Lecturer, Global Health and Human Services

Updated: 3 months ago
Location: Columbia, SOUTH CAROLINA
Job Type: FullTime
Deadline: ;

Posting Details


Job Title: Lecturer, Global Health and Human Services
Campus: Vancouver, British Columbia Canada
Department: School of Public and Global Affairs-Vancouver
Hiring Manager: Peter Woolley
Hiring Manager Title: Founding Director School of Public and Global Affairs
College:
Position Type: Faculty
Grade:
FLSA: Exempt
Faculty Rank: Lecturer
Salary: Commensurate with Experience
Status: Full-Time
Months Worked: 12 Month
Job Summary:

FDU-Vancouver is seeking a full-time lecturer in Global Health and Human Services for AY 2021-22. All qualified candidates are encouraged to apply; however, Canadians and Permanent Residents will be given priority.

Fairleigh Dickinson University is the largest private (not-for-profit) university in the state of New Jersey (USA), with campuses also in Vancouver Canada, and Wroxton, UK. It has approximately 10,000 graduate and undergraduate students and more than 100 degree programs ranging from the Associate of Arts (A.A.) to the Doctor of Philosophy (Ph.D.).
The University’s Vancouver campus currently offers the Master of Administrative Science, a professional degree program with six different specializations. The Vancouver Campus boasts an excellent and dedicated core of full- and part-time faculty; a new, state-of-the art facilities; small class sizes; close working relations between students, faculty and staff; and an intensive and unrivaled student support system focused on individual student success.

Required Qualifications:

The Ph.D. or other terminal degree is preferred, although doctoral students with teaching experience and applicants with professional qualifications will be considered. Candidates should be able to teach at least four of the following courses:

MADS 6637 – Computer Systems Seizure and Examination
This analytic course will cover the appropriate protocols for seizure of computer systems and their examination in cases of Internet or computer fraud, terrorism, child pornography, internet sex crimes, and other high-tech crimes or violations of organization rules and regulations. This course focuses on the matters relating to the law and technology. Includes discussions on how to manage a digital forensics operation in today’s business environment. It will explore the use of technology to retrieve data and copy data on computers and on websites without disturbing the original data/site. It will study essential protocols needed to ensure the integrity of the data from the investigation process through prosecution or administrative disciplinary procedures
MADS 6638 – Computer Security Administration
This course will introduce the basics of computer security (CIA-Confidentiality, Integrity, Availability) and (AAA-Authentication, Authorization, and Auditing) and investigate ways to prevent hackers from accessing websites. Encryption process and firewall protection by itself may not be enough for someone who wants to access data stored and processed on your computer system. The course will analyze formal criteria and properties of system and network security and will determine ways to improve overall IT infrastructure security. Additional topics to be reviewed include formal specifications, verification of security properties, security policies that includes hardening, and preventing an intrusion, detection and how to react to such an attempt
MADS 6639 – The Forensic Expert
This analytic course will study what is necessary to become a forensic expert, the methods for preparing and presenting technical information in a courtroom or administrative hearing setting, and the use of technical and scientific witnesses in the area of high-tech crimes or violations of agency rules and regulations. Appropriate interaction with criminal justice agencies to develop internal security protocols will be emphasized. Individuals will learn how to trace security intrusions, what constitutes admissible proof, how to manage evidence, and how to develop proactive initiatives in this area
MADS 6654 – Forensics Administration
This course examines the principles of forensics administration and how to become a forensic expert. Proper administration forensic work is required to produce consistently high-quality forensic analysis. Topics covered include training and education of forensic analysis, accreditation, proficiency testing, audits, evidence presentation, information hiding, and strategic redundancy. The course will also explore quality control and quality assurance of cyber forensics administration, cyber forensics labor in legal, political, and social context, and emerging cyber technology trends. Also, this course will introduce the methods for preparing and presenting technical information in a courtroom or administrative hearing setting, and use of technical and scientific witnesses in the area of high-tech crimes or violations of agency rules and regulations
MADS 6697 – Current Issues in Cyber Forensics
This course examines the principles of forensics administration and how to become a forensic expert. Proper administration forensic work is required to produce consistently high-quality forensic analysis. Topics covered include training and education of forensic analysis, accreditation, proficiency testing, audits, evidence presentation, information hiding, and strategic redundancy. The course will also explore quality control and quality assurance of cyber forensics administration, cyber forensics labor in legal, political and social context, and emerging cyber technology trends. Also, this course will introduce the methods for preparing and presenting technical information in a courtroom or administrative hearing setting, and use of technical and scientific witnesses in the area of high-tech crimes or violations of agency rules and regulations
MADS 6701 – Intro. To Computer Network Security
This course provides a detailed review of the network security field, including essential terminology, the history of the discipline, and practical techniques to manage implementation of network security solutions. After an overview of information, network, and web security, students will explore network perimeter defense technologies and methods, including access controls, firewalls, VPNs, and instruction detection systems, as well as applied cryptography in public key infrastructures, wireless security, and web commerce. Assessment of network security, professional careers in the field, and contingency planning are also covered. The course gives knowledge and ability to students for helping organizations protect critical information assets and secure their systems and networks, both by recognizing current threats and vulnerabilities, and by designing and developing the secure system of the future
MADS 6702 – Invest Comp Sys/Network Emergencies
This course will introduce students to computer system emergencies and response to these emergencies. It will explore proper techniques and system configurations to create redundancy in critical computer systems and learn proper standards for data backup and recovery. It will also cover the pros and cons of adapt encryption. Students will learn how common hacking techniques are used for computer system intrusion as well as common techniques used to obtain information from employees. Also covered will be the development of a user agreement for the workplace, remote users, vendors with access to systems and consultants
MADS 6735 – Introduction to Countermeasures for Malware
This course will offer ethical hacking as well as computer and network security countermeasures for the professional or personal user who encounters various types of malware such as spyware, phishing sites, spam, bots, root kits, viruses, trojans, key loggers, cookies, and hijackers. The course will include both theoretical and practical application processes to block unauthorized access, remove convert programs, and assess network vulnerabilities. The students learn about security testing and monitoring methodologies and practice their knowledge with the various penetration testing tools. In addition, it will provide mechanisms for strengthening computers and networks from malicious users
MADS 6773 – Current Issues Forensic Science
This course explores current issues and challenges confronting the forensic science community. The issues include reviews of the scope of forensic services, the various ways forensic services are organized, the professional and education requirements for careers in forensic science. The challenges include the uneven levels of service, the admissibility of scientific evidence and testimony in courts of law and the differences between criminal and homeland security forensic investigations
MADS 6830 – Cloud Security
At the end of this course, the students will be able to discuss Cloud specific policies and agreements. Threats and Risks of clouds, Best practices for cloud security, Security Challenges of cloud, Policy and governance of cloud. Compliance and legal consideration of cloud, and Risk, Audit and Assessment
MADS 6831 – Ethical and Legal Issues in Cybersecurity and Digital Forensics
The objective of this course is to examine the ethical and legal issues related to cybersecurity and digital forensics. The course surveys the foundational theories of ethics and applies these theories to the analysis of moral questions that often arise in the context of cybersecurity and digital forensics. The course also introduces key laws and codes of conduct that regulate practices in the cybersecurity and digital forensics field. Contemporary real-world cases will be used to highlight the ethical and legal dilemmas faced by professionals in the field
MADS 6832 – Data Governance
At the end of the course, the student will be able to describe; what is data governance and why it is important, Data as enterprise asset, Compliance and Risk Management, Enterprise Data Management Program, Business drivers of data governance, and Role of business and IT in data governance

Employment is contingent upon a satisfactory background check. Candidates for hire will be required to sign a waiver authorizing the background check and produce a Social Security Card.

Preferred Qualifications:
Hours Worked
Posting Date: 04/23/2021
Special Instructions to Applicants:
Application Types Accepted: Faculty Profile

View or Apply

Similar Positions