TITLE

The Role of Universities in Preparing the Next Generation of Security Professionals

AUTHOR(S)
Alexander, Dean C.
PUB. DATE
April 2008
SOURCE
Security: Solutions for Enterprise Security Leaders;Apr2008, Vol. 45 Issue 4, p90
SOURCE TYPE
Trade Publication
DOC. TYPE
Article
ABSTRACT
The article discusses the role of universities and colleges in preparing the next generation of security professionals. The article focuses on students' substantive academic coursework provided by the universities. It states that students are exposed to practical, hands-on security-related functions during internships arranged by the universities. Students also meet and interact with security professionals.
ACCESSION #
31658178

 

Related Articles

  • The Security Education Gap. McCourt, Mark // Security: Solutions for Enterprise Security Leaders;Jul2009, Vol. 46 Issue 7, p12 

    The article discusses the problem of security education in the U.S. He stresses the need to change the gap in the security education in universities and graduate schools. He notes that it is imperative for the industry to improve security's distribution and performance. He commends institutions...

  • campus [in] SECURITY. Collett, Stacy // Community College Journal;Jun/Jul2007, Vol. 77 Issue 6, p12 

    The article focuses on issues regarding campus security in the U.S. For college presidents across the nation and community colleges, security in campuses has been the number one topic. Community college administrators face the delicate balancing act of preserving the state of open environment of...

  • Password Protected. Millard, Elizabeth // University Business;Apr2007, Vol. 10 Issue 4, p46 

    The article looks at problems with changing identity management (IdM) security systems for institutions of higher education (IHEs) in the U.S. Chief information administrator Adam Stavn notes that getting end users to understand new policies was the challenging part of developing such products....

  • Henley Putnam University: Embracing The Competencies In Security Education. Morrow-Jensen, Amanda; DiMaio, Amy // Journal of Counterterrorism & Homeland Security International;Summer2012, Vol. 18 Issue 2, p38 

    The article offers information on Henley-Putnam University in Indonesia.. It states that the university is focused on professional and practical outcomes since the school's inception. They follow core competencies. It has several courses including philosophy course, ethics course, and...

  • A HANDS-ON LESSON. Vigue, Beverly // T H E Journal;Jan2011, Vol. 38 Issue 1, pS12 

    The article discusses innovations in educational security technology in secondary and higher education. The article describes the use of security surveillance cameras in classrooms and college campuses, the integration of student and visitor tracking technology, and improvements in emergency...

  • Behind-the-Scenes Security Techniques. Smith, Jack // Buildings;Apr2008, Vol. 102 Issue 4, p42 

    The article offers information about the Physical Security Information Management (PSIM) market. PSIM is undergoing powerful changes, largely driven by technology innovation, and includes software solutions that comprise the industry. These software solutions solve the problems that chief...

  • From Good to Great. Dean, Ray // Security: Solutions for Enterprise Security Leaders;Jul2008, Vol. 45 Issue 7, p66 

    The author reflects on the performance of several security directors in the U.S. He says that most security directors do good deeds and are able to perform their job well. He believes that a great security director is one whom other security directors ask for guidance. Moreover, he adds that...

  • Enterprise Risk Management as a Foundation. Brennan, Jerry; Mattice, Lynn // Security: Solutions for Enterprise Security Leaders;Mar2013, Vol. 50 Issue 3, p22 

    The article discusses the importance for business organization to utilize the principles of the enterprise risk management (ERM) as the foundation of their security programs. It explores the concept of the ERM and the significance of using its standards and methodologies as the foundation of a...

  • Making Access Complete, One Way or the Other. Zalud, Bill // Security: Solutions for Enterprise Security Leaders;Mar2013, Vol. 50 Issue 3, p48 

    The article discusses tips for security professionals on how to implement effective integrated access control solutions in their business organization in the U.S. It provides insights from several security officers regarding their initiative of developing security solutions, integrated with...

Share

Read the Article

Courtesy of VIRGINIA BEACH PUBLIC LIBRARY AND SYSTEM

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics