IT pros rank University of Texas San Antonio best school for cybersecurity
Norwich University is second and Mississippi State is third in HP-sponsored survey
Computerworld - The University of Texas at San Antonio (UTSA) tops a somewhat unexpected list of schools that are considered by security practitioners as the best in the country for cybersecurity courses and degree programs.
In a Hewlett-Packard-sponsored survey of about 2,000 certified IT security professionals, UTSA's 14 undergraduate and graduate programs in areas such as digital forensics, secure design and intrusion detection and response, were ranked first for academic excellence and practical relevance.
The experience and expertise of program faculty and the school's professional reputation within the security community were also factors that contributed to the school's top ranking.
Norwich University, a private military college in Northfield, Vt., garnered the second spot, while Mississippi State University near Starkville was third. Norwich's Computer Science and Information Assurance (CSIA) program and Mississippi State's Center for Computer Security Research are National Security Agency-certified centers of academic excellence in information security.
Rounding out the top 10 were Syracuse University and Carnegie Mellon University, which tied for the fourth spot; Purdue University was fifth; the University of Southern California, the University of Pittsburgh and George Mason University were in a seventh place tie. Eighth place went to West Chester University, in West Chester, Penn., while the U.S. Military Academy at West Point and the University of Washington in Seattle completed the list.
The Ponemon Institute, which conducted the survey for HP, compiled the list of top schools based on responses from 1,958 security practitioners, about 65% of whom identified themselves as being at a supervisory level.
Survey participants were given a list of 403 educational institutions and were asked to select and rank up to five of the institutions in descending order of preference. Respondents were then asked to rate each school's program based on their perceptions about the school's academic rigor, faculty quality and other measures.
Schools were assigned weighted scores based on how often survey respondents selected each school, the order in which they were ranked by each respondent and overall perceptions about program quality.
For instance, 98 respondents selected the University of Texas, San Antonio, as one of their top schools for cybersecurity. Of those, 90 ranked it as their first choice. The school also got an average score of 9.40 on a scale of 1 to 10 for program quality, putting it on top of the list.
Similarly, about 91% of the 69 respondents who selected Norwich in their top five list also ranked the university as their top pick and give it an average score of 9.2 for program quality.
The numbers for each of the top ranking schools, by themselves, are relatively small. For instance, only 90 individuals out of the total sample size of more than 1,950 individuals selected UTSA as the number one choice, but that was enough to make it the top school on the list.
- Onboarding New Employees Read this paper to understand the difference between training and socialization in employee onboarding.
- Agility & Scalability for Oracle EBS R12 and RAC on VMware vSphere 5 This white paper outlines extensive performance and scalability testing of Oracle EBS applications on a Vblock™ Systems with vSphere 5.
- Oracle and VCE: The Next Step in Integrated Computing Platforms In this ESG Lab review you will learn how a VCE system driven by Oracle, delivers the perfect blend of high performance and...
- Migrate Oracle Apps from RISC/UNIX to Virtualized x86 Ready to move Oracle to a virtualized environment? This brief explains how true converged infrastructure can help you migrate from a RISC/UNIX environment...
- Keep Servers Up and Running and Attackers in the Dark An SSL/TLS handshake requires at least 10 times more processing power on a server than on the client. SSL renegotiation attacks can readily...
- On Demand: Mastering the Art of Mobile Content Management Mobile device usage in the enterprise has skyrocketed, and it continues to escalate. IT must answer to users who demand access to their... All Education/Training White Papers | Webcasts