cart

Membership Portal

Join Login

Membership and collaboration facilitated by Member 365.

Membership Portal

Join Login

Membership and collaboration facilitated by Member 365.

Archives

Presentations

A Qualitative Analysis of Best Practices in IA Online Synchronous Instruction
Author:
Helen Barker, Jason Pittman
Date:
01 July 2012
Building A Program to Support The Next Generation Digital Forensicator
Author:
Mark McKinnon
Date:
01 July 2012
Certifying a Textbook Under NSTISSI 4011
Author:
Richard Smith
Date:
01 July 2012
CISSE K-12 Cybersecurity Working Group - Report
Author:
Les Barnett, Steven Fulton, Mark Hufe, Matt Pirko, Davina Pruitt-Mentle, Alec Yasinsac
Date:
01 July 2012
Confirmation Bias & Causality - How to Stop Doing the Things in Security That Don't Work
Author:
Michael A. Davis
Date:
01 July 2012
Conversation with the Colloquium
Author:
Dr. Deborah Frincke
Date:
01 July 2012
Cyberattacks on SCADA Systems
Author:
Guillermo Francia, David Thornton, Thomas Brookshire
Date:
01 July 2012
Developing a Blended Computer Security Course
Author:
William Young
Date:
01 July 2012
Engaging Students through Reflective Practice Assessment within a Software Security Lifecycle
Author:
Elena Sitnikova, Ray Hunt
Date:
01 July 2012
Formal Verification for Mission Assurance in Cyberspace: Education, Tools, and Results
Author:
Shiu-Kai Chin, Erich Devendorf, Sarah Muccio, Susan Older, James Royer
Date:
01 July 2012
Hands-on Laboratory Exercises for Teaching Software Security
Author:
Xiaohong Yuan, Bill Chu, Huiming Yu
Date:
01 July 2012
Hardening The Computing Landscape: Toward A High Assurance Private Cloud
Author:
Tom Rochat, Sam Chung, Barbara Endicott-Popovsky
Date:
01 July 2012
High School 12-Week Cybersecurity eLearning Pilot
Author:
Duke Ayers, Myoki Spencer
Date:
01 July 2012
HIPAA Compliance: How do we get there? A Standardized Framework for Enabling Healthcare Information Security & Privacy
Author:
Brian Coats, Subrata Acharya, Arpit Saluja, Dale Fuller
Date:
01 July 2012
Integrating IT Security Auditing to IA Curriculum
Author:
Zhixiong Chen
Date:
01 July 2012
National Initiative for Cyber-Security Education
Author:
Dr. Ernest McDuffie
Date:
01 July 2012
National Science Foundation Programs Supporting Cybersecurity Education and Workforce Development
Author:
Dr. Corby Hovis, Dr. Victor Piotrowski
Date:
01 July 2012
Professionalizing the Cybersecurity Workforce
Author:
Anji Curry, Chelsea Pickens
Date:
01 July 2012
Providing “real world” experiences for security students
Author:
Margaret Leary
Date:
01 July 2012
Provisioning Secure Coding Curricular Resources: Toward Robust Software
Author:
Barbara Endicott-Popovsky
Date:
01 July 2012
Security Vulnerabilities in the open source Moodle eLearning System
Author:
Steven Fulton, Colton Floyd, Tyler Schultz
Date:
01 July 2012
Strategies to increase female enrollment and retention in Information Security Programs
Author:
Deanne Cranford-Wesley, Alfreda Dudley
Date:
01 July 2012
Teaching Network Security Using VITAL
Author:
Efstratios Gavas, Keith O’Brien
Date:
01 July 2012
Teaching Stateless and Stateful Firewall Packet Filtering: A Hands-on Approach
Author:
Zouheir Trabelsi
Date:
01 July 2012
The Joint ACM and IEEE/CS Computing Curricula Computer Science 2013
Author:
Ronald Dodge, Beth Hawthorne, Remzi Seker
Date:
01 July 2012
What the roll-out of the NICE Cybersecurity Framework means to you!
Author:
Peggy Maxson, Dr. Mike Koehler
Date:
01 July 2012
When Good Ninjas Turn Bad: Preventing Your Students from Becoming the Threat
Author:
Thomas Cook, Gregory Conti, David Raymond
Date:
01 July 2012
 
 
Powered by Phoca Download

The Colloquium recognizes that the protection of information and infrastructures that are used to create, store, process, and communicate information is vital to business continuity and security. The Colloquium's goal is to work together to define current and emerging requirements for information assurance education and to influence and encourage the development and expansion of information assurance curricula, especially at the graduate and undergraduate levels.


giving

Save money and support the Colloquium for Information Systems Security Education.


Recent Posts