{"id":380,"date":"2019-01-18T17:56:37","date_gmt":"2019-01-18T17:56:37","guid":{"rendered":"https:\/\/public-info.dsu.edu\/academic-program-reviews\/?page_id=380"},"modified":"2019-03-19T19:36:03","modified_gmt":"2019-03-19T19:36:03","slug":"ph-d-cyber-defense","status":"publish","type":"page","link":"https:\/\/blogs.dsu.edu\/public-info-academic-program-reviews\/ph-d-cyber-defense\/","title":{"rendered":"Ph.D. Cyber Defense"},"content":{"rendered":"<p><a href=\"https:\/\/blogs.dsu.edu\/wp-content\/uploads\/sites\/15\/2019\/03\/DSU-PhD-Cyber-Defense-2019-final.pdf\">Ph.D. Cyber Defense Proposal<\/a><br \/>\n<a href=\"https:\/\/blogs.dsu.edu\/wp-content\/uploads\/sites\/15\/2019\/03\/PhD-Cyber-Defense-Review.2019-Vaughn.pdf\">Ph.D. Cyber Defense Review&#8217;s Report<\/a><br \/>\n<a href=\"https:\/\/blogs.dsu.edu\/wp-content\/uploads\/sites\/15\/2019\/03\/Ph.D.CD-Letter-of-Response-to-ExtRev-Mar2019c.pdf\">Ph.D. Letter of Response<\/a><br \/>\n<a href=\"https:\/\/blogs.dsu.edu\/wp-content\/uploads\/sites\/15\/2019\/02\/Cyber-Defense-Course-Descriptions.pdf\">Cyber Defense Course Descriptions<\/a><br \/>\n<a href=\"https:\/\/blogs.dsu.edu\/wp-content\/uploads\/sites\/15\/2019\/01\/Intent-to-Plan-Board-Agenda-5-18.pdf\" target=\"_blank\" rel=\"noopener\">Intent to Plan-Board Agenda 5-18<\/a><br \/>\n<a href=\"https:\/\/blogs.dsu.edu\/wp-content\/uploads\/sites\/15\/2019\/02\/Ph.D.CD-Appendix-A-Standards_Outcomes-1.pdf\">Appendix A Standards Outcomes<\/a><br \/>\n<a href=\"https:\/\/blogs.dsu.edu\/wp-content\/uploads\/sites\/15\/2019\/01\/Ph.D.-Cyber-Defense-worksheet-Appendix-B.xlsx\" target=\"_blank\" rel=\"noopener\">Appendix B &#8211; Budget<\/a><\/p>\n<p><strong>Faculty Expertise:<\/strong><\/p>\n<p><a href=\"https:\/\/blogs.dsu.edu\/wp-content\/uploads\/sites\/15\/2019\/01\/Cronin-Kyle-CV.pdf\" target=\"_blank\" rel=\"noopener\">Cronin, Kyle, Assistant Professor<\/a><br \/>\n<a href=\"https:\/\/blogs.dsu.edu\/wp-content\/uploads\/sites\/15\/2019\/01\/Hawkes-VITA.pdf\" target=\"_blank\" rel=\"noopener\">Hawkes, Mark, Professor &amp; Dean of Graduate Studies<\/a><br \/>\n<a href=\"https:\/\/blogs.dsu.edu\/wp-content\/uploads\/sites\/15\/2019\/01\/Houssain-Kettani-Vita.pdf\" target=\"_blank\" rel=\"noopener\">Houssain, Kettani, Assistant Professor<\/a><br \/>\n<a href=\"https:\/\/blogs.dsu.edu\/wp-content\/uploads\/sites\/15\/2019\/01\/Josh-Pauli-CV.pdf\" target=\"_blank\" rel=\"noopener\">Pauli, Josh, Professor<\/a><br \/>\n<a href=\"https:\/\/blogs.dsu.edu\/wp-content\/uploads\/sites\/15\/2019\/01\/Pauli-Wayne.pdf\" target=\"_blank\" rel=\"noopener\">Pauli, Wayne, Professor<\/a><br \/>\n<a href=\"https:\/\/blogs.dsu.edu\/wp-content\/uploads\/sites\/15\/2019\/01\/Podhradsky-Vita.pdf\" target=\"_blank\" rel=\"noopener\">Podhradsky , Ashley, Associate Professor<\/a><br \/>\n<a href=\"https:\/\/blogs.dsu.edu\/wp-content\/uploads\/sites\/15\/2019\/01\/Rowland.pdf\" target=\"_blank\" rel=\"noopener\">Rowland, Pam, Assistant Professor<\/a><br \/>\n<a href=\"https:\/\/blogs.dsu.edu\/wp-content\/uploads\/sites\/15\/2019\/01\/Streff-Vita.pdf\" target=\"_blank\" rel=\"noopener\">Streff, Kevin, Professor<\/a><br \/>\n<a href=\"https:\/\/blogs.dsu.edu\/wp-content\/uploads\/sites\/15\/2019\/01\/Stroschein-Josh.pdf\" target=\"_blank\" rel=\"noopener\">Stroschein, Josh, Assistant Professor<\/a><br \/>\n<a href=\"https:\/\/blogs.dsu.edu\/wp-content\/uploads\/sites\/15\/2019\/01\/Yong-Wang.pdf\" target=\"_blank\" rel=\"noopener\">Wang, Yong, Associate Professor<\/a><\/p>\n<p><strong>Resources<\/strong><br \/>\n<a href=\"https:\/\/dsu.edu\/graduate-students\" target=\"_blank\" rel=\"noopener\">Graduate Program website<\/a><br \/>\n<a href=\"https:\/\/dsu.edu\/graduate-students\/phdis\" target=\"_blank\" rel=\"noopener\">Ph.D. Information Systems website<\/a><br \/>\n<a href=\"https:\/\/dsu.edu\/graduate-students\/phdco\" target=\"_blank\" rel=\"noopener\">Ph.D. Cyber Operations website<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Ph.D. Cyber Defense Proposal Ph.D. Cyber Defense Review&#8217;s Report Ph.D. Letter of Response Cyber Defense Course Descriptions Intent to Plan-Board Agenda 5-18 Appendix A Standards Outcomes Appendix B &#8211; Budget Faculty Expertise: Cronin, Kyle, Assistant Professor Hawkes, Mark, Professor &amp; Dean of Graduate Studies Houssain, Kettani, Assistant Professor Pauli, Josh, Professor Pauli, Wayne, Professor Podhradsky &hellip;<br \/><a href=\"https:\/\/blogs.dsu.edu\/public-info-academic-program-reviews\/ph-d-cyber-defense\/\">Read more <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":32,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-380","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/blogs.dsu.edu\/public-info-academic-program-reviews\/wp-json\/wp\/v2\/pages\/380"}],"collection":[{"href":"https:\/\/blogs.dsu.edu\/public-info-academic-program-reviews\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/blogs.dsu.edu\/public-info-academic-program-reviews\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/blogs.dsu.edu\/public-info-academic-program-reviews\/wp-json\/wp\/v2\/users\/32"}],"replies":[{"embeddable":true,"href":"https:\/\/blogs.dsu.edu\/public-info-academic-program-reviews\/wp-json\/wp\/v2\/comments?post=380"}],"version-history":[{"count":12,"href":"https:\/\/blogs.dsu.edu\/public-info-academic-program-reviews\/wp-json\/wp\/v2\/pages\/380\/revisions"}],"predecessor-version":[{"id":415,"href":"https:\/\/blogs.dsu.edu\/public-info-academic-program-reviews\/wp-json\/wp\/v2\/pages\/380\/revisions\/415"}],"wp:attachment":[{"href":"https:\/\/blogs.dsu.edu\/public-info-academic-program-reviews\/wp-json\/wp\/v2\/media?parent=380"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}