logo

JobNob

Your Career. Our Passion.

Cyberspace and Cybersecurity Adjunct Faculty


University of Maryland Global Campus


Location

Smart working | Italy


Job description

Adjunct Faculty

Cyberspace and Cybersecurity 

Graduate School

UMGC Stateside

Location: Remote

University of Maryland Global Campus (UMGC) seeks adjunct faculty to teach in the Cyberspace and Cybersecurity program. Specifically, we are seeking faculty to teach the following courses:

CTCH 605: INTRODUCTION TO CYBERSECURITY

Gain knowledge of the foundations of cybersecurity, and apply cyber methodologies to cyber architectures, services, protocols, algorithms, software components, and programming languages. Become familiar with the important role that security management practices, security architecture, operations security, and physical security play in cybersecurity. Explore the impact of cyber terrorism and national security on cybersecurity. Gain hands-on, real-world experience with state-of-the-art tools and technologies in a lab-intensive environment.

CTCH 615: CYBERSECURITY THREATS AND ANALYSIS

An introduction to tools and tactics to manage cybersecurity threats, identify various types of common threats, analyze organizational exposure to threats, and collect and analyze cybersecurity intelligence. The goal is to provide hands-on exercises to analyze common security failures and identify specific design principles that have been violated. The coursework emphasizes the interaction between security and system usability and the importance of minimizing the potential for harm by modern threats, attacks, and usability challenges.

CTCH 625: CYBERSECURITY FOR SYSTEMS AND NETWORKS

A study of key security issues and procedures in systems and networks. The objective is to identify security issues of LANs, WANs, and network operating systems; identify threats to the system and network infrastructure design weaknesses; determine security flaws in the network infrastructure protocols; explain the security of data at rest in systems; and modern systems and network hardening tools, techniques, and practices.

CTCH 635: CYBERSECURITY ATTACK PREVENTION STRATEGIES

A comprehensive study of specific information regarding targeted cyber-attacks, including advanced persistent threats. The aim is to plan and prepare for, respond to, and recover from targeted cyber-attacks. The objective is to fill the gap in threat-specific training for cybersecurity as a community-driven course that focuses on the phases of targeted cyber-attacks and the attacker methods used during each phase. Participants will also receive valuable information on cyber-attack prevention, mitigation, and response.

CTCH 645: CYBERSECURITY EXPLOITATION METHODOLOGIES

A comprehensive study of the major areas of cyber exploitation methodologies. The objective is to identify the latest tools, techniques, and ethical hacking practices. The goal is to apply state-of-the-art tools and technologies in a lab-intensive environment that provides hands-on, real-world experience.

CTCH 655: CYBERSECURITY AUDITING AND MONITORING SYSTEMS

Employ technological solutions that identify, catalog, and triage cyber-attacks. Utilize host-based monitoring, auditing, network intrusion detection and prevention, and report generation tools. Use state-of-the-art tools and technologies in a lab-intensive environment that provide hands-on, real-world experience.

CTCH 660: CYBERSECURITY ATTACK INCIDENT AND ARTIFACT GATHERING

Develop the skills to conduct incident response investigations. The objective is to apply a dynamic incident response process to evolving cyber threats, and how to develop threat intelligence to mount effective defense strategies. Evaluate how attackers scan, exploit, pivot, and establish persistence in the cloud and conventional systems. The Cyber Incident Response course will give students an understanding of how incidents are responded to at a high level and allow them to build important technical skills through the hands-on labs and projects. Topics include a high-level discussion of what happens at each phase of responding to an incident, followed by a technical deep dive into some of the more exciting parts of memory, network, host analysis, and forensics.

CTCH 665: DIGITAL FORENSICS AND INCIDENT RESPONSE

A detailed exploration of the tools and technologies commonly used in forensic examinations and utilizing best practices. Explore procedures for securing and validating evidence, including digital media and physical memory, as well as for recovering artifacts and analyzing, reporting, and presenting results in both criminal and civil situations. Gain experience with mobile forensic analysis.

CTCH 685: SOFTWARE SECURITY

A comprehensive evaluation of software security vulnerabilities and threats in software exploitations. Topics include buffer overflows, SQL injection, and session hijacking. Further, learners will develop defensive methodologies to prevent or mitigate these attacks, including advanced testing and program analysis techniques.

CTCH 690: CYBERSECURITY TECHNOLOGY CAPSTONE

A comprehensive evaluation of issues in cybersecurity technology, including enterprise risk management, vulnerability assessment, threat analysis, crisis management, security architecture, security models, security policy development and implementation, security compliance, information privacy, identity management, incident response, disaster recovery, and business continuity planning, particularly in the health, banking, and finance sectors.

SPECIFIC RESPONSIBILITIES INCLUDE:

·Teaching graduate level students within Cyber Security specializations using a wide range of technology solutions.

·Topics include cyber architecture, cyber services and mechanisms, protocols, algorithms, hardware components, software components, secure programming techniques, cryptographic techniques, business continuity planning, security management practices, security architecture, operations security, physical security, cyber terrorism, and national security. Teaching topics also include cybersecurity protection and prevention strategies and intrusion detection and prevention in cyberspace.

·Providing students with an engaging and challenging environment to learn and develop technology hands-on skills.

REQUIRED EDUCATION AND EXPERIENCE:

·An earned Masters degree from a regionally accredited institution

·Active in the cybersecurity field

·Industry experience with network operations, cybersecurity, information security, computer security, and/or information assurance

·Strong understanding and experience with network/security technology

·Understanding of adult learning, and utilizing technology within the online and on-site classroom

PREFERRED EDUCATION AND EXPERIENCE:

·Terminal degree preferred from a regionally accredited institution

·Prior graduate teaching experience and experience with online teaching environments

Who We Are and Who We Serve

UMGC—one of 12 degree-granting institutions in the University System of Maryland (USM)—is a mission-driven institution with seven core values that guide us in all we do. At the top of the list is "Students First,” and we strive to do just that for our 90,000 students at home and abroad. From its start in 1947, UMGC has demonstrated its commitment to adult learners. We recognize that adult students need flexibility and options. UMGC is proud to be a global, 24-hour, institution of higher learning. 

The typical UMGC student is an adult learner juggling a career, family, and other priorities. Roughly 80% work full time, half are parents, and half are minority students. They are continuing their education to better themselves, their families, and their professional opportunities. UMGC is also a leading higher education provider to the U.S. military, enrolling 55,000 active-duty service members, reservists, National Guard members, veterans, and family members annually. We are proud of our military heritage and are committed to this service. 

The Adjunct Faculty Role at UMGC

UMGC is committed to helping students achieve success not only with us but also in their professional fields. As a result, we actively seek faculty members who are scholar-practitioners: professionals who are actively and successfully engaged in their field and who additionally wish to help the next generation of professionals grow in their knowledge and expertise through education.  Your role as an adjunct faculty member will be to: 

Faculty Training at UMGC

We are committed to your professional success at UMGC. Each new faculty member is required to complete our online two-week new faculty orientation, FacDev 411, as a condition of hire.  

Position Available and will Remain Open until Filled

Salary Commensurate with Experience

Adjunct faculty candidates will be required to provide official transcripts during the candidate selection process

All submissions should include a cover letter and resume. UMGC offers competitive compensation and comprehensive benefits for qualifying positions, such as tuition remission, generous leave and healthcare. For detailed benefits information, please visit: .


Job tags



Salary

All rights reserved