The U.S. Department of Defense is offering
Cyber Information Assurance Scholarships to U.S. citizens who will be Juniors, Seniors, or graduate students in the fall of 2017. This is a one-year scholarship covering full books, tuition, and a $22,500 stipend for undergraduates or a $30,000 stipend for graduate students. The scholarships are renewable but will require a new application each year. Payback is one year of federal service in a cyber security or digital forensics role for each year of scholarship, or four years of military service. Applicants must be eligible for a security clearance. Applicants are not limited to students in the Department of Information Technology and Management but may also be students in Computer Science, Computer Engineering, Electrical Engineering, and Business, but because of the nature of the application, knowledge of and a clear understanding of cyber security is a necessity. A printed and signed physical application must be delivered to the ITM Department office, Perlstein Hall suite 223 later than 8:30am Monday May 22nd so we can evaluate and include your scholarship in our funding request, which is due May 31st. The application and details of the scholarship are included below. (Note: if you downloaded the announcement or application prior to 11:00am on Wednesday, April 19th, please download them again as the DOD provided us with updated copies.)
ATTACHMENT C IA Scholarship and Vacancy Announcement 2017
ATTACHMENT D NEW Student Application 2017-2018 (site 1)
ATTACHMENT D NEW Student Application 2017-2018 (site 2)
Contact Professor Ray Trygstad for questions: email@example.com. Please include “DOD Cyber Scholarship” as the first thing in the subject line of your email.
A new IT professional association will emerge this spring as CompTIA, home of the A+, Linux+, and Network+ certifications absorbs the Association of Information Technology Professionals. From these pieces the new association will emerge, and students have the opportunity to get onboard at the ground floor with a very minimal expense: twenty-nine bucks! See the full details at http://www.land.certification.comptia.org/CompTIA-IT-Pro-Association.
Graduate, undergraduate, and women’s scholarships are offered by the Center for Cyber Safety and Education of the International Information System Security Certification Consortium (ISC)². They will begin accepting applications on February 28, 2017 for graduate and undergraduate scholarships of up to $5,000, and are currently accepting applications for women’s scholarships of $8,000 or more. One undergraduate student may also be selected for the Harold F. Tipton Memorial Scholarship; the most recent award recipient for this scholarship is Kyle Dean Murbach from Wheaton, IL. Please see the (ISC)² scholarship page at https://www.isc2cares.org/Scholarships/ for full details.
The Women in CyberSecurity (WiCyS) 2017 conference will be held in Tucson, AZ on March 31st-April 1st. Scholarships are available for both faculty and students to attend the conference (details at https://www.csc.tntech.edu/wicys/register/); in the past these scholarships, funded by NSF, have covered airfare and lodging. Student and faculty scholarship applications are now open through November 21st. Notifications will go out December 5th. Conference registration costs are nominal–$30 for students, $150 for faculty.
The Call for Participation for Presentations, Workshops, Birds-of-a-Feather (BOF) Sessions, Lightning Talks, Panels, and Posters is open, and submissions will be accepted until November 6 (details at https://www.csc.tntech.edu/wicys/participate/)
All ITM women enrolled in Cyber Forensics and Security, and all third- and fourth-year undergraduate women, are strongly encouraged to participate—lightning talks and posters are easy and can be drawn from work already done—and to apply for these scholarships.
Free books are always nice. There are a fair number of textbooks released regularly under the Creative Commons or GNU Free Documentation Licenses, and not surprisingly many of them are on IT subjects…oh, and on discrete mathematics. (We hear ITM students may need a little boost there.) These books may be a good supplement to a course or may just help you learn something new on your own. Read more…
Since Dell’s purchase of EMC, there is a considerable increase in opportunities for our students at Dell and Dell EMC. Dell’s University Relations (UR) program broadens opportunities for internships and new hires, with an ultimate goal of hiring 25 percent of all external hires from university campuses by the end of year 2020. See all the details for both internship opportunities and new hires at https://jobs.dell.com/students.
ITM Student Handbooks for Fall 2016 have been posted and are available for students.
ITM Undergraduate Student Handbook: http://www.itm.iit.edu/data/ITMUndergraduateStudentHandbookFall2016.pdf
ITM Graduate Student Handbook: http://www.itm.iit.edu/data/ITMGraduateStudentHandbookFall2016.pdf
Linked below are the Department of Information Technology and Management’s requirements for computers for students entering our degrees in Fall of 2016. Please let contact Professor Trygstad if you have any questions or problems.
A major concern in our industry over the last few years has been the declining number of women in the computing fields. IT is not like other industries where there is a “glass ceiling”, a level above which women cannot rise: there are numerous examples of women CIOs in Chicago alone, including the former CIO of Boeing Corporation Kim Hammonds, now Global Chief Operating Officer of Deutsche Bank AG. And of course there’s Yahoo CEO Marissa Mayer, and Megan Smith, CTO of the United States. But we understand that it is difficult being female in a male-majority industry. Our department is strongly committed to doing everything we can to reduce this gender imbalance and to ensure that every student in our program is successful. Because this is a serious concern, I wanted to take an opportunity to share some resources to support women in IT. And guys: you should at least read the articles so you can begin to understand why this is an issue. Read more…