Thursday, May 31, 2012

On Sunday/Monday at Midnight, I finally gained access to my first two courses.  This would make it 7 full days of access for those reading this blog for informational purposes.  I was told 2 days when I enrolled, but found later that it would be between 5 to 7 days prior to the first day of class.  Anyway, I have had the time to play around in each class setting and I have to say that I am pretty stoked to get started.  The discussion boards are not set up yet and will not be until the first day of class.  I have been able to take a glance at my final project for my Intro to Cyber Ethics course and I already have ideas flowing through my head.  I must come up with a current IT ethics concern and then present it as a case study.  I must also create a commercial to help promote it to the rest of the class and professor.  I have no access to my final project in my Information Security Management class as of yet.  Other than that, no new news to pass along about my classes.  Thanks for reading.

Wednesday, May 23, 2012

On June 4th 2012, I will begin my new journey.  I will be attending Bellevue University for their Master of Science in Cybersecurity degree.  The degree has 12 classes and focuses on securing computer data.  The classes follow, along with a corresponding link to their appropriate blog. 

Information Security Management
http://informationsecmanagement.blogspot.com/

Introduction to Cyber Ethics
http://introtocyberethics.blogspot.com/

Security Architecture and Design
http://securityarcitectureanddesign.blogspot.com/

Physical, Operations, and Personnel Security
http://physicaloperationsandpersonnelsec.blogspot.com/

Risk Management Studies
http://riskmanagementstudies.blogspot.com/

Human Aspects of Cybersecurity
http://humanaspectsofcybersecurity.blogspot.com/

Computer Forensics
http://cis607computerforensics.blogspot.com/

Cybersecurity Governance and Compliance
http://governanceandcompliance.blogspot.com/

Business Continuity Planning and Recovery
http://continuityplanningandrecovery.blogspot.com/

Cyber Warfare and Deterrence
http://warefareanddeterrence.blogspot.com/

Ethical Hacking and Response
http://ethicalhackingandresponse.blogspot.com/

Current Trends in Cybersecurity
http://currenttrendsincybersecurity.blogspot.com/


Only the first two in the list are in order at the moment in how I will be taking them.  The others are yet to be decided.  Also, at this time, from what I have been told, only the first and last class in this degree have a blog requirement.  The others in between are just recommended.  I will try to blog a bit in each class, but I am not going to set it in stone that I will.