SlideShare uma empresa Scribd logo
1 de 26
The College of Information Sciences and Technology What is IST? What can I do with IST/SRA? Is this a good fit for me?
Mission Build knowledge  and information skills  to meet the needs  of the new Information Age.   2
Information Age: Need Coffee 3
Google Maps 4
Starbucks 5
Street View 6
IST enables: People Technology Information create organize share using store protect access analyze modify
IST enables: People Technology new iPod applications Information students create organize share using store protect access digital music analyze modify
IST enables: People Technology firewall, authentication, and other security technologies that will keep your information safe Information PSU academic and financial advisors create organize share store using protect access private information in your student files analyze modify
IST enables: People Technology integrated software systems (that allow the information to be accessed and coordinated across databases) managers (in any organization—Walmart, Geico, Proctor & Gamble…) Information create organize share store using financial and manufacturing information that exists in different databases protect access analyze modify
IST enables: People Technology Internet Information government create organize share store using well-informed laws about sharing private information protect access analyze modify
Information Sciences and Technology Information Sciences and Technology (IST) Major
IST Bachelor of Science (ISTBS)  Design, implementation, integration, and utilization of information systems (IS) Design  and  Development Integration  and  Application Information Context Intelligence Analysis and Modeling Information and Cyber Security Social Factors and Risk   Make Cool Stuff Understand programming, database, human computer interaction, knowledge representation, search engines, characteristics of users. Make Businesses’ Use of Information More Efficient Understand information acquisition, representation, dissemination, storage, retrieval, display, and interpretation. Make Sense of Impact of Information Systems Understand the use and impact of IS at the individual, group, organizational, national and international levels (e.g., social networks, crowd sourcing, digital natives/digital immigrants). 13
What You Will Learn Internship 14
Companies Who Hire IST Graduates 15
IST Bachelor of Arts (ISTBA) 16
Security and Risk Analysis Security and Risk Analysis (SRA) Major
What is SRA? 18
Individual Threats 19
Business Threats 20
Threats to  our National Security 21
SRA Bachelor of Science (B.S.)  Design, implementation, integration and utilization of information systems (IS) Information and  Cyber Security Intelligence Analysis  and Modeling Social Factors and Risk Intelligence Analysis and Modeling Information and Cyber Security Social Factors and Risk   Make Information Systems Secure Understand how to deal with security and privacy concerns in all types of organizations, ensure that computer systems and products are secure and how to “police” cyberspace. Make Risk Predictions Understand how to calculate, evaluate, and predict risk in a variety of fields including business and national security; students learn how to protect vital infrastructure against subversive attacks. Make Sense of Contextual Elements surrounding Risk Understand the psychological and sociological causes of terrorism and crime and how information technology is transforming each; understand privacy policies and government regulation to ensure users that data are secure.  22
What You Will Learn 23 Internship
Companies Who Hire SRA Graduates 24
What We Are Where information, people, and technology meet.  Where careers in information technologies abound. Where students understand the effects of information technology on themselves, other individuals, organizations, and society.  Where you will find a broad range of topics from software development to social media to business applications for technology to information security and risk analysis.  25
IST4Me 26 https://online.ist.psu.edu/110-ist4me/

Mais conteúdo relacionado

Mais procurados

Infromation securiity
Infromation securiityInfromation securiity
Infromation securiityAamir Sohail
 
Ethical mobility policy development & sustainability
Ethical mobility policy development & sustainabilityEthical mobility policy development & sustainability
Ethical mobility policy development & sustainabilityGlobal Business Professor
 
Gr 3 Societal Issues of Information System Design and Use
Gr 3 Societal Issues of Information System Design and UseGr 3 Societal Issues of Information System Design and Use
Gr 3 Societal Issues of Information System Design and Useuniversity of education,Lahore
 
Emerging trends in computer science and related technologies
Emerging trends in computer science and related technologiesEmerging trends in computer science and related technologies
Emerging trends in computer science and related technologiesSidraAfreen
 
AI Governance and Ethics - Industry Standards
AI Governance and Ethics - Industry StandardsAI Governance and Ethics - Industry Standards
AI Governance and Ethics - Industry StandardsAnsgar Koene
 
Afcea it security course 2015 flyer
Afcea it security course 2015 flyerAfcea it security course 2015 flyer
Afcea it security course 2015 flyerClaude Gelinas
 
CUbRIK tutorial at ICWE 2013: part 1 Introduction to Human Computation
CUbRIK tutorial at ICWE 2013: part 1 Introduction to Human ComputationCUbRIK tutorial at ICWE 2013: part 1 Introduction to Human Computation
CUbRIK tutorial at ICWE 2013: part 1 Introduction to Human ComputationCUbRIK Project
 
Challenges facing data protection in kenya
Challenges facing data protection in kenyaChallenges facing data protection in kenya
Challenges facing data protection in kenyafillkay
 
AI and Machine Learning In Cybersecurity | A Saviour or Enemy?
AI and Machine Learning In Cybersecurity | A Saviour or Enemy?AI and Machine Learning In Cybersecurity | A Saviour or Enemy?
AI and Machine Learning In Cybersecurity | A Saviour or Enemy?SahilRao25
 
Legal, ethical & professional issues
Legal, ethical & professional issuesLegal, ethical & professional issues
Legal, ethical & professional issuesDhani Ahmad
 
Network Security and Privacy in Medium Scale Businesses in Nigeria
Network Security and Privacy in Medium Scale Businesses in NigeriaNetwork Security and Privacy in Medium Scale Businesses in Nigeria
Network Security and Privacy in Medium Scale Businesses in NigeriaINFOGAIN PUBLICATION
 
Cyber Security in AI (Artificial Intelligence)
Cyber Security in AI (Artificial Intelligence)Cyber Security in AI (Artificial Intelligence)
Cyber Security in AI (Artificial Intelligence)Harsh Bhanushali
 
My Pres @ Red Sea_university 23-12-2015
My Pres @ Red Sea_university 23-12-2015My Pres @ Red Sea_university 23-12-2015
My Pres @ Red Sea_university 23-12-2015Anwar F.A. Dafa-Alla
 
Cyber Security Intelligence
Cyber Security IntelligenceCyber Security Intelligence
Cyber Security Intelligenceijtsrd
 
The social aspect of Smart Wearable Systems in the era of Internet-of-Things
The social aspect of Smart Wearable Systems in the era of Internet-of-ThingsThe social aspect of Smart Wearable Systems in the era of Internet-of-Things
The social aspect of Smart Wearable Systems in the era of Internet-of-ThingsAnax Fotopoulos
 
Career guide on cyber security
Career guide on cyber securityCareer guide on cyber security
Career guide on cyber securityavinashkumar1912
 
IT-Security-Governance-Innovations_joa_Eng_0515
IT-Security-Governance-Innovations_joa_Eng_0515IT-Security-Governance-Innovations_joa_Eng_0515
IT-Security-Governance-Innovations_joa_Eng_0515A Krista Kivisild
 

Mais procurados (20)

Infromation securiity
Infromation securiityInfromation securiity
Infromation securiity
 
Ethical mobility policy development & sustainability
Ethical mobility policy development & sustainabilityEthical mobility policy development & sustainability
Ethical mobility policy development & sustainability
 
Gr 3 Societal Issues of Information System Design and Use
Gr 3 Societal Issues of Information System Design and UseGr 3 Societal Issues of Information System Design and Use
Gr 3 Societal Issues of Information System Design and Use
 
Emerging trends in computer science and related technologies
Emerging trends in computer science and related technologiesEmerging trends in computer science and related technologies
Emerging trends in computer science and related technologies
 
AI Governance and Ethics - Industry Standards
AI Governance and Ethics - Industry StandardsAI Governance and Ethics - Industry Standards
AI Governance and Ethics - Industry Standards
 
Monitoring, Detecting And Preventing Insider Fraud And Abuse V2
Monitoring, Detecting And Preventing Insider Fraud And Abuse V2Monitoring, Detecting And Preventing Insider Fraud And Abuse V2
Monitoring, Detecting And Preventing Insider Fraud And Abuse V2
 
Afcea it security course 2015 flyer
Afcea it security course 2015 flyerAfcea it security course 2015 flyer
Afcea it security course 2015 flyer
 
Cybersecurity jobs jb
Cybersecurity jobs jbCybersecurity jobs jb
Cybersecurity jobs jb
 
CUbRIK tutorial at ICWE 2013: part 1 Introduction to Human Computation
CUbRIK tutorial at ICWE 2013: part 1 Introduction to Human ComputationCUbRIK tutorial at ICWE 2013: part 1 Introduction to Human Computation
CUbRIK tutorial at ICWE 2013: part 1 Introduction to Human Computation
 
Challenges facing data protection in kenya
Challenges facing data protection in kenyaChallenges facing data protection in kenya
Challenges facing data protection in kenya
 
AI and Machine Learning In Cybersecurity | A Saviour or Enemy?
AI and Machine Learning In Cybersecurity | A Saviour or Enemy?AI and Machine Learning In Cybersecurity | A Saviour or Enemy?
AI and Machine Learning In Cybersecurity | A Saviour or Enemy?
 
Legal, ethical & professional issues
Legal, ethical & professional issuesLegal, ethical & professional issues
Legal, ethical & professional issues
 
Network Security and Privacy in Medium Scale Businesses in Nigeria
Network Security and Privacy in Medium Scale Businesses in NigeriaNetwork Security and Privacy in Medium Scale Businesses in Nigeria
Network Security and Privacy in Medium Scale Businesses in Nigeria
 
Cyber Security in AI (Artificial Intelligence)
Cyber Security in AI (Artificial Intelligence)Cyber Security in AI (Artificial Intelligence)
Cyber Security in AI (Artificial Intelligence)
 
My Pres @ Red Sea_university 23-12-2015
My Pres @ Red Sea_university 23-12-2015My Pres @ Red Sea_university 23-12-2015
My Pres @ Red Sea_university 23-12-2015
 
Cyber Security Intelligence
Cyber Security IntelligenceCyber Security Intelligence
Cyber Security Intelligence
 
The social aspect of Smart Wearable Systems in the era of Internet-of-Things
The social aspect of Smart Wearable Systems in the era of Internet-of-ThingsThe social aspect of Smart Wearable Systems in the era of Internet-of-Things
The social aspect of Smart Wearable Systems in the era of Internet-of-Things
 
Career guide on cyber security
Career guide on cyber securityCareer guide on cyber security
Career guide on cyber security
 
Class activity 4
Class activity 4 Class activity 4
Class activity 4
 
IT-Security-Governance-Innovations_joa_Eng_0515
IT-Security-Governance-Innovations_joa_Eng_0515IT-Security-Governance-Innovations_joa_Eng_0515
IT-Security-Governance-Innovations_joa_Eng_0515
 

Destaque

IST 110s: Library Skills
IST 110s: Library SkillsIST 110s: Library Skills
IST 110s: Library SkillsMelissa Hicks
 
Ist110sacademicintegrity 13
Ist110sacademicintegrity 13Ist110sacademicintegrity 13
Ist110sacademicintegrity 13Melissa Hicks
 
The Language of Drupal
The Language of DrupalThe Language of Drupal
The Language of DrupalMelissa Hicks
 
"Turbo boost your website" aka BigPipe at Webinale 2014 in Berlin
"Turbo boost your website" aka BigPipe at Webinale 2014 in Berlin"Turbo boost your website" aka BigPipe at Webinale 2014 in Berlin
"Turbo boost your website" aka BigPipe at Webinale 2014 in BerlinTobias Zander
 

Destaque (8)

110sadvising
110sadvising110sadvising
110sadvising
 
IST 110s: Library Skills
IST 110s: Library SkillsIST 110s: Library Skills
IST 110s: Library Skills
 
Ist110sacademicintegrity 13
Ist110sacademicintegrity 13Ist110sacademicintegrity 13
Ist110sacademicintegrity 13
 
Advising FAQs
Advising FAQsAdvising FAQs
Advising FAQs
 
Advising
AdvisingAdvising
Advising
 
Library Lesson Plan
Library Lesson PlanLibrary Lesson Plan
Library Lesson Plan
 
The Language of Drupal
The Language of DrupalThe Language of Drupal
The Language of Drupal
 
"Turbo boost your website" aka BigPipe at Webinale 2014 in Berlin
"Turbo boost your website" aka BigPipe at Webinale 2014 in Berlin"Turbo boost your website" aka BigPipe at Webinale 2014 in Berlin
"Turbo boost your website" aka BigPipe at Webinale 2014 in Berlin
 

Semelhante a Ist curriculum

Cybersecurity Business Risk, Literature Review
Cybersecurity Business Risk, Literature ReviewCybersecurity Business Risk, Literature Review
Cybersecurity Business Risk, Literature ReviewEnow Eyong
 
Running Head TRENDS IN CYBERSECURITY1TRENDS IN CYBERSECURITY.docx
Running Head TRENDS IN CYBERSECURITY1TRENDS IN CYBERSECURITY.docxRunning Head TRENDS IN CYBERSECURITY1TRENDS IN CYBERSECURITY.docx
Running Head TRENDS IN CYBERSECURITY1TRENDS IN CYBERSECURITY.docxtodd521
 
Cyber Crime and Cyber Security
Cyber Crime and Cyber SecurityCyber Crime and Cyber Security
Cyber Crime and Cyber Securityijtsrd
 
INFORMATION SECURITY MANAGEMENT - Critique the employment of ethical hacking ...
INFORMATION SECURITY MANAGEMENT - Critique the employment of ethical hacking ...INFORMATION SECURITY MANAGEMENT - Critique the employment of ethical hacking ...
INFORMATION SECURITY MANAGEMENT - Critique the employment of ethical hacking ...Hansa Edirisinghe
 
wp-us-cities-exposed
wp-us-cities-exposedwp-us-cities-exposed
wp-us-cities-exposedNumaan Huq
 
Cybersecurity vs Data Science A Roadmap.pptx
Cybersecurity vs Data Science A Roadmap.pptxCybersecurity vs Data Science A Roadmap.pptx
Cybersecurity vs Data Science A Roadmap.pptxInfosectrain3
 
Cybersecurity vs Data Science A Roadmap.pptx
Cybersecurity vs Data Science A Roadmap.pptxCybersecurity vs Data Science A Roadmap.pptx
Cybersecurity vs Data Science A Roadmap.pptxInfosectrain3
 
Empowering Cyber Threat Intelligence with AI
Empowering Cyber Threat Intelligence with AIEmpowering Cyber Threat Intelligence with AI
Empowering Cyber Threat Intelligence with AIIJCI JOURNAL
 
Analysis of personal information security behavior and awareness.docx
Analysis of personal information security behavior and awareness.docxAnalysis of personal information security behavior and awareness.docx
Analysis of personal information security behavior and awareness.docxdaniahendric
 
Database Security Is Vital For Any And Every Organization
Database Security Is Vital For Any And Every OrganizationDatabase Security Is Vital For Any And Every Organization
Database Security Is Vital For Any And Every OrganizationApril Dillard
 
Cyber Security Awareness and Corporate Agility of Deposit Money Banks in Nigeria
Cyber Security Awareness and Corporate Agility of Deposit Money Banks in NigeriaCyber Security Awareness and Corporate Agility of Deposit Money Banks in Nigeria
Cyber Security Awareness and Corporate Agility of Deposit Money Banks in Nigeriaijtsrd
 
Article 1 currently, smartphone, web, and social networking techno
Article 1 currently, smartphone, web, and social networking technoArticle 1 currently, smartphone, web, and social networking techno
Article 1 currently, smartphone, web, and social networking technohoney690131
 
STAYING SAFE AND SECURED ON TODAY AND TOMORROW’S AFRICA CYBERSPACE WORKSHOP 2017
STAYING SAFE AND SECURED ON TODAY AND TOMORROW’S AFRICA CYBERSPACE WORKSHOP 2017STAYING SAFE AND SECURED ON TODAY AND TOMORROW’S AFRICA CYBERSPACE WORKSHOP 2017
STAYING SAFE AND SECURED ON TODAY AND TOMORROW’S AFRICA CYBERSPACE WORKSHOP 2017Maurice Dawson
 
CHAPTER 15HRIS Privacy and Security1.docx
CHAPTER 15HRIS Privacy and Security1.docxCHAPTER 15HRIS Privacy and Security1.docx
CHAPTER 15HRIS Privacy and Security1.docxketurahhazelhurst
 
Challenges and Solution for Artificial Intelligence in Cybersecurity of the USA
Challenges and Solution for Artificial Intelligence in Cybersecurity of the USAChallenges and Solution for Artificial Intelligence in Cybersecurity of the USA
Challenges and Solution for Artificial Intelligence in Cybersecurity of the USAvishal dineshkumar soni
 
A Critical Analysis Of Information Security -A Case Study Of Cognizant Techno...
A Critical Analysis Of Information Security -A Case Study Of Cognizant Techno...A Critical Analysis Of Information Security -A Case Study Of Cognizant Techno...
A Critical Analysis Of Information Security -A Case Study Of Cognizant Techno...Finni Rice
 
Information Security Awareness
Information Security AwarenessInformation Security Awareness
Information Security AwarenessDigit Oktavianto
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hackingijtsrd
 

Semelhante a Ist curriculum (20)

Cybersecurity Business Risk, Literature Review
Cybersecurity Business Risk, Literature ReviewCybersecurity Business Risk, Literature Review
Cybersecurity Business Risk, Literature Review
 
Running Head TRENDS IN CYBERSECURITY1TRENDS IN CYBERSECURITY.docx
Running Head TRENDS IN CYBERSECURITY1TRENDS IN CYBERSECURITY.docxRunning Head TRENDS IN CYBERSECURITY1TRENDS IN CYBERSECURITY.docx
Running Head TRENDS IN CYBERSECURITY1TRENDS IN CYBERSECURITY.docx
 
Cyber Crime and Cyber Security
Cyber Crime and Cyber SecurityCyber Crime and Cyber Security
Cyber Crime and Cyber Security
 
INFORMATION SECURITY MANAGEMENT - Critique the employment of ethical hacking ...
INFORMATION SECURITY MANAGEMENT - Critique the employment of ethical hacking ...INFORMATION SECURITY MANAGEMENT - Critique the employment of ethical hacking ...
INFORMATION SECURITY MANAGEMENT - Critique the employment of ethical hacking ...
 
wp-us-cities-exposed
wp-us-cities-exposedwp-us-cities-exposed
wp-us-cities-exposed
 
Threat intelligence minority report
Threat intelligence minority reportThreat intelligence minority report
Threat intelligence minority report
 
Cybersecurity vs Data Science A Roadmap.pptx
Cybersecurity vs Data Science A Roadmap.pptxCybersecurity vs Data Science A Roadmap.pptx
Cybersecurity vs Data Science A Roadmap.pptx
 
Cybersecurity vs Data Science A Roadmap.pptx
Cybersecurity vs Data Science A Roadmap.pptxCybersecurity vs Data Science A Roadmap.pptx
Cybersecurity vs Data Science A Roadmap.pptx
 
Empowering Cyber Threat Intelligence with AI
Empowering Cyber Threat Intelligence with AIEmpowering Cyber Threat Intelligence with AI
Empowering Cyber Threat Intelligence with AI
 
Analysis of personal information security behavior and awareness.docx
Analysis of personal information security behavior and awareness.docxAnalysis of personal information security behavior and awareness.docx
Analysis of personal information security behavior and awareness.docx
 
Database Security Is Vital For Any And Every Organization
Database Security Is Vital For Any And Every OrganizationDatabase Security Is Vital For Any And Every Organization
Database Security Is Vital For Any And Every Organization
 
Cyber Security Awareness and Corporate Agility of Deposit Money Banks in Nigeria
Cyber Security Awareness and Corporate Agility of Deposit Money Banks in NigeriaCyber Security Awareness and Corporate Agility of Deposit Money Banks in Nigeria
Cyber Security Awareness and Corporate Agility of Deposit Money Banks in Nigeria
 
Article 1 currently, smartphone, web, and social networking techno
Article 1 currently, smartphone, web, and social networking technoArticle 1 currently, smartphone, web, and social networking techno
Article 1 currently, smartphone, web, and social networking techno
 
STAYING SAFE AND SECURED ON TODAY AND TOMORROW’S AFRICA CYBERSPACE WORKSHOP 2017
STAYING SAFE AND SECURED ON TODAY AND TOMORROW’S AFRICA CYBERSPACE WORKSHOP 2017STAYING SAFE AND SECURED ON TODAY AND TOMORROW’S AFRICA CYBERSPACE WORKSHOP 2017
STAYING SAFE AND SECURED ON TODAY AND TOMORROW’S AFRICA CYBERSPACE WORKSHOP 2017
 
CHAPTER 15HRIS Privacy and Security1.docx
CHAPTER 15HRIS Privacy and Security1.docxCHAPTER 15HRIS Privacy and Security1.docx
CHAPTER 15HRIS Privacy and Security1.docx
 
Information Security For Small Business
Information Security For Small BusinessInformation Security For Small Business
Information Security For Small Business
 
Challenges and Solution for Artificial Intelligence in Cybersecurity of the USA
Challenges and Solution for Artificial Intelligence in Cybersecurity of the USAChallenges and Solution for Artificial Intelligence in Cybersecurity of the USA
Challenges and Solution for Artificial Intelligence in Cybersecurity of the USA
 
A Critical Analysis Of Information Security -A Case Study Of Cognizant Techno...
A Critical Analysis Of Information Security -A Case Study Of Cognizant Techno...A Critical Analysis Of Information Security -A Case Study Of Cognizant Techno...
A Critical Analysis Of Information Security -A Case Study Of Cognizant Techno...
 
Information Security Awareness
Information Security AwarenessInformation Security Awareness
Information Security Awareness
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 

Último

ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxAreebaZafar22
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Disha Kariya
 
fourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingfourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingTeacherCyreneCayanan
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxnegromaestrong
 
Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.MateoGardella
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Celine George
 
PROCESS RECORDING FORMAT.docx
PROCESS      RECORDING        FORMAT.docxPROCESS      RECORDING        FORMAT.docx
PROCESS RECORDING FORMAT.docxPoojaSen20
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsTechSoup
 
psychiatric nursing HISTORY COLLECTION .docx
psychiatric  nursing HISTORY  COLLECTION  .docxpsychiatric  nursing HISTORY  COLLECTION  .docx
psychiatric nursing HISTORY COLLECTION .docxPoojaSen20
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin ClassesCeline George
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxVishalSingh1417
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAssociation for Project Management
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfJayanti Pande
 
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...Shubhangi Sonawane
 

Último (20)

ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..
 
fourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingfourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writing
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
 
Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
PROCESS RECORDING FORMAT.docx
PROCESS      RECORDING        FORMAT.docxPROCESS      RECORDING        FORMAT.docx
PROCESS RECORDING FORMAT.docx
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
psychiatric nursing HISTORY COLLECTION .docx
psychiatric  nursing HISTORY  COLLECTION  .docxpsychiatric  nursing HISTORY  COLLECTION  .docx
psychiatric nursing HISTORY COLLECTION .docx
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
 

Ist curriculum

  • 1. The College of Information Sciences and Technology What is IST? What can I do with IST/SRA? Is this a good fit for me?
  • 2. Mission Build knowledge and information skills to meet the needs of the new Information Age. 2
  • 7. IST enables: People Technology Information create organize share using store protect access analyze modify
  • 8. IST enables: People Technology new iPod applications Information students create organize share using store protect access digital music analyze modify
  • 9. IST enables: People Technology firewall, authentication, and other security technologies that will keep your information safe Information PSU academic and financial advisors create organize share store using protect access private information in your student files analyze modify
  • 10. IST enables: People Technology integrated software systems (that allow the information to be accessed and coordinated across databases) managers (in any organization—Walmart, Geico, Proctor & Gamble…) Information create organize share store using financial and manufacturing information that exists in different databases protect access analyze modify
  • 11. IST enables: People Technology Internet Information government create organize share store using well-informed laws about sharing private information protect access analyze modify
  • 12. Information Sciences and Technology Information Sciences and Technology (IST) Major
  • 13. IST Bachelor of Science (ISTBS) Design, implementation, integration, and utilization of information systems (IS) Design and Development Integration and Application Information Context Intelligence Analysis and Modeling Information and Cyber Security Social Factors and Risk Make Cool Stuff Understand programming, database, human computer interaction, knowledge representation, search engines, characteristics of users. Make Businesses’ Use of Information More Efficient Understand information acquisition, representation, dissemination, storage, retrieval, display, and interpretation. Make Sense of Impact of Information Systems Understand the use and impact of IS at the individual, group, organizational, national and international levels (e.g., social networks, crowd sourcing, digital natives/digital immigrants). 13
  • 14. What You Will Learn Internship 14
  • 15. Companies Who Hire IST Graduates 15
  • 16. IST Bachelor of Arts (ISTBA) 16
  • 17. Security and Risk Analysis Security and Risk Analysis (SRA) Major
  • 21. Threats to our National Security 21
  • 22. SRA Bachelor of Science (B.S.) Design, implementation, integration and utilization of information systems (IS) Information and Cyber Security Intelligence Analysis and Modeling Social Factors and Risk Intelligence Analysis and Modeling Information and Cyber Security Social Factors and Risk Make Information Systems Secure Understand how to deal with security and privacy concerns in all types of organizations, ensure that computer systems and products are secure and how to “police” cyberspace. Make Risk Predictions Understand how to calculate, evaluate, and predict risk in a variety of fields including business and national security; students learn how to protect vital infrastructure against subversive attacks. Make Sense of Contextual Elements surrounding Risk Understand the psychological and sociological causes of terrorism and crime and how information technology is transforming each; understand privacy policies and government regulation to ensure users that data are secure. 22
  • 23. What You Will Learn 23 Internship
  • 24. Companies Who Hire SRA Graduates 24
  • 25. What We Are Where information, people, and technology meet. Where careers in information technologies abound. Where students understand the effects of information technology on themselves, other individuals, organizations, and society. Where you will find a broad range of topics from software development to social media to business applications for technology to information security and risk analysis. 25

Notas do Editor

  1. INTRO SELF AND WELCOME TO COLLEGE OF IST
  2. Well, here is our mission…What is the “Information Age”? Take a minute to think about Information all around you. What information have you produced, come in contact with, or ignored in the last 10 minutes?(Bar code on card you handed in, iPod, mobile phone, PPT slide)Think about your life, day-in, day-out. Information is all around you—and we increasingly rely on it to make our lives work.STORY: Steve asking me a question and none of us knew the answer in the meeting. What did we do? What would we have done 5 years ago? 10 years ago? Parents—30 years ago?This IS the information age; and this College was created to pioneer research, education, and forward thinking in this new era.Here is a quick example…
  3. Have you ever done this—”Where is the closest Starbucks?” (If you don’t drink coffee now, you just might when you get to college…)
  4. First you search for Penn State area
  5. Then you search for Starbucks near Penn State. College Avenue appears. Sounds close!!
  6. Then you look at the street view--ah-ha!! This is what we drove by this morning!! Think about all the things involved in this quick interaction with your information technology device.You, the person, want something (coffee). You need information (location of Starbucks).You turn to the technology in your hand to get the information (iPod).Someone who works for Google anticipated this need. The Google Maps Vehicle driver drove through town and collected videos of street views. Someone organized, labeled, and stored them.Someone wrote a program to deliver that image over the Internet.You made use of all this: the information, the information databases where the info was stored, the networks through which the data was passed, and the programs that someone wrote to get the information to you.And then you drank your coffee.THIS is the information age. And there is much more…
  7. Let’s go back to what our website said: IST is about the interaction of people, tech, and info. Let’s put a few more words around this interaction to make more sense of this statement.THEN (after all animations):Can you give one example people who use information technologies? (How about people searching for a college???)What information might those people want or need?What might they want to do with the information?What technologies might they use?Let’s look at some other examples.
  8. Let’s look at some examples…How do we enable this to happen? We teach students what they need to know to be able to:develop applications for iPods
  9. How about another example…How do we enable this to happen? We teach students what they need to know to be able to:Protect an organization’s private information
  10. Here’s an example from our most popular area of study…How do we enable this to happen? We teach students what they need to know to be able to:Consult with corporations that need help making their various systems of information “talk” to each other more efficiently
  11. And if you are interested in policy-related aspects of information technology use, how about this example…How do we enable this to happen? We teach students what they need to know to be able to:Advise on policy-making regarding the internet regulations and lawsDOES THIS HELP GIVE YOU A SENSE OF WHAT WE ARE CONCERNED WITH IN THIS COLLEGE??? (Please ask now if you have questions…)
  12. Let’s take a closer look at the degrees we offer—first the B.S. in IST. Here is where it can get confusing—we have a major with the same name as the College. But I will try to be specific in referring to one or the other.
  13. We offer 3 options—see slide--Design next iPhone application…--Help PSU move from archaic system of student information to a newer one that allows people with appropriate access to view financial, medical, academic, payroll info from one system--Determine how to disseminate information about the next earthquake to rural villages in developing countries
  14. ALL students in the IST-B.S. major learn…
  15. On screen are companies that hire IST graduates.Here are some job titles:Applications DeveloperIT ConsultantAssistant Project ManagerIT Infrastructure AnalystBusiness Systems AnalystIT Solutions ArchitectChange Management AnalystIT Systems EngineerData AnalystImplementation specialistDesign EngineerMultimedia Specialist Forensics and Analysis ConsultantTechnology Support SpecialistWeb Developer
  16. New this past year: Craft your own degree by integrating different disciplines and your personal passions with ISTUnderstand potential applications AthleticsArtBusinessScienceHistoryMedical-informatics Legal-informatics Bio-informatics Enviro-informatics Business-informatics ChemometricsEnterprise informatics
  17. Our SECOND B.S. is in “Security and Risk Analysis.”
  18. The Security and Risk Analysis major focuses on how to design systems that are secure (while still allowing people to work), how to measure risk, and how to make decisions to ensure that proper levels of privacy are maintained for individual technology users, businesses, government, and other organizations. The SRA major promotes an understanding of information system design and operation, and of the legal and cultural issues surrounding privacy, intelligence, and security.Students learn about:Computer securityNetwork securityCyber crime The politics and “business” of terrorism Offensive and defensive use of computer and information networksDecision theoryPrivacy and legal/regulatory issues Implications of digital social networking Let’s take a look at a few examples of what our SRA students are prepared to face…
  19. Students help protect individuals from phishing –where someone seeks personal information under false pretense—e.g., Hallmark cards and Google jobs
  20. Students help prevent and investigate Business threatsFirst article, network breach: Federal Fire Department workers are being asked to look for unusual activity on bank accounts because an employee wrongfully accessed their information.Second article: privacy at risk: potential Chinese hackers at Google
  21. Students help protect national security interests…We see plenty of articles in the news about Government-industry partnership to targets cyber security threats.
  22. We offer three options:ICS—IF INTERESTED IN MAKING SYSTEMS SECURE, THINK ICS --- Students do VIRTUAL LABS where…IAM—IF MORE INTERESTED IN PREDICTION AND RISK ANALYSIS, CONSIDER IAM -- Students work for 3-letter agencies (CIA, and so forth) Teaches students how to calculate, evaluate, and predict risk in a variety of fields, including business and national security. SFR IF MORE INTERESTED IN WHAT MAKES PEOPLE TICK, CONSIDER SFR – Leading faculty in the field of terrorism and privacy, and sociology of crime!!In this option, students explore the psychological and sociological causes of terrorism and crime, and how information technology is transforming each. In the classroom, students work on teams in which they role-play both terrorists and criminals and the intelligence and security officers combating them. This option also examines the privacy policies and legal regulations within companies and the government. Students learn to critically read privacy policies and understand government regulation so they can help improve their own privacy policies and ensure users that the data they provide is secure.
  23. ALL students in the SRA-B.S. major learn…
  24. On screen are companies that hire SRA graduates.Here are some job titles:Catastrophe Risk AnalystIT AnalystComputer System Security AnalystsIT Consulting ManagerCyber AnalystIT Strategy ArchitectCyber Network Security EngineerNetwork Intel AnalystsData Security AdministratorNetwork Security Engineer Enterprise ArchitectSystems AdministrationInformation Assurance AnalystsSystems Enterprise Architect Information Assurance RemediationSystems Integration AnalystsInformation Assurance/Security EngineersSecurity Project ManagerIntel AnalystsSystems Integration EngineerIntrusion Detection AnalystWeb Security & Privacy Specialist
  25. In Summary… We are the College where…information, people, and technology meetcareers in information technologies aboundstudents to understand the effects of information technology on themselves, other individuals, organizations, and societyyou will find a broad range of topics from software development to social media to business applications for technology to information security and risk analysis
  26. Now, YOU can take a look at IST—with this website created just for first-year students…Be sure to check out:--Which option is for me Quiz--Descriptions of majors and options--videos of former students--resources in IST for students--and more!