UNCLASSIFIED NSA/DHS Centers of Academic Excellence in Cyber Defense Education For Four-Year (CAE-CDE) & Two-Year (CAE2Y) Institutions November 2015 UNCLASSIFIED
UNCLASSIFIED NSA/DHS CAE Goal Reduce vulnerability in our national information infrastructure by promoting higher education and research in CD and producing a growing number of professionals with CD expertise in various disciplines. UNCLASSIFIED 2
Knowledge Unit (KU) Terminology A detailed list of course topics and expected outcomes
CAE Knowledge Unit Requirements CAE CD & CAE2Y Fundamental core KUs: 11 Apply to CAE 2Y and CAE CD Secondary core KUs: 6 Apply to CAE CD Optional KUs: 47 CAE IA/CD Required to map to 5 * List of KUs can be found at www.iad.gov/nietp/caerequirements.cfm
Letter of Intent Cyber Defense Center CAE Program Requirements CAE CD & CAE2Y Cyber Defense Academic Program Student Research (4Y) Cyber Defense Faculty Cyber Defense is Multidisciplinary Institution Security Plans Outreach * Criteria can be found at www.iad.gov/nietp/caerequirements.cfm
Letter of Intent Identify POC Institutional Support Accreditation Information Any Pertinent Accomplishments
Cyber Defense Center Formal Documentation of Center Institutional Support of Center, Signed by a Dean or Higher Operational Link Website content: Program guidance; CD information; Collaboration, Cyber activities; CD resources; Conferences; Workshops; Competitions; News articles; etc.
Cyber Defense Academic Program Identify Department(s) Identify a clearly defined course path that map to core KUs + Focus Area KUs if identified. Choose best path, do not map multiple paths, additional paths can be explained in the comment section. Students must take that path! Provide evidence that students take those courses that map to the KUs (transcript, completion letter, certificate, etc.) Provide student enrollment/graduation in program for last 3 years Identify publications available to students in syllabus
Student Research (4Y) Research papers/projects by students, actual links 5 to 10 papers Must be from students in the course of study identified in criteria 2 Physical/Virtual Labs (Criteria 2 for 2Y) Description of labs Samples of lab projects or exercises Courses that require labs List of courses the require labs Link to labs from course syllabus
Cyber Defense Faculty Head of Cyber Defense program of study Job description CV or biography must identify that they teach at the applying institution Additional Full-time faculty Not identified above Shows depth and sustainability of program of study CV or biography must identify that they teach at the applying institution Part-time or Adjunct Additional faculty from other departments Industry experts CV or biography must identify that they teach at the applying institution
Faculty Publications Cyber Defense Faculty (4Y Only) Peer reviewed publications within 3 years, actual not subscription service Books or chapters of books Within 5 years; title, author, date; chapters Presentations Presentations at Cyber conferences within 3 years. Includes guest lecturer at government organizations or academic institutions Professional Societies Subject matter expert for professional societies, accrediting bodies, etc. Active in Cyber organizations. Within 3 years of application Grants Evidence of grants Support to Student activities Mentor for student clubs, exercises, etc.
Cyber Defense is Multidisciplinary Cyber concept taught in other fields of study Courses must be in a department separate from submitted program path; preferably non-technical like business, criminal justice, etc. Syllabus required with cyber content highlighted Non-cyber courses encourage papers or projects Courses submitted above require papers or projects Link to 5 to 10 actual papers, not subscription service; or substantial projects that have highlighted cyber content. Must be from at least 2 separate courses
Institution Security Plans Security plans and policies Links to plans and policies to show institutional security practices Cyber Security/Information Security Officer Name, title, job description Implementation Evidence of security practices Awareness, training, tutorials for faculty, staff and students User acknowledgements On-line help Etc.
Outreach Shared Curriculum/Faculty Examples; MOAs; collaboration; course info; etc. Reciprocity of credits Written agreements Sponsorship/participation in Exercises or Competitions Flyers; website rosters; emails from organizers; pictures; etc. CAE Collaboration Business/Industry Collaboration Internships? Speakers Community Outreach Help for the community at large
AK OR 2 CA 10 WA 4 NV HI - 2 ID 2 UT 1 AZ 4 MT WY NM 2 CO 5 ND SD 1 NE 2 TX 15 KS 3 OK 6 MN 6 IA 1 MO 1 AR 2 WI LA 3 IL 8 MS 1 IN 4 MI 5 TN - 4 AL 9 OH 4 KY- 2 WV 1 SC - 1 GA1 4 ME VT 1 2 - NH - 1 NY -MA 3 10 -RI - 1 - CT - 1 PA - 7 -NJ - 6 -DE - 1 -MD 16 - DC 2 FL 8 VA 7 NC - 6 64 CAE-R, 126 CAE-CDE, and 39 CAE-2Y, totaling 191 CAEs (40 are both CDE and R) in 44 states + District of Columbia and Commonwealth of Puerto Rico https://www.iad.gov/nietp/reports/cae_designated_institutions.cfm PR - 1
CAE Program Office askcaeiae@nsa.gov Resources Website Application https://www.iad.gov/nietp/index.cfm Resources and Requirements; Obtain account ATE Centers National CyberWatch Center - www.cyberwatchcenter.org/ CyberWatch West www.cyberwatchwest.org/ CSSIA - http://www.cssia.org/ CAE Community www.caecommunity.org