Access your Pro+ Content below.
Information assurance training programs create new cadre of IT security pros
This article is part of the February 2013/ Volume 15 / No. 1 issue of Information Security magazine
Recognizing that individuals proficient in computer security are in high demand, colleges and universities have begun producing students with degrees in information assurance. When compared with other disciplines that have been in existence for 150 or more years at the institution, information assurance training programs are seen as the “new kids” on the academic block. The first schools to teach security courses began doing so in the 1990s, and they started offering degree programs in 2000. At approximately the same time, 1999, the government, specifically the National Security Agency, created the Centers of Academic Excellence (CAE) program as a way to entice a larger number of universities to produce security professionals. In 2000, seven schools met the government’s criteria and were designated as charter CAE schools; Iowa State University was one of the original seven. Since that time the number of CAE schools has grown to more than 150 schools that range from two-year colleges to research-focused institutions. Due to the ...
Access this PRO+ Content for Free!
By submitting your email address, you agree to receive emails regarding relevant topic offers from TechTarget and its partners. You can withdraw your consent at any time. Contact TechTarget at 275 Grove Street, Newton, MA.
Features in this issue
Cover story: The U.S. government says Chinese IT giants Huawei and ZTE pose too much risk. But do they? Joel Snyder offers his take.
2013 IT security trends reveal mobile device security tops the list of priorities for security pros this year.
Allowing employee-owned mobile devices doesn’t have to mean accepting all BYOD risks. Infosec pros share their BYOD security strategies.
News in this issue
Going on the offense doesn’t mean actively targeting cybercriminals, experts say. Deceptive tactics, phony documents can help trip up attackers.
Columns in this issue
Information Security Magazine reveals the results of its 2013 Security Priority Survey and examines the security risks associated with purchasing IT hardware from China. Elsewhere in the issue, infosec pros share their strategies for BYOD security.
University information assurance programs are varied, but they are beginning to provide technology disciplines a level of security knowledge.
No ultimate test can give third-party software a clean bill of health, but careful assessment can help organizations gain more control over vendors.