Cyberspace and Cybersecurity, Department of Cybersecurity & Information Technology - Adjunct Faculty

Posted:
4/3/2024, 5:00:00 PM

Location(s):
Maryland, United States ⋅ Adelphi, Maryland, United States

Experience Level(s):
Mid Level

Field(s):
IT & Security

Workplace Type:
On-site

Adjunct Faculty

Cyberspace and Cybersecurity 

Graduate School

UMGC Stateside

Location: DMV Area

University of Maryland Global Campus (UMGC) seeks adjunct faculty to teach in the Cyberspace and Cybersecurity program online and onsite in the DMV Area. Specifically, we are seeking faculty to teach the following courses:

CTCH 605: INTRODUCTION TO CYBERSECURITY

Gain knowledge of the foundations of cybersecurity, and apply cyber methodologies to cyber architectures, services, protocols, algorithms, software components, and programming languages. Become familiar with the important role that security management practices, security architecture, operations security, and physical security play in cybersecurity. Explore the impact of cyber terrorism and national security on cybersecurity. Gain hands-on, real-world experience with state-of-the-art tools and technologies in a lab-intensive environment.

CTCH 615: CYBERSECURITY THREATS AND ANALYSIS

An introduction to tools and tactics to manage cybersecurity threats, identify various types of common threats, analyze organizational exposure to threats, and collect and analyze cybersecurity intelligence. The goal is to provide hands-on exercises to analyze common security failures and identify specific design principles that have been violated. The coursework emphasizes the interaction between security and system usability and the importance of minimizing the potential for harm by modern threats, attacks, and usability challenges.

CTCH 625: CYBERSECURITY FOR SYSTEMS AND NETWORKS

A study of key security issues and procedures in systems and networks. The objective is to identify security issues of LANs, WANs, and network operating systems; identify threats to the system and network infrastructure design weaknesses; determine security flaws in the network infrastructure protocols; explain the security of data at rest in systems; and modern systems and network hardening tools, techniques, and practices.

CTCH 635: CYBERSECURITY ATTACK PREVENTION STRATEGIES

A comprehensive study of specific information regarding targeted cyber-attacks, including advanced persistent threats. The aim is to plan and prepare for, respond to, and recover from targeted cyber-attacks. The objective is to fill the gap in threat-specific training for cybersecurity as a community-driven course that focuses on the phases of targeted cyber-attacks and the attacker methods used during each phase. Participants will also receive valuable information on cyber-attack prevention, mitigation, and response.

CTCH 645: CYBERSECURITY EXPLOITATION METHODOLOGIES

A comprehensive study of the major areas of cyber exploitation methodologies. The objective is to identify the latest tools, techniques, and ethical hacking practices. The goal is to apply state-of-the-art tools and technologies in a lab-intensive environment that provides hands-on, real-world experience.

CTCH 655: CYBERSECURITY AUDITING AND MONITORING SYSTEMS

Employ technological solutions that identify, catalog, and triage cyber-attacks. Utilize host-based monitoring, auditing, network intrusion detection and prevention, and report generation tools. Use state-of-the-art tools and technologies in a lab-intensive environment that provide hands-on, real-world experience.

CTCH 660: CYBERSECURITY ATTACK INCIDENT AND ARTIFACT GATHERING

Develop the skills to conduct incident response investigations. The objective is to apply a dynamic incident response process to evolving cyber threats, and how to develop threat intelligence to mount effective defense strategies. Evaluate how attackers scan, exploit, pivot, and establish persistence in the cloud and conventional systems. The Cyber Incident Response course will give students an understanding of how incidents are responded to at a high level and allow them to build important technical skills through the hands-on labs and projects. Topics include a high-level discussion of what happens at each phase of responding to an incident, followed by a technical deep dive into some of the more exciting parts of memory, network, host analysis, and forensics.

CTCH 665: DIGITAL FORENSICS AND INCIDENT RESPONSE

A detailed exploration of the tools and technologies commonly used in forensic examinations and utilizing best practices. Explore procedures for securing and validating evidence, including digital media and physical memory, as well as for recovering artifacts and analyzing, reporting, and presenting results in both criminal and civil situations. Gain experience with mobile forensic analysis.

CTCH 685: SOFTWARE SECURITY

A comprehensive evaluation of software security vulnerabilities and threats in software exploitations. Topics include buffer overflows, SQL injection, and session hijacking. Further, learners will develop defensive methodologies to prevent or mitigate these attacks, including advanced testing and program analysis techniques.

CTCH 690: CYBERSECURITY TECHNOLOGY CAPSTONE

A comprehensive evaluation of issues in cybersecurity technology, including enterprise risk management, vulnerability assessment, threat analysis, crisis management, security architecture, security models, security policy development and implementation, security compliance, information privacy, identity management, incident response, disaster recovery, and business continuity planning, particularly in the health, banking, and finance sectors.

SPECIFIC RESPONSIBILITIES INCLUDE:

·Teaching graduate level students within Cyber Security specializations using a wide range of technology solutions.

·Topics include cyber architecture, cyber services and mechanisms, protocols, algorithms, hardware components, software components, secure programming techniques, cryptographic techniques, business continuity planning, security management practices, security architecture, operations security, physical security, cyber terrorism, and national security. Teaching topics also include cybersecurity protection and prevention strategies and intrusion detection and prevention in cyberspace.

·Providing students with an engaging and challenging environment to learn and develop technology hands-on skills.

REQUIRED EDUCATION AND EXPERIENCE:

·An earned Masters degree from a regionally accredited institution

·Active in the cybersecurity field

·Industry experience with network operations, cybersecurity, information security, computer security, and/or information assurance

·Strong understanding and experience with network/security technology

·Understanding of adult learning, and utilizing technology within the online and on-site classroom

  • If selected, candidates with international degrees may be required to submit a translation/degree evaluation from a NACES approved vendor.

PREFERRED EDUCATION AND EXPERIENCE:

·Terminal degree preferred from a regionally accredited institution

·Prior graduate teaching experience and experience with online teaching environments.

Who We Are and Who We Serve 

UMGC—one of 12 degree-granting institutions in the University System of Maryland (USM)—is a mission-driven institution with seven core values that guide us in all we do. At the top of the list is "Students First,” and we strive to do just that for our 90,000 students at home and abroad. From its start in 1947, UMGC has demonstrated its commitment to adult learners. We recognize that adult students need flexibility and options. UMGC is proud to be a global, 24-hour, institution of higher learning. 

  

The typical UMGC student is an adult learner juggling a career, family, and other priorities. Roughly 80% work full time, half are parents, and half are minority students. They are continuing their education to better themselves, their families, and their professional opportunities. UMGC is also a leading higher education provider to the U.S. military, enrolling 55,000 active-duty service members, reservists, National Guard members, veterans, and family members annually. We are proud of our military heritage and are committed to this service. 

  

The Adjunct Faculty Role at UMGC 

UMGC is committed to helping students achieve success not only with us but also in their professional fields. As a result, we actively seek faculty members who are scholar-practitioners: professionals who are actively and successfully engaged in their field and who additionally wish to help the next generation of professionals grow in their knowledge and expertise through education.  Your role as an adjunct faculty member will be to: 

  

  • Actively engage students through frequent interaction that motivates them to succeed, and conveys genuine energy and enthusiasm for their learning. 
  • Guide students in active collaboration and the application of their learning in problem- and project-based learning demonstrations. 
  • Provide rich and regular constructive feedback, utilizing rubrics effectively for the assessment of student work, and acknowledging student accomplishments. 
  • Demonstrate relevant and current subject-matter expertise, and help students connect concepts across their academic program. 
  • Provide feedback to your program chair on possible curricular improvements. 

Faculty Training at UMGC 

We are committed to your professional success at UMGC. Each new faculty member is required to complete our online two-week new faculty orientation, FacDev 411, as a condition of hire.  

  

Position Available and will Remain Open until Filled 

Salary Commensurate with Experience 

Adjunct faculty candidates will be required to provide official transcripts during the candidate selection process

All submissions should include a cover letter and resume. UMGC offers competitive compensation and comprehensive benefits for qualifying positions, such as tuition remission, generous leave and healthcare. For detailed benefits information, please visit: https://careers.umgc.edu/benefits.html.

The University of Maryland Global Campus (UMGC) is an equal opportunity employer and complies with all applicable federal and state laws regarding nondiscrimination. UMGC is committed to a policy of equal opportunity for all persons and does not discriminate on the basis of race, color, national origin, age, marital status, sex, sexual orientation, gender identity, gender expression, disability, religion, ancestry, political affiliation or veteran status in employment, educational programs and activities, and admissions.

University of Maryland Global Campus (UMGC) is committed to helping safeguard the health of its faculty, staff, students, contractors, and guests. Because vaccinations reduce the spread of SARS-CoV-2-the virus that causes COVID-19-all prospective UMGC faculty (full-time and adjunct) and staff are strongly encouraged to be fully vaccinated and current with the recommended boosters. As always, operations at our military locations in Europe, Asia, and stateside will follow the guidance of the U.S. Department of Defense and local commands, and may require proof of full vaccination, unless an exception is approved as a reasonable accommodation based on disability or religion. If so, a copy of their Approved Exception Letter must be provided before the start of their employment. Failure to provide proof of vaccination or show proof of exception may result in the offer of employment being rescinded.

Workplace Accommodations:

The University of Maryland Global Campus Global Campus (UMGC) is committed to creating and maintaining a welcoming and inclusive working environment for people of all abilities. UMGC is dedicated to the principle that no qualified individual with a disability shall, based on disability, be excluded from participation in or be denied the benefits of the services, programs, or activities of the University, or be subjected to discrimination. For information about UMGC’s Reasonable Workplace Accommodation Policy or to request an accommodation, applicants/candidates can contact Employee Accommodations via email at [email protected].