Information Security Center at WCU
-
Upload
sophia-rosales -
Category
Documents
-
view
32 -
download
1
description
Transcript of Information Security Center at WCU
![Page 1: Information Security Center at WCU](https://reader036.fdocuments.in/reader036/viewer/2022062321/56812ac1550346895d8e88bc/html5/thumbnails/1.jpg)
Information Security Center at WCU
Dr. Zhen JiangAssociate Professor, Computer Science Department
Directorate, Information Security CenterEmail: [email protected]
![Page 2: Information Security Center at WCU](https://reader036.fdocuments.in/reader036/viewer/2022062321/56812ac1550346895d8e88bc/html5/thumbnails/2.jpg)
Outline
• Mission
• Plan
• Curriculum and development
• Future
![Page 3: Information Security Center at WCU](https://reader036.fdocuments.in/reader036/viewer/2022062321/56812ac1550346895d8e88bc/html5/thumbnails/3.jpg)
Mission
![Page 4: Information Security Center at WCU](https://reader036.fdocuments.in/reader036/viewer/2022062321/56812ac1550346895d8e88bc/html5/thumbnails/4.jpg)
• IA education• Certificate program for undergraduates• Certificate program for graduates• Education for non-CS major or non-security track students• Local community service
• Workforce development• To attract and motivate more under-presented groups• To enhance the effectiveness and efficiency of our training • To develop more advance IA techniques in research areas
• Local impact• Academy collaborations
• Research schools, both CAE and non-CAE• Educational institutions, both CAE and non-CAE
• Industry partners• Local community, e.g., K-12 students
![Page 5: Information Security Center at WCU](https://reader036.fdocuments.in/reader036/viewer/2022062321/56812ac1550346895d8e88bc/html5/thumbnails/5.jpg)
![Page 6: Information Security Center at WCU](https://reader036.fdocuments.in/reader036/viewer/2022062321/56812ac1550346895d8e88bc/html5/thumbnails/6.jpg)
Class learning: Computer Security in various topics
Lab modules Intern programs
Opportunities with research inspired materials
Strategy plan
![Page 7: Information Security Center at WCU](https://reader036.fdocuments.in/reader036/viewer/2022062321/56812ac1550346895d8e88bc/html5/thumbnails/7.jpg)
21st century workforce, and an entrepreneurially and computationally empowered citizenry.
Goal•Enhancement of career skills•Technical preparation for inter-disciplinary students
Key•To be motivated continuously•Fully understand the real-world paradigms •Accomplish in a very short time frame •Learning in an obstacle-less manner
Approach•Teamwork with seamless integration of research and education•Adoption of commercial-off-the-shelf products and research materials•Template/pattern learning in lab modules•An efficient method for self-phased learning
under-presented groups,unmotivated & inexperienced traineeseasy to quit / interrupt
![Page 8: Information Security Center at WCU](https://reader036.fdocuments.in/reader036/viewer/2022062321/56812ac1550346895d8e88bc/html5/thumbnails/8.jpg)
Curriculum (undergraduate)
Undergraduate Computer Security CertificateCSC301 — Introduction to Computer SecurityCSC302 — Computer Security IICSC331 — Operating SystemsCSC335 — Data Communications and Networking ICSC402 — Software EngineeringOne course chosen from the following :
CSC490 — Independent Project (Computer Security)CSC495 — Topics (Computer Security)CRJ380 — Computer CrimeMAT405 — Topics (Cryptography)
![Page 9: Information Security Center at WCU](https://reader036.fdocuments.in/reader036/viewer/2022062321/56812ac1550346895d8e88bc/html5/thumbnails/9.jpg)
REU in granted research projects
Collaborative work at inter-disciplinary level
Opportunities offered by collaborators & partners
Hands-on experience in class project
Learning model
![Page 10: Information Security Center at WCU](https://reader036.fdocuments.in/reader036/viewer/2022062321/56812ac1550346895d8e88bc/html5/thumbnails/10.jpg)
Education Partners1. Collaboration for ISC development
Research schools such as Temple, Lehigh, Drexel, UD, Auburn, etc
Teaching schools such as Cheyney, Delaware Technical Community College, etc
CAE schools such as NC A&T SU, etc
• Faculty exchange • Sharing curriculum • Research in educational project – more
efficient pedagogical methods• Research for new techniques - from small
grants to collaborative project • REU experience for undergraduates • Seminar talk
![Page 11: Information Security Center at WCU](https://reader036.fdocuments.in/reader036/viewer/2022062321/56812ac1550346895d8e88bc/html5/thumbnails/11.jpg)
2. Establishment of student learning model to meet requirements of industry Industry partners e.g., Gnostech. • Invited talks in ISC courses• Seminars or guest speeches• Curriculum review/assessment• Permanent intern opportunities• Training for local employees
![Page 12: Information Security Center at WCU](https://reader036.fdocuments.in/reader036/viewer/2022062321/56812ac1550346895d8e88bc/html5/thumbnails/12.jpg)
3. Partners in training dissemination – from K-12 to professionalLocal K-12 schools, e.g., play, girl scout, etc.
Other departments at WCU, e.g., general education for inter-disciplinary students
Industry partners, e.g., Gnostech for local employees (in plan)
Other institutions, both CAE and non-CAE, research and education schools.
• Share curriculum and teaching experience• Share student opportunities, e.g., seminar,
REU, etc.• Recruit more students to high quality
education or higher degree study
![Page 13: Information Security Center at WCU](https://reader036.fdocuments.in/reader036/viewer/2022062321/56812ac1550346895d8e88bc/html5/thumbnails/13.jpg)
Future
![Page 14: Information Security Center at WCU](https://reader036.fdocuments.in/reader036/viewer/2022062321/56812ac1550346895d8e88bc/html5/thumbnails/14.jpg)
Goal• Competitive students entrepreneurially and
computationally empowered citizenries
Temple, NCST, etc, for a higher degree studyIBM, SAP, Vanguard, Bell lab, etc.
Key• Attract students and keep them continuously working hard
Strategy• Real-world computing paradigms and principles in an
obstacle-less learning