technology – Attack Users
Problem #3 - Hackers defeat sophisticated technical
cybersecurity defenses by directly targeting the users
instead of the computers.
• With „Phishing attacks‟, users are tricked by email
attachments, or by false web sites, that enable hackers
to steal personal secrets and passwords.
Problems Require a Multi-Disciplinary Education
Problems of Complexity, Cascade Failures, and Targeted
Users now require a multi-disciplinary approach to
cybersecurity education.
– Leaders in all professions, all disciplines must develop a
“cybersecurity mindset”.
The ACM Education Board in 2013 acknowledged that “a system-
wide perspective has become an important part of cybersecurity
education, and that education must be multi-disciplinary, to include
many sectors.”
Management and Coordination of Cybersecurity Technology
Traditional cybersecurity education courses were initially
designed to expand the technical skills of technology experts.
• Management and Coordination of technology must now be
emphasized in Cybersecurity Education.
• Cybersecurity Education must now range across many
sectors, not focus just on the development and operation of
security technology.
APUS Goal for Cybersecurity Education
Leaders in All Disciplines need Cybersecurity Education to help
manage and coordinate technology for cybersecurity -
Business Education
Public Safety International Relations
Environmental Science Space Studies
Sports and Healthcare Transportation and Logistics
Students may enroll in the APUS Cybersecurity Program with an
IT certificate, or with a non-technical work background
APUS Admissions Requirements
Students enrolling for Cybersecurity must meet one of these
requirements ---
– Undergraduate degree in Information Technology or a related field
or
– Undergraduate IT Certificate
or
– FIVE years of work experience at the senior level in Criminal
Justice, Emergency Management, Intelligence, Homeland Security or
other non-technical background
APUS Cybersecurity Programs
• First half of the graduate cybersecurity program focuses on network security, information
assurance, cybercrime, and digital forensics. Second half of grad program focuses on policies,
practices, perspectives of different disciplines, including emergency management, homeland
security, intelligence, law and ethics, risk management and cyber warfare.
• The capstone course is a multi-disciplinary group project where individual participants
represent different sectors, agencies, and disciplines.
• Graduate certificates are available in:
• Cybercrime
• Digital Forensics
• Information Assurance
• Information Systems Security
• Undergraduate certificates also available in:
• Digital Forensics
• Information Assurance
• Homeland Security
• National Security
• Emergency Management
APUS Awarded National Certifications for Cybersecurity Education
2013 - APUS received two National Training Standards
certifications for Information Systems Security Professionals
from the Committee on National Security Systems (CNSS)
NSTISSI no. 4011 and CNSSI no. 4013
2014 - APUS is also applying for the CAE/IA/CD designation
from DHA and NSA.
For Further Information
Clay Wilson, Phd, CISSP
Program Director, Cybersecurity Studies
American Public University System
cwilson@apus.edu
Undergraduate programs
http://www.amu.apus.edu/lp2/cybersecurity/bachelors.htm
Graduate programs
http://www.amu.apus.edu/lp2/cybersecurity/masters.htm

Mais conteúdo relacionado

Mais procurados

Course Tech 2013, Mark Ciampa, Helping Students Stay Secure
Course Tech 2013, Mark Ciampa, Helping Students Stay SecureCourse Tech 2013, Mark Ciampa, Helping Students Stay Secure
Course Tech 2013, Mark Ciampa, Helping Students Stay SecureCengage Learning
 
Fundamentals of threats and risk management course, cybersecurity
Fundamentals of threats and risk management course, cybersecurityFundamentals of threats and risk management course, cybersecurity
Fundamentals of threats and risk management course, cybersecurityTonex
 
Autonomous and Semi-Autonomous Cybersecurity Training
Autonomous and Semi-Autonomous Cybersecurity TrainingAutonomous and Semi-Autonomous Cybersecurity Training
Autonomous and Semi-Autonomous Cybersecurity TrainingBryan Len
 
Cybersecurity education for the next generation
Cybersecurity education for the next generationCybersecurity education for the next generation
Cybersecurity education for the next generationIBM Security
 
A military perspective on cyber security
A military perspective on cyber securityA military perspective on cyber security
A military perspective on cyber securityJoey Hernandez
 
Cyber Security Isaca Bglr Presentation 24th July
Cyber Security Isaca Bglr Presentation 24th JulyCyber Security Isaca Bglr Presentation 24th July
Cyber Security Isaca Bglr Presentation 24th JulyFiroze Hussain
 
Cyber security general perspective a
Cyber security general perspective aCyber security general perspective a
Cyber security general perspective amarukanda
 
The Cost Of Preventing Breaches Educause Nat Conf Denver Nov 09
The Cost Of Preventing Breaches Educause Nat Conf Denver Nov 09The Cost Of Preventing Breaches Educause Nat Conf Denver Nov 09
The Cost Of Preventing Breaches Educause Nat Conf Denver Nov 09Tammy Clark
 
The Ultimate Guide To Cyber Security Certifications
The Ultimate Guide To Cyber Security CertificationsThe Ultimate Guide To Cyber Security Certifications
The Ultimate Guide To Cyber Security CertificationsMercury Solutions Limited
 
Airport security 2013 john mc carthy
Airport security 2013   john mc carthyAirport security 2013   john mc carthy
Airport security 2013 john mc carthyRussell Publishing
 
IBM Cybersecurity Analyst
IBM Cybersecurity AnalystIBM Cybersecurity Analyst
IBM Cybersecurity AnalystMustafa TOPÇU
 
Cyber Security
Cyber SecurityCyber Security
Cyber SecurityRamiro Cid
 
osn-threats-solutions-2
osn-threats-solutions-2osn-threats-solutions-2
osn-threats-solutions-2SMITA V MORE
 
Ahmed Al Barrak - Staff information security practices - a latent threat
Ahmed Al Barrak - Staff information security practices - a latent threatAhmed Al Barrak - Staff information security practices - a latent threat
Ahmed Al Barrak - Staff information security practices - a latent threatnooralmousa
 

Mais procurados (20)

ISA Toronto Chapter Presentation-March 2017
ISA Toronto  Chapter Presentation-March 2017ISA Toronto  Chapter Presentation-March 2017
ISA Toronto Chapter Presentation-March 2017
 
Hiring for cybersecurity
Hiring for cybersecurityHiring for cybersecurity
Hiring for cybersecurity
 
Security tools
Security toolsSecurity tools
Security tools
 
Course Tech 2013, Mark Ciampa, Helping Students Stay Secure
Course Tech 2013, Mark Ciampa, Helping Students Stay SecureCourse Tech 2013, Mark Ciampa, Helping Students Stay Secure
Course Tech 2013, Mark Ciampa, Helping Students Stay Secure
 
Fundamentals of threats and risk management course, cybersecurity
Fundamentals of threats and risk management course, cybersecurityFundamentals of threats and risk management course, cybersecurity
Fundamentals of threats and risk management course, cybersecurity
 
Autonomous and Semi-Autonomous Cybersecurity Training
Autonomous and Semi-Autonomous Cybersecurity TrainingAutonomous and Semi-Autonomous Cybersecurity Training
Autonomous and Semi-Autonomous Cybersecurity Training
 
Campus Mobility
Campus MobilityCampus Mobility
Campus Mobility
 
Cybersecurity education for the next generation
Cybersecurity education for the next generationCybersecurity education for the next generation
Cybersecurity education for the next generation
 
A military perspective on cyber security
A military perspective on cyber securityA military perspective on cyber security
A military perspective on cyber security
 
Cyber Security Isaca Bglr Presentation 24th July
Cyber Security Isaca Bglr Presentation 24th JulyCyber Security Isaca Bglr Presentation 24th July
Cyber Security Isaca Bglr Presentation 24th July
 
Cyber security general perspective a
Cyber security general perspective aCyber security general perspective a
Cyber security general perspective a
 
The Cost Of Preventing Breaches Educause Nat Conf Denver Nov 09
The Cost Of Preventing Breaches Educause Nat Conf Denver Nov 09The Cost Of Preventing Breaches Educause Nat Conf Denver Nov 09
The Cost Of Preventing Breaches Educause Nat Conf Denver Nov 09
 
The Ultimate Guide To Cyber Security Certifications
The Ultimate Guide To Cyber Security CertificationsThe Ultimate Guide To Cyber Security Certifications
The Ultimate Guide To Cyber Security Certifications
 
Airport security 2013 john mc carthy
Airport security 2013   john mc carthyAirport security 2013   john mc carthy
Airport security 2013 john mc carthy
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
A Strategy for Addressing Cyber Security Challenges
A Strategy for Addressing Cyber Security Challenges A Strategy for Addressing Cyber Security Challenges
A Strategy for Addressing Cyber Security Challenges
 
IBM Cybersecurity Analyst
IBM Cybersecurity AnalystIBM Cybersecurity Analyst
IBM Cybersecurity Analyst
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
osn-threats-solutions-2
osn-threats-solutions-2osn-threats-solutions-2
osn-threats-solutions-2
 
Ahmed Al Barrak - Staff information security practices - a latent threat
Ahmed Al Barrak - Staff information security practices - a latent threatAhmed Al Barrak - Staff information security practices - a latent threat
Ahmed Al Barrak - Staff information security practices - a latent threat
 

Semelhante a American Public University System (NASDAQ:APEI) - Dr. Clay Wilson is the Program Director for Cybersecurity

chapter 1. Introduction to Information Security
chapter 1. Introduction to Information Security chapter 1. Introduction to Information Security
chapter 1. Introduction to Information Security elmuhammadmuhammad
 
CISSP Certification Training Course
CISSP Certification Training CourseCISSP Certification Training Course
CISSP Certification Training CourseRicky Lionel Vaz
 
Webinar - Reducing the Risk of a Cyber Attack on Utilities
Webinar - Reducing the Risk of a Cyber Attack on UtilitiesWebinar - Reducing the Risk of a Cyber Attack on Utilities
Webinar - Reducing the Risk of a Cyber Attack on UtilitiesWPICPE
 
Get training in cyber security & place yourself in good companies through...
Get training in cyber security & place yourself in good companies through...Get training in cyber security & place yourself in good companies through...
Get training in cyber security & place yourself in good companies through...CCI Training Center
 
Webinar - Reducing Your Cybersecurity Risk
Webinar - Reducing Your Cybersecurity RiskWebinar - Reducing Your Cybersecurity Risk
Webinar - Reducing Your Cybersecurity RiskWPICPE
 
01Introduction to Information Security.ppt
01Introduction to Information Security.ppt01Introduction to Information Security.ppt
01Introduction to Information Security.pptit160320737038
 
Introduction to information security
Introduction to information securityIntroduction to information security
Introduction to information securityKumawat Dharmpal
 
Career Guidance on Cybersecurity by Mohammed Adam
Career Guidance on Cybersecurity by Mohammed AdamCareer Guidance on Cybersecurity by Mohammed Adam
Career Guidance on Cybersecurity by Mohammed AdamMohammed Adam
 
The Future of Cybersecurity - October 2015
The Future of Cybersecurity - October 2015The Future of Cybersecurity - October 2015
The Future of Cybersecurity - October 2015Security Innovation
 
Introduction to Cybersecurity.pdf
Introduction to Cybersecurity.pdfIntroduction to Cybersecurity.pdf
Introduction to Cybersecurity.pdfssuserf98dd4
 
Cybersecurity Management Principles, 12 - 15 Nov 2017 Dubai, UAE
Cybersecurity Management Principles, 12 - 15 Nov 2017 Dubai, UAECybersecurity Management Principles, 12 - 15 Nov 2017 Dubai, UAE
Cybersecurity Management Principles, 12 - 15 Nov 2017 Dubai, UAE360 BSI
 
Why implement a robust cyber security policy?
Why implement a robust cyber security policy?Why implement a robust cyber security policy?
Why implement a robust cyber security policy?Jisc
 
July 20, 2016 Webcast for the Cybersecurity MS at NYU Tandon Online
July 20, 2016 Webcast for the Cybersecurity MS at NYU Tandon OnlineJuly 20, 2016 Webcast for the Cybersecurity MS at NYU Tandon Online
July 20, 2016 Webcast for the Cybersecurity MS at NYU Tandon OnlineNYU Tandon Online
 
Cybersecurity Management Principles, 11 - 14 Sept 2017 KL, Malaysia / 17 - 20...
Cybersecurity Management Principles, 11 - 14 Sept 2017 KL, Malaysia / 17 - 20...Cybersecurity Management Principles, 11 - 14 Sept 2017 KL, Malaysia / 17 - 20...
Cybersecurity Management Principles, 11 - 14 Sept 2017 KL, Malaysia / 17 - 20...360 BSI
 
Cyber awareness ppt on the recorded data
Cyber awareness ppt on the recorded dataCyber awareness ppt on the recorded data
Cyber awareness ppt on the recorded dataTecnoIncentive
 
Chapter 1 introduction(web security)
Chapter 1 introduction(web security)Chapter 1 introduction(web security)
Chapter 1 introduction(web security)Kirti Ahirrao
 

Semelhante a American Public University System (NASDAQ:APEI) - Dr. Clay Wilson is the Program Director for Cybersecurity (20)

chapter 1. Introduction to Information Security
chapter 1. Introduction to Information Security chapter 1. Introduction to Information Security
chapter 1. Introduction to Information Security
 
CISSP Certification Training Course
CISSP Certification Training CourseCISSP Certification Training Course
CISSP Certification Training Course
 
Cyber Ed
Cyber EdCyber Ed
Cyber Ed
 
mille2.pptx
mille2.pptxmille2.pptx
mille2.pptx
 
Webinar - Reducing the Risk of a Cyber Attack on Utilities
Webinar - Reducing the Risk of a Cyber Attack on UtilitiesWebinar - Reducing the Risk of a Cyber Attack on Utilities
Webinar - Reducing the Risk of a Cyber Attack on Utilities
 
Get training in cyber security & place yourself in good companies through...
Get training in cyber security & place yourself in good companies through...Get training in cyber security & place yourself in good companies through...
Get training in cyber security & place yourself in good companies through...
 
Cyber Safety Awareness Training (Brochure)
Cyber Safety Awareness Training (Brochure)Cyber Safety Awareness Training (Brochure)
Cyber Safety Awareness Training (Brochure)
 
Webinar - Reducing Your Cybersecurity Risk
Webinar - Reducing Your Cybersecurity RiskWebinar - Reducing Your Cybersecurity Risk
Webinar - Reducing Your Cybersecurity Risk
 
01Introduction to Information Security.ppt
01Introduction to Information Security.ppt01Introduction to Information Security.ppt
01Introduction to Information Security.ppt
 
Introduction to information security
Introduction to information securityIntroduction to information security
Introduction to information security
 
Career Guidance on Cybersecurity by Mohammed Adam
Career Guidance on Cybersecurity by Mohammed AdamCareer Guidance on Cybersecurity by Mohammed Adam
Career Guidance on Cybersecurity by Mohammed Adam
 
The Future of Cybersecurity - October 2015
The Future of Cybersecurity - October 2015The Future of Cybersecurity - October 2015
The Future of Cybersecurity - October 2015
 
Introduction to Cybersecurity.pdf
Introduction to Cybersecurity.pdfIntroduction to Cybersecurity.pdf
Introduction to Cybersecurity.pdf
 
Cybersecurity Management Principles, 12 - 15 Nov 2017 Dubai, UAE
Cybersecurity Management Principles, 12 - 15 Nov 2017 Dubai, UAECybersecurity Management Principles, 12 - 15 Nov 2017 Dubai, UAE
Cybersecurity Management Principles, 12 - 15 Nov 2017 Dubai, UAE
 
Why implement a robust cyber security policy?
Why implement a robust cyber security policy?Why implement a robust cyber security policy?
Why implement a robust cyber security policy?
 
July 20, 2016 Webcast for the Cybersecurity MS at NYU Tandon Online
July 20, 2016 Webcast for the Cybersecurity MS at NYU Tandon OnlineJuly 20, 2016 Webcast for the Cybersecurity MS at NYU Tandon Online
July 20, 2016 Webcast for the Cybersecurity MS at NYU Tandon Online
 
Cybersecurity Management Principles, 11 - 14 Sept 2017 KL, Malaysia / 17 - 20...
Cybersecurity Management Principles, 11 - 14 Sept 2017 KL, Malaysia / 17 - 20...Cybersecurity Management Principles, 11 - 14 Sept 2017 KL, Malaysia / 17 - 20...
Cybersecurity Management Principles, 11 - 14 Sept 2017 KL, Malaysia / 17 - 20...
 
Jason r mc kinney halfday
Jason r mc kinney halfdayJason r mc kinney halfday
Jason r mc kinney halfday
 
Cyber awareness ppt on the recorded data
Cyber awareness ppt on the recorded dataCyber awareness ppt on the recorded data
Cyber awareness ppt on the recorded data
 
Chapter 1 introduction(web security)
Chapter 1 introduction(web security)Chapter 1 introduction(web security)
Chapter 1 introduction(web security)
 

Mais de Investorideas.com

Speaker Scott Greiper, President and Founding Partner, Secure Strategy Group
Speaker Scott Greiper, President and Founding Partner, Secure Strategy GroupSpeaker Scott Greiper, President and Founding Partner, Secure Strategy Group
Speaker Scott Greiper, President and Founding Partner, Secure Strategy GroupInvestorideas.com
 
Speaker Kiersten E. Todt, President and Managing Partner, Liberty Group Ventu...
Speaker Kiersten E. Todt, President and Managing Partner, Liberty Group Ventu...Speaker Kiersten E. Todt, President and Managing Partner, Liberty Group Ventu...
Speaker Kiersten E. Todt, President and Managing Partner, Liberty Group Ventu...Investorideas.com
 
Speaker Scott Sacknoff, President, The Spade Defense Index
Speaker Scott Sacknoff, President, The Spade Defense IndexSpeaker Scott Sacknoff, President, The Spade Defense Index
Speaker Scott Sacknoff, President, The Spade Defense IndexInvestorideas.com
 
Viscount Systems (OTCQB:VSYS) Presentation
Viscount Systems (OTCQB:VSYS) PresentationViscount Systems (OTCQB:VSYS) Presentation
Viscount Systems (OTCQB:VSYS) PresentationInvestorideas.com
 
NXT-ID, Inc.'s (OTCQB:NXTD) Presentation
NXT-ID, Inc.'s (OTCQB:NXTD) PresentationNXT-ID, Inc.'s (OTCQB:NXTD) Presentation
NXT-ID, Inc.'s (OTCQB:NXTD) PresentationInvestorideas.com
 
Keynote Speaker Janice Kephart - Founder and CEO of The Secure Identity and B...
Keynote Speaker Janice Kephart - Founder and CEO of The Secure Identity and B...Keynote Speaker Janice Kephart - Founder and CEO of The Secure Identity and B...
Keynote Speaker Janice Kephart - Founder and CEO of The Secure Identity and B...Investorideas.com
 
Positive id PositiveID Corporation (OTCBB:PSID) Conference Presentation
Positive id PositiveID Corporation (OTCBB:PSID) Conference PresentationPositive id PositiveID Corporation (OTCBB:PSID) Conference Presentation
Positive id PositiveID Corporation (OTCBB:PSID) Conference PresentationInvestorideas.com
 
Implant Sciences (OTCQB:IMSC) Presentation
Implant Sciences (OTCQB:IMSC) Presentation Implant Sciences (OTCQB:IMSC) Presentation
Implant Sciences (OTCQB:IMSC) Presentation Investorideas.com
 
Facial Recognition: The Science, The Technology, and Market Applications
Facial Recognition: The Science, The Technology, and Market ApplicationsFacial Recognition: The Science, The Technology, and Market Applications
Facial Recognition: The Science, The Technology, and Market ApplicationsInvestorideas.com
 

Mais de Investorideas.com (9)

Speaker Scott Greiper, President and Founding Partner, Secure Strategy Group
Speaker Scott Greiper, President and Founding Partner, Secure Strategy GroupSpeaker Scott Greiper, President and Founding Partner, Secure Strategy Group
Speaker Scott Greiper, President and Founding Partner, Secure Strategy Group
 
Speaker Kiersten E. Todt, President and Managing Partner, Liberty Group Ventu...
Speaker Kiersten E. Todt, President and Managing Partner, Liberty Group Ventu...Speaker Kiersten E. Todt, President and Managing Partner, Liberty Group Ventu...
Speaker Kiersten E. Todt, President and Managing Partner, Liberty Group Ventu...
 
Speaker Scott Sacknoff, President, The Spade Defense Index
Speaker Scott Sacknoff, President, The Spade Defense IndexSpeaker Scott Sacknoff, President, The Spade Defense Index
Speaker Scott Sacknoff, President, The Spade Defense Index
 
Viscount Systems (OTCQB:VSYS) Presentation
Viscount Systems (OTCQB:VSYS) PresentationViscount Systems (OTCQB:VSYS) Presentation
Viscount Systems (OTCQB:VSYS) Presentation
 
NXT-ID, Inc.'s (OTCQB:NXTD) Presentation
NXT-ID, Inc.'s (OTCQB:NXTD) PresentationNXT-ID, Inc.'s (OTCQB:NXTD) Presentation
NXT-ID, Inc.'s (OTCQB:NXTD) Presentation
 
Keynote Speaker Janice Kephart - Founder and CEO of The Secure Identity and B...
Keynote Speaker Janice Kephart - Founder and CEO of The Secure Identity and B...Keynote Speaker Janice Kephart - Founder and CEO of The Secure Identity and B...
Keynote Speaker Janice Kephart - Founder and CEO of The Secure Identity and B...
 
Positive id PositiveID Corporation (OTCBB:PSID) Conference Presentation
Positive id PositiveID Corporation (OTCBB:PSID) Conference PresentationPositive id PositiveID Corporation (OTCBB:PSID) Conference Presentation
Positive id PositiveID Corporation (OTCBB:PSID) Conference Presentation
 
Implant Sciences (OTCQB:IMSC) Presentation
Implant Sciences (OTCQB:IMSC) Presentation Implant Sciences (OTCQB:IMSC) Presentation
Implant Sciences (OTCQB:IMSC) Presentation
 
Facial Recognition: The Science, The Technology, and Market Applications
Facial Recognition: The Science, The Technology, and Market ApplicationsFacial Recognition: The Science, The Technology, and Market Applications
Facial Recognition: The Science, The Technology, and Market Applications
 

Último

WheelTug PLC Pitch Deck | Investor Insights | April 2024
WheelTug PLC Pitch Deck | Investor Insights | April 2024WheelTug PLC Pitch Deck | Investor Insights | April 2024
WheelTug PLC Pitch Deck | Investor Insights | April 2024Hector Del Castillo, CPM, CPMM
 
9654467111 Low Rate Call Girls In Tughlakabad, Delhi NCR
9654467111 Low Rate Call Girls In Tughlakabad, Delhi NCR9654467111 Low Rate Call Girls In Tughlakabad, Delhi NCR
9654467111 Low Rate Call Girls In Tughlakabad, Delhi NCRSapana Sha
 
Q1 Quarterly Update - April 16, 2024.pdf
Q1 Quarterly Update - April 16, 2024.pdfQ1 Quarterly Update - April 16, 2024.pdf
Q1 Quarterly Update - April 16, 2024.pdfProbe Gold
 
the 25 most beautiful words for a loving and lasting relationship.pdf
the 25 most beautiful words for a loving and lasting relationship.pdfthe 25 most beautiful words for a loving and lasting relationship.pdf
the 25 most beautiful words for a loving and lasting relationship.pdfFrancenel Paul
 
Leveraging USDA Rural Development Grants for Community Growth and Sustainabil...
Leveraging USDA Rural Development Grants for Community Growth and Sustainabil...Leveraging USDA Rural Development Grants for Community Growth and Sustainabil...
Leveraging USDA Rural Development Grants for Community Growth and Sustainabil...USDAReapgrants.com
 
slideshare_2404_presentation materials_en.pdf
slideshare_2404_presentation materials_en.pdfslideshare_2404_presentation materials_en.pdf
slideshare_2404_presentation materials_en.pdfsansanir
 
9654467111 Call Girls In Katwaria Sarai Short 1500 Night 6000
9654467111 Call Girls In Katwaria Sarai Short 1500 Night 60009654467111 Call Girls In Katwaria Sarai Short 1500 Night 6000
9654467111 Call Girls In Katwaria Sarai Short 1500 Night 6000Sapana Sha
 
Corporate Presentation Probe April 2024.pdf
Corporate Presentation Probe April 2024.pdfCorporate Presentation Probe April 2024.pdf
Corporate Presentation Probe April 2024.pdfProbe Gold
 
Corporate Presentation Probe April 2024.pdf
Corporate Presentation Probe April 2024.pdfCorporate Presentation Probe April 2024.pdf
Corporate Presentation Probe April 2024.pdfProbe Gold
 
Best investment platform in india - falcon invoice discounting
Best investment platform in india - falcon invoice discountingBest investment platform in india - falcon invoice discounting
Best investment platform in india - falcon invoice discountingFalcon Invoice Discounting
 
Collective Mining | Corporate Presentation - April 2024
Collective Mining | Corporate Presentation - April 2024Collective Mining | Corporate Presentation - April 2024
Collective Mining | Corporate Presentation - April 2024CollectiveMining1
 

Último (15)

WheelTug PLC Pitch Deck | Investor Insights | April 2024
WheelTug PLC Pitch Deck | Investor Insights | April 2024WheelTug PLC Pitch Deck | Investor Insights | April 2024
WheelTug PLC Pitch Deck | Investor Insights | April 2024
 
9654467111 Low Rate Call Girls In Tughlakabad, Delhi NCR
9654467111 Low Rate Call Girls In Tughlakabad, Delhi NCR9654467111 Low Rate Call Girls In Tughlakabad, Delhi NCR
9654467111 Low Rate Call Girls In Tughlakabad, Delhi NCR
 
Q1 Quarterly Update - April 16, 2024.pdf
Q1 Quarterly Update - April 16, 2024.pdfQ1 Quarterly Update - April 16, 2024.pdf
Q1 Quarterly Update - April 16, 2024.pdf
 
young Call girls in Dwarka sector 1🔝 9953056974 🔝 Delhi escort Service
young Call girls in Dwarka sector 1🔝 9953056974 🔝 Delhi escort Serviceyoung Call girls in Dwarka sector 1🔝 9953056974 🔝 Delhi escort Service
young Call girls in Dwarka sector 1🔝 9953056974 🔝 Delhi escort Service
 
the 25 most beautiful words for a loving and lasting relationship.pdf
the 25 most beautiful words for a loving and lasting relationship.pdfthe 25 most beautiful words for a loving and lasting relationship.pdf
the 25 most beautiful words for a loving and lasting relationship.pdf
 
Leveraging USDA Rural Development Grants for Community Growth and Sustainabil...
Leveraging USDA Rural Development Grants for Community Growth and Sustainabil...Leveraging USDA Rural Development Grants for Community Growth and Sustainabil...
Leveraging USDA Rural Development Grants for Community Growth and Sustainabil...
 
slideshare_2404_presentation materials_en.pdf
slideshare_2404_presentation materials_en.pdfslideshare_2404_presentation materials_en.pdf
slideshare_2404_presentation materials_en.pdf
 
9654467111 Call Girls In Katwaria Sarai Short 1500 Night 6000
9654467111 Call Girls In Katwaria Sarai Short 1500 Night 60009654467111 Call Girls In Katwaria Sarai Short 1500 Night 6000
9654467111 Call Girls In Katwaria Sarai Short 1500 Night 6000
 
Call Girls in South Ex⎝⎝9953056974⎝⎝ Escort Delhi NCR
Call Girls in South Ex⎝⎝9953056974⎝⎝ Escort Delhi NCRCall Girls in South Ex⎝⎝9953056974⎝⎝ Escort Delhi NCR
Call Girls in South Ex⎝⎝9953056974⎝⎝ Escort Delhi NCR
 
Corporate Presentation Probe April 2024.pdf
Corporate Presentation Probe April 2024.pdfCorporate Presentation Probe April 2024.pdf
Corporate Presentation Probe April 2024.pdf
 
young call girls in Hauz Khas,🔝 9953056974 🔝 escort Service
young call girls in Hauz Khas,🔝 9953056974 🔝 escort Serviceyoung call girls in Hauz Khas,🔝 9953056974 🔝 escort Service
young call girls in Hauz Khas,🔝 9953056974 🔝 escort Service
 
young call girls in Govindpuri 🔝 9953056974 🔝 Delhi escort Service
young call girls in Govindpuri 🔝 9953056974 🔝 Delhi escort Serviceyoung call girls in Govindpuri 🔝 9953056974 🔝 Delhi escort Service
young call girls in Govindpuri 🔝 9953056974 🔝 Delhi escort Service
 
Corporate Presentation Probe April 2024.pdf
Corporate Presentation Probe April 2024.pdfCorporate Presentation Probe April 2024.pdf
Corporate Presentation Probe April 2024.pdf
 
Best investment platform in india - falcon invoice discounting
Best investment platform in india - falcon invoice discountingBest investment platform in india - falcon invoice discounting
Best investment platform in india - falcon invoice discounting
 
Collective Mining | Corporate Presentation - April 2024
Collective Mining | Corporate Presentation - April 2024Collective Mining | Corporate Presentation - April 2024
Collective Mining | Corporate Presentation - April 2024
 

American Public University System (NASDAQ:APEI) - Dr. Clay Wilson is the Program Director for Cybersecurity

  • 1. American Public University System - A Multi-Disciplinary Approach to Cybersecurity Education Dr. Clay Wilson, CISSP Program Director, Cybersecurity Studies American Public University System
  • 2. Overview • About American Public University System (APUS) • What is a Multi-Disciplinary Approach? • What Problems does it help solve? Complex Malicious Code Cascade Failures for Infrastructures Hackers Bypass Defensive Technologies • Problems require a Multi-Disciplinary Education Management and Coordination of Cybersecurity Technologies • APUS Goal for Cybersecurity Education Summarized Admission Requirements Overview of the APUS Cybersecurity Program APUS Offers Undergrad Certificates • APUS awarded National Certifications for Cybersecurity Education
  • 3. About APUS • Founded in 1991 as American Military University (AMU) by James P. Etter, USMC • Fully-online; intended for military and working adults with focus on counter-terrorism, military intelligence • In 2002 expanded to American Public University System, adding American Public University for public service courses, i.e. criminal justice and national security • APUS accredited by the Higher Learning Commission, North Central Association
  • 4. About APUS (con‟t) • Today more than 100,000 students from all 50 states/DC and 100+ countries • Approximately 53% active-duty all branches; 47% civilian or other military • Recent Awards • US News & World Report 2014 Online Rankings: APUS Undergraduate Programs Rated Among Best in Overall Quality • First Three-Time Recipient of Sloan Consortium Effective Practice Award
  • 5. About APUS (con‟t) Some of the Organizations that Partner with APUS -- Education Institutions of all Military Service Branches Department of Homeland Security FBI Lockheed Martin Center for Security Analysis - and many other universities and organizations
  • 6. What is a Multi-Disciplinary Approach to Cybersecurity? Definition of Multi-Disciplinary – cooperation and participation across different sectors to solve problems. Why is a Multi-Disciplinary approach to Cybersecurity now important? • Sometimes, skill-centered specialists cultivate a traditional boundary around their expertise. • This can be a restrictive way of finding solutions to a problem. • Cybersecurity is being hit with newer types of problems that bypass traditional boundaries
  • 7. What Problems does a Multi-Disciplinary Approach Help Solve? Problem #1 – Cyberattacks are becoming more complex. • Complexity shows in newer, advanced persistent threats that defeat increasingly sophisticated cybersecurity defensive technologies. • Cybersecurity experts are always playing catch up after newer methods of cyberattack are discovered.
  • 8. Complex Malicious Code Operates Undetected for Years Complex malicious code can reside and operate undetected inside computers for years before discovery. • The STUXNET malicious code operated inside Iranian nuclear facilities for several years before it was eventually discovered. • The new SNAKE malicious code, recently announced as a new discovery inside Ukrainian computers, may also have infected other computers worldwide and operated secretly for the past several years.
  • 9. Cascade Failures May Connect Critical Infrastructures Problem #2 - Critical infrastructures are subject to complex cascade-failures due to vulnerabilities in other distantly- related infrastructures. • During Sandy, the hospitals in New Jersey lost electricity when the local power utility flooded. • When Hospital backup diesel generators ran out of fuel, filling stations had no electricity to pump fuel into delivery tankers.
  • 10. Hackers Bypass Defensive Technology – Attack Users Problem #3 - Hackers defeat sophisticated technical cybersecurity defenses by directly targeting the users instead of the computers. • With „Phishing attacks‟, users are tricked by email attachments, or by false web sites, that enable hackers to steal personal secrets and passwords.
  • 11. Problems Require a Multi-Disciplinary Education Problems of Complexity, Cascade Failures, and Targeted Users now require a multi-disciplinary approach to cybersecurity education. – Leaders in all professions, all disciplines must develop a “cybersecurity mindset”. The ACM Education Board in 2013 acknowledged that “a system- wide perspective has become an important part of cybersecurity education, and that education must be multi-disciplinary, to include many sectors.”
  • 12. Management and Coordination of Cybersecurity Technology Traditional cybersecurity education courses were initially designed to expand the technical skills of technology experts. • Management and Coordination of technology must now be emphasized in Cybersecurity Education. • Cybersecurity Education must now range across many sectors, not focus just on the development and operation of security technology.
  • 13. APUS Goal for Cybersecurity Education Leaders in All Disciplines need Cybersecurity Education to help manage and coordinate technology for cybersecurity - Business Education Public Safety International Relations Environmental Science Space Studies Sports and Healthcare Transportation and Logistics Students may enroll in the APUS Cybersecurity Program with an IT certificate, or with a non-technical work background
  • 14. APUS Admissions Requirements Students enrolling for Cybersecurity must meet one of these requirements --- – Undergraduate degree in Information Technology or a related field or – Undergraduate IT Certificate or – FIVE years of work experience at the senior level in Criminal Justice, Emergency Management, Intelligence, Homeland Security or other non-technical background
  • 15. APUS Cybersecurity Programs • First half of the graduate cybersecurity program focuses on network security, information assurance, cybercrime, and digital forensics. Second half of grad program focuses on policies, practices, perspectives of different disciplines, including emergency management, homeland security, intelligence, law and ethics, risk management and cyber warfare. • The capstone course is a multi-disciplinary group project where individual participants represent different sectors, agencies, and disciplines. • Graduate certificates are available in: • Cybercrime • Digital Forensics • Information Assurance • Information Systems Security • Undergraduate certificates also available in: • Digital Forensics • Information Assurance • Homeland Security • National Security • Emergency Management
  • 16. APUS Awarded National Certifications for Cybersecurity Education 2013 - APUS received two National Training Standards certifications for Information Systems Security Professionals from the Committee on National Security Systems (CNSS) NSTISSI no. 4011 and CNSSI no. 4013 2014 - APUS is also applying for the CAE/IA/CD designation from DHA and NSA.
  • 17. For Further Information Clay Wilson, Phd, CISSP Program Director, Cybersecurity Studies American Public University System cwilson@apus.edu Undergraduate programs http://www.amu.apus.edu/lp2/cybersecurity/bachelors.htm Graduate programs http://www.amu.apus.edu/lp2/cybersecurity/masters.htm