The College of Information Sciences and TechnologyWhat is IST?What can I do with IST/SRA?Is this a good fit for me?
MissionBuild knowledge and information skills to meet the needs of the new Information Age.  2
Information Age: Need Coffee3
Google Maps4
Starbucks5
Street View6
IST enables:PeopleTechnologyInformationcreateorganizeshareusingstoreprotectaccessanalyzemodify
IST enables:PeopleTechnologynew iPod applicationsInformationstudentscreateorganizeshareusingstoreprotectaccessdigital musicanalyzemodify
IST enables:PeopleTechnologyfirewall, authentication, and other security technologies that will keep your information safeInformationPSU academic and financial advisorscreateorganizesharestoreusingprotectaccessprivate information in your student filesanalyzemodify
IST enables:PeopleTechnologyintegrated software systems (that allow the information to be accessed and coordinated across databases)managers (in any organization—Walmart, Geico, Proctor & Gamble…)Informationcreateorganizesharestoreusingfinancial and manufacturing information that exists in different databasesprotectaccessanalyzemodify
IST enables:PeopleTechnologyInternetInformationgovernmentcreateorganizesharestoreusingwell-informed laws about sharing private informationprotectaccessanalyzemodify
Information Sciences and TechnologyInformation Sciences and Technology (IST) Major
IST Bachelor of Science (ISTBS) Design, implementation, integration, and utilization of information systems (IS)Design and DevelopmentIntegration and ApplicationInformation ContextIntelligence Analysis and ModelingInformation and Cyber SecuritySocial Factors and Risk  Make Cool StuffUnderstand programming, database, human computer interaction, knowledge representation, search engines, characteristics of users.Make Businesses’ Use of Information More EfficientUnderstand information acquisition, representation, dissemination, storage, retrieval, display, and interpretation.Make Sense of Impact of Information SystemsUnderstand the use and impact of IS at the individual, group, organizational, national and international levels (e.g., social networks, crowd sourcing, digital natives/digital immigrants).13
What You Will LearnInternship14
Companies Who Hire IST Graduates15
IST Bachelor of Arts (ISTBA)16
Security and Risk AnalysisSecurity and Risk Analysis (SRA) Major
What is SRA?18
Individual Threats19
Business Threats20
Threats to  our National Security21
SRA Bachelor of Science (B.S.) Design, implementation, integration and utilization of information systems (IS)Information and  Cyber SecurityIntelligence Analysis  and ModelingSocial Factors and RiskIntelligence Analysis and ModelingInformation and Cyber SecuritySocial Factors and Risk  Make Information Systems SecureUnderstand how to deal with security and privacy concerns in all types of organizations, ensure that computer systems and products are secure and how to “police” cyberspace.Make Risk PredictionsUnderstand how to calculate, evaluate, and predict risk in a variety of fields including business and national security; students learn how to protect vital infrastructure against subversive attacks.Make Sense of Contextual Elements surrounding RiskUnderstand the psychological and sociological causes of terrorism and crime and how information technology is transforming each; understand privacy policies and government regulation to ensure users that data are secure. 22
What You Will Learn23Internship
Companies Who Hire SRA Graduates24
What We AreWhere information, people, and technology meet. Where careers in information technologies abound.Where students understand the effects of information technology on themselves, other individuals, organizations, and society. Where you will find a broad range of topics from software development to social media to business applications for technology to information security and risk analysis. 25
IST4Me26https://online.ist.psu.edu/110-ist4me/

More Related Content

PDF
HOW AI CAN HELP IN CYBERSECURITY
PDF
Cyber security: challenges for society- literature review
PPTX
Security Solutions for Hyperconnectivity in the Internet of Things
PDF
What is Information System - Miechael 20190700004
PPTX
Introduction to AI Governance
PPTX
Citizen centric digital and mobile-identity, personal data ecosystems and the...
PDF
Data ethics for developers
PDF
Deep Learning for Cybersecurity Innovation Insights from Patents
HOW AI CAN HELP IN CYBERSECURITY
Cyber security: challenges for society- literature review
Security Solutions for Hyperconnectivity in the Internet of Things
What is Information System - Miechael 20190700004
Introduction to AI Governance
Citizen centric digital and mobile-identity, personal data ecosystems and the...
Data ethics for developers
Deep Learning for Cybersecurity Innovation Insights from Patents

What's hot (20)

PPTX
Infromation securiity
PDF
Ethical mobility policy development & sustainability
PPTX
Gr 3 Societal Issues of Information System Design and Use
PPTX
Emerging trends in computer science and related technologies
PPTX
AI Governance and Ethics - Industry Standards
PPTX
Monitoring, Detecting And Preventing Insider Fraud And Abuse V2
PDF
Afcea it security course 2015 flyer
PPTX
Cybersecurity jobs jb
PDF
CUbRIK tutorial at ICWE 2013: part 1 Introduction to Human Computation
PDF
Challenges facing data protection in kenya
PDF
AI and Machine Learning In Cybersecurity | A Saviour or Enemy?
PPT
Legal, ethical & professional issues
PDF
Network Security and Privacy in Medium Scale Businesses in Nigeria
PPTX
Cyber Security in AI (Artificial Intelligence)
PPTX
My Pres @ Red Sea_university 23-12-2015
PDF
Cyber Security Intelligence
PPTX
The social aspect of Smart Wearable Systems in the era of Internet-of-Things
PDF
Career guide on cyber security
PDF
Class activity 4
PDF
IT-Security-Governance-Innovations_joa_Eng_0515
Infromation securiity
Ethical mobility policy development & sustainability
Gr 3 Societal Issues of Information System Design and Use
Emerging trends in computer science and related technologies
AI Governance and Ethics - Industry Standards
Monitoring, Detecting And Preventing Insider Fraud And Abuse V2
Afcea it security course 2015 flyer
Cybersecurity jobs jb
CUbRIK tutorial at ICWE 2013: part 1 Introduction to Human Computation
Challenges facing data protection in kenya
AI and Machine Learning In Cybersecurity | A Saviour or Enemy?
Legal, ethical & professional issues
Network Security and Privacy in Medium Scale Businesses in Nigeria
Cyber Security in AI (Artificial Intelligence)
My Pres @ Red Sea_university 23-12-2015
Cyber Security Intelligence
The social aspect of Smart Wearable Systems in the era of Internet-of-Things
Career guide on cyber security
Class activity 4
IT-Security-Governance-Innovations_joa_Eng_0515
Ad

Viewers also liked (8)

PPSX
110sadvising
PPT
IST 110s: Library Skills
PPT
Ist110sacademicintegrity 13
PDF
Advising FAQs
PPSX
Advising
PDF
Library Lesson Plan
PPTX
The Language of Drupal
PDF
"Turbo boost your website" aka BigPipe at Webinale 2014 in Berlin
110sadvising
IST 110s: Library Skills
Ist110sacademicintegrity 13
Advising FAQs
Advising
Library Lesson Plan
The Language of Drupal
"Turbo boost your website" aka BigPipe at Webinale 2014 in Berlin
Ad

Similar to Ist curriculum (20)

PPTX
2011 curriculum ist110
DOCX
The Roadmap A Bachelor’s Degree Guide 2009 – 2010 .docx
PPT
Introduction to information security
PPT
The need for security
PPTX
Exploring Information Technology The information technology (IT).
PDF
CollegeofISTCampaignBookCopy
PPTX
Information Technology Security Management
PDF
GITA March 2015 Newsletter
PDF
WiCyS Career Fair Handbook
PDF
Information Assurance And Security Ethics In Complex Systems Interdisciplinar...
PDF
IST BA Student Guide
PDF
it2042-unit1.pd AIM To study the critical need for ensuring Information Secu...
PPTX
Socio-technical Secuirty Value Chain
PPTX
[CB16] Using the CGC’s fully automated vulnerability detection tools in secur...
PPTX
1.Lecture 1 Introdgadfgdagfdgadfgdsfg .pptx
PPT
Information systems and ethical values in setting business environment
PDF
Unit 1&2.pdf
PPT
Putting the Business in Enterprise Information Security Architecture
PPTX
Security Architecture
PPTX
Perry: Informatics at Northern Kentucky University
2011 curriculum ist110
The Roadmap A Bachelor’s Degree Guide 2009 – 2010 .docx
Introduction to information security
The need for security
Exploring Information Technology The information technology (IT).
CollegeofISTCampaignBookCopy
Information Technology Security Management
GITA March 2015 Newsletter
WiCyS Career Fair Handbook
Information Assurance And Security Ethics In Complex Systems Interdisciplinar...
IST BA Student Guide
it2042-unit1.pd AIM To study the critical need for ensuring Information Secu...
Socio-technical Secuirty Value Chain
[CB16] Using the CGC’s fully automated vulnerability detection tools in secur...
1.Lecture 1 Introdgadfgdagfdgadfgdsfg .pptx
Information systems and ethical values in setting business environment
Unit 1&2.pdf
Putting the Business in Enterprise Information Security Architecture
Security Architecture
Perry: Informatics at Northern Kentucky University

Recently uploaded (20)

PPTX
Unit 4 Computer Architecture Multicore Processor.pptx
PPTX
Computer Architecture Input Output Memory.pptx
PDF
BP 704 T. NOVEL DRUG DELIVERY SYSTEMS (UNIT 1)
PDF
Uderstanding digital marketing and marketing stratergie for engaging the digi...
PPTX
CHAPTER IV. MAN AND BIOSPHERE AND ITS TOTALITY.pptx
PPTX
ELIAS-SEZIURE AND EPilepsy semmioan session.pptx
PPTX
Virtual and Augmented Reality in Current Scenario
PDF
Vision Prelims GS PYQ Analysis 2011-2022 www.upscpdf.com.pdf
PPTX
Onco Emergencies - Spinal cord compression Superior vena cava syndrome Febr...
PDF
FORM 1 BIOLOGY MIND MAPS and their schemes
PDF
HVAC Specification 2024 according to central public works department
PPTX
Introduction to pro and eukaryotes and differences.pptx
PDF
Paper A Mock Exam 9_ Attempt review.pdf.
PDF
AI-driven educational solutions for real-life interventions in the Philippine...
PPTX
20th Century Theater, Methods, History.pptx
PDF
1.3 FINAL REVISED K-10 PE and Health CG 2023 Grades 4-10 (1).pdf
PPTX
Chinmaya Tiranga Azadi Quiz (Class 7-8 )
PPTX
TNA_Presentation-1-Final(SAVE)) (1).pptx
PDF
Τίμαιος είναι φιλοσοφικός διάλογος του Πλάτωνα
PDF
IGGE1 Understanding the Self1234567891011
Unit 4 Computer Architecture Multicore Processor.pptx
Computer Architecture Input Output Memory.pptx
BP 704 T. NOVEL DRUG DELIVERY SYSTEMS (UNIT 1)
Uderstanding digital marketing and marketing stratergie for engaging the digi...
CHAPTER IV. MAN AND BIOSPHERE AND ITS TOTALITY.pptx
ELIAS-SEZIURE AND EPilepsy semmioan session.pptx
Virtual and Augmented Reality in Current Scenario
Vision Prelims GS PYQ Analysis 2011-2022 www.upscpdf.com.pdf
Onco Emergencies - Spinal cord compression Superior vena cava syndrome Febr...
FORM 1 BIOLOGY MIND MAPS and their schemes
HVAC Specification 2024 according to central public works department
Introduction to pro and eukaryotes and differences.pptx
Paper A Mock Exam 9_ Attempt review.pdf.
AI-driven educational solutions for real-life interventions in the Philippine...
20th Century Theater, Methods, History.pptx
1.3 FINAL REVISED K-10 PE and Health CG 2023 Grades 4-10 (1).pdf
Chinmaya Tiranga Azadi Quiz (Class 7-8 )
TNA_Presentation-1-Final(SAVE)) (1).pptx
Τίμαιος είναι φιλοσοφικός διάλογος του Πλάτωνα
IGGE1 Understanding the Self1234567891011

Ist curriculum

  • 1. The College of Information Sciences and TechnologyWhat is IST?What can I do with IST/SRA?Is this a good fit for me?
  • 2. MissionBuild knowledge and information skills to meet the needs of the new Information Age. 2
  • 8. IST enables:PeopleTechnologynew iPod applicationsInformationstudentscreateorganizeshareusingstoreprotectaccessdigital musicanalyzemodify
  • 9. IST enables:PeopleTechnologyfirewall, authentication, and other security technologies that will keep your information safeInformationPSU academic and financial advisorscreateorganizesharestoreusingprotectaccessprivate information in your student filesanalyzemodify
  • 10. IST enables:PeopleTechnologyintegrated software systems (that allow the information to be accessed and coordinated across databases)managers (in any organization—Walmart, Geico, Proctor & Gamble…)Informationcreateorganizesharestoreusingfinancial and manufacturing information that exists in different databasesprotectaccessanalyzemodify
  • 12. Information Sciences and TechnologyInformation Sciences and Technology (IST) Major
  • 13. IST Bachelor of Science (ISTBS) Design, implementation, integration, and utilization of information systems (IS)Design and DevelopmentIntegration and ApplicationInformation ContextIntelligence Analysis and ModelingInformation and Cyber SecuritySocial Factors and Risk Make Cool StuffUnderstand programming, database, human computer interaction, knowledge representation, search engines, characteristics of users.Make Businesses’ Use of Information More EfficientUnderstand information acquisition, representation, dissemination, storage, retrieval, display, and interpretation.Make Sense of Impact of Information SystemsUnderstand the use and impact of IS at the individual, group, organizational, national and international levels (e.g., social networks, crowd sourcing, digital natives/digital immigrants).13
  • 14. What You Will LearnInternship14
  • 15. Companies Who Hire IST Graduates15
  • 16. IST Bachelor of Arts (ISTBA)16
  • 17. Security and Risk AnalysisSecurity and Risk Analysis (SRA) Major
  • 21. Threats to our National Security21
  • 22. SRA Bachelor of Science (B.S.) Design, implementation, integration and utilization of information systems (IS)Information and Cyber SecurityIntelligence Analysis and ModelingSocial Factors and RiskIntelligence Analysis and ModelingInformation and Cyber SecuritySocial Factors and Risk Make Information Systems SecureUnderstand how to deal with security and privacy concerns in all types of organizations, ensure that computer systems and products are secure and how to “police” cyberspace.Make Risk PredictionsUnderstand how to calculate, evaluate, and predict risk in a variety of fields including business and national security; students learn how to protect vital infrastructure against subversive attacks.Make Sense of Contextual Elements surrounding RiskUnderstand the psychological and sociological causes of terrorism and crime and how information technology is transforming each; understand privacy policies and government regulation to ensure users that data are secure. 22
  • 23. What You Will Learn23Internship
  • 24. Companies Who Hire SRA Graduates24
  • 25. What We AreWhere information, people, and technology meet. Where careers in information technologies abound.Where students understand the effects of information technology on themselves, other individuals, organizations, and society. Where you will find a broad range of topics from software development to social media to business applications for technology to information security and risk analysis. 25

Editor's Notes

  • #2: INTRO SELF AND WELCOME TO COLLEGE OF IST
  • #3: Well, here is our mission…What is the “Information Age”? Take a minute to think about Information all around you. What information have you produced, come in contact with, or ignored in the last 10 minutes?(Bar code on card you handed in, iPod, mobile phone, PPT slide)Think about your life, day-in, day-out. Information is all around you—and we increasingly rely on it to make our lives work.STORY: Steve asking me a question and none of us knew the answer in the meeting. What did we do? What would we have done 5 years ago? 10 years ago? Parents—30 years ago?This IS the information age; and this College was created to pioneer research, education, and forward thinking in this new era.Here is a quick example…
  • #4: Have you ever done this—”Where is the closest Starbucks?” (If you don’t drink coffee now, you just might when you get to college…)
  • #5: First you search for Penn State area
  • #6: Then you search for Starbucks near Penn State. College Avenue appears. Sounds close!!
  • #7: Then you look at the street view--ah-ha!! This is what we drove by this morning!! Think about all the things involved in this quick interaction with your information technology device.You, the person, want something (coffee). You need information (location of Starbucks).You turn to the technology in your hand to get the information (iPod).Someone who works for Google anticipated this need. The Google Maps Vehicle driver drove through town and collected videos of street views. Someone organized, labeled, and stored them.Someone wrote a program to deliver that image over the Internet.You made use of all this: the information, the information databases where the info was stored, the networks through which the data was passed, and the programs that someone wrote to get the information to you.And then you drank your coffee.THIS is the information age. And there is much more…
  • #8: Let’s go back to what our website said: IST is about the interaction of people, tech, and info. Let’s put a few more words around this interaction to make more sense of this statement.THEN (after all animations):Can you give one example people who use information technologies? (How about people searching for a college???)What information might those people want or need?What might they want to do with the information?What technologies might they use?Let’s look at some other examples.
  • #9: Let’s look at some examples…How do we enable this to happen? We teach students what they need to know to be able to:develop applications for iPods
  • #10: How about another example…How do we enable this to happen? We teach students what they need to know to be able to:Protect an organization’s private information
  • #11: Here’s an example from our most popular area of study…How do we enable this to happen? We teach students what they need to know to be able to:Consult with corporations that need help making their various systems of information “talk” to each other more efficiently
  • #12: And if you are interested in policy-related aspects of information technology use, how about this example…How do we enable this to happen? We teach students what they need to know to be able to:Advise on policy-making regarding the internet regulations and lawsDOES THIS HELP GIVE YOU A SENSE OF WHAT WE ARE CONCERNED WITH IN THIS COLLEGE??? (Please ask now if you have questions…)
  • #13: Let’s take a closer look at the degrees we offer—first the B.S. in IST. Here is where it can get confusing—we have a major with the same name as the College. But I will try to be specific in referring to one or the other.
  • #14: We offer 3 options—see slide--Design next iPhone application…--Help PSU move from archaic system of student information to a newer one that allows people with appropriate access to view financial, medical, academic, payroll info from one system--Determine how to disseminate information about the next earthquake to rural villages in developing countries
  • #15: ALL students in the IST-B.S. major learn…
  • #16: On screen are companies that hire IST graduates.Here are some job titles:Applications DeveloperIT ConsultantAssistant Project ManagerIT Infrastructure AnalystBusiness Systems AnalystIT Solutions ArchitectChange Management AnalystIT Systems EngineerData AnalystImplementation specialistDesign EngineerMultimedia Specialist Forensics and Analysis ConsultantTechnology Support SpecialistWeb Developer
  • #17: New this past year: Craft your own degree by integrating different disciplines and your personal passions with ISTUnderstand potential applications AthleticsArtBusinessScienceHistoryMedical-informatics Legal-informatics Bio-informatics Enviro-informatics Business-informatics ChemometricsEnterprise informatics
  • #18: Our SECOND B.S. is in “Security and Risk Analysis.”
  • #19: The Security and Risk Analysis major focuses on how to design systems that are secure (while still allowing people to work), how to measure risk, and how to make decisions to ensure that proper levels of privacy are maintained for individual technology users, businesses, government, and other organizations. The SRA major promotes an understanding of information system design and operation, and of the legal and cultural issues surrounding privacy, intelligence, and security.Students learn about:Computer securityNetwork securityCyber crime The politics and “business” of terrorism Offensive and defensive use of computer and information networksDecision theoryPrivacy and legal/regulatory issues Implications of digital social networking Let’s take a look at a few examples of what our SRA students are prepared to face…
  • #20: Students help protect individuals from phishing –where someone seeks personal information under false pretense—e.g., Hallmark cards and Google jobs
  • #21: Students help prevent and investigate Business threatsFirst article, network breach: Federal Fire Department workers are being asked to look for unusual activity on bank accounts because an employee wrongfully accessed their information.Second article: privacy at risk: potential Chinese hackers at Google
  • #22: Students help protect national security interests…We see plenty of articles in the news about Government-industry partnership to targets cyber security threats.
  • #23: We offer three options:ICS—IF INTERESTED IN MAKING SYSTEMS SECURE, THINK ICS --- Students do VIRTUAL LABS where…IAM—IF MORE INTERESTED IN PREDICTION AND RISK ANALYSIS, CONSIDER IAM -- Students work for 3-letter agencies (CIA, and so forth) Teaches students how to calculate, evaluate, and predict risk in a variety of fields, including business and national security. SFR IF MORE INTERESTED IN WHAT MAKES PEOPLE TICK, CONSIDER SFR – Leading faculty in the field of terrorism and privacy, and sociology of crime!!In this option, students explore the psychological and sociological causes of terrorism and crime, and how information technology is transforming each. In the classroom, students work on teams in which they role-play both terrorists and criminals and the intelligence and security officers combating them. This option also examines the privacy policies and legal regulations within companies and the government. Students learn to critically read privacy policies and understand government regulation so they can help improve their own privacy policies and ensure users that the data they provide is secure.
  • #24: ALL students in the SRA-B.S. major learn…
  • #25: On screen are companies that hire SRA graduates.Here are some job titles:Catastrophe Risk AnalystIT AnalystComputer System Security AnalystsIT Consulting ManagerCyber AnalystIT Strategy ArchitectCyber Network Security EngineerNetwork Intel AnalystsData Security AdministratorNetwork Security Engineer Enterprise ArchitectSystems AdministrationInformation Assurance AnalystsSystems Enterprise Architect Information Assurance RemediationSystems Integration AnalystsInformation Assurance/Security EngineersSecurity Project ManagerIntel AnalystsSystems Integration EngineerIntrusion Detection AnalystWeb Security & Privacy Specialist
  • #26: In Summary… We are the College where…information, people, and technology meetcareers in information technologies aboundstudents to understand the effects of information technology on themselves, other individuals, organizations, and societyyou will find a broad range of topics from software development to social media to business applications for technology to information security and risk analysis
  • #27: Now, YOU can take a look at IST—with this website created just for first-year students…Be sure to check out:--Which option is for me Quiz--Descriptions of majors and options--videos of former students--resources in IST for students--and more!