SlideShare une entreprise Scribd logo
1  sur  38
Welcome to the April 2018
Webinar Plus Degree Briefing
1
2
Our Agenda Today:
1. Introduction and Overview of ERAU
--Bill Gibbs
2. Bachelor of Science in Aviation Security
--Dr. Daniel Benny
3. Master of Science in Cybersecurity Management and Policy
--Dr. Glenn Dardick
4. Master of Science in Cybersecurity Engineering
5. Professional Education Non-Degree Program in Cybersecurity
--Sarah Ochs
Embry-Riddle Aeronautical University
• Fully-accredited, independent, nonprofit university based in Daytona Beach, Florida
• Oldest (1926) and most prestigious aviation-related university in the world
• More than 70 undergraduate and graduate degrees (Associates to Ph.D.) + Professional Education
• 32,000 students
Worldwide Campus
• 130 campuses around the world
• Classroom, Real-time Virtual Classroom, Online
About ERAU
3
AVIATION SECURITY
Bachelor of Science
Daniel J. Benny, Ph.D., CPP, CM, ACE
Program Chair
• Designed to meet the needs and demands of:
– Aviation/Aerospace Industry
– Security Industry
• Program Launch Date: January, 2014
• Modality: Online, Eagle Vision/Home, Classroom
BS Aviation Security
• Students will be introduced to aviation security
courses related to:
– Airport Security
– Airline Security
– General Aviation Security
– Corporate Security
– Physical Security
– Aviation Legislation
– Airport Management
– National Security and Intelligence
Science and Practical
Application
• High School Graduates
• Two Year College Graduates
• Security Professionals
• Aviation Professionals
• Active and Transitioning Military
Focus Market
• Transportation Security Administration
• Federal Intelligence Agencies
• U.S. Air Force Security Police
• Airline or Airport Security
• Corporate Aviation Security
• Law Enforcement
• Other Security
Career
Interest
TSA Salary Range
• Screener $29,300-$44,000
• Supervisor $33,600-$50,400
• Inspector $48,000-$74,300
• Federal Security Director $120,200-$155,500
Source: TSA
Entry
Salary Ranges
Federal Intelligence Agencies
• $28,500-$36,500
U.S. Air Force Security Police
• $23,000-$28,000
Airline or Airport Security
• $27,000-$35,000
Corporate Aviation Security
• $30,000-$40,000
Law Enforcement
• $45,000-$55,000
Source: ASIS International
Salary Ranges
Other Security
Entry Security Officer
• $18,000- $21,000
Security Manager
• $30,000-$50,000
Security Director
• $75,000- $100,000
Chief Security Officer/Global Security Director
• $125,000-$250,000
Source: ASIS International
Professional
Certifications
The degree can also prepare the student for testing to obtain the following
professional security and aviation certifications.
ASIS International
• Certified Protection Professional - CPP
American Association of Airport Executives
• Certified Member - CM (Security Component)
• Accredited Airport Executive - AAE (Security Component)
• Airport Certified Employee/Security - ACE
• Airport Security Coordinator - ASC
• Specialized to the Aviation Security
Profession
• Covers Current Aviation Regulations,
Industry Standards and Practices
• Prepares the Student for Any Security
Environment
• It is an Embry-Riddle Degree
Value of the Degree
1962 Cessna C-150 Questions?
DR. GLENN S. DARDICK
MASTER OF SCIENCE
CYBERSECURITY MANAGEMENT & POLICY
• Geared for non-technical students as well as
students with prior technical expertise
• Project and policy expertise for managers
• Oversight of human and digital resources
• Homeland Security
THE NEED
• Recent cyber attacks
 Target, Home Depot, Goodwill
• Economic incentives for cyber attacks
 Threats from China, Russia
• Information driven society
 Need to protect financial and medical information
• All levels of government, industry and academia
 Need for policies, security of information, cloud
computing
PROGRAM GOALS
& FOCUS
• Answers the need for cyber security expertise
 Government and industry
• Support multiple disciplinary group of professionals
 Management policy, law, leadership, security, defense
• Target Audience
 Homeland Security, military, business, government
• Focused on management and policy
 Differs from other degree programs focusing on technology
expertise
PROGRAM
• 100% Online
• 30 Credit hour program
• Developed by the Daytona Beach Faculty
• AND …
• Graduate Certificate in Aviation Cybersecurity Management & Policy
• adding two new courses to be developed. Grad. Cert. can be started in fall
(take two existing courses), presuming that the new courses are available
by October/November
• Aviation track in M.S, Cybersecurity Management & Policy
• Can be started at any time; two new courses (same as above) should be
completed by October/November
THE DIFFERENCE
• Complements, does not compete with, the
Daytona Beach Cybersecurity Engineering
degree program. This is not a program
focused on technology expertise.
• Differs from the Intelligence degree program
at Prescott. Again, the MCMP degree is
focused more on Management and Policy.
OPPORTUNITIES
• The MCMP degree is intended to assist those
in technology careers to advance to
supervisory and management roles
• The MCMP degree is intended to assist those
already in supervisory and management roles
to better understand how to manage areas
having responsibilities for cybersecurity.
MASTER OF SCIENCE IN CYBERSECURITY
MANAGEMENT & POLICY
MCMP 501
THE INTERNET, GOVERNANCE AND SECURITY
• This course examines how the Internet and associated communication
technologies have created new means for people to organize, both within
their local communities and across great distances, changing the nature
of the relationship between society and the institutions of government.
• The Internet has allowed people to communicate, often without detection,
that has resulted in both positive and negative effects; e.g., Internet-
based communications have been a significant factor in the both the
growth of transnational terrorism and popular uprisings such as the Arab
Spring.
• In response, governments have often attempted to control the Internet, in
some cases to aid legitimate law enforcement, in others to repress
restless populations seeking change. State institutions can also use
these technologies to create more effective governance and better
response to humanitarian crises.
MCMP 510
THE PRACTICE OF CYBERSECURITY
• The course introduces principles of cybersecurity, providing a framework covering
technical, legal, and managerial issues.
• Students will examine computer and network security from the perspectives of the
industry-standard ten core bodies of knowledge:
• access control;
• telecommunications and network
security;
• information security governance
and risk management;
• software development security;
• cryptography;
• security architecture and design;
• operations security;
• business continuity and disaster
recovery planning;
• legal, regulations, investigations and
compliance; and
• physical (environmental) security.
MCMP 520
SECURITY ENGINEERING AND MANAGEMENT
• This course is designed to teach how cybersecurity should be integrated
early on in any project or other use of information in a computer or
network setting.
• Emphasis is placed on the relationship between information and the
operation and mission of an agency, business, organization, or other
entity.
• This course specifically ties together information and communications
technology (ICT), cybersecurity, business, policies, and ethics.
• Topics include security engineering concepts (although this is not an
engineering course), distributed systems, network attacks and defense,
security management, encryption, the role of training and education, and
more.
MCMP 615
POLICY AND LAW IN CYBERSPACE
• Cyberspace has emerged as a "real" place where people
congregate, crimes occur, social changes are initiated, and a
majority of our work takes place.
• Whereas the physical world — and law and policy that impact the
physical world — can be constrained by geopolitical boundaries, it
is literally impossible to similarly constrain activities in cyberspace.
• For that reason, cyberspace itself is a virtual universe — one that
is global and where every Internet user is a citizen.
• This course describes emerging policies and laws that affect
cyberspace, particularly those related to information security and
cybercrime. The clash between real space and cyberspace is also
examined.
MCMP 650
EMERGING TOPICS IN CYBERSECURITY
• This course examines the current research literature
concerning issues related to cybersecurity.
• Topics will include, but not be limited to, current research
topics in information assurance, cybersecurity policy,
information warfare and the Advanced Persistent Threat,
policy and law in cyberspace, evolving information security
technologies and methods, new approaches to incident
response and digital forensics, emerging threats and
adversaries, and the impact of cybersecurity on society and
organizations.
• Students will focus on research techniques, as well as the
presentation of results, legal issues, and relevant
technologies.
MCMP 690/691
CYBERSECURITY MANAGEMENT AND POLICY
CAPSTONE
• The capstone provides students with the opportunity to
integrate all disciplines and competencies that have been
learned in this program, plus their past experiences and
professional goals, into a single work-based project,
internship experience, or other appropriate activity.
• The project will be the culmination of a student's studies
integrated in their area of specialization or expertise.
• In cooperation with an advisor, the student will design,
research, and implement a project that is comprehensive in
nature and which addresses, to the extent feasible, all core
areas of knowledge around which the program has been built
QUESTIONS
Dr. Gary Kessler, Dept. Chair SSIA,
kessleg1@erau.edu
Dr. Glenn S. Dardick Program Chair,
dardickg@erau.edu
•Bureau of Labor Statistics states
Cybersecurity jobs will have 18%
growth rate (much higher than average)
for 2014-2024
•Forbes states that cybersecurity engineers
command almost 10% more salary than other
areas in IT
Over 209,000 cybersecurity jobs in the
U.S. are unfilled
Postings are up 74% over the past five
years
Master of Cybersecurity Engineering
(MSCybE)
Jobs
• Cybersecurity Engineer
• System Design & Implementation
• Information Security Analyst
• Penetration Tester
• Malware Analyst
• Offense/Defense Ops Member
• Digital Forensics Investigator
Focus Areas
• Cybersecurity in Aviation & Aerospace
Systems
• UAS
• Satellite Systems
• Embedded Systems Security
• Aviation and Aerospace Cybersecurity
• Digital Forensics for Unmanned
Autonomous Systems
Program Overview
32
ERAU NextGen Task E
UAS Demonstration
Project
ERAU Project Lead Task E
Todd Waller
Date: October 9-11, 2018 (8am – 5pm)
Location: Daytona Beach, FL
Web: www.erau.edu/cyber
A professional short-course with a focus on
cybersecurity vulnerabilities to the aviation industry,
taught by industry experts.
Want to know how to ….
 Increase your awareness of how to identify cyber-related
vulnerabilities?
 Develop and apply mitigation strategies?
 Recognize threats and vulnerabilities to airport, aircraft,
and supporting systems?
Contact
 Email: dbproed@erau.edu
 Tel: 386.226.6928
 Web: erau.edu/cyber
Upcoming Webinar:
webinars.erau.edu

Contenu connexe

Tendances

IT Security Architecture & Leadership, 24 - 27 November 2013 Dubai UAE
IT Security Architecture & Leadership, 24 - 27 November 2013 Dubai UAEIT Security Architecture & Leadership, 24 - 27 November 2013 Dubai UAE
IT Security Architecture & Leadership, 24 - 27 November 2013 Dubai UAE360 BSI
 
The Cyber Security Training Gap: Rotarian Reach
The Cyber Security Training Gap: Rotarian ReachThe Cyber Security Training Gap: Rotarian Reach
The Cyber Security Training Gap: Rotarian ReachRotary International
 
Cybersecurity education for the next generation
Cybersecurity education for the next generationCybersecurity education for the next generation
Cybersecurity education for the next generationIBM Security
 
Webinar slides march 2022 nikki robinson
Webinar slides march 2022 nikki robinson Webinar slides march 2022 nikki robinson
Webinar slides march 2022 nikki robinson CapitolTechU
 
IT Information Security Management Principles, 15 - 18 May 2016 Dubai UAE
IT Information Security Management Principles, 15 - 18 May 2016 Dubai UAEIT Information Security Management Principles, 15 - 18 May 2016 Dubai UAE
IT Information Security Management Principles, 15 - 18 May 2016 Dubai UAE360 BSI
 
IT Information Security Management Principles, 28 February - 02 March 2016 Du...
IT Information Security Management Principles, 28 February - 02 March 2016 Du...IT Information Security Management Principles, 28 February - 02 March 2016 Du...
IT Information Security Management Principles, 28 February - 02 March 2016 Du...360 BSI
 
Top schools in noida
Top schools in noidaTop schools in noida
Top schools in noidaEdhole.com
 
12 security policies
12 security policies12 security policies
12 security policiesSaqib Raza
 
Erau webinar-applied information technologies
Erau webinar-applied information technologiesErau webinar-applied information technologies
Erau webinar-applied information technologiesERAUWebinars
 
STAYING SAFE AND SECURED ON TODAY AND TOMORROW’S AFRICA CYBERSPACE WORKSHOP 2017
STAYING SAFE AND SECURED ON TODAY AND TOMORROW’S AFRICA CYBERSPACE WORKSHOP 2017STAYING SAFE AND SECURED ON TODAY AND TOMORROW’S AFRICA CYBERSPACE WORKSHOP 2017
STAYING SAFE AND SECURED ON TODAY AND TOMORROW’S AFRICA CYBERSPACE WORKSHOP 2017Maurice Dawson
 
Fundamentals of threats and risk management course, cybersecurity
Fundamentals of threats and risk management course, cybersecurityFundamentals of threats and risk management course, cybersecurity
Fundamentals of threats and risk management course, cybersecurityTonex
 
2019-09-11 Workshop incident response n handling honeynet Universitas Indonesia
2019-09-11 Workshop incident response n handling honeynet Universitas Indonesia2019-09-11 Workshop incident response n handling honeynet Universitas Indonesia
2019-09-11 Workshop incident response n handling honeynet Universitas IndonesiaIGN MANTRA
 
Using the CGC's Fully Automated Vulnerability Detection Tools in Security Eva...
Using the CGC's Fully Automated Vulnerability Detection Tools in Security Eva...Using the CGC's Fully Automated Vulnerability Detection Tools in Security Eva...
Using the CGC's Fully Automated Vulnerability Detection Tools in Security Eva...Seungjoo Kim
 
Ikeepsafe Cyber Safety, Ethics and Security Competencies
Ikeepsafe Cyber Safety, Ethics and Security CompetenciesIkeepsafe Cyber Safety, Ethics and Security Competencies
Ikeepsafe Cyber Safety, Ethics and Security CompetenciesJohn Macasio
 

Tendances (20)

IT Security Architecture & Leadership, 24 - 27 November 2013 Dubai UAE
IT Security Architecture & Leadership, 24 - 27 November 2013 Dubai UAEIT Security Architecture & Leadership, 24 - 27 November 2013 Dubai UAE
IT Security Architecture & Leadership, 24 - 27 November 2013 Dubai UAE
 
Internet safety and security strategies for building an internet safety wall
Internet safety and security strategies for building an internet safety wallInternet safety and security strategies for building an internet safety wall
Internet safety and security strategies for building an internet safety wall
 
The Cyber Security Training Gap: Rotarian Reach
The Cyber Security Training Gap: Rotarian ReachThe Cyber Security Training Gap: Rotarian Reach
The Cyber Security Training Gap: Rotarian Reach
 
Cybersecurity education for the next generation
Cybersecurity education for the next generationCybersecurity education for the next generation
Cybersecurity education for the next generation
 
Webinar slides march 2022 nikki robinson
Webinar slides march 2022 nikki robinson Webinar slides march 2022 nikki robinson
Webinar slides march 2022 nikki robinson
 
IT Information Security Management Principles, 15 - 18 May 2016 Dubai UAE
IT Information Security Management Principles, 15 - 18 May 2016 Dubai UAEIT Information Security Management Principles, 15 - 18 May 2016 Dubai UAE
IT Information Security Management Principles, 15 - 18 May 2016 Dubai UAE
 
IT Information Security Management Principles, 28 February - 02 March 2016 Du...
IT Information Security Management Principles, 28 February - 02 March 2016 Du...IT Information Security Management Principles, 28 February - 02 March 2016 Du...
IT Information Security Management Principles, 28 February - 02 March 2016 Du...
 
ConnieJusticeCV-2016
ConnieJusticeCV-2016ConnieJusticeCV-2016
ConnieJusticeCV-2016
 
Top schools in noida
Top schools in noidaTop schools in noida
Top schools in noida
 
OCR cybersecurity
OCR cybersecurityOCR cybersecurity
OCR cybersecurity
 
AAS Cybersecurity 2 pages
AAS Cybersecurity 2 pagesAAS Cybersecurity 2 pages
AAS Cybersecurity 2 pages
 
12 security policies
12 security policies12 security policies
12 security policies
 
Erau webinar-applied information technologies
Erau webinar-applied information technologiesErau webinar-applied information technologies
Erau webinar-applied information technologies
 
STAYING SAFE AND SECURED ON TODAY AND TOMORROW’S AFRICA CYBERSPACE WORKSHOP 2017
STAYING SAFE AND SECURED ON TODAY AND TOMORROW’S AFRICA CYBERSPACE WORKSHOP 2017STAYING SAFE AND SECURED ON TODAY AND TOMORROW’S AFRICA CYBERSPACE WORKSHOP 2017
STAYING SAFE AND SECURED ON TODAY AND TOMORROW’S AFRICA CYBERSPACE WORKSHOP 2017
 
Fundamentals of threats and risk management course, cybersecurity
Fundamentals of threats and risk management course, cybersecurityFundamentals of threats and risk management course, cybersecurity
Fundamentals of threats and risk management course, cybersecurity
 
Hacking the Helpdesk, Craig Clark
Hacking the Helpdesk, Craig ClarkHacking the Helpdesk, Craig Clark
Hacking the Helpdesk, Craig Clark
 
2019-09-11 Workshop incident response n handling honeynet Universitas Indonesia
2019-09-11 Workshop incident response n handling honeynet Universitas Indonesia2019-09-11 Workshop incident response n handling honeynet Universitas Indonesia
2019-09-11 Workshop incident response n handling honeynet Universitas Indonesia
 
Web profile
Web profileWeb profile
Web profile
 
Using the CGC's Fully Automated Vulnerability Detection Tools in Security Eva...
Using the CGC's Fully Automated Vulnerability Detection Tools in Security Eva...Using the CGC's Fully Automated Vulnerability Detection Tools in Security Eva...
Using the CGC's Fully Automated Vulnerability Detection Tools in Security Eva...
 
Ikeepsafe Cyber Safety, Ethics and Security Competencies
Ikeepsafe Cyber Safety, Ethics and Security CompetenciesIkeepsafe Cyber Safety, Ethics and Security Competencies
Ikeepsafe Cyber Safety, Ethics and Security Competencies
 

Similaire à Erau cybersecurity and security degrees

Cyber Security and Digital Forensics, BSc(Hons) (ESOFT) 2022-23 (1).doc
Cyber Security and Digital Forensics, BSc(Hons) (ESOFT) 2022-23 (1).docCyber Security and Digital Forensics, BSc(Hons) (ESOFT) 2022-23 (1).doc
Cyber Security and Digital Forensics, BSc(Hons) (ESOFT) 2022-23 (1).docThowfeekFayees
 
Supervising undergraduate-cybersecurity-projects
Supervising undergraduate-cybersecurity-projectsSupervising undergraduate-cybersecurity-projects
Supervising undergraduate-cybersecurity-projectsArun Singh
 
July 20, 2016 Webcast for the Cybersecurity MS at NYU Tandon Online
July 20, 2016 Webcast for the Cybersecurity MS at NYU Tandon OnlineJuly 20, 2016 Webcast for the Cybersecurity MS at NYU Tandon Online
July 20, 2016 Webcast for the Cybersecurity MS at NYU Tandon OnlineNYU Tandon Online
 
Online MS in Cybersecurity at NYU
Online MS in Cybersecurity at NYUOnline MS in Cybersecurity at NYU
Online MS in Cybersecurity at NYUNYU Tandon Online
 
Saint Leo University by Study Metro
Saint Leo University by Study MetroSaint Leo University by Study Metro
Saint Leo University by Study MetroAbhishek Bajaj
 
NYU Tandon Online M.S. In Cybersecurity Webinar
NYU Tandon Online M.S. In Cybersecurity WebinarNYU Tandon Online M.S. In Cybersecurity Webinar
NYU Tandon Online M.S. In Cybersecurity WebinarNYU Tandon Online
 
AWS Educate: Accelerating Cybersecurity and Cloud Workforce Preparation with AWS
AWS Educate: Accelerating Cybersecurity and Cloud Workforce Preparation with AWSAWS Educate: Accelerating Cybersecurity and Cloud Workforce Preparation with AWS
AWS Educate: Accelerating Cybersecurity and Cloud Workforce Preparation with AWSAmazon Web Services
 
Cybersecurity Management: Preventing Data Breaches in the Age of Big Data, 25...
Cybersecurity Management: Preventing Data Breaches in the Age of Big Data, 25...Cybersecurity Management: Preventing Data Breaches in the Age of Big Data, 25...
Cybersecurity Management: Preventing Data Breaches in the Age of Big Data, 25...360 BSI
 
Erau webinar plus dec 2016 security degrees
Erau webinar plus dec 2016 security degreesErau webinar plus dec 2016 security degrees
Erau webinar plus dec 2016 security degreesERAUWebinars
 
Get training in cyber security & place yourself in good companies through...
Get training in cyber security & place yourself in good companies through...Get training in cyber security & place yourself in good companies through...
Get training in cyber security & place yourself in good companies through...CCI Training Center
 
Cybersecurity for Automation Control and SCADA Systems
Cybersecurity for Automation Control and SCADA SystemsCybersecurity for Automation Control and SCADA Systems
Cybersecurity for Automation Control and SCADA SystemsLiving Online
 
Get training in cyber security & place yourself in good companies through...
Get training in cyber security & place yourself in good companies through...Get training in cyber security & place yourself in good companies through...
Get training in cyber security & place yourself in good companies through...CCI Training Center
 
Cyber Security_Presentation_KTH
Cyber Security_Presentation_KTHCyber Security_Presentation_KTH
Cyber Security_Presentation_KTHAwais Shibli
 
Erau webinar plus jan2017 safety degrees
Erau webinar plus jan2017 safety degreesErau webinar plus jan2017 safety degrees
Erau webinar plus jan2017 safety degreesERAUWebinars
 
Pmd prospective students 2.22.2222
Pmd prospective students 2.22.2222Pmd prospective students 2.22.2222
Pmd prospective students 2.22.2222KevinAlt1
 
chapter 1. Introduction to Information Security
chapter 1. Introduction to Information Security chapter 1. Introduction to Information Security
chapter 1. Introduction to Information Security elmuhammadmuhammad
 
Business cases internet 30 use cases
Business cases internet 30 use casesBusiness cases internet 30 use cases
Business cases internet 30 use casesPriyanka Aash
 

Similaire à Erau cybersecurity and security degrees (20)

Cyber Security and Digital Forensics, BSc(Hons) (ESOFT) 2022-23 (1).doc
Cyber Security and Digital Forensics, BSc(Hons) (ESOFT) 2022-23 (1).docCyber Security and Digital Forensics, BSc(Hons) (ESOFT) 2022-23 (1).doc
Cyber Security and Digital Forensics, BSc(Hons) (ESOFT) 2022-23 (1).doc
 
Supervising undergraduate-cybersecurity-projects
Supervising undergraduate-cybersecurity-projectsSupervising undergraduate-cybersecurity-projects
Supervising undergraduate-cybersecurity-projects
 
July 20, 2016 Webcast for the Cybersecurity MS at NYU Tandon Online
July 20, 2016 Webcast for the Cybersecurity MS at NYU Tandon OnlineJuly 20, 2016 Webcast for the Cybersecurity MS at NYU Tandon Online
July 20, 2016 Webcast for the Cybersecurity MS at NYU Tandon Online
 
Online MS in Cybersecurity at NYU
Online MS in Cybersecurity at NYUOnline MS in Cybersecurity at NYU
Online MS in Cybersecurity at NYU
 
Saint Leo University by Study Metro
Saint Leo University by Study MetroSaint Leo University by Study Metro
Saint Leo University by Study Metro
 
NYU Tandon Online M.S. In Cybersecurity Webinar
NYU Tandon Online M.S. In Cybersecurity WebinarNYU Tandon Online M.S. In Cybersecurity Webinar
NYU Tandon Online M.S. In Cybersecurity Webinar
 
AWS Educate: Accelerating Cybersecurity and Cloud Workforce Preparation with AWS
AWS Educate: Accelerating Cybersecurity and Cloud Workforce Preparation with AWSAWS Educate: Accelerating Cybersecurity and Cloud Workforce Preparation with AWS
AWS Educate: Accelerating Cybersecurity and Cloud Workforce Preparation with AWS
 
Cybersecurity Management: Preventing Data Breaches in the Age of Big Data, 25...
Cybersecurity Management: Preventing Data Breaches in the Age of Big Data, 25...Cybersecurity Management: Preventing Data Breaches in the Age of Big Data, 25...
Cybersecurity Management: Preventing Data Breaches in the Age of Big Data, 25...
 
Erau webinar plus dec 2016 security degrees
Erau webinar plus dec 2016 security degreesErau webinar plus dec 2016 security degrees
Erau webinar plus dec 2016 security degrees
 
Get training in cyber security & place yourself in good companies through...
Get training in cyber security & place yourself in good companies through...Get training in cyber security & place yourself in good companies through...
Get training in cyber security & place yourself in good companies through...
 
Cybersecurity for Automation Control and SCADA Systems
Cybersecurity for Automation Control and SCADA SystemsCybersecurity for Automation Control and SCADA Systems
Cybersecurity for Automation Control and SCADA Systems
 
Get training in cyber security & place yourself in good companies through...
Get training in cyber security & place yourself in good companies through...Get training in cyber security & place yourself in good companies through...
Get training in cyber security & place yourself in good companies through...
 
Cyber Security_Presentation_KTH
Cyber Security_Presentation_KTHCyber Security_Presentation_KTH
Cyber Security_Presentation_KTH
 
Erau webinar plus jan2017 safety degrees
Erau webinar plus jan2017 safety degreesErau webinar plus jan2017 safety degrees
Erau webinar plus jan2017 safety degrees
 
Pmd prospective students 2.22.2222
Pmd prospective students 2.22.2222Pmd prospective students 2.22.2222
Pmd prospective students 2.22.2222
 
chapter 1. Introduction to Information Security
chapter 1. Introduction to Information Security chapter 1. Introduction to Information Security
chapter 1. Introduction to Information Security
 
mille2.pptx
mille2.pptxmille2.pptx
mille2.pptx
 
A Strategy for Addressing Cyber Security Challenges
A Strategy for Addressing Cyber Security Challenges A Strategy for Addressing Cyber Security Challenges
A Strategy for Addressing Cyber Security Challenges
 
Business cases internet 30 use cases
Business cases internet 30 use casesBusiness cases internet 30 use cases
Business cases internet 30 use cases
 
ANS_Ch_06_Handouts.pdf
ANS_Ch_06_Handouts.pdfANS_Ch_06_Handouts.pdf
ANS_Ch_06_Handouts.pdf
 

Plus de ERAUWebinars

ERAU Webinar june 2019 Resumes that Work!
ERAU Webinar june 2019 Resumes that Work!ERAU Webinar june 2019 Resumes that Work!
ERAU Webinar june 2019 Resumes that Work!ERAUWebinars
 
ERAU Webinar May 2019 NTSB Accicent Investigation
ERAU Webinar May 2019 NTSB Accicent InvestigationERAU Webinar May 2019 NTSB Accicent Investigation
ERAU Webinar May 2019 NTSB Accicent InvestigationERAUWebinars
 
ERAU Webinar April 2019 Are Drones a Threat?
ERAU Webinar April 2019 Are Drones a Threat?ERAU Webinar April 2019 Are Drones a Threat?
ERAU Webinar April 2019 Are Drones a Threat?ERAUWebinars
 
ERAU Webinar March 2019 Leadership Fatal Flaws
ERAU Webinar March 2019 Leadership Fatal FlawsERAU Webinar March 2019 Leadership Fatal Flaws
ERAU Webinar March 2019 Leadership Fatal FlawsERAUWebinars
 
Webinar ERAU personality webinar Jan 2019
Webinar ERAU personality webinar Jan 2019Webinar ERAU personality webinar Jan 2019
Webinar ERAU personality webinar Jan 2019ERAUWebinars
 
Erau webinar may 2018 resumes
Erau webinar may 2018 resumesErau webinar may 2018 resumes
Erau webinar may 2018 resumesERAUWebinars
 
Erau webinar april 2018 Aviation Cybersecurity
Erau webinar april 2018 Aviation CybersecurityErau webinar april 2018 Aviation Cybersecurity
Erau webinar april 2018 Aviation CybersecurityERAUWebinars
 
ERAU webinar: Aviation English for Flight Training
ERAU webinar: Aviation English for Flight Training ERAU webinar: Aviation English for Flight Training
ERAU webinar: Aviation English for Flight Training ERAUWebinars
 
ERAU webinar plus march 15 2018
ERAU webinar plus march 15 2018 ERAU webinar plus march 15 2018
ERAU webinar plus march 15 2018 ERAUWebinars
 
Embry-Riddle Unmanned Systems Degrees and Programs
Embry-Riddle Unmanned Systems Degrees and ProgramsEmbry-Riddle Unmanned Systems Degrees and Programs
Embry-Riddle Unmanned Systems Degrees and ProgramsERAUWebinars
 
Erau webinar jan 24 2018 -pilot profiling
Erau webinar jan 24 2018 -pilot profilingErau webinar jan 24 2018 -pilot profiling
Erau webinar jan 24 2018 -pilot profilingERAUWebinars
 
Slides erau webinar jan 2018 pittenger
Slides erau webinar jan 2018 pittengerSlides erau webinar jan 2018 pittenger
Slides erau webinar jan 2018 pittengerERAUWebinars
 
Erau webinar UAS-a european perspective
Erau webinar UAS-a european perspective Erau webinar UAS-a european perspective
Erau webinar UAS-a european perspective ERAUWebinars
 
erau webinar october 2017 Commanding presentations
erau webinar october 2017 Commanding presentationserau webinar october 2017 Commanding presentations
erau webinar october 2017 Commanding presentationsERAUWebinars
 
erau webinar sept 2018 pilot careers
erau webinar sept 2018 pilot careerserau webinar sept 2018 pilot careers
erau webinar sept 2018 pilot careersERAUWebinars
 
Aerospace Coatings Applicator
Aerospace Coatings ApplicatorAerospace Coatings Applicator
Aerospace Coatings ApplicatorERAUWebinars
 
Embry-Riddle Degree Briefing BS Interdisciplinary Studies
Embry-Riddle Degree Briefing BS Interdisciplinary StudiesEmbry-Riddle Degree Briefing BS Interdisciplinary Studies
Embry-Riddle Degree Briefing BS Interdisciplinary StudiesERAUWebinars
 
erau webinar- career portfolios
erau webinar- career portfolioserau webinar- career portfolios
erau webinar- career portfoliosERAUWebinars
 
Slides erau webinar june 13 2017 international students
Slides erau webinar june 13 2017 international studentsSlides erau webinar june 13 2017 international students
Slides erau webinar june 13 2017 international studentsERAUWebinars
 
Slides erau webinar international students Part 1
Slides erau webinar international students Part 1Slides erau webinar international students Part 1
Slides erau webinar international students Part 1ERAUWebinars
 

Plus de ERAUWebinars (20)

ERAU Webinar june 2019 Resumes that Work!
ERAU Webinar june 2019 Resumes that Work!ERAU Webinar june 2019 Resumes that Work!
ERAU Webinar june 2019 Resumes that Work!
 
ERAU Webinar May 2019 NTSB Accicent Investigation
ERAU Webinar May 2019 NTSB Accicent InvestigationERAU Webinar May 2019 NTSB Accicent Investigation
ERAU Webinar May 2019 NTSB Accicent Investigation
 
ERAU Webinar April 2019 Are Drones a Threat?
ERAU Webinar April 2019 Are Drones a Threat?ERAU Webinar April 2019 Are Drones a Threat?
ERAU Webinar April 2019 Are Drones a Threat?
 
ERAU Webinar March 2019 Leadership Fatal Flaws
ERAU Webinar March 2019 Leadership Fatal FlawsERAU Webinar March 2019 Leadership Fatal Flaws
ERAU Webinar March 2019 Leadership Fatal Flaws
 
Webinar ERAU personality webinar Jan 2019
Webinar ERAU personality webinar Jan 2019Webinar ERAU personality webinar Jan 2019
Webinar ERAU personality webinar Jan 2019
 
Erau webinar may 2018 resumes
Erau webinar may 2018 resumesErau webinar may 2018 resumes
Erau webinar may 2018 resumes
 
Erau webinar april 2018 Aviation Cybersecurity
Erau webinar april 2018 Aviation CybersecurityErau webinar april 2018 Aviation Cybersecurity
Erau webinar april 2018 Aviation Cybersecurity
 
ERAU webinar: Aviation English for Flight Training
ERAU webinar: Aviation English for Flight Training ERAU webinar: Aviation English for Flight Training
ERAU webinar: Aviation English for Flight Training
 
ERAU webinar plus march 15 2018
ERAU webinar plus march 15 2018 ERAU webinar plus march 15 2018
ERAU webinar plus march 15 2018
 
Embry-Riddle Unmanned Systems Degrees and Programs
Embry-Riddle Unmanned Systems Degrees and ProgramsEmbry-Riddle Unmanned Systems Degrees and Programs
Embry-Riddle Unmanned Systems Degrees and Programs
 
Erau webinar jan 24 2018 -pilot profiling
Erau webinar jan 24 2018 -pilot profilingErau webinar jan 24 2018 -pilot profiling
Erau webinar jan 24 2018 -pilot profiling
 
Slides erau webinar jan 2018 pittenger
Slides erau webinar jan 2018 pittengerSlides erau webinar jan 2018 pittenger
Slides erau webinar jan 2018 pittenger
 
Erau webinar UAS-a european perspective
Erau webinar UAS-a european perspective Erau webinar UAS-a european perspective
Erau webinar UAS-a european perspective
 
erau webinar october 2017 Commanding presentations
erau webinar october 2017 Commanding presentationserau webinar october 2017 Commanding presentations
erau webinar october 2017 Commanding presentations
 
erau webinar sept 2018 pilot careers
erau webinar sept 2018 pilot careerserau webinar sept 2018 pilot careers
erau webinar sept 2018 pilot careers
 
Aerospace Coatings Applicator
Aerospace Coatings ApplicatorAerospace Coatings Applicator
Aerospace Coatings Applicator
 
Embry-Riddle Degree Briefing BS Interdisciplinary Studies
Embry-Riddle Degree Briefing BS Interdisciplinary StudiesEmbry-Riddle Degree Briefing BS Interdisciplinary Studies
Embry-Riddle Degree Briefing BS Interdisciplinary Studies
 
erau webinar- career portfolios
erau webinar- career portfolioserau webinar- career portfolios
erau webinar- career portfolios
 
Slides erau webinar june 13 2017 international students
Slides erau webinar june 13 2017 international studentsSlides erau webinar june 13 2017 international students
Slides erau webinar june 13 2017 international students
 
Slides erau webinar international students Part 1
Slides erau webinar international students Part 1Slides erau webinar international students Part 1
Slides erau webinar international students Part 1
 

Dernier

THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONTHEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONHumphrey A Beña
 
Judging the Relevance and worth of ideas part 2.pptx
Judging the Relevance  and worth of ideas part 2.pptxJudging the Relevance  and worth of ideas part 2.pptx
Judging the Relevance and worth of ideas part 2.pptxSherlyMaeNeri
 
How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17Celine George
 
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfLike-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfMr Bounab Samir
 
4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptxmary850239
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceSamikshaHamane
 
Q4 English4 Week3 PPT Melcnmg-based.pptx
Q4 English4 Week3 PPT Melcnmg-based.pptxQ4 English4 Week3 PPT Melcnmg-based.pptx
Q4 English4 Week3 PPT Melcnmg-based.pptxnelietumpap1
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPCeline George
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for BeginnersSabitha Banu
 
Karra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxKarra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxAshokKarra1
 
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYKayeClaireEstoconing
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTiammrhaywood
 
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfAMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfphamnguyenenglishnb
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxiammrhaywood
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...JhezDiaz1
 
ENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomnelietumpap1
 

Dernier (20)

FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptxFINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
 
Raw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptxRaw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptx
 
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONTHEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
 
Judging the Relevance and worth of ideas part 2.pptx
Judging the Relevance  and worth of ideas part 2.pptxJudging the Relevance  and worth of ideas part 2.pptx
Judging the Relevance and worth of ideas part 2.pptx
 
How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17
 
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptxYOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
 
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfLike-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
 
4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in Pharmacovigilance
 
OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...
 
Q4 English4 Week3 PPT Melcnmg-based.pptx
Q4 English4 Week3 PPT Melcnmg-based.pptxQ4 English4 Week3 PPT Melcnmg-based.pptx
Q4 English4 Week3 PPT Melcnmg-based.pptx
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERP
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for Beginners
 
Karra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxKarra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptx
 
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
 
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfAMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
 
ENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choom
 

Erau cybersecurity and security degrees

  • 1. Welcome to the April 2018 Webinar Plus Degree Briefing 1
  • 2. 2 Our Agenda Today: 1. Introduction and Overview of ERAU --Bill Gibbs 2. Bachelor of Science in Aviation Security --Dr. Daniel Benny 3. Master of Science in Cybersecurity Management and Policy --Dr. Glenn Dardick 4. Master of Science in Cybersecurity Engineering 5. Professional Education Non-Degree Program in Cybersecurity --Sarah Ochs
  • 3. Embry-Riddle Aeronautical University • Fully-accredited, independent, nonprofit university based in Daytona Beach, Florida • Oldest (1926) and most prestigious aviation-related university in the world • More than 70 undergraduate and graduate degrees (Associates to Ph.D.) + Professional Education • 32,000 students Worldwide Campus • 130 campuses around the world • Classroom, Real-time Virtual Classroom, Online About ERAU 3
  • 4. AVIATION SECURITY Bachelor of Science Daniel J. Benny, Ph.D., CPP, CM, ACE Program Chair
  • 5. • Designed to meet the needs and demands of: – Aviation/Aerospace Industry – Security Industry • Program Launch Date: January, 2014 • Modality: Online, Eagle Vision/Home, Classroom BS Aviation Security
  • 6. • Students will be introduced to aviation security courses related to: – Airport Security – Airline Security – General Aviation Security – Corporate Security – Physical Security – Aviation Legislation – Airport Management – National Security and Intelligence Science and Practical Application
  • 7. • High School Graduates • Two Year College Graduates • Security Professionals • Aviation Professionals • Active and Transitioning Military Focus Market
  • 8. • Transportation Security Administration • Federal Intelligence Agencies • U.S. Air Force Security Police • Airline or Airport Security • Corporate Aviation Security • Law Enforcement • Other Security Career Interest
  • 9. TSA Salary Range • Screener $29,300-$44,000 • Supervisor $33,600-$50,400 • Inspector $48,000-$74,300 • Federal Security Director $120,200-$155,500 Source: TSA
  • 10. Entry Salary Ranges Federal Intelligence Agencies • $28,500-$36,500 U.S. Air Force Security Police • $23,000-$28,000 Airline or Airport Security • $27,000-$35,000 Corporate Aviation Security • $30,000-$40,000 Law Enforcement • $45,000-$55,000 Source: ASIS International
  • 11. Salary Ranges Other Security Entry Security Officer • $18,000- $21,000 Security Manager • $30,000-$50,000 Security Director • $75,000- $100,000 Chief Security Officer/Global Security Director • $125,000-$250,000 Source: ASIS International
  • 12. Professional Certifications The degree can also prepare the student for testing to obtain the following professional security and aviation certifications. ASIS International • Certified Protection Professional - CPP American Association of Airport Executives • Certified Member - CM (Security Component) • Accredited Airport Executive - AAE (Security Component) • Airport Certified Employee/Security - ACE • Airport Security Coordinator - ASC
  • 13. • Specialized to the Aviation Security Profession • Covers Current Aviation Regulations, Industry Standards and Practices • Prepares the Student for Any Security Environment • It is an Embry-Riddle Degree Value of the Degree
  • 14. 1962 Cessna C-150 Questions?
  • 15. DR. GLENN S. DARDICK
  • 16. MASTER OF SCIENCE CYBERSECURITY MANAGEMENT & POLICY • Geared for non-technical students as well as students with prior technical expertise • Project and policy expertise for managers • Oversight of human and digital resources • Homeland Security
  • 17. THE NEED • Recent cyber attacks  Target, Home Depot, Goodwill • Economic incentives for cyber attacks  Threats from China, Russia • Information driven society  Need to protect financial and medical information • All levels of government, industry and academia  Need for policies, security of information, cloud computing
  • 18. PROGRAM GOALS & FOCUS • Answers the need for cyber security expertise  Government and industry • Support multiple disciplinary group of professionals  Management policy, law, leadership, security, defense • Target Audience  Homeland Security, military, business, government • Focused on management and policy  Differs from other degree programs focusing on technology expertise
  • 19. PROGRAM • 100% Online • 30 Credit hour program • Developed by the Daytona Beach Faculty • AND … • Graduate Certificate in Aviation Cybersecurity Management & Policy • adding two new courses to be developed. Grad. Cert. can be started in fall (take two existing courses), presuming that the new courses are available by October/November • Aviation track in M.S, Cybersecurity Management & Policy • Can be started at any time; two new courses (same as above) should be completed by October/November
  • 20. THE DIFFERENCE • Complements, does not compete with, the Daytona Beach Cybersecurity Engineering degree program. This is not a program focused on technology expertise. • Differs from the Intelligence degree program at Prescott. Again, the MCMP degree is focused more on Management and Policy.
  • 21. OPPORTUNITIES • The MCMP degree is intended to assist those in technology careers to advance to supervisory and management roles • The MCMP degree is intended to assist those already in supervisory and management roles to better understand how to manage areas having responsibilities for cybersecurity.
  • 22. MASTER OF SCIENCE IN CYBERSECURITY MANAGEMENT & POLICY
  • 23. MCMP 501 THE INTERNET, GOVERNANCE AND SECURITY • This course examines how the Internet and associated communication technologies have created new means for people to organize, both within their local communities and across great distances, changing the nature of the relationship between society and the institutions of government. • The Internet has allowed people to communicate, often without detection, that has resulted in both positive and negative effects; e.g., Internet- based communications have been a significant factor in the both the growth of transnational terrorism and popular uprisings such as the Arab Spring. • In response, governments have often attempted to control the Internet, in some cases to aid legitimate law enforcement, in others to repress restless populations seeking change. State institutions can also use these technologies to create more effective governance and better response to humanitarian crises.
  • 24. MCMP 510 THE PRACTICE OF CYBERSECURITY • The course introduces principles of cybersecurity, providing a framework covering technical, legal, and managerial issues. • Students will examine computer and network security from the perspectives of the industry-standard ten core bodies of knowledge: • access control; • telecommunications and network security; • information security governance and risk management; • software development security; • cryptography; • security architecture and design; • operations security; • business continuity and disaster recovery planning; • legal, regulations, investigations and compliance; and • physical (environmental) security.
  • 25. MCMP 520 SECURITY ENGINEERING AND MANAGEMENT • This course is designed to teach how cybersecurity should be integrated early on in any project or other use of information in a computer or network setting. • Emphasis is placed on the relationship between information and the operation and mission of an agency, business, organization, or other entity. • This course specifically ties together information and communications technology (ICT), cybersecurity, business, policies, and ethics. • Topics include security engineering concepts (although this is not an engineering course), distributed systems, network attacks and defense, security management, encryption, the role of training and education, and more.
  • 26. MCMP 615 POLICY AND LAW IN CYBERSPACE • Cyberspace has emerged as a "real" place where people congregate, crimes occur, social changes are initiated, and a majority of our work takes place. • Whereas the physical world — and law and policy that impact the physical world — can be constrained by geopolitical boundaries, it is literally impossible to similarly constrain activities in cyberspace. • For that reason, cyberspace itself is a virtual universe — one that is global and where every Internet user is a citizen. • This course describes emerging policies and laws that affect cyberspace, particularly those related to information security and cybercrime. The clash between real space and cyberspace is also examined.
  • 27. MCMP 650 EMERGING TOPICS IN CYBERSECURITY • This course examines the current research literature concerning issues related to cybersecurity. • Topics will include, but not be limited to, current research topics in information assurance, cybersecurity policy, information warfare and the Advanced Persistent Threat, policy and law in cyberspace, evolving information security technologies and methods, new approaches to incident response and digital forensics, emerging threats and adversaries, and the impact of cybersecurity on society and organizations. • Students will focus on research techniques, as well as the presentation of results, legal issues, and relevant technologies.
  • 28. MCMP 690/691 CYBERSECURITY MANAGEMENT AND POLICY CAPSTONE • The capstone provides students with the opportunity to integrate all disciplines and competencies that have been learned in this program, plus their past experiences and professional goals, into a single work-based project, internship experience, or other appropriate activity. • The project will be the culmination of a student's studies integrated in their area of specialization or expertise. • In cooperation with an advisor, the student will design, research, and implement a project that is comprehensive in nature and which addresses, to the extent feasible, all core areas of knowledge around which the program has been built
  • 29. QUESTIONS Dr. Gary Kessler, Dept. Chair SSIA, kessleg1@erau.edu Dr. Glenn S. Dardick Program Chair, dardickg@erau.edu
  • 30.
  • 31. •Bureau of Labor Statistics states Cybersecurity jobs will have 18% growth rate (much higher than average) for 2014-2024 •Forbes states that cybersecurity engineers command almost 10% more salary than other areas in IT Over 209,000 cybersecurity jobs in the U.S. are unfilled Postings are up 74% over the past five years Master of Cybersecurity Engineering (MSCybE) Jobs • Cybersecurity Engineer • System Design & Implementation • Information Security Analyst • Penetration Tester • Malware Analyst • Offense/Defense Ops Member • Digital Forensics Investigator Focus Areas • Cybersecurity in Aviation & Aerospace Systems • UAS • Satellite Systems • Embedded Systems Security • Aviation and Aerospace Cybersecurity • Digital Forensics for Unmanned Autonomous Systems Program Overview
  • 32. 32
  • 33. ERAU NextGen Task E UAS Demonstration Project ERAU Project Lead Task E Todd Waller
  • 34.
  • 35. Date: October 9-11, 2018 (8am – 5pm) Location: Daytona Beach, FL Web: www.erau.edu/cyber
  • 36. A professional short-course with a focus on cybersecurity vulnerabilities to the aviation industry, taught by industry experts. Want to know how to ….  Increase your awareness of how to identify cyber-related vulnerabilities?  Develop and apply mitigation strategies?  Recognize threats and vulnerabilities to airport, aircraft, and supporting systems?
  • 37. Contact  Email: dbproed@erau.edu  Tel: 386.226.6928  Web: erau.edu/cyber