This is my first blog in what hopes to be in my new degree, Master of Science in Cybersecurity, and new school, Bellevue University. You might be wondering why I am typing a blog when I could easily type up status updates on Facebook. This is due to me finding out that a blog is a requirement for two of the courses in Bellevue's Cybersecurity degree plan. The first class of that degree, Information Security Management and the last class which is the Capstone class. Everything in between will not be a requirement, but I might type about each class anyway.
First things first, this particular blog is not a part of the University yet. I am starting it just so that it is started, and all I have to do from here on out is add posts. The blogs during the classes will be graded, from what I have been told. This one will just be a discussion on my history of school, Bellevue, and the degree that I will be setting out to achieve through them.
As many of my friends and family members are aware, I have been attending college online since 2006. I achieved my Associate degree in IT from Colorado Technical University (CTU) in 2008. I then continued on to Kaplan University for my Bachelor degree in IT with an emphasis in Network Administration. I graduated Summa Cum Laude with a 3.98 GPA in 2010. From that point, my Master degree seeking went haywire. I started one month after graduating from Kaplan back at CTU for a Master of Science in Management with an emphasis in IT Management. One class in, I decided to change the degree to an MBA in IT Management. While in that next class, group projects got the best of me, and with little help from anyone, I decided to withdraw. I found Capella University and started in their Master of Science in IT (MSIT) Network Architecture degree. After one class, I decided that I wanted to try the MBA so to get some business foundations in me. Long story short 4 classes and 3 emphasis changes later (Entrepreneurship, Accounting, & IT Management), I withdrew completely from Capella realizing that the MBA was just too much for me.
Two weeks ago, I decided to search for schools which focused in computer security. Over the course of a week, I narrowed the list down to 3 Universities and their degrees; CTU's MSIT in Information Security, APU's MSIT in Digital Forensics, and Bellevue's Master of Science in Cybersecurity. At the top of the list was Bellevue due to their curriculum being nothing but classes in Cybersecurity. There were circumstances that were pushing them to the bottom of the list, the main one being their application fee of $75. APU and CTU were waiving theirs due to me being a returning student (CTU) or a current Wal-Mart employee (APU). I know that $75 doesn't sound like a lot, but to me at a time like now, it is a lot.
I wanted some more information about Bellevue so I started connecting with them on the Bellevue University Facebook page. The first person to comment on my post just so happened to be the Director of the Cybersecurity department there at Bellevue. We exchanged emails for a little over a day. I started to realize if he was willing to give me the time of day without being a student of Bellevue, I could only imagine what kind of help I would get as a student. I made the decision to go with Bellevue no matter what. I contacted my enrollment advisor last Thursday (4/19) and told him that as soon as I received my paycheck on (4/26), I would be applying there at Bellevue. I also logged into my FAFSA (Financial Aid site) and placed Bellevue as the school to receive my information. I made a point in telling my advisor this as well in the email. The next morning, when I woke up, I had received an email from him stating that because I was showing extreme interest in the degree and school, he would wave the application fee. Needless to say, I immediately applied.
At this time, I am in limbo as a student. They are waiting on my transcripts from CTU and Kaplan. As soon as they come in, I should have no trouble getting accepted. Here is the information about their Cybersecurity degree, which is copied directly from their school site and just pasted below followed by their curriculum (classes) and descriptions of each class:
"The Master of Science in Cybersecurity program is designed to meet the high demand for Cybersecurity professionals in both the public and private sectors. Combining theory with active learning, the program provides a framework for protecting an organization's information and technology assets. The program is designed for professionals who want to build and expand their knowledge of protection and risk management techniques in the realm of cyber technologies. The program focuses on network and software security, risk management, protection mechanisms, business continuity planning, disaster recovery, and governance of information systems (Bellevue University, 2012)."
-
CIS 537 Introduction to Cyber Ethics
This course provides a brief overview of the field of ethics, computer privacy and security, computer crime and software piracy, intellectual property and information ownership, computers and gender, computers and social justice, and civil liberties in cyberspace. Additionally, ethical questions concerning professional codes of conduct and issues of moral responsibility for computer professionals are presented.
-
CIS 607 Computer Forensics
This course is designed as an overview of the investigative methods and tools associated with computer forensics. Topics include: processing crime and incident scenes, digital evidence controls, recovery of information, network forensics, data acquisition, and legal and ethical issues associated with investigations.
-
CIS 608 Information Security Management
This course addresses the issues relating to successful information security management. Topics include access control systems, network and software security, management practices, risk management, protection mechanisms, business continuity planning, and legal and ethical issues. The course allows for analysis of current security management models.
-
CYBR 510 Physical, Operations, and Personnel Security
This course presents an examination of effective security methodologies based on comprehensive assessment of threats and implementation of a layered system of physical and electronic protection. Threat identification, countermeasures, and prevention are explored.
-
CYBR 515 Security Architecture and Design
This course provides an introduction to the fundamental components of security architecture. Topics include computer organization; hardware, software and firmware components; open and distributed systems; and protection mechanisms. Discussion also includes certification and accreditation; formal security models; and evaluation criteria. Assigned projects include designing a model secure system.
-
CYBR 520 Human Aspects of Cybersecurity
This course provides an exploration of the human aspects of Cybersecurity. Topics include human behavior and interaction; motivation and influence; and social engineering. Emphasis on the human element of cyber incidents in relation to protecting information and technology assets.
-
CYBR 525 Ethical Hacking and Response
This course provides a technical study of offensive and defensive techniques for protecting cyber assets. Topics include security testing, risk mitigation techniques, and threat response. Discussion also includes penetration testing theory, techniques, and tools; network, systems, and application vulnerability scanning; risk analysis and response; and intrusion detection and response. Emphasis is placed on identification of system vulnerabilities and threats and techniques for preventing attacks.
-
CYBR 610 Risk Management Studies
This course provides an exploration of how organizations manage risks to information technology assets. Discussion includes the application of methodologies and models for managing such risks. Topics also include recognition of security threats and vulnerabilities and the analysis of associated risks. A systematic approach for acquiring and analyzing information to support decision-making in the protection of assets and the allocation of security resources is presented.
-
CYBR 615 Cybersecurity Governance and Compliance
This course provides an exploration of the governance of information systems. Discussion includes the importance of compliance with laws, regulations, policies, and procedures as a means of minimizing risk through mandated security and control measures.
-
CYBR 625 Business Continuity Planning and Recovery
This course provides an introduction to the processes associated with business continuity planning and disaster recovery. Topics include project scope and planning, assessing risk, developing policy and procedures, and conducting a business impact analysis. Discussion also includes disaster recovery plan development and implementation, and restoration.
-
CYBR 650 Current Trends in Cybersecurity
This course presents an in-depth study of current trends in Cybersecurity threats. Discussion includes the identification and management of threats and vulnerabilities within an effective enterprise security program. Prior Cybersecurity education is synthesized through projects and assignments.
- DET 630 Cyberwar and Cyberdeterrence
*The last class didn't copy and paste correctly hence the separation between the class and the description*
I'm hoping to make it very easy to get into the school once my transcripts come in. I have already submitted FAFSA information and signed a Master Promissory Note (Loans) for Bellevue. All that I will hopefully need to do is sign a few documents and register for my first class and I should be good to go. By the way, the first day of classes will be June 4.
This degree will help open many doors for me. This degree will help me better secure computers not only at one's home but business computers connected to the Internet. People who know me will also tell you that I am not too keen on possibly working for the government, but if this degree opens that door, well, I will have to weight the options when that door opens. Well, thanks for reading this blog. Comments are appreciated and I thank all in advance that do post comments. Thanks as well for taking the time out to read this blog.
No comments:
Post a Comment