by clicking on the page. A slider will appear, allowing you to adjust your zoom level. Return to the original size by clicking on the page again.
the page around when zoomed in by dragging it.
the zoom using the slider on the top right.
by clicking on the zoomed-in page.
by entering text in the search field and click on "In This Issue" or "All Issues" to search the current issue or the archive of back issues respectively.
by clicking on thumbnails to select pages, and then press the print button.
this publication and page.
displays a table of sections with thumbnails and descriptions.
displays thumbnails of every page in the issue. Click on a page to jump.
allows you to browse through every available issue.
FCW : August 30, 2015
degrees in cybersecurity engineering and IT leadership, and the latter will be available online. “The community can access USD’s cybersecurity expertise through degree and certificate programs, inviting USD’s cyber experts to participate in projects focusing on the evaluation and devel- opment of their own systems and strategies to mitigate cyberthreats, and developing internal leadership on cybersecurity IT, cybersecurity law, forensics and incident response,” said Jason Lemon, the university’s dean of professional and continuing education, in a statement. 5. North Carolina State University North Carolina State University is the site of NSA’s Laboratory for Analytic Sciences and offers a master’s degree in big-data analytics. NC State was one of four major uni- versities to receive funding from NSA last year for cybersecurity research in five key areas: scalability and com- posability, policy-governed secure col- laboration, security metrics, resilient architectures, and understanding and accounting for human behavior. The university had previously received a grant of $2.5 million for research ranging from fault-tolerant computing to security context. An NC State professor told FCW that the 2014 funding would be used for similar research, with a focus on the design of trusted IT systems. NC State lies in North Carolina’s Research Triangle, which is a mag- net for engineering and, increasingly, cybersecurity talent. 6. George Mason University Like UMUC, George Mason University’s proximity to Washington, D.C., makes it a convenient potential pipeline for federal agencies. The State Council of Higher Educa- tion for Virginia approved GMU’s mas- ter of science degree in management of secure information systems in 2011. “This isn’t just a technical cybersecuri- ty program,” said Daniel Menasce, who was a senior associate dean in GMU’s Volgenau School of Engineering at the time and is still a computer science professor at the school. “Cybersecurity is not just a technical problem, it is also a policy and management problem.” The Fairfax, Va., university’s cyber- security curriculum has since expand- ed. Officials say GMU is the first college in the country to “offer a cybersecu- rity engineering degree that focuses on cyber-resilience engineering design.” The staff of the Volgenau School of Engineering includes Associate Professor Angelos Stavrou, who is also a guest researcher at the National Institute of Standards and Technology’s Computer Security Division. n Back to School 18 August 30, 2015 FCW.COM CyberSecurity Forensic Analyst Audience: highly experienced digital forensic professionals Focus: Ability to conduct a thorough and sound forensic examination of a computer system and other digital/ electronic devices, properly interpret the evidence, and communicate the examination results effectively and understandably Requirements: Practical experience in the field of digital forensics Certifying organization: CyberSecurity Institute (cybersecurityforensicanalyst.com) EC-Council Certified Security Analyst and Licensed Penetration Tester Audience: Information security professionals Focus: Various penetration testing and security auditing methodologies for ECSA, and report-writing skills and the ability to perform penetration tests in real-time scenarios on an active cyber range for LPT. Successful candidates will receive two certifications. Requirements: Basic ethical hacking skills. Certified Ethical Hacker certifica- tion is highly recommended. Certifying organization: EC-Council (eccouncil.org) GIAC Certified Penetration Tester Audience: Information security professionals Focus: Penetration-testing method- ologies, the legal issues surrounding penetration testing, how to properly conduct such tests, and technical and non-technical techniques professionalcertifications George Mason University 0830fcw_014-026.indd 18 8/12/15 9:26 AM
August 15, 2015
September 15, 2015