Discover The CTU Experience
The United States does not yet have a national strategy to deal with cybersecurity; cyber law is undeveloped, and while narrow segments of expertise exist inside and outside of government, broad understanding of the threat and what we might do to prepare for, recovery from, and respond to cyber attacks is woefully lacking.
The advice of fiction writers such as Stephen King and Robert A. Heinlein has helped me hone my craft. I learn from the purveyors of the craft who have come before me. Books such as On Writing have caused me to reflect upon the life experiences that make me the writer I am.
Higher education has been a great point of debate throughout this presidential election season. Much can be learned from the platforms of both President Barack Obama and Mitt Romney and their collective approach to ensuring that Americans have high quality and accessible means to personal and professional development.
The highlight of the conference was Professor Edward Burger’s keynote address entitled, “The 5 Elements of Effective Thinking.” A captivating speaker, Dr. Burger creatively outlined these five elements of effective—or innovative—thinking, which he linked to the four basic earthly elements which predate Socrates: Earth, Fire, Air, and Water.
I recently returned from a planning conference associated with Exercise Angel Thunder 2013. AT-13, and its Defense Support of Civil Authorities segment (Resolute Angel) are played on an 18-month cycle to exercise local, state, federal, and multinational civil and military agencies in disaster response and – particularly for the military forces – personnel recovery in simulated earthquake and combat scenarios.
Today, as many as 92% of employers and recruiters use social networks to find job candidates – yet only 38% of job seekers report regular use of LinkedIn to find work. With the candidate pool growing more homogeneous and the hiring process almost entirely digital, there’s really no denying that a professional presence online is critical to career success.
An entrepreneur is an enlightened renegade who refuses to kow-tow to conventional wisdom and is always willing to bet what they have to get what they want. Entrepreneurs tend to be radicals on a mission to sate a deep-seated passion; an obsessive Promethean (Intuitive-Thinker) willing to sacrifice all for the redemption of a dream. And strange as it may seem, an entrepreneur tends to leap before they look.
There is a tremendous diversity to the threats in the cyber domain and the entities that are behind them. Let’s take a closer look at the individuals responsible for the various threats threatening our cybersecurity.
The key to beginning your education, despite the curve balls life will throw, is finding the right balance between organization and time management. These skills are critical to ensuring you can get through these difficult times with your best foot forward.
The MBA is designed to equip the individual with an overall core knowledge of business, with courses in finance, economics, marketing, accounting, strategy and leadership. The MS, on the other hand, offers deep dives into coursework that is aligned with a specialized, or more directed career path.
In recognition of Cybersecurity Awareness month in October, our faculty offer insights on both policy and technical issues related to cybersecurity. In our second post of the series, Bruce Harmon, Ph.D., took a look at the defining terminology making its way into our culture. In today’s post, Stephen Recca, M.A., takes a look at four cybersecurity threats from a policy perspective.
CTU’s Global Security Series offers background on current national and homeland security topics. Dr. Morag recently participated in the Eastern Accord 2012 Counter Violent Extremism Exercise in Arusha, Tanzania. His second post in this series looked at primary security threats from the trans-national and global Jihadist groups operating in the region. Today’s post will focus on some of the economic and social challenges facing Djibouti, Uganda, Tanzania and Zambia.
Law enforcement has long been a rich source of fodder for the creative minds that keep us entertained in front of the television – not to mention the big screen – year in and year out.
These days, everyone is vulnerable to cybercrime and other breaches to the security of their digital systems and identity. Our world is increasingly connected through computers, smart phones and tablets and an exploding number of apps. This influx of technology makes for that many more digital portals to protect.
Copyright © 2017 Colorado Technical University (CTU). All rights reserved. No information may be duplicated without CTU's permission. The CTU logo is a registered trademark of Career Education Corporation. CTU cannot guarantee employment or salary. Not all programs are available to residents of all states. Programs vary by location and modality; see catalog for details. Financial aid is available for those who qualify. See the Accreditation & Licensure section for information on the agencies that approve and regulate the school's programs, including relevant complaint procedures here. Find employment rates, financial obligations and other disclosures below. (855) 230-0555
Copyright © 2017 Colorado Technical University (CTU). All rights reserved. No information may be duplicated without CTU's permission. The CTU logo is a registered trademark of Career Education Corporation. CTU cannot guarantee employment or salary. Not all programs are available to residents of all states. Programs vary by location and modality; see catalog for details. Financial aid is available for those who qualify. See the Accreditation & Licensure section for information on the agencies that approve and regulate the school's programs, including relevant complaint procedures here. Find employment rates, financial obligations and other disclosures below.