Date post: | 02-May-2018 |
Category: |
Documents |
Upload: | nguyendiep |
View: | 219 times |
Download: | 6 times |
UNCLASSIFIED
UNCLASSIFIED
NSA/DHS Centers of Academic Excellence in Cyber Defense Education
For Four-Year (CAE-CDE)& Two-Year (CAE2Y)
Institutions
November 2015
NSA/DHS CAE Goal
2UNCLASSIFIED
UNCLASSIFIED
Reduce vulnerability in our national information infrastructure by promoting higher education and research in CD and
producing a growing number of professionals with
CD expertise in various disciplines.
• Knowledge Unit (KU)
– A detailed list of course topics and expected outcomes
Terminology
• Fundamental core KUs: 11
– Apply to CAE 2Y and CAE CD
• Secondary core KUs: 6
– Apply to CAE CD
• Optional KUs: 47
– CAE IA/CD Required to map to 5
CAE Knowledge Unit RequirementsCAE CD & CAE2Y
* List of KUs can be found at www.iad.gov/NIETP/CAERequirements.cfm
CAE Program RequirementsCAE CD & CAE2Y
• Letter of Intent
• Cyber Defense “Center”
• Cyber Defense Academic Program
• Student Research (4Y)
• Cyber Defense Faculty
• Cyber Defense is Multidisciplinary
• Institution Security Plans
• Outreach
* Criteria can be found at www.iad.gov/NIETP/CAERequirements.cfm
Letter of Intent
• Identify POC
• Institutional Support
• Accreditation Information
• Any Pertinent Accomplishments
Cyber Defense “Center”
• Formal Documentation of Center Institutional Support of Center, Signed by a Dean or Higher
• Operational Link Website content: Program guidance; CD information; Collaboration,
Cyber activities; CD resources; Conferences; Workshops; Competitions; News articles; etc.
Cyber Defense Academic Program
• Identify Department(s)
• Identify a clearly defined course path that map to core KUs + Focus Area KUs if identified. Choose best path, do not map multiple paths, additional paths can be explained in the comment section. Students must take that path!
• Provide evidence that students take those courses that map to the KUs (transcript, completion letter, certificate, etc.)
• Provide student enrollment/graduation in program for last 3 years
• Identify publications available to students in syllabus
Student Research (4Y)
• Research papers/projects by students, actual links – 5 to 10 papers Must be from students in the course of study identified in criteria 2
• Physical/Virtual Labs (Criteria 2 for 2Y) Description of labs
Samples of lab projects or exercises
• Courses that require labs List of courses the require labs
Link to labs from course syllabus
Cyber Defense Faculty• Head of Cyber Defense program of study
Job description
CV or biography must identify that they teach at the applying institution
• Additional Full-time faculty
Not identified above
Shows depth and sustainability of program of study
CV or biography must identify that they teach at the applying institution
• Part-time or Adjunct
Additional faculty from other departments
Industry experts
CV or biography must identify that they teach at the applying institution
Cyber Defense Faculty (4Y Only)• Faculty Publications
Peer reviewed publications within 3 years, actual – not subscription service
• Books or chapters of books Within 5 years; title, author, date; chapters
• Presentations Presentations at Cyber conferences within 3 years. Includes guest lecturer at
government organizations or academic institutions
• Professional Societies Subject matter expert for professional societies, accrediting bodies, etc. Active in Cyber
organizations. Within 3 years of application
• Grants Evidence of grants
• Support to Student activities Mentor for student clubs, exercises, etc.
• Cyber concept taught in other fields of study Courses must be in a department separate from submitted program
path; preferably non-technical like business, criminal justice, etc.
Syllabus required with cyber content highlighted
• Non-cyber courses encourage papers or projects Courses submitted above require papers or projects
Link to 5 to 10 actual papers, not subscription service; or substantial projects that have highlighted cyber content.
Must be from at least 2 separate courses
Cyber Defense is Multidisciplinary
Institution Security Plans
• Security plans and policies Links to plans and policies to show institutional security practices
• Cyber Security/Information Security Officer Name, title, job description
• Implementation Evidence of security practices
Awareness, training, tutorials for faculty, staff and students
User acknowledgements
On-line help
Etc.
Outreach• Shared Curriculum/Faculty
Examples; MOAs; collaboration; course info; etc.
• Reciprocity of credits Written agreements
• Sponsorship/participation in Exercises or Competitions Flyers; website rosters; emails from organizers; pictures; etc.
• CAE Collaboration
• Business/Industry Collaboration Internships?
Speakers
• Community Outreach Help for the community at large
64 CAE-R, 126 CAE-CDE, and 39 CAE-2Y, totaling 191 CAEs (40 are both CDE and R)in 44 states + District of Columbia and Commonwealth of Puerto Ricohttps://www.iad.gov/NIETP/reports/cae_designated_institutions.cfm
SC - 1
1
MI
5
KS
3
AL
9
IL
8
PR - 1
VA
7
-NJ - 6
-DE - 1
MN
6
TX
15
AZ
4
OH
4
PA - 7
FL
8
GA
4
IA
1
CA
10
NY
10
-MD – 16
- DC – 2
-MA – 3
-RI - 1
LA
3
OK
6NM
2
AK WA
4
ID
2
NVCO
5
SD
1
NE
2
MO
1
AR
2
IN
4
MS
1
TN - 4
WV
1
NC - 6
VT
2- NH - 1
- CT - 1
UT
1
OR
2
KY- 2
ME
1
HI - 2
WY
MT ND
WI
• CAE Program Office
• Website Application
https://www.iad.gov/NIETP/index.cfm
Resources and Requirements; Obtain account
• ATE Centers
National CyberWatch Center - www.cyberwatchcenter.org/
CyberWatch West – www.cyberwatchwest.org/
CSSIA - http://www.cssia.org/
• CAE Community
www.caecommunity.org
Resources