integrated security curriculum
play

Integrated Security Curriculum Conceptions of SECURITY RISK - PDF document

5/18/2017 Integrated Security Curriculum Conceptions of SECURITY RISK THREATS TECH VALUES The Big Picture: Integrated Security Pathways Cyber Security ISERC Student portal National Security Studies CAPSTONE: Gateway course Peace Studies


  1. 5/18/2017 Integrated Security Curriculum Conceptions of SECURITY RISK THREATS TECH VALUES The Big Picture: Integrated Security Pathways Cyber Security ISERC Student portal National Security Studies CAPSTONE: Gateway course Peace Studies ISERC Security and Privacy Management AND OTHERS 1

  2. 5/18/2017 THE ISERC: Integrated Security Education and Research Center Gateway Course Learning Objectives* •Evaluate various security and privacy solutions in terms of their security and •Identify threats and vulnerabilities to privacy guarantees given economic, legal, private and public assets and sensitive data, political, technical, and social deploy a solution to mitigate them, and considerations. evaluate legal, business, social, and ethical •Apply multiple disciplinary concepts and ramifications. analytical frameworks pertaining to security at local, national, international and global levels. Risk Tech Human Threats Experience •Describe how security, threats to security, •Demonstrate and evaluate a response to a and proposed solutions to those threats are simulated security attack in a real world defined and contested by different scenario. individuals, institutions, and cultures, •Apply a basic security and privacy risk across space and time. management framework to a private or •Explain how socio ‐ legal, technological, and public decision making scenario. historical factors create the contexts for threats to security as well as responses to those threats. *Current Proposals Capstone Course ISERC 2

  3. 5/18/2017 In ‐ Process and Future Work: • ISERC • ISDA Pathways Minor • Design Collaboration • Capstone Course • Cases/Scenarios • Graduate Curriculum • Available more broadly for • PhD in Security Governance classes • Available for research Input and Questions Contribute to the ISDA educational subcommittee: email Kira Gantt at kgantt@vt.edu or Russ Walker at rswalker@vt.edu 3

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend