Free is always good, and beyond our Microsoft DreamSpark Premium there are a variety of free tools available to students such as Autodesk 3D Software including AutoCad, RipTiger Software, and even professional prototyping software such as Axure. See the full list of freebies as well as student discounts at http://slickdeals.net/f/8500607-2016-students-freebies-offers-software-membership-free-more.
Every year the department publishes a specification for notebook computers for use by ITM students. It is the intent of the department to require all students entering a degree in our department starting in Fall 2016 to posses a portable computer that meets these specifications. Here is the specification for Fall 2016.
The 17th Annual Conference on Information Technology Education (SIGITE) and the 5th Annual Research in IT Conference (RIIT) will be hosted by University of Massachusetts Boston September 28 – October 1, 2016. The conferences will take place at the Hilton Boston Back Bay at 40 Dalton St near Fenway Park. Both conferences are sponsored by the ACM Special Interest Group of Information Technology Education (SIGITE)and the theme of both conferences is “Securing the Future”. More student papers from IIT have been presented at RIIT than from any other institution, and 50% of the “Best Paper” awards have gone to IIT students or faculty. ITM students won “Best Paper” in 2014. See the full Call for Participation at http://sigite.hosting.acm.org/sigite2016/wp-content/uploads/2014/07/SIGITE2016CfP.pdf and start tweaking your best research papers for sumission!
Free Microsoft Office! Office 365 Education is available for free to students who are enrolled at qualifying schools( (and faculty and staff, too)—and IIT is a qualifying school! This also allows you to install the current version of Microsoft Office and Office Apps on up to 5 PCs or Macs and on other mobile devices, including Windows tablets and iPads. Go to https://products.office.com/en-us/student/office-in-education or click on the image above. Also, if you already have a personal Microsoft OneDrive account, this will give you an additional IIT OneDrive account with 1 terabyte of storage.
How much space do you have on your MyIIT Google Drive? If your answer was anything less than infinite, you were wrong. According to an announcement on the Google for Education Blog, Drive for Education is available to all Google Apps for Education accounts at no charge and includes:
- Unlimited storage: No more worrying about how much space you have left or about which user needs more gigabytes. Drive for Education supports individual files up to 5TB in size.
- Vault: Google Apps Vault, Google’s solution for search and discovery for compliance needs, will be coming free to all Apps for Education users.
- Enhanced Auditing: Reporting and auditing tools and an Audit API easily let you see the activity of a file, are also on the way.
We need students to help with the 2015 ACM Special Interest Group in IT Education (SIGITE)/Research in Information Technology (RIIT) Annual Conference, September 30th through October 3rd. The Conference location is at DePaul University in the loop, on the eighth floor of the DePaul Center at 1 E. Jackson Blvd. This is an 8-minute ride on the Green Line, getting off at Adams & Wabash.
SIGITE is the leading academic conference in the information technology field. IIT School of Applied Technology is a Platinum Sponsor for this year’s Conference and we have three student research papers being presented. We would really like to see IIT ITM well represented in pokies this effort. For additional details and to sign up to volunteer, please go to http://www.itm.iit.edu/SIGITE15 .
Thanks! We know we can rely on ITM students to pitch in and show DePaul how committed we are!
We can’t make you read them…but you’d have to be crazy not to! The new ITM Undergraduate Student Handbook and the new ITM Graduate Student Handbook are now available. They are chock full of good information, a great deal of it new for this year, and you should just read them! New students: no excuses! Just read them!
- ITM Undergraduate Student Handbook Fall 2015
- ITM Graduate Student Handbook Fall 2015
The U.S. Department of Homeland Security and the National Security Agency have designated Illinois Institute of Technology as a National Center of Academic Excellence in Cyber Defense Education, effective until 2020. Our ability to meet the increasing demands of the program criteria will serve the nation well in contributing to the protection of the National Information Infrastructure. The Presidents’ National Strategy to Secure Cyberspace, February 2003, and the International Strategy for Cyberspace, May 2011, addresses the critical shortage of professionals with these skills and highlights the importance of higher education as a solution to defending America’s cyberspace: “Like all nations, the United States has a compelling interest in defending its vital national assets, as well as our core principles and values, and we are committed to defending against those who would attempt to impede our ability to do so.” Education is the key to promoting these ideals.
This designation recognizes the accomplishments of IIT in the areas of cyber security and digital forensics education, spearheaded by the Department of Information Technology and Management (ITM) and the IIT Center for Cyber Security and Forensics Education (C2SAFE). The ITM Department’s key offering in this area is the Master of Cyber Forensics and Security degree, designed to help students, and experienced information technology professionals become cyber security and forensics practitioners, investigators, managers, and leaders. This degree is intended for students who are interested in cyber security, digital forensics, risk control, and information assurance, and draws on the extensive professional experience of our ITM faculty.
The Center of Academic Excellence (CAE) in Cyber Defense (CD) designation is a new designation based on updated academic criteria for Cybersecurity education and affords each CAE institution the opportunity to distinguish its strengths in specific focus areas. The updated criteria benefit not only the institution, but also students, employers and hiring managers throughout the Nation.
Official letters of notification of IIT’s designation were sent to the university, the Governor of Illinois, Members of Congress, and appropriate Congressional Committees. The official CAE Certificate will be awarded during a ceremony at the CAE Community Meeting being held in conjunction with the NICE (National Initiative for Cybersecurity Education) Conference in San Diego, California, November 3-4, 2015.
ITM’s Jeremy Hajek selected by Verizon to be a panelist for “Verizon Internet of Things – Smart Seminars – Smart Cities” seminar
During this interactive seminar, Verizon Smart Cities specialists and strategic solutions providers demonstrated how the “Internet of Things” can make a positive impact on the future of Chicago and its surrounding communities to increase economic growth through sustainability, enhance safety and security, and improve operational efficiencies.
Industry Associate Professor Jeremy Hajek joined an exciting line-up of local guests and speakers for a panel discussion. Included on the panel:
Futurist, Technology Strategist, and Trends Forecaster, and New York Times bestselling author
Bureau Chief of Economic Development, Cook County
CIO, Bureau of Technology, Cook County
More than 220 cyber security professionals participated in ForenSecure ’15: Cyber Forensics and Security Conference and Expo at Illinois Institute of Technology’s Rice Campus in Wheaton. In its 13th year, this industry-focused technical conference attracted representatives from Google, the Federal Bureau of Investigation (FBI), Exelon, Cisco, Verizon, Comcast, Allstate Insurance, Argonne National Laboratory, Booz Allen Hamilton, CDW, Chicago Public Schools, CNA Insurance, Fermilab, Ford Motor Company, Motorola Solutions, Navistar, U.S. Marines, and Alcatel-Lucent. Universities such as Boston University, University of Chicago, University of Illinois at Chicago, Loyola University, Lewis University, Northern Illinois University, Wheaton College, University of Wisconsin, University of Dubuque (Iowa) and several community colleges, and other organizations were also represented.
This multi-tracked conference included discussion and debate by local, regional, national, and international organizations and universities over cyber security, forensics, data/information governance, cyber crime, cyber security legislation and legal issues, ethical hacking, eDiscovery, cloud forensics, steganography, policy and compliance, privacy, wireless security, cloud computing, credit card fraud, drones, identity theft, and more.
William Lidinsky, director, School of Applied Technology Computer Security and Forensics Laboratory; interim director, Center for Cyber Security and Forensics Education; and industry professor of Information Technology and Management headed up the conference with co-chairs, Ben Khodja (ITM ’12, M.S. CYF ’15) and Yalinne Castelan Guzman (ITM, M.S. CYF ’16).
Several IIT faculty presented at conference sessions including Mohammad Shahidehpour, Bodine Chair professor of electrical and computer engineering; Henry Perritt Jr, professor of law; Ray Trygstad, director of information technology at IIT School of Applied Technology; and Adam Rouse, legal fellow for the Institute of Science, Law, and Technology at IIT Chicago-Kent College of Law; Bonnie Goins and William Slater III, adjunct industry professors of information technology and management;.
Student presentations from Lidinsky’s ITMS 448/548-Cyber Security Technologies, ITMS 539-Steganography, and ITMS 549-Cyber Security Technologies: Projects & Advanced Methods courses were featured both days. Presentations included various forms of steganography, how to defend Android apps, RADISH (Remotely-Accessible Dynamic Infrastructure for Students to Hack) developed at IIT, and more.
ABC7 reporter, Chuck Goudie, interviews School of Applied Technology Associate Professor Jeremy Hajek about the issues of digital age tornado notifications
Tornado warnings have traditionally relied on a siren system that was designed 50 years ago. In this digital age, the ABC7 I-Team investigates how people will be informed of a coming tornado, who pushes the button to activate digital warnings and what happens to those people not plugged in.