enow.com Web Search

Search results

  1. Results from the WOW.Com Content Network
  2. List of information schools - Wikipedia

    en.wikipedia.org/wiki/List_of_information_schools

    Degree programs at iSchools include course offerings in areas such as information architecture, design, policy, and economics; knowledge management, user experience design, and usability; preservation and conservation; librarianship and library administration; the sociology of information; and human-computer interaction and computer science.

  3. SANS Institute - Wikipedia

    en.wikipedia.org/wiki/SANS_Institute

    The information security courses are developed through a consensus process involving administrators, security managers, and information security professionals. The courses cover security fundamentals and technical aspects of information security. The institute has been recognized for its training programs [3] and certification programs. [4]

  4. List of systems engineering universities - Wikipedia

    en.wikipedia.org/wiki/List_of_systems...

    Systems engineering is an interdisciplinary field of engineering, that focuses on the development and organization of complex systems.. This list of systems engineering at universities gives an overview of the different forms of systems engineering (SE) programs, faculties, and institutes at universities worldwide.

  5. Syracuse University School of Information Studies - Wikipedia

    en.wikipedia.org/wiki/Syracuse_University_School...

    The School of Information Studies offers an undergraduate degree, four master's degrees, and two doctoral degrees, as well as several certificates of advanced study. The Bachelor of Science in Information Management and Technology focuses on information systems and personal services. It prepares graduates for careers in data administration ...

  6. Information Security Group - Wikipedia

    en.wikipedia.org/wiki/Information_Security_Group

    The ISG also includes a Systems Security Research Lab (S2Lab), which was created in 2014, to investigate how to protect systems from software related threats, such as malware [12] and botnets. The research in the lab covers many different Computer Science-related topics, such as operating systems , computer architecture , program analysis , and ...

  7. Information security management - Wikipedia

    en.wikipedia.org/.../Information_security_management

    The ISO/IEC 27000 family represents some of the most well-known standards governing information security management and their ISMS is based on global expert opinion. They lay out the requirements for best "establishing, implementing, deploying, monitoring, reviewing, maintaining, updating, and improving information security management systems."

  8. Master of Science in Information Assurance - Wikipedia

    en.wikipedia.org/wiki/Master_of_Science_in...

    The Master of Science in Information Assurance is a one to three years Master Degree; depending on the program, some may even start with two-year preparation classes and covers various areas of computer science, Internet security, Computer security, and or cyber security. Topics of study may include: Business continuity planning; CobiT

  9. ISO/IEC 27001 Lead Implementer - Wikipedia

    en.wikipedia.org/wiki/ISO/IEC_27001_Lead_Implementer

    This certification is different from the ISO/IEC 27001 Lead Auditor certification which is targeted for information security professionals who want to audit the ISO/IEC 27001 standard rather than implement it. Most of the five-day ISO/IEC 27001 Lead Implementer courses require some prerequisite knowledge of ISO/IEC 27001 but the content of the ...