Full-text resources of CEJSH and other databases are now available in the new Library of Science.
Visit https://bibliotekanauki.pl

PL EN


Journal

2017 | 4 (71) | 64-78

Article title

Certificate Programs in Computer Networks, Security, and Cloud Computing in the USA - A Review

Content

Title variants

Languages of publication

PL

Abstracts

EN
The computer networks and security topics have been covered traditionally by computer science and information sciences and technology academic programs at numerous universities and colleges around the country. These themes have been the subject of specific courses within the respective undergraduate academic majors, graduate programs and certification programs. With the rapid advancement in computer technologies and their applications, the business world created the demand for specialists with appropriate knowledge and skills set associated with computer networks, cybersecurity, and recently added cloud computing services. To satisfy the job requirements often in niche areas, many certification programs were created by industry and academia, which complemented the 2-year or 4-year academic programs. The certification programs either augment skills set developed by academic degree programs or provide skilled workforce upon completion of relatively short in duration education or training programs through certification processes without completing lengthy academic degree curricula.

Keywords

Journal

Year

Issue

Pages

64-78

Physical description

Dates

published
2017

Contributors

References

  • Amazon, http://www.amazon.com.
  • Balakrishnan, V. (2010). Trust Enhanced Security Framework For Mobile Ad Hoc Wireless Networks. Sydney: Ph.D. Thesis. Dept. of Computing. Macquarie University.
  • Beasley, J., & Nilkaew, P. (2012). Networking Essentials. 3rd ed. Indianapolis: Pearson Education.
  • Boyd, R. & Proudfoot, J. (2014). Applied Information Security, a Hands-on Guide to Information Security Software. New York: Prentice-Hall.
  • Cisco, http://www.cisco.com.
  • Clark, D. (2016). MOOCs: Course Completion is the Wrong Measure of Course Success. Retrieved from https://www.class-central.com/report/moocs-course-completion-wrong-measure/).
  • Claycomb, W.R. (2012). Tutorial: Cloud Computing Security, Retrieved from https://resources.sei.cmu.edu/asset_files/Presentation/2012_017_001_52439.pdf.
  • CompTIA, https://certification.comptia.org.
  • Coursera, https://www.coursera.org.
  • Cyberdegrees, http://www.cyberdegrees.org.
  • DELL, https://education.emc.com/content/emc/en-us/home.html.
  • Dickson, B. (2016). 10 Hot Cyber Security Certifications for 2017. IT Career Finder. Retrieved from https://www.itcareerfinder.com/brain-food/blog/entry/10-hot-cyber-security-certifications-for-2017.html.
  • edX, https://www.edx.org.
  • EITCI European Information Technologies Certification Institute, http://eitci.org.
  • EXIN, https://www.exin.com.
  • Florentine, S. (2017). The most valuable cloud computing certifications today. Retrieved from https://www.cio.com/article/3207553/certifications/the-most-valuable-cloud-computing-certifications-today.html.
  • Fortinet (2017). Mapping the Ransomware Landscape. Retrieved from https://www.fortinet.com/demand/gated/mapping-ransomware-landscape.html.
  • Gapinski, A. (2003). A Note on LAN, ATM Technologies, and Priority Queuing. Proceedings of International Conference on Industry, Engineering & Management Systems (IEMS). Florida. 515-519.
  • Gapinski, A. (2005). A Note on Teaching Cisco Routers. Proceedings of IEMS'2005. Florida. 137-141.
  • Gapinski, A. (2014). Strategies for Computer Networks' Security. Business Administration Quarterly, 32(3), 59-65. Retrieved from https://przedsiebiorstwo.waw.pl/resources/html/article/details?id=59512.
  • Gapinski, A. (2015). Cloud Computing: Information Security Standards, Compliance and Attestation. Proceedings of International Conference on Engineering and Technologies (LACCEI). Santo Domingo. Retrieved from www.laccei.org.
  • Gapinski, A. (2016a). Cloud Computing Services: Status and Trends. e-mentor, 64(2), 70-78. http://dx.doi.org/10.15219/em64.1241
  • Gapinski, A. (2016b). Developing a Certificate Program in Computer Networks Technologies, Security, and Cloud Computing Services. Proceedings of World Engineering Education Forum (WEEF) Conference. Seoul.
  • Gapinski, A. (2017). Automation and its Effect on STEM Occupations. Economic and Ethical Impact. Research in Logistics and Production. 7(5), 391-407. http://dx.doi.org/10.21008/j.2083-4950.2017.7.5.1
  • Georgetown University School of Continuing Studies, https://scs.georgetown.edu/.
  • Global Information Assurance Certification (GIAC), http://www.giac.org.
  • Grobauer, B., Walloschek, T., and Stöcker, E. (2011). Understanding Cloud Computing Vulnerabilities. IEEE Computer and Reliability. IEEE Security & Privacy, March/April 2011. http://doi.ieeecomputersociety.org/10.1109/MSP.2010.115
  • Half, R. (2017). Which IT certification are most valuable? Retrieved from https://www.roberthalf.com/blog/salaries-and-skills/which-it-certifications-are-most-valuable.
  • Harfoushi, O., Alfawwaz, B., Ghatasheh, N., Obiedat, R., Abu-Faraj, M., & Faris, H. (2014). Data Security Issues and Challenges in Cloud Computing: A Conceptual Analysis and Review. Communications and Network, 6(1), 15-21. http://dx.doi.org/10.4236/cn.2014.61003
  • Homeland Security (2017). Cybersecurity Questions for CEOs. Retrieved from https://www.us-cert.gov/sites/default/files/publications/DHS-Cybersecurity-Questions-for-CEOs.pdf.
  • IACIS International Association for Computer Information Systems, http://www.iacis.org.
  • IDC Enterprise Panel (August 2008).
  • IEEE Computer Society, http://www.computer.org.
  • Information Systems Audit and Control Association (ISACA), https://www.isaca.org.
  • Kizza, J.M. (2013). Guide to Computer Network Security. Springer-Verlag. London.
  • Lindros, K. (2016, December 28). 5 Great 'Starter' Cybersecurity Certifications. Business News Daily. Retrieved from http://www.businessnewsdaily.com/9661-cybersecurity-certifications.html.
  • Massive Open Online Courses, http://www.cyberdegrees.org/resources/free-online-courses/.
  • Merriam-Webster, https://www.merriam-webster.com/dictionary/ransomware.
  • Microsoft, https://www.microsoft.com/en-us/learning/mcse-cloud-platform-infrastructure.aspx.
  • National Infocomm Competency Framework NICF, https://www.imda.gov.sg/industry-development/programmes-and-grants/individuals/national-infocomm-competency-framework-nicf.
  • Pak, Ch. (2017). Cloud Security. IEEE Computer Society. Webinar.
  • Palmer, M. (2008). Hands-On Microsoft Windows Server 2008. Boston: Course Technology, Cengage Learning.
  • Penn State College of Information Sciences and Technology, https://ist.psu.edu/students/undergrad/majors/cybersecurity.
  • Penn State World Campus, http://www.worldcampus.psu.edu/degrees-and-certificates/security-risk-analysis-certificate/overview.
  • PMI, https://www.pmi.org.
  • Ristenpart, T., Tromer, E., Shacham, H., and Savage, S. (2009) Hey, you, get off of my cloud: exploring information leakage in third-party compute clouds. Proceedings of the 16 ACM Conference (CCS'09). Chicago. 199-212.
  • Rivard, R. (2013). Measuring the MOOC Dropout Rates. Inside Higher Education. March 8. https://www.insidehighered.com/news/2013/03/08/researchers-explore-who-taking-moocs-and-why-so-many-drop-out.
  • Schou, C., & Shoemaker, D. (2007). Information Assurance for the Enterprise. A Roadmap to Information Security. New York: McGraw-Hill.
  • SCRUM, https://www.scrumalliance.org/certifications/practitioners/certified-scrummaster-csm.
  • Software Engineering Institute, https://www.sei.cmu.edu/certification/.
  • Sokol, J. & Gapinski, A. (2002). Creating a Course In Computer Networking: Electrical Engineering Technology Versus Information Science and Technology. Proceedings of International Conference on Industry, Engineering & Management Systems (IEMS). Florida. 7-11.
  • Solomon, M.G., & Chapple, M. (2005). Information Security Illuminated., Sudbury, Massachusetts: Jones & Bartlett Publishers.
  • Stanford University, https://computersecurity.stanford.edu.
  • Stolfo, S.J., Bellovin, S.M., Hershkop, S., Keromytis, A.D., Sinclair, S., & Smith, S.W. (Eds). (2008). Insider Attack and Cyber Security: Beyond the Hacker. Springer-Verlag, Advances in Information Security 39.
  • Syracuse University of Engineering and Computer Science. https://engineeringonline.syr.edu/graduate-programs/cybersecurity/.
  • Techopedia, https://www.techopedia.com/definition/24747/cybersecurity.
  • The Convergence of Operational Risk and Cyber Security (2016). Retrieved from https://www.accenture.com/t20170803T055319Z__w__/us-en/_acnmedia/PDF-7/Accenture-Cyber-Risk-Convergence-Of-Operational-Risk-And-Cyber-Security.pdf.
  • The International Council of Electronic Commerce Consultants (EC-Council), https://www.eccouncil.org.
  • The International Information System Security Certification Consortium (ISC), http://isc2.org.
  • Tittel, E. (2016). Best Information Security Certifications For 2017. Tom's IT PRO. Retrieved from http://www.tomsitpro.com/articles/information-security-certifications,2-205.html.
  • Tittel, E., & Kyle, M. (2017). Best Cloud Certifications. Tom's IT PRO. Retrieved from http://www.tomsitpro.com/articles/cloud-it-certifications,2-537.html.
  • Umass Lowell, http://www.uml.edu.
  • University of Maryland University College, http://www.umuc.edu.
  • U.S. Dept. of Labor. Bureau of Labor Statistics, https://www.bls.gov.
  • Velte, T. & Velte. A. (2013). Cisco: A Beginner's Guide. 5th ed. New York: McGraw-Hill.
  • Weidman, G. (2014). Penetration Testing: A Hands-On Introduction to Hacking. 2nd ed. San Francisco: No Starch Press.
  • White, S.K., & Hein, R. (2017). The 13 most valuable IT certifications today. Retrieved from https://www.cio.com/article/2392856/it-skills-training/careers-staffing-12-it-certifications-that-deliver-career-advancement.html.
  • Wikipedia, https://en.wikipedia.org/wiki/List_of_computer_security_certifications.
  • Wikipedia, https://en.wikipedia.org/wiki/Udacity.

Document Type

Publication order reference

Identifiers

YADDA identifier

bwmeta1.element.desklight-2990405b-1241-4585-aa89-8448aab67426
JavaScript is turned off in your web browser. Turn it on to take full advantage of this site, then refresh the page.