SlideShare uma empresa Scribd logo
1 de 26
The College of Information Sciences and Technology What is IST? What can I do with IST/SRA? Is this a good fit for me?
Mission Build knowledge  and information skills  to meet the needs  of the new Information Age.   2
Information Age: Need Coffee 3
Google Maps 4
Starbucks 5
Street View 6
IST enables: People Technology Information create organize share using store protect access analyze modify
IST enables: People Technology new iPod applications Information students create organize share using store protect access digital music analyze modify
IST enables: People Technology firewall, authentication, and other security technologies that will keep your information safe Information PSU academic and financial advisors create organize share store using protect access private information in your student files analyze modify
IST enables: People Technology integrated software systems (that allow the information to be accessed and coordinated across databases) managers (in any organization—Walmart, Geico, Proctor & Gamble…) Information create organize share store using financial and manufacturing information that exists in different databases protect access analyze modify
IST enables: People Technology Internet Information government create organize share store using well-informed laws about sharing private information protect access analyze modify
Information Sciences and Technology Information Sciences and Technology (IST) Major
IST Bachelor of Science (ISTBS)  Design, implementation, integration, and utilization of information systems (IS) Design  and  Development Integration  and  Application Information Context Intelligence Analysis and Modeling Information and Cyber Security Social Factors and Risk   Make Cool Stuff Understand programming, database, human computer interaction, knowledge representation, search engines, characteristics of users. Make Businesses’ Use of Information More Efficient Understand information acquisition, representation, dissemination, storage, retrieval, display, and interpretation. Make Sense of Impact of Information Systems Understand the use and impact of IS at the individual, group, organizational, national and international levels (e.g., social networks, crowd sourcing, digital natives/digital immigrants). 13
What You Will Learn Internship 14
Companies Who Hire IST Graduates 15
IST Bachelor of Arts (ISTBA) 16
Security and Risk Analysis Security and Risk Analysis (SRA) Major
What is SRA? 18
Individual Threats 19
Business Threats 20
Threats to  our National Security 21
SRA Bachelor of Science (B.S.)  Design, implementation, integration and utilization of information systems (IS) Information and  Cyber Security Intelligence Analysis  and Modeling Social Factors and Risk Intelligence Analysis and Modeling Information and Cyber Security Social Factors and Risk   Make Information Systems Secure Understand how to deal with security and privacy concerns in all types of organizations, ensure that computer systems and products are secure and how to “police” cyberspace. Make Risk Predictions Understand how to calculate, evaluate, and predict risk in a variety of fields including business and national security; students learn how to protect vital infrastructure against subversive attacks. Make Sense of Contextual Elements surrounding Risk Understand the psychological and sociological causes of terrorism and crime and how information technology is transforming each; understand privacy policies and government regulation to ensure users that data are secure.  22
What You Will Learn 23 Internship
Companies Who Hire SRA Graduates 24
What We Are Where information, people, and technology meet.  Where careers in information technologies abound. Where students understand the effects of information technology on themselves, other individuals, organizations, and society.  Where you will find a broad range of topics from software development to social media to business applications for technology to information security and risk analysis.  25
IST4Me 26 https://online.ist.psu.edu/110-ist4me/

Mais conteúdo relacionado

Mais procurados

Infromation securiity
Infromation securiityInfromation securiity
Infromation securiityAamir Sohail
 
Ethical mobility policy development & sustainability
Ethical mobility policy development & sustainabilityEthical mobility policy development & sustainability
Ethical mobility policy development & sustainabilityGlobal Business Professor
 
Gr 3 Societal Issues of Information System Design and Use
Gr 3 Societal Issues of Information System Design and UseGr 3 Societal Issues of Information System Design and Use
Gr 3 Societal Issues of Information System Design and Useuniversity of education,Lahore
 
Emerging trends in computer science and related technologies
Emerging trends in computer science and related technologiesEmerging trends in computer science and related technologies
Emerging trends in computer science and related technologiesSidraAfreen
 
AI Governance and Ethics - Industry Standards
AI Governance and Ethics - Industry StandardsAI Governance and Ethics - Industry Standards
AI Governance and Ethics - Industry StandardsAnsgar Koene
 
Afcea it security course 2015 flyer
Afcea it security course 2015 flyerAfcea it security course 2015 flyer
Afcea it security course 2015 flyerClaude Gelinas
 
CUbRIK tutorial at ICWE 2013: part 1 Introduction to Human Computation
CUbRIK tutorial at ICWE 2013: part 1 Introduction to Human ComputationCUbRIK tutorial at ICWE 2013: part 1 Introduction to Human Computation
CUbRIK tutorial at ICWE 2013: part 1 Introduction to Human ComputationCUbRIK Project
 
Challenges facing data protection in kenya
Challenges facing data protection in kenyaChallenges facing data protection in kenya
Challenges facing data protection in kenyafillkay
 
AI and Machine Learning In Cybersecurity | A Saviour or Enemy?
AI and Machine Learning In Cybersecurity | A Saviour or Enemy?AI and Machine Learning In Cybersecurity | A Saviour or Enemy?
AI and Machine Learning In Cybersecurity | A Saviour or Enemy?SahilRao25
 
Legal, ethical & professional issues
Legal, ethical & professional issuesLegal, ethical & professional issues
Legal, ethical & professional issuesDhani Ahmad
 
Network Security and Privacy in Medium Scale Businesses in Nigeria
Network Security and Privacy in Medium Scale Businesses in NigeriaNetwork Security and Privacy in Medium Scale Businesses in Nigeria
Network Security and Privacy in Medium Scale Businesses in NigeriaINFOGAIN PUBLICATION
 
Cyber Security in AI (Artificial Intelligence)
Cyber Security in AI (Artificial Intelligence)Cyber Security in AI (Artificial Intelligence)
Cyber Security in AI (Artificial Intelligence)Harsh Bhanushali
 
My Pres @ Red Sea_university 23-12-2015
My Pres @ Red Sea_university 23-12-2015My Pres @ Red Sea_university 23-12-2015
My Pres @ Red Sea_university 23-12-2015Anwar F.A. Dafa-Alla
 
Cyber Security Intelligence
Cyber Security IntelligenceCyber Security Intelligence
Cyber Security Intelligenceijtsrd
 
The social aspect of Smart Wearable Systems in the era of Internet-of-Things
The social aspect of Smart Wearable Systems in the era of Internet-of-ThingsThe social aspect of Smart Wearable Systems in the era of Internet-of-Things
The social aspect of Smart Wearable Systems in the era of Internet-of-ThingsAnax Fotopoulos
 
Career guide on cyber security
Career guide on cyber securityCareer guide on cyber security
Career guide on cyber securityavinashkumar1912
 
IT-Security-Governance-Innovations_joa_Eng_0515
IT-Security-Governance-Innovations_joa_Eng_0515IT-Security-Governance-Innovations_joa_Eng_0515
IT-Security-Governance-Innovations_joa_Eng_0515A Krista Kivisild
 

Mais procurados (20)

Infromation securiity
Infromation securiityInfromation securiity
Infromation securiity
 
Ethical mobility policy development & sustainability
Ethical mobility policy development & sustainabilityEthical mobility policy development & sustainability
Ethical mobility policy development & sustainability
 
Gr 3 Societal Issues of Information System Design and Use
Gr 3 Societal Issues of Information System Design and UseGr 3 Societal Issues of Information System Design and Use
Gr 3 Societal Issues of Information System Design and Use
 
Emerging trends in computer science and related technologies
Emerging trends in computer science and related technologiesEmerging trends in computer science and related technologies
Emerging trends in computer science and related technologies
 
AI Governance and Ethics - Industry Standards
AI Governance and Ethics - Industry StandardsAI Governance and Ethics - Industry Standards
AI Governance and Ethics - Industry Standards
 
Monitoring, Detecting And Preventing Insider Fraud And Abuse V2
Monitoring, Detecting And Preventing Insider Fraud And Abuse V2Monitoring, Detecting And Preventing Insider Fraud And Abuse V2
Monitoring, Detecting And Preventing Insider Fraud And Abuse V2
 
Afcea it security course 2015 flyer
Afcea it security course 2015 flyerAfcea it security course 2015 flyer
Afcea it security course 2015 flyer
 
Cybersecurity jobs jb
Cybersecurity jobs jbCybersecurity jobs jb
Cybersecurity jobs jb
 
CUbRIK tutorial at ICWE 2013: part 1 Introduction to Human Computation
CUbRIK tutorial at ICWE 2013: part 1 Introduction to Human ComputationCUbRIK tutorial at ICWE 2013: part 1 Introduction to Human Computation
CUbRIK tutorial at ICWE 2013: part 1 Introduction to Human Computation
 
Challenges facing data protection in kenya
Challenges facing data protection in kenyaChallenges facing data protection in kenya
Challenges facing data protection in kenya
 
AI and Machine Learning In Cybersecurity | A Saviour or Enemy?
AI and Machine Learning In Cybersecurity | A Saviour or Enemy?AI and Machine Learning In Cybersecurity | A Saviour or Enemy?
AI and Machine Learning In Cybersecurity | A Saviour or Enemy?
 
Legal, ethical & professional issues
Legal, ethical & professional issuesLegal, ethical & professional issues
Legal, ethical & professional issues
 
Network Security and Privacy in Medium Scale Businesses in Nigeria
Network Security and Privacy in Medium Scale Businesses in NigeriaNetwork Security and Privacy in Medium Scale Businesses in Nigeria
Network Security and Privacy in Medium Scale Businesses in Nigeria
 
Cyber Security in AI (Artificial Intelligence)
Cyber Security in AI (Artificial Intelligence)Cyber Security in AI (Artificial Intelligence)
Cyber Security in AI (Artificial Intelligence)
 
My Pres @ Red Sea_university 23-12-2015
My Pres @ Red Sea_university 23-12-2015My Pres @ Red Sea_university 23-12-2015
My Pres @ Red Sea_university 23-12-2015
 
Cyber Security Intelligence
Cyber Security IntelligenceCyber Security Intelligence
Cyber Security Intelligence
 
The social aspect of Smart Wearable Systems in the era of Internet-of-Things
The social aspect of Smart Wearable Systems in the era of Internet-of-ThingsThe social aspect of Smart Wearable Systems in the era of Internet-of-Things
The social aspect of Smart Wearable Systems in the era of Internet-of-Things
 
Career guide on cyber security
Career guide on cyber securityCareer guide on cyber security
Career guide on cyber security
 
Class activity 4
Class activity 4 Class activity 4
Class activity 4
 
IT-Security-Governance-Innovations_joa_Eng_0515
IT-Security-Governance-Innovations_joa_Eng_0515IT-Security-Governance-Innovations_joa_Eng_0515
IT-Security-Governance-Innovations_joa_Eng_0515
 

Destaque

IST 110s: Library Skills
IST 110s: Library SkillsIST 110s: Library Skills
IST 110s: Library SkillsMelissa Hicks
 
Ist110sacademicintegrity 13
Ist110sacademicintegrity 13Ist110sacademicintegrity 13
Ist110sacademicintegrity 13Melissa Hicks
 
The Language of Drupal
The Language of DrupalThe Language of Drupal
The Language of DrupalMelissa Hicks
 
"Turbo boost your website" aka BigPipe at Webinale 2014 in Berlin
"Turbo boost your website" aka BigPipe at Webinale 2014 in Berlin"Turbo boost your website" aka BigPipe at Webinale 2014 in Berlin
"Turbo boost your website" aka BigPipe at Webinale 2014 in BerlinTobias Zander
 

Destaque (8)

110sadvising
110sadvising110sadvising
110sadvising
 
IST 110s: Library Skills
IST 110s: Library SkillsIST 110s: Library Skills
IST 110s: Library Skills
 
Ist110sacademicintegrity 13
Ist110sacademicintegrity 13Ist110sacademicintegrity 13
Ist110sacademicintegrity 13
 
Advising FAQs
Advising FAQsAdvising FAQs
Advising FAQs
 
Advising
AdvisingAdvising
Advising
 
Library Lesson Plan
Library Lesson PlanLibrary Lesson Plan
Library Lesson Plan
 
The Language of Drupal
The Language of DrupalThe Language of Drupal
The Language of Drupal
 
"Turbo boost your website" aka BigPipe at Webinale 2014 in Berlin
"Turbo boost your website" aka BigPipe at Webinale 2014 in Berlin"Turbo boost your website" aka BigPipe at Webinale 2014 in Berlin
"Turbo boost your website" aka BigPipe at Webinale 2014 in Berlin
 

Semelhante a Ist curriculum

Cybersecurity Business Risk, Literature Review
Cybersecurity Business Risk, Literature ReviewCybersecurity Business Risk, Literature Review
Cybersecurity Business Risk, Literature ReviewEnow Eyong
 
Running Head TRENDS IN CYBERSECURITY1TRENDS IN CYBERSECURITY.docx
Running Head TRENDS IN CYBERSECURITY1TRENDS IN CYBERSECURITY.docxRunning Head TRENDS IN CYBERSECURITY1TRENDS IN CYBERSECURITY.docx
Running Head TRENDS IN CYBERSECURITY1TRENDS IN CYBERSECURITY.docxtodd521
 
Cyber Crime and Cyber Security
Cyber Crime and Cyber SecurityCyber Crime and Cyber Security
Cyber Crime and Cyber Securityijtsrd
 
INFORMATION SECURITY MANAGEMENT - Critique the employment of ethical hacking ...
INFORMATION SECURITY MANAGEMENT - Critique the employment of ethical hacking ...INFORMATION SECURITY MANAGEMENT - Critique the employment of ethical hacking ...
INFORMATION SECURITY MANAGEMENT - Critique the employment of ethical hacking ...Hansa Edirisinghe
 
wp-us-cities-exposed
wp-us-cities-exposedwp-us-cities-exposed
wp-us-cities-exposedNumaan Huq
 
Cybersecurity vs Data Science A Roadmap.pptx
Cybersecurity vs Data Science A Roadmap.pptxCybersecurity vs Data Science A Roadmap.pptx
Cybersecurity vs Data Science A Roadmap.pptxInfosectrain3
 
Cybersecurity vs Data Science A Roadmap.pptx
Cybersecurity vs Data Science A Roadmap.pptxCybersecurity vs Data Science A Roadmap.pptx
Cybersecurity vs Data Science A Roadmap.pptxInfosectrain3
 
Empowering Cyber Threat Intelligence with AI
Empowering Cyber Threat Intelligence with AIEmpowering Cyber Threat Intelligence with AI
Empowering Cyber Threat Intelligence with AIIJCI JOURNAL
 
Analysis of personal information security behavior and awareness.docx
Analysis of personal information security behavior and awareness.docxAnalysis of personal information security behavior and awareness.docx
Analysis of personal information security behavior and awareness.docxdaniahendric
 
Database Security Is Vital For Any And Every Organization
Database Security Is Vital For Any And Every OrganizationDatabase Security Is Vital For Any And Every Organization
Database Security Is Vital For Any And Every OrganizationApril Dillard
 
Cyber Security Awareness and Corporate Agility of Deposit Money Banks in Nigeria
Cyber Security Awareness and Corporate Agility of Deposit Money Banks in NigeriaCyber Security Awareness and Corporate Agility of Deposit Money Banks in Nigeria
Cyber Security Awareness and Corporate Agility of Deposit Money Banks in Nigeriaijtsrd
 
Article 1 currently, smartphone, web, and social networking techno
Article 1 currently, smartphone, web, and social networking technoArticle 1 currently, smartphone, web, and social networking techno
Article 1 currently, smartphone, web, and social networking technohoney690131
 
STAYING SAFE AND SECURED ON TODAY AND TOMORROW’S AFRICA CYBERSPACE WORKSHOP 2017
STAYING SAFE AND SECURED ON TODAY AND TOMORROW’S AFRICA CYBERSPACE WORKSHOP 2017STAYING SAFE AND SECURED ON TODAY AND TOMORROW’S AFRICA CYBERSPACE WORKSHOP 2017
STAYING SAFE AND SECURED ON TODAY AND TOMORROW’S AFRICA CYBERSPACE WORKSHOP 2017Maurice Dawson
 
CHAPTER 15HRIS Privacy and Security1.docx
CHAPTER 15HRIS Privacy and Security1.docxCHAPTER 15HRIS Privacy and Security1.docx
CHAPTER 15HRIS Privacy and Security1.docxketurahhazelhurst
 
Challenges and Solution for Artificial Intelligence in Cybersecurity of the USA
Challenges and Solution for Artificial Intelligence in Cybersecurity of the USAChallenges and Solution for Artificial Intelligence in Cybersecurity of the USA
Challenges and Solution for Artificial Intelligence in Cybersecurity of the USAvishal dineshkumar soni
 
A Critical Analysis Of Information Security -A Case Study Of Cognizant Techno...
A Critical Analysis Of Information Security -A Case Study Of Cognizant Techno...A Critical Analysis Of Information Security -A Case Study Of Cognizant Techno...
A Critical Analysis Of Information Security -A Case Study Of Cognizant Techno...Finni Rice
 
Information Security Awareness
Information Security AwarenessInformation Security Awareness
Information Security AwarenessDigit Oktavianto
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hackingijtsrd
 

Semelhante a Ist curriculum (20)

Cybersecurity Business Risk, Literature Review
Cybersecurity Business Risk, Literature ReviewCybersecurity Business Risk, Literature Review
Cybersecurity Business Risk, Literature Review
 
Running Head TRENDS IN CYBERSECURITY1TRENDS IN CYBERSECURITY.docx
Running Head TRENDS IN CYBERSECURITY1TRENDS IN CYBERSECURITY.docxRunning Head TRENDS IN CYBERSECURITY1TRENDS IN CYBERSECURITY.docx
Running Head TRENDS IN CYBERSECURITY1TRENDS IN CYBERSECURITY.docx
 
Cyber Crime and Cyber Security
Cyber Crime and Cyber SecurityCyber Crime and Cyber Security
Cyber Crime and Cyber Security
 
INFORMATION SECURITY MANAGEMENT - Critique the employment of ethical hacking ...
INFORMATION SECURITY MANAGEMENT - Critique the employment of ethical hacking ...INFORMATION SECURITY MANAGEMENT - Critique the employment of ethical hacking ...
INFORMATION SECURITY MANAGEMENT - Critique the employment of ethical hacking ...
 
wp-us-cities-exposed
wp-us-cities-exposedwp-us-cities-exposed
wp-us-cities-exposed
 
Threat intelligence minority report
Threat intelligence minority reportThreat intelligence minority report
Threat intelligence minority report
 
Cybersecurity vs Data Science A Roadmap.pptx
Cybersecurity vs Data Science A Roadmap.pptxCybersecurity vs Data Science A Roadmap.pptx
Cybersecurity vs Data Science A Roadmap.pptx
 
Cybersecurity vs Data Science A Roadmap.pptx
Cybersecurity vs Data Science A Roadmap.pptxCybersecurity vs Data Science A Roadmap.pptx
Cybersecurity vs Data Science A Roadmap.pptx
 
Empowering Cyber Threat Intelligence with AI
Empowering Cyber Threat Intelligence with AIEmpowering Cyber Threat Intelligence with AI
Empowering Cyber Threat Intelligence with AI
 
Analysis of personal information security behavior and awareness.docx
Analysis of personal information security behavior and awareness.docxAnalysis of personal information security behavior and awareness.docx
Analysis of personal information security behavior and awareness.docx
 
Database Security Is Vital For Any And Every Organization
Database Security Is Vital For Any And Every OrganizationDatabase Security Is Vital For Any And Every Organization
Database Security Is Vital For Any And Every Organization
 
Cyber Security Awareness and Corporate Agility of Deposit Money Banks in Nigeria
Cyber Security Awareness and Corporate Agility of Deposit Money Banks in NigeriaCyber Security Awareness and Corporate Agility of Deposit Money Banks in Nigeria
Cyber Security Awareness and Corporate Agility of Deposit Money Banks in Nigeria
 
Article 1 currently, smartphone, web, and social networking techno
Article 1 currently, smartphone, web, and social networking technoArticle 1 currently, smartphone, web, and social networking techno
Article 1 currently, smartphone, web, and social networking techno
 
STAYING SAFE AND SECURED ON TODAY AND TOMORROW’S AFRICA CYBERSPACE WORKSHOP 2017
STAYING SAFE AND SECURED ON TODAY AND TOMORROW’S AFRICA CYBERSPACE WORKSHOP 2017STAYING SAFE AND SECURED ON TODAY AND TOMORROW’S AFRICA CYBERSPACE WORKSHOP 2017
STAYING SAFE AND SECURED ON TODAY AND TOMORROW’S AFRICA CYBERSPACE WORKSHOP 2017
 
CHAPTER 15HRIS Privacy and Security1.docx
CHAPTER 15HRIS Privacy and Security1.docxCHAPTER 15HRIS Privacy and Security1.docx
CHAPTER 15HRIS Privacy and Security1.docx
 
Information Security For Small Business
Information Security For Small BusinessInformation Security For Small Business
Information Security For Small Business
 
Challenges and Solution for Artificial Intelligence in Cybersecurity of the USA
Challenges and Solution for Artificial Intelligence in Cybersecurity of the USAChallenges and Solution for Artificial Intelligence in Cybersecurity of the USA
Challenges and Solution for Artificial Intelligence in Cybersecurity of the USA
 
A Critical Analysis Of Information Security -A Case Study Of Cognizant Techno...
A Critical Analysis Of Information Security -A Case Study Of Cognizant Techno...A Critical Analysis Of Information Security -A Case Study Of Cognizant Techno...
A Critical Analysis Of Information Security -A Case Study Of Cognizant Techno...
 
Information Security Awareness
Information Security AwarenessInformation Security Awareness
Information Security Awareness
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 

Último

ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4MiaBumagat1
 
Q4 English4 Week3 PPT Melcnmg-based.pptx
Q4 English4 Week3 PPT Melcnmg-based.pptxQ4 English4 Week3 PPT Melcnmg-based.pptx
Q4 English4 Week3 PPT Melcnmg-based.pptxnelietumpap1
 
How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17Celine George
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Celine George
 
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfInclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfTechSoup
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTiammrhaywood
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxthorishapillay1
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Celine George
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersSabitha Banu
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...Nguyen Thanh Tu Collection
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Jisc
 
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxBarangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxCarlos105
 
Judging the Relevance and worth of ideas part 2.pptx
Judging the Relevance  and worth of ideas part 2.pptxJudging the Relevance  and worth of ideas part 2.pptx
Judging the Relevance and worth of ideas part 2.pptxSherlyMaeNeri
 
ACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfSpandanaRallapalli
 

Último (20)

ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4
 
Q4 English4 Week3 PPT Melcnmg-based.pptx
Q4 English4 Week3 PPT Melcnmg-based.pptxQ4 English4 Week3 PPT Melcnmg-based.pptx
Q4 English4 Week3 PPT Melcnmg-based.pptx
 
How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17
 
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptxLEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17
 
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfInclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptx
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17
 
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptxYOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginners
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...
 
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxBarangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
 
OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...
 
Judging the Relevance and worth of ideas part 2.pptx
Judging the Relevance  and worth of ideas part 2.pptxJudging the Relevance  and worth of ideas part 2.pptx
Judging the Relevance and worth of ideas part 2.pptx
 
ACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdf
 

Ist curriculum

  • 1. The College of Information Sciences and Technology What is IST? What can I do with IST/SRA? Is this a good fit for me?
  • 2. Mission Build knowledge and information skills to meet the needs of the new Information Age. 2
  • 7. IST enables: People Technology Information create organize share using store protect access analyze modify
  • 8. IST enables: People Technology new iPod applications Information students create organize share using store protect access digital music analyze modify
  • 9. IST enables: People Technology firewall, authentication, and other security technologies that will keep your information safe Information PSU academic and financial advisors create organize share store using protect access private information in your student files analyze modify
  • 10. IST enables: People Technology integrated software systems (that allow the information to be accessed and coordinated across databases) managers (in any organization—Walmart, Geico, Proctor & Gamble…) Information create organize share store using financial and manufacturing information that exists in different databases protect access analyze modify
  • 11. IST enables: People Technology Internet Information government create organize share store using well-informed laws about sharing private information protect access analyze modify
  • 12. Information Sciences and Technology Information Sciences and Technology (IST) Major
  • 13. IST Bachelor of Science (ISTBS) Design, implementation, integration, and utilization of information systems (IS) Design and Development Integration and Application Information Context Intelligence Analysis and Modeling Information and Cyber Security Social Factors and Risk Make Cool Stuff Understand programming, database, human computer interaction, knowledge representation, search engines, characteristics of users. Make Businesses’ Use of Information More Efficient Understand information acquisition, representation, dissemination, storage, retrieval, display, and interpretation. Make Sense of Impact of Information Systems Understand the use and impact of IS at the individual, group, organizational, national and international levels (e.g., social networks, crowd sourcing, digital natives/digital immigrants). 13
  • 14. What You Will Learn Internship 14
  • 15. Companies Who Hire IST Graduates 15
  • 16. IST Bachelor of Arts (ISTBA) 16
  • 17. Security and Risk Analysis Security and Risk Analysis (SRA) Major
  • 21. Threats to our National Security 21
  • 22. SRA Bachelor of Science (B.S.) Design, implementation, integration and utilization of information systems (IS) Information and Cyber Security Intelligence Analysis and Modeling Social Factors and Risk Intelligence Analysis and Modeling Information and Cyber Security Social Factors and Risk Make Information Systems Secure Understand how to deal with security and privacy concerns in all types of organizations, ensure that computer systems and products are secure and how to “police” cyberspace. Make Risk Predictions Understand how to calculate, evaluate, and predict risk in a variety of fields including business and national security; students learn how to protect vital infrastructure against subversive attacks. Make Sense of Contextual Elements surrounding Risk Understand the psychological and sociological causes of terrorism and crime and how information technology is transforming each; understand privacy policies and government regulation to ensure users that data are secure. 22
  • 23. What You Will Learn 23 Internship
  • 24. Companies Who Hire SRA Graduates 24
  • 25. What We Are Where information, people, and technology meet. Where careers in information technologies abound. Where students understand the effects of information technology on themselves, other individuals, organizations, and society. Where you will find a broad range of topics from software development to social media to business applications for technology to information security and risk analysis. 25

Notas do Editor

  1. INTRO SELF AND WELCOME TO COLLEGE OF IST
  2. Well, here is our mission…What is the “Information Age”? Take a minute to think about Information all around you. What information have you produced, come in contact with, or ignored in the last 10 minutes?(Bar code on card you handed in, iPod, mobile phone, PPT slide)Think about your life, day-in, day-out. Information is all around you—and we increasingly rely on it to make our lives work.STORY: Steve asking me a question and none of us knew the answer in the meeting. What did we do? What would we have done 5 years ago? 10 years ago? Parents—30 years ago?This IS the information age; and this College was created to pioneer research, education, and forward thinking in this new era.Here is a quick example…
  3. Have you ever done this—”Where is the closest Starbucks?” (If you don’t drink coffee now, you just might when you get to college…)
  4. First you search for Penn State area
  5. Then you search for Starbucks near Penn State. College Avenue appears. Sounds close!!
  6. Then you look at the street view--ah-ha!! This is what we drove by this morning!! Think about all the things involved in this quick interaction with your information technology device.You, the person, want something (coffee). You need information (location of Starbucks).You turn to the technology in your hand to get the information (iPod).Someone who works for Google anticipated this need. The Google Maps Vehicle driver drove through town and collected videos of street views. Someone organized, labeled, and stored them.Someone wrote a program to deliver that image over the Internet.You made use of all this: the information, the information databases where the info was stored, the networks through which the data was passed, and the programs that someone wrote to get the information to you.And then you drank your coffee.THIS is the information age. And there is much more…
  7. Let’s go back to what our website said: IST is about the interaction of people, tech, and info. Let’s put a few more words around this interaction to make more sense of this statement.THEN (after all animations):Can you give one example people who use information technologies? (How about people searching for a college???)What information might those people want or need?What might they want to do with the information?What technologies might they use?Let’s look at some other examples.
  8. Let’s look at some examples…How do we enable this to happen? We teach students what they need to know to be able to:develop applications for iPods
  9. How about another example…How do we enable this to happen? We teach students what they need to know to be able to:Protect an organization’s private information
  10. Here’s an example from our most popular area of study…How do we enable this to happen? We teach students what they need to know to be able to:Consult with corporations that need help making their various systems of information “talk” to each other more efficiently
  11. And if you are interested in policy-related aspects of information technology use, how about this example…How do we enable this to happen? We teach students what they need to know to be able to:Advise on policy-making regarding the internet regulations and lawsDOES THIS HELP GIVE YOU A SENSE OF WHAT WE ARE CONCERNED WITH IN THIS COLLEGE??? (Please ask now if you have questions…)
  12. Let’s take a closer look at the degrees we offer—first the B.S. in IST. Here is where it can get confusing—we have a major with the same name as the College. But I will try to be specific in referring to one or the other.
  13. We offer 3 options—see slide--Design next iPhone application…--Help PSU move from archaic system of student information to a newer one that allows people with appropriate access to view financial, medical, academic, payroll info from one system--Determine how to disseminate information about the next earthquake to rural villages in developing countries
  14. ALL students in the IST-B.S. major learn…
  15. On screen are companies that hire IST graduates.Here are some job titles:Applications DeveloperIT ConsultantAssistant Project ManagerIT Infrastructure AnalystBusiness Systems AnalystIT Solutions ArchitectChange Management AnalystIT Systems EngineerData AnalystImplementation specialistDesign EngineerMultimedia Specialist Forensics and Analysis ConsultantTechnology Support SpecialistWeb Developer
  16. New this past year: Craft your own degree by integrating different disciplines and your personal passions with ISTUnderstand potential applications AthleticsArtBusinessScienceHistoryMedical-informatics Legal-informatics Bio-informatics Enviro-informatics Business-informatics ChemometricsEnterprise informatics
  17. Our SECOND B.S. is in “Security and Risk Analysis.”
  18. The Security and Risk Analysis major focuses on how to design systems that are secure (while still allowing people to work), how to measure risk, and how to make decisions to ensure that proper levels of privacy are maintained for individual technology users, businesses, government, and other organizations. The SRA major promotes an understanding of information system design and operation, and of the legal and cultural issues surrounding privacy, intelligence, and security.Students learn about:Computer securityNetwork securityCyber crime The politics and “business” of terrorism Offensive and defensive use of computer and information networksDecision theoryPrivacy and legal/regulatory issues Implications of digital social networking Let’s take a look at a few examples of what our SRA students are prepared to face…
  19. Students help protect individuals from phishing –where someone seeks personal information under false pretense—e.g., Hallmark cards and Google jobs
  20. Students help prevent and investigate Business threatsFirst article, network breach: Federal Fire Department workers are being asked to look for unusual activity on bank accounts because an employee wrongfully accessed their information.Second article: privacy at risk: potential Chinese hackers at Google
  21. Students help protect national security interests…We see plenty of articles in the news about Government-industry partnership to targets cyber security threats.
  22. We offer three options:ICS—IF INTERESTED IN MAKING SYSTEMS SECURE, THINK ICS --- Students do VIRTUAL LABS where…IAM—IF MORE INTERESTED IN PREDICTION AND RISK ANALYSIS, CONSIDER IAM -- Students work for 3-letter agencies (CIA, and so forth) Teaches students how to calculate, evaluate, and predict risk in a variety of fields, including business and national security. SFR IF MORE INTERESTED IN WHAT MAKES PEOPLE TICK, CONSIDER SFR – Leading faculty in the field of terrorism and privacy, and sociology of crime!!In this option, students explore the psychological and sociological causes of terrorism and crime, and how information technology is transforming each. In the classroom, students work on teams in which they role-play both terrorists and criminals and the intelligence and security officers combating them. This option also examines the privacy policies and legal regulations within companies and the government. Students learn to critically read privacy policies and understand government regulation so they can help improve their own privacy policies and ensure users that the data they provide is secure.
  23. ALL students in the SRA-B.S. major learn…
  24. On screen are companies that hire SRA graduates.Here are some job titles:Catastrophe Risk AnalystIT AnalystComputer System Security AnalystsIT Consulting ManagerCyber AnalystIT Strategy ArchitectCyber Network Security EngineerNetwork Intel AnalystsData Security AdministratorNetwork Security Engineer Enterprise ArchitectSystems AdministrationInformation Assurance AnalystsSystems Enterprise Architect Information Assurance RemediationSystems Integration AnalystsInformation Assurance/Security EngineersSecurity Project ManagerIntel AnalystsSystems Integration EngineerIntrusion Detection AnalystWeb Security & Privacy Specialist
  25. In Summary… We are the College where…information, people, and technology meetcareers in information technologies aboundstudents to understand the effects of information technology on themselves, other individuals, organizations, and societyyou will find a broad range of topics from software development to social media to business applications for technology to information security and risk analysis
  26. Now, YOU can take a look at IST—with this website created just for first-year students…Be sure to check out:--Which option is for me Quiz--Descriptions of majors and options--videos of former students--resources in IST for students--and more!