Вы находитесь на странице: 1из 14

Appendix E: Sample Certificate Program

Proposal
Share this post

Proposal for a Graduate Certificate in

Information Assurance Education – Track 2

Submitted

by the

College of Technology

Calumet Campus

Graduate Certificate Proposal


Information Assurance Education – Track 2
College of Technology

Purpose: In order to meet the demand for well prepared faculty to develop and teach
Information Assurance programs at Schools and universities across the nation, Purdue
University, Department of Computer Science has developed and implemented an 11
credit hour graduate certificate program for computer science faculty who want to
develop Information Assurance (IA) programs at their institutions. This was approved
by the Purdue University Graduate Council in November, 2002. However, there are a
considerable number of Information Technology (IT) faculty who also need a similar
program rooted in information technology. The purpose of this proposal is to develop
a parallel graduate certificate, offered by the College of Technology, but targeted on
IT faculty.
It should be noted, that there is existing grant support for this program. The National
Security Agency has funded Purdue University to offer academic programs in
Information Assurance Education for faculty members at higher education institutions
across the nation. The grant proposal was submitted by Melissa Dark (Principal
Investigator). However, we anticipate the graduate certificate program continuing
after the completion date of the NSA project, which is 9/30/05.

This (track 2) Information Assurance Education graduate certificate will prepare IT


faculty to integrate relevant IT security topics into their undergraduate and graduate
IT related degree programs. (Track 1 is targeted at CS and ECE faculty; details of
track one can be found in Appendix B). Track 2 will consist of 6 credit hours in
computer technology courses, 3 credit hours in computer science and 2 credit hours in
curriculum and instruction. Faculty from Purdue University will modify and upgrade
modules and units from existing technical courses offered at Purdue University to be
included in this certificate program. The graduate certificate will also address the
pedagogical knowledge and skills that faculty need to develop IA instructional
materials, and implement courses and modules into their academic programs.
Therefore, 2 credit hours in the program will be derived from a curriculum and
instruction course offered through the College of Education.

Target Audience: The target audience is faculty from Colleges and universities in the
areas of information systems, information science, information technology,
telecommunications, and networking.
Proposed Initiation Date: May, 2004
Admission Requirements
1. Faculty participants (these are the faculty who will participate as “students” in
the program) must be tenure-track or equivalent at an institution receiving
accreditation by an appropriate regional accrediting body.
2. U.S. citizenship required per National Security Agency specifications (note: NSA
is the program sponsor).
Completion Requirements
3
We are in the process of applying for a permanent graduate course number for this
class. If awarded, we anticipate the number being CPT 555.
4
This course will be taught as TECH 581 for the first time in Spring 2004. Thereafter,
we plan to apply for a permanent CPT number for the class.
The graduate certificate will require 11 credit hours: 6 credits hour of computer
technology courses, 3 credit hours of computer science, and 2 credit hours of
curriculum and instruction courses.

1. Course requirements (see Appendix A for more detail):


o CS 526 Information Security
o TECH 581x Network Security3
o TECH 581y Digital Forensics4
o EDCI 590 Design and Development of Instructional Materials and
Resources
o Only special sections of these courses, specifically taught for the
certificate program, may be used for this certificate.
2. GPA requirements – grade of B- is an acceptable grade if the overall GPA for
certificate courses is above 3.0.
3. No credits may be transferred from another institution toward this certificate.
4. No credits from undergraduate-level courses may be used toward the
certificate.
5. Completion of the certificate must occur within 3 years unless special
permission is granted by the Computer Technology Graduate Committee.
6. No credit hours taken prior to admission to the certificate program may be
counted toward completion of the certificate. Admission to the certificate
program must occur before any credit hours are earned towards the certificate.
Administration
In addition to complying with the requirements of the Purdue University Graduate
School, the following administrative requirements are proposed:

1. The audit process will be the responsibility of the CPT Graduate Committee or
its designee.
2. The certificate shall be awarded by the College of Technology.
Appendix A
Course Descriptions
CS 526 Information Security Basic notions of confidentiality, integrity, availability;
authentication models; protection models; security kernels; secure programming;
audit; intrusion detection and response; operational security issues; physical security
issues; personnel security; policy formation and enforcement; access controls;
information flow; legal and social issues; identification and authentication in local
and distributed systems; classification and trust modeling; risk assessment.

TECH 581x (CPT 555 anticipated) Network Security

This course will cover conceptual and technological aspects of network security for
voice and data networks. The course will deal with the analysis, design,
implementation and management issues surrounding effective network security.
Technology research and presentation of research results as well as security
technology implementation will be required course outcomes.

TECH 581y (CPT ZZZ anticipated) Digital Forensics

This course will introduce students to the fundamentals of computer forensics and
cyber-crime scene analysis. The various laws and regulations dealing with computer
forensic analysis will be discussed. Students will be introduced to the emerging
international standards for computer forensic analysis, as well as a formal
methodology for conducting computer forensic investigations.

EDCI 590 Design and Development of Instructional Materials and Resources


Instructional skills development; instructional analysis; instructional strategies;
producing implementing, and testing instructional materials, labs, case studies, and
problems; formative and summative evaluation; curriculum development; and
curriculum scope and sequence.

Prerequisites
Faculty participants (i.e. faculty students) need to have or secure the following
prerequisites:

CS 503 Operating Systems

Appendix B
Graduate Council Document 02-11c
Approved by the Graduate Council 11/21/02

Proposal for a Graduate Certificate in Information Assurance Education

Submitted

by the

Department of Computer Sciences

West Lafayette Campus

Information Assurance Education


Department of Computer Science, School of Science

Purpose: In order to meet the demand for trained faculty to develop and teach
Information Assurance programs at Schools and universities across the nation, Purdue
University will design, develop, and implement an 11 credit hour graduate certificate
program for School and university educators who want to develop Information
Assurance (IA) programs at their institutions. The National Security Agency has funded
a grant program to develop capacity to offer academic programs in Information
Assurance at higher education institutions across the nation. A grant proposal was
submitted by Melissa Dark (Principal Investigator) and Eugene Spafford (Co-Principal
Investigator) to develop a program to help address this need. Purdue University is one
of three universities selected.
The Information Assurance graduate certificate will consist of 9 credit hours in
computer science courses and 2 credit hours in curriculum and instruction. Purdue
University already has relevant graduate programs established (M.S. and Ph.D.
degrees in Computer Science, Multidisciplinary M.S. degree in Information Security,
M.A. and Ph.D. degrees in Curriculum and Instruction ). Faculty from Purdue
University will modify and upgrade modules and units from existing technical courses
offered at Purdue University to be included in this certificate program. The graduate
certificate will also address the pedagogical knowledge and skills that faculty need to
develop IA instructional materials, and implement courses and modules into their
academic programs. Therefore, 2 credit hours in the program will be derived from a
curriculum and instruction course offered through the College of Education.

Target Audience: The target audience is faculty from Colleges and universities in the
areas of computer sciences, mathematics, computer engineering, statistics, and/or
physics.
Relation to Other Certificate Programs: None of the students in this program will be
concurrently working toward a graduate degree.
Proposed Initiation Date: May, 2003
Admission Requirements
1. Faculty participants (these are the faculty who will participate as “students” in
the program) must be tenure-track at an institution receiving accreditation by
an appropriate regional accrediting body.
2. Faculty should be from the following departments: computer sciences,
mathematics, computer engineering, information science, statistics, and/or
physics.
3. This program is closed to non-faculty applicants. Therefore, students who are
currently admitted to a degree program will NOT be eligible to earn a
certificate.
4. U.S. citizenship required per National Security Agency specifications (note:
NSA is the program sponsor).
Completion Requirements
1. The graduate certificate will require 11 credit hours: 9 credits hour of
computer science courses and 2 credit hours of curriculum and instruction
courses.
2. Course requirements (see Appendix A for more detail):
CS 526

CS 555

CS 626

EDCI 590
3. GPA requirements – grade of B or better in every course.
4. No credits shall be transferred from another institution.
5. No credits from undergraduate-level courses may be used toward the
certificate.
6. Completion of the certificate must occur within 3 years unless waived by the
Computer Science Graduate Committee.
7. Courses may NOT be applied toward more than this certificate.
8. No credit hours taken prior to admission to the certificate program may be
counted toward completion of the certificate. Admission to the certificate
program must occur before any credit hours are earned towards the certificate.
Administration
In addition to complying with the requirements of the Purdue University Graduate
School, the following administrative requirements are proposed:

1. The audit process will be the responsibility of the CS Graduate Committee or


its designee.
2. The certificate shall be awarded by the CS Graduate Committee or its
designee.
5
According to S. Fahmy regarding CS 503 as a prerequisite for 526, if students do not
need TCP/IP code and the experience building an operating system, then CS 354
would be a sufficient prerequisite for CS 526. According to M. Atallah, this is not
required in CS 526. Therefore, for this program, CS 354 should be a sufficient
prerequisite for CS 526.
Appendix A
Course Descriptions
CS 526 Information Security Basic notions of confidentiality, integrity, availability;
authentication models; protection models; security kernels; secure programming;
audit; intrusion detection and response; operational security issues; physical security
issues; personnel security; policy formation and enforcement; access controls;
information flow; legal and social issues; identification and authentication in local
and distributed systems; classification and trust modeling; risk assessment.

CS 555 Cryptography

Concepts and principles of cryptography and data security. Cryptography (secret


codes): principles of secrecy systems; classical cryptographic systems, including
Vigenère and Vernam ciphers; the Data Encryption Standard (DES); public-key
encryption; privacy-enhanced email; digital signatures. Proprietary software
protection; information theory and number theory; complexity bounds on encryption;
key escrow; traffic analysis; attacks against encryption; basic legal issues; e-
commerce; the role of protocols.
CS 626 Advanced Information Assurance Advanced topics in information assurance,
including selections from the following: penetration testing, formal verification of
systems, formal models of information flow and protection, distributed system
authentication, protocol design and attack, computer viruses and malware, intrusion
and anomaly detection models, multi-level security, active defenses, investigation
and forensics, network firewalls, anonymity and identity, e-commerce support,
database security models and mechanisms.

EDCI 590 Design and Development of Instructional Materials and Resources

Instructional skills development; instructional analysis; instructional strategies;


producing implementing, and testing instructional materials, labs, case studies, and
problems; formative and summative evaluation; curriculum development; and
curriculum scope and sequence.

Prerequisites
Faculty participants (i.e. faculty students) need to have the following prerequisites:

 CS 3545 or equivalent.
 MA 351 or equivalent.
 CS 251 or equivalent.
 CS 381 or equivalent.
 CS 426 or equivalent.
Graduate Certificate Program in
Information Technology for Management

Description
Technology is dramatically changing our economy and our society. Today’s decision-makers need a firm
grasp of information technologies so as to function maximally within traditional business disciplines. The
successful manager must be in command of the requisite tools to access, monitor, analyze and apply
company information and knowledge--technologically. The U.S. Bureau of Labor Statistics points to very
strong call, and only to grow stronger, for leaders across fields with significant technical skills. The
University of Atlanta’s program is designed for any individual in a management role (middle, senior,
executive levels) who seeks a better understanding of Information Technology applications and who will,
as a result of these complementary skills, be empowered to manage information in a more pliable fashion
tied to maximized outcomes.

The program is based on the firm and documented contention that information technology is one of the
key drivers of business in the twenty-first century, providing new sources of revenue and opportunity to
change dramatically a firm’s cost structure. In brief, IT has become inextricably intertwined with corporate
strategy.
 Program Objectives
 Curriculum
 Requirements

The Graduate Certificate in Information Technology for Management is designed to complement your
current level of IT experience and improve your leadership and management skills within the corporate (or
organizational) environment. Advanced level courses are interdisciplinary to meet the needs of a diverse
industries, while focusing on several core competencies. The Program (including the final, intensive
project) is designed so that graduates will ideally:

 Understand the basic structure, driving forces of change, performance characteristics, and
strengths and weaknesses of the current Information Technology within the management arena.
 Improve critical thinking and communication skills in framing, analyzing, and interpreting the
meaning and consequences of strategy and decision-making based on enhanced knowledge of, and
access to, IT data and other IT applications.
 Develop the ability to compare, contrast, and appreciate diverse interpretations of IT as it impacts
performance, structure and management.
 Recognize and analyze current and emerging trends in IT that directly impact management,
leadership and change.
 Be prepared to address many of the major issues and challenges faced by management and
which IT can readily facilitate, if not resolve.
 Employ appropriate problem assessment and resolution tools – that is in the application of IT
knowledge to the managerial realm.
 Recognize the applications and limits of analysis and decision-making models, with and without
IT components.
 Begin to develop the ability to structure decisions bearing on structure, efficiency, models and
productivity based on the applications of augmented understanding of IT within the managerial arena
This intensive four-graduate-course program presents realistic strategies in an array of critical areas for
the application of IT and leadership. The courses are delivered on-line learning with interaction among
peers, advisors, academic and student services facilitators and, of course, field-specialists (all
participating faculty hold the Ph.D. and have extensive experience and accomplishments both in the
corporate arena and in the sphere of Information Technology). Course content, graded assignments and
shared discourse are all designed to provide readily-usable systems and strategies for the significant and
ever-increasing challenges of IT applications to management and leadership.
Courses positively exploit fine Internet features -- threaded discussions, chat, bulletin boards, e-mail, file
sharing, and more for in-depth participation. You also have online library privileges, with instant search
and retrieval of important databases, and the counsel of authoritative figures to lead you in the right
directions.
The fourth and final course (BA 700) is a Research Project course, which allows each participant to
produce a substantive and significant work focused upon his or her specialized interests within the broad
field of IT as it informs and shapes new models of management. Once the proposal is approved, a group
of highly-qualified faculty will provide guidance from start to finish to maximize the value of the experience
and to foster successful (and meaningful) conclusion.

Further Study Options Beyond the Graduate Certificate


tatement of Purpose
The purpose of the Information Technology Programming and Software Development option is to
prepare qualified individuals for entry-level positions in computer related fields by providing hands-on
instruction in programming and operations/ administration.

Learning Outcomes
At the completion of the Programming and Software Development plan of study the student will be
able to:

1. Construct a diagram of a solution which follows structured programming guidelines


and produces the expected results.

2. Code, test and debug entry-level computer programs using an appropriate computer
language and techniques.

3. Analyze the current processes in an existing computer program and revise the
program so that it performs as required.

4. Create an object-oriented class structure, with corresponding properties and


methods.

5. Create a Web site consisting of several pages, with hyperlink navigation between the
pages.

6. Create a flexible database schema and analyze the schema to 3rd normal form.

7. Design effective and efficient queries to retrieve data from a database.


Computing and Information Technology Courses
Learning Outcomes

What do students learn to do in the computing and information technology program?


Our program combines a solid foundation in computing and information technology with
the abilities developed through a strong liberal arts approach to learning. Students
develop key abilities such as analysis, effective communication, ethical valuing, and
problem solving.

In computing and information technology you develop:


1. The ability to solve problems. You learn to effectively use computing and information
technology frameworks to develop communication and technology solutions to a variety
of problems.
2. The ability to analyze. You learn how to analyze and create systems to accomplish
tasks. You learn how to evaluate rapidly evolving trends and to integrate knowledge
from appropriate fields to make effective and ethical technology decisions.
3. The ability to communicate. You effectively communicate about technical systems to
a variety of audiences. You facilitate the implementation of technology by articulating
technical issues and their impact on individuals, organizations, and society as a whole.
Courses

CIT 200 Foundations of Computing and Information Technology 3 credits


Wonder why sometimes your computer works more slowly than at other times? Want to
learn how your computer really works so you can troubleshoot it? Need to use
PowerPoint for a speech? The answer to these questions is just part of what a student
learns in this course. She learns how a computer works and how information is saved
on a computer and on external devices. She extends her knowledge of word
processing, spreadsheets, and databases, along with graphics. In addition, she
explores ethical issues regarding technology.

CIT 250 Programming Fundamentals 3 credits


In this introductory programming course, students will learn to use the fundamentals of
the current programming language(s) to solve problems from a variety of areas. We will
cover language syntax and format to analyze its appropriate application to specific
problems. Students will use structured and object oriented programming techniques as
they define and implement a computer solution.

CIT 280 Introduction to Databases 3 credits


In this introduction to database course, students work to understand the basics of data
and its appropriate relationships including tables, records, fields, data types, keys, and
entity relationships. Students learn how to analyze basic problems for a database
solution. Students analyze client needs and data to create a model for database
implementation. Using a case study, students work collaboratively and independently to
analyze, synthesize, and evaluate their database models.
CIT 300 Computer Components 3 credits
This course provides the technical framework needed to understand the structure and
operation of computer hardware and software. The student studies computer hardware
and systems architecture from an advanced user standpoint. She works in teams to
disassemble and assemble a component computer, to install an operating system, and
to troubleshoot both hardware and software problems. She also explores and learns the
components of a home network, how they interact, and how to troubleshoot.

CIT 376 Systems Analysis and Design 3 credits


The student takes a practical approach to study and apply established principles of
analysis and design of information systems. Using interviewing techniques, process
charting, screen and report design, proposal writing, program specifications, and
process walkthrough, she designs an information system for a client and presents her
proposal to the class.

CIT 383 Internship 2 credits


The student develops the ability to apply classroom learning to a concrete work situation
and at the same time develops her skills in reflecting on and conceptualizing learning
that comes from work experience. Emphasis is also placed on developing the ability to
assess oneself as a key ability in "learning how to learn" from any work experience.

CIT 399 Introduction to Advanced Work 0 credits


The Advanced-Level Event marks a significant accomplishment for each student as she
proceeds into the work of her major department. When a department determines that a
student is ready for advanced work within a discipline, the student is invited to
participate in a ceremony that is both a celebration and an explanation of future
requirements of the major and support areas. She registers for this experience at a
point determined by her major department: for most majors the registration is connected
to the taking of a particular course. Students and faculty gather for an afternoon during
Mid-semester Assessment Days. Following a general program, students meet in
departmental sessions with their faculty to discuss advanced outcomes, department
courses, advising procedures, and so on.

CIT 420 Integrative Systems 3 credits


This practicum offers an application of previously studied theories, processes,
frameworks, and technologies. Integrative systems in computing is the process of
linking together different technologies and software applications physically or
functionally to act as a coordinated whole.

CIT 470 Advanced Database 3 credits


In today's competitive world, accessing a variety of information for ad hoc decision-
making, as well as day-to-day management is critical. Databases and database queries
provide the user with tools to efficiently and effectively store and access information.
Students study and apply the principles of sound database design and analyze common
models upon which database management systems are based. The students use a
relational database and structure query language (SQL) to design and create database
solutions.

CIT 490 Project Management 3 credits


In this capstone course, the student manages a final semester-long project in which she
synthesizes her learning in the major. The course follows Project Management Institute
guidelines for project management, giving the student a comprehensive overview of the
components that encompass information technology project management. She defines,
controls, and manages her project. She investigates project organization and structures
while working on financial issues in project management. She becomes familiar with
and applies terms, definitions, and common acronyms used in project management to
her own capstone project. She also researches project management career paths,
professional organizations, and national certifications.

Electives

CIT 267 or CIT 268 Introduction to Programming 4 credits


In this introductory programming course, students learn to use the fundamentals of the
Java/VB language to solve problems from a variety of areas. The foundation for this
problem solving is formed by Java/VB language syntax and the analysis of its
appropriate application to specific problems. Students will use object-oriented design
and programming techniques as they define and implement software solutions.

CIT 270 Web Design 3 credits


The student explores the frameworks and principles of web design--its production,
implications, and impact as a communication tool. She works with Dreamweaver,
studying HTML code as she designs and implements web pages. She explores
Photoshop to create graphics and digitized pictures. Using a variety of hardware,
software, and computer platforms, she applies her expertise in web design to create a
website for a client.

CIT 284 Spreadsheet Analysis and Design 3 credits


Used by professionals including accountants, business people, and scientists, a
spreadsheet is a very powerful tool for storing, manipulating, and charting numbers. The
focus of the course is in mining and analyzing data for the purpose of making business
decisions including information calculations, trends, patterns, and other business
analysis.

CIT 359 Computer Graphics 3 credits


This course offers the opportunity to learn how to use graphic computer hardware and
Adobe Illustrator and Photoshop programs in computerized designing, painting, and
photo editing.

CIT 368 Dynamic Web Pages 3 credits


This class will offer students an opportunity to examine the process of developing
dynamic web pages for the web. Students will learn both client side and server side
connectivity techniques. Students will apply their understanding of connectivity to
develop dynamic applications for the Internet.

CIT 372 Advanced Web Design 3 credits


Students expand their knowledge and understanding of web page layout, design, and
implementation, focusing on usability. Expanding on their knowledge from CIT 270 Web
Design, students work to understand and implement advanced topics of web design
including positional cascading style sheets, behaviors, libraries, and analytics. They
work to deepen their understanding of and ability to work with, create, and manipulate
web graphics using Photoshop. Using a variety of hardware, software, and computer
platforms, students incorporate their expertise in web design as they define, analyze,
design, and implement a website for a client of their choice.

Вам также может понравиться