PODCAST · education
Excelsior Life
by Mike Lesczinski
"Excelsior Life: Distance EDU on Demand" showcases the people, events, and programs that make Excelsior a vibrant community. Ranging from behind-the-scenes looks at faculty research to the passionate pursuits of staff and achievements of graduates, "Excelsior Life: Distance EDU on Demand" is the insider's source for all things Excelsior, whether across campus or around the world.
-
100
Excelsior LIVE: Ethics of Using Games
Karen Schrier is an Assistant Professor of Media Arts at Marist College and Director of the Games and Emerging Media program. She joins the podcast to discuss some of the ethical issues around the use of games in education.
-
99
Excelsior LIVE: Tina Goodyear on the need for alternative education quality assurance
Tina Goodyear, COO of the Presidents' Forum, joins the podcast to discuss recent efforts exploring the need for a quality assurance entity (QAE) for alternative education providers, such as coding bootcamps. The project, led by the Presidents' Forum and Distance Education Accreditation Commission (DEAC), is being funded by a $150,000 planning grant from USA Funds. Resources Tina Goodyear Expert Profile Presidents' Forum DEAC USA Funds
-
98
Excelsior LIVE: Nick Fortugno on storytelling for learning
Nick Fortugno is recognized around the world as a leading game designer, narrative and story expert as well as an entrepreneur of digital and real-world games. The chief creative officer of Playmatics joins the podcast to discuss his upcoming presentation at Revolutionary Learning 2016: Storytelling for Learning. Resources Revolutionary Learning 2016 Nick Fortugno Profile Storytelling for Learning (Presentation) Playmatics
-
97
Excelsior LIVE: Clark Aldrich on teaching and learning via short simulations
Clark Aldrich, one of the top educational simulation designers in the world and the founder and Managing Partner of Clark Aldrich Designs, joins the podcast to discuss the game changing nature of short simulations as an educational tool.
-
96
Excelsior LIVE: Tina Goodyear on "The Case for CACE"
Tina Goodyear, COO of the Presidents' Forum, joins Excelsior Live to discuss the new Consortium for the Assessment of College Equivalency, which brings together six institutions with expertise in Prior Learning Assessment and allows them to collaborate, pool their resources, and set common standards that could drastically improve how all of higher education facilitates the awarding of academic credit for workplace training. Resources The Case for CACE: The Consortium for the Assessment of College Equivalency (WCET) Tina Goodyear Expert Profile
-
95
Excelsior LIVE: Avery Rueb on good game design
In part two of the interview with the co-founders of Affordance Studio, Avery Rueb, discusses his Revoluionary Learning 2016 presentation: Brainstorm Cards: Playing a Card Game to Learn about Good Game Design.
-
94
Excelsior LIVE: Pascal Nataf and Avery Rueb on teaching academics to think like game designers
Pascal Nataf, co-founder of Affordance Studio, a serious game company based in Montreal and a Quebec Entrepreneur of the Year finalist joins Excelsior LIVE to discuss all things educational gaming. In part two of the interview, Avery Rueb, Affordance Studio's other co-founder, joins the podcast to discuss his upcoming Revolutionary Learning 2016 presentation: Brainstorm Cards: Playing a Card Game to Learn about Good Game Design. Full Interview with Pascal Nataf and Avery Rueb Avery Rueb segment More information Affordance Studio Revolutionary Learning Avery Rueb Revolutionary Learning Conference profile Brainstorm Cards: Playing a Card Game to Learn about Good Game Design (Revolutionary Learning session)
-
93
Excelsior LIVE: Dorcey Applyrs on public health and economic development
Dorcey Applyrs, DrPH, MPH, faculty program director for Excelsior College, discusses the reciprocal relationship between public health and economic development.
-
92
Excelsior LIVE: Braddock on Excelsior College Student Success Center
In this audio-only version of this Excelsior LIVE broadcast, Glenn Braddock, PhD, executive director of the new Excelsior College Student Success Center, discusses the new initiative, the differences between academic coaches and academic advisors, and the need for more personalized student support across all of higher education.
-
91
Excelsior LIVE: Andrew Hurd on cybersecurity workforce development
Dr. Andrew Hurd, faculty program director for cybersecurity at Excelsior College, discusses the NSA Day of Cyber, what drew him to Excelsior and distance education, and why so many employers are struggling to both build an educated and adaptable cyber workforce and create an informed cyber culture.
-
90
Today in Cybersecurity: Virtualization Security
Once an organization begins employing virtualization, they become less secure unless they utilize fault tolerance to keep things running in the event of the loss of a physical server running multiple virtual machines. James Antonakos of the National Cybersecurity Institute explains.
-
89
Today in Cybersecurity: Insider versus Outsider Threats
Threats come from inside through employees or vendors, and from the outside through hackers or infected websites. Both types of threats should be considered and policies and procedures developed for each threat. James Antonakos of the National Cybersecurity Institute explains.
-
88
Today in Cybersecurity: Physical Security
Physical security has to do with all aspects of making sure that information systems are protected from anything in their physical environment. James Antonakos of the National Cybersecurity Institute explains.
-
87
Today in Cybersecurity: Honeypots
A honeypot is a computer on a network that is deliberately vulnerable, in order to lure attackers away from other more critical systems. This keeps the attacker busy giving attention to a systems that has no real information on it. James Antonakos of the National Cybersecurity Institute explains.
-
86
Today in Cybersecurity: Separation of Duties
Separation of duties, together with the principle of least privilege, are two important areas to address in order to reduce or eliminate fraud and protect the organization. One individual should not perform multiple duties, to prevent the possibility of improper actions. James Antonakos of the National Cybersecurity Institute explains.
-
85
Today in Cybersecurity: The Principle of Least Privilege
An individual should only be given the least amount of privilege necessary to do their job. Granting more access than is necessary can lead to unnecessary security violations. James Antonakos of the National Cybersecurity Institute explains.
-
84
Today in Cybersecurity: Access Control
Access control is applied to packets on a network, connections between computers, and users and their ability to access files and folders on company systems. Controlling access is essential to security in keeping information out of the wrong hands. James Antonakos of the National Cybersecurity Institute explains.
-
83
Today in Cybersecurity: The Cloud
What is the cloud? Where is it located? How is our data protected while in the cloud? What happens when there is a problem within the cloud provider? Why is it important to read the cloud license agreement? James Antonakos of the National Cybersecurity Institute explains.
-
82
Today in Cybersecurity: Penetration Testing
Penetration testing is a process in which we try to infiltrate computers or devices on a network from the outside or the inside, typically using a black box test or a white box test. James Antonakos of the National Cybersecurity Institute explains.
-
81
Today in Cybersecurity: Baselining
Baselining is a technique we use to enhance our security and alert us that something is not right and may need further investigation. Any behavior that does not fit the baseline should be considered suspicious until it is examined. James Antonakos of the National Cybersecurity Institute explains.
-
80
Today in Cybersecurity: Disaster Recovery and Business Continuity
Disaster recovery is part of business continuity, and is concerned with getting essential services for the organization up and running as fast as possible after a disaster. Business continuity is concerned with the long-term health and growth of the company. James Antonakos of the National Cybersecurity Institute explains.
-
79
Today in Cybersecurity: Passwords
Passwords are the single most common thing we use to authenticate ourselves to a computer system. But it is surprising how little care people use in choosing and managing their passwords. James Antonakos of the National Cybersecurity Institute explains.
-
78
Today in Cybersecurity: Zero-day Attacks
A zero-day attack is a malware attack that is so new it is not recognized by signature-based anti-virus software, and is therefore able to infect a system without detection. James Antonakos of the National Cybersecurity Institute explains.
-
77
Today in Cybersecurity: Computer Forensics
Computer forensics is a set of processes used to acquire and analyze digital evidence. This is useful in determining how malware entered a system and also for proving or disproving that information of a certain form exists or does not exist on a system. James Antonakos of the National Cybersecurity Institute explains.
-
76
Today in Cybersecurity: Risk Assessment
A risk assessment is used to identify assets within an organization, determine the threats to those assets, evaluate the probabilities of the asset being compromised, the impact to the organization, and a plan to mitigate or eliminate the risks. James Antonakos of the National Cybersecurity Institute explains.
-
75
Today in Cybersecurity: Encryption
Encryption is a process where we take information that is readable and make it unreadable. Symmetric encryption uses one key to encrypt and decrypt. Asymmetric encryption uses two keys: one key to encrypt and a second key to decrypt. James Antonakos of the National Cybersecurity Institute explains.
-
74
Today in Cybersecurity: Backups
James Antonakos of the National Cybersecurity Institute explains the importance of performing backups on a regular basis, testing the backups to make sure they work, and with storing the backups off site so they are not destroyed during a disaster.
-
73
Today in Cybersecurity: Social Engineering
James Antonakos of the National Cybersecurity Institute explains social engineering. This technique is essentially clever lying or deception, where one human tricks another human to obtain information or access to a restricted area.
-
72
Today in Cybersecurity: Layered Security
Security must be built in layers, with each layer providing a different measure of security, such as hardware, software, and even human behavior. James Antonakos of the National Cybersecurity Institute explains.
-
71
Today in Cybersecurity: Authentication
Authentication is how a human proves who he or she is to a computer, using one or more of the following: something you know, something you have, or something you are. James Antonakos of the National Cybersecurity Institute explains.
-
70
Today in Cybersecurity: Confidentiality, Integrity, and Availability
All three of these areas – confidentiality, integrity, and availability - must be present in order to provide a secure information environment. This is true for information that is stored as well as transmitted. James Antonakos of the National Cybersecurity Institute explains.
-
69
Today in Cybersecurity: People, Process, and Technology
Information security depends on people, process, and technology. James Antonakos of the National Cybersecurity Institute discusses why all three areas must be utilized properly in order for a security program to be effective.
-
68
Distance EDU on Demand: Ebersole on higher education and the first National Republican debates
Normal 0 false false false EN-US X-NONE X-NONE /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Table Normal"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-priority:99; mso-style-parent:""; mso-padding-alt:0in 5.4pt 0in 5.4pt; mso-para-margin-top:0in; mso-para-margin-right:0in; mso-para-margin-bottom:10.0pt; mso-para-margin-left:0in; line-height:115%; mso-pagination:widow-orphan; font-size:11.0pt; font-family:"Calibri",sans-serif; mso-ascii-font-family:Calibri; mso-ascii-theme-font:minor-latin; mso-hansi-font-family:Calibri; mso-hansi-theme-font:minor-latin;} In response to last night’s National Republican debates, Excelsior College President John Ebersole offered the following response. “In last night’s Republican debates, little was said about either K-12 or higher education. While the Common Core curriculum received passing criticism, slightly more attention was given to the role of the Federal government in quality setting as opposed to those of the states. Senator Rubio of Florida, who has been an instructor at Florida International University and is a frequent critic of higher education, described how the U.S. government frequently uses Federal funding to pursue interests that may be at odds with those of the State or educational systems. He also mentions that like many college graduates, he had amassed considerable student loan debt. However, he says this in the context of pulling himself up from humble beginnings and seem to suggest that education may have played an important role in his success. In the earlier debate between the candidates, especially those who are still languishing in the polls, I had thought that Governor Jindal, a former president in the University of Louisiana system, might make a connection between the critical need for more education and training in cybersecurity. Here, the government is reporting shortages running in the thousands (of workers) and there is a clear connection between more education and our nation’s security. Additionally, a similar connection exists between the workforce of the future and our economic prosperity. Labor workforce researchers are now reporting that 60 percent of future jobs will require more than a secondary education. The need for greater emphasis on education and degree completion is now intertwined with that of economic growth and future prosperity. Hopefully in the weeks and months to come, the candidates on both sides of the aisle will be spending more time talking about education and the role that it plays in making for a better life and a better society for all. Let’s keep our fingers crossed.”
-
67
Distance EDU on Demand: Berenson on how online college students can find a mentor
Normal 0 false false false EN-US X-NONE X-NONE /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Table Normal"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-priority:99; mso-style-parent:""; mso-padding-alt:0in 5.4pt 0in 5.4pt; mso-para-margin-top:0in; mso-para-margin-right:0in; mso-para-margin-bottom:10.0pt; mso-para-margin-left:0in; line-height:115%; mso-pagination:widow-orphan; font-size:11.0pt; font-family:"Calibri",sans-serif; mso-ascii-font-family:Calibri; mso-ascii-theme-font:minor-latin; mso-hansi-font-family:Calibri; mso-hansi-theme-font:minor-latin;} Dr. Robin Berenson, associate dean, School of Business and Technology, joins the Distance EDU on Demand podcast to discuss how adults returning to college online can find and connect with a mentor who can help guide them through their academic and professional pursuits. Topics include: · How early in the process adults should begin to think about mentorship · How newly enrolled students can find a mentor within an online classroom or on social media · Advice on approaching a potential mentor and determining whether they would be a good fit · Setting and managing expectations Show Notes Mentorship Program – Lt. Col. Bryant A. Murray Veterans Center at Excelsior College
-
66
Distance EDU on Demand: Tom Dalton on FAFSA simplification
Normal 0 false false false EN-US X-NONE X-NONE /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Table Normal"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-priority:99; mso-style-parent:""; mso-padding-alt:0in 5.4pt 0in 5.4pt; mso-para-margin-top:0in; mso-para-margin-right:0in; mso-para-margin-bottom:10.0pt; mso-para-margin-left:0in; line-height:115%; mso-pagination:widow-orphan; font-size:11.0pt; font-family:"Calibri",sans-serif; mso-ascii-font-family:Calibri; mso-ascii-theme-font:minor-latin; mso-hansi-font-family:Calibri; mso-hansi-theme-font:minor-latin;} Beyond the iron triangle of cost, quality, and access, the narratives around the reauthorization of the Higher Education Act are focusing squarely on transparency and simplification, in particular around the Federal financial aid process. Tom Dalton, assistant vice president of Enrollment Management at Excelsior College, discusses the benefits of simplifying the Free Application for Federal Student Aid (FAFSA) and particular proposals, including the NASFAA FAFSA Working Group’s three-level means-tested application.
-
65
Distance EDU On Demand: "Commencement Stories" with Laurie Cox
Normal 0 false false false EN-US X-NONE X-NONE MicrosoftInternetExplorer4 /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Table Normal"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-priority:99; mso-style-qformat:yes; mso-style-parent:""; mso-padding-alt:0in 5.4pt 0in 5.4pt; mso-para-margin-top:0in; mso-para-margin-right:0in; mso-para-margin-bottom:10.0pt; mso-para-margin-left:0in; line-height:115%; mso-pagination:widow-orphan; font-size:11.0pt; font-family:"Calibri","sans-serif"; mso-ascii-font-family:Calibri; mso-ascii-theme-font:minor-latin; mso-fareast-font-family:"Times New Roman"; mso-fareast-theme-font:minor-fareast; mso-hansi-font-family:Calibri; mso-hansi-theme-font:minor-latin;} Laurie Cox , course chair at Samaritan Hospital School of Nursing in Troy, New York, earned her first nursing degree in 1984 - from a traditional school. More than 30 years later, she’s graduating from Excelsior College with a Master of Science in nursing. She joins the podcast to discuss what brought her back to school, initial challenges adjusting to the online classroom environment, and how her education turned her into a better leader and educator.
-
64
Distance EDU on Demand: "Commencement Stories" with Jason Duke
Jason Duke, recipient of the Jean M. Smith Award, presented to a student who demonstrates outstanding academic and professional achievement in the world of business, joins the podcast to discuss his educational journey. Duke, a supervising auto damage appraiser, earned a Bachelor of Science in Business from Excelsior with a 3.9 GPA, graduating summa cum laude. Planning to continue his educational pursuits, Duke has enrolled in Excelsior’s MBA program.
-
63
Distance EDU on Demand: Dr. David Seelow on "Revolutionary Learning"
Normal 0 false false false EN-US X-NONE X-NONE MicrosoftInternetExplorer4 /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Table Normal"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-priority:99; mso-style-qformat:yes; mso-style-parent:""; mso-padding-alt:0in 5.4pt 0in 5.4pt; mso-para-margin-top:0in; mso-para-margin-right:0in; mso-para-margin-bottom:10.0pt; mso-para-margin-left:0in; line-height:115%; mso-pagination:widow-orphan; font-size:11.0pt; font-family:"Calibri","sans-serif"; mso-ascii-font-family:Calibri; mso-ascii-theme-font:minor-latin; mso-fareast-font-family:"Times New Roman"; mso-fareast-theme-font:minor-fareast; mso-hansi-font-family:Calibri; mso-hansi-theme-font:minor-latin;} Dr. David Seelow joins the podcast to discuss the development of the Center for Game and Simulation-Based Learning, why he wants to spark a revolution in learning, and why One Flew Over the Cuckoo’s Nest is a great example of the power of games in education. The interview ends with a discussion of the Center’s upcoming Revolutionary Learning 2015: Using Games and Simulations to Solve Critical Issues in Public Health conference,scheduled for May 20 in Washington, DC. Normal 0 false false false EN-US X-NONE X-NONE MicrosoftInternetExplorer4 /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Table Normal"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-priority:99; mso-style-qformat:yes; mso-style-parent:""; mso-padding-alt:0in 5.4pt 0in 5.4pt; mso-para-margin-top:0in; mso-para-margin-right:0in; mso-para-margin-bottom:10.0pt; mso-para-margin-left:0in; line-height:115%; mso-pagination:widow-orphan; font-size:11.0pt; font-family:"Calibri","sans-serif"; mso-ascii-font-family:Calibri; mso-ascii-theme-font:minor-latin; mso-fareast-font-family:"Times New Roman"; mso-fareast-theme-font:minor-fareast; mso-hansi-font-family:Calibri; mso-hansi-theme-font:minor-latin;} 0:31 The idea. 3:31 First year reflections. 7:14 “What kind of revolution do you seek?” 8:55 What “One Flew Over the Cuckoo’s Nest” can teach us about the power of games in education. 12:00 How games can solve public health challenges. 15:48 Revolutionary Learning 2015.
-
62
Distance EDU On Demand: Revolutionary Learning 2015
Normal 0 false false false EN-US X-NONE X-NONE MicrosoftInternetExplorer4 /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Table Normal"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-priority:99; mso-style-qformat:yes; mso-style-parent:""; mso-padding-alt:0in 5.4pt 0in 5.4pt; mso-para-margin-top:0in; mso-para-margin-right:0in; mso-para-margin-bottom:10.0pt; mso-para-margin-left:0in; line-height:115%; mso-pagination:widow-orphan; font-size:11.0pt; font-family:"Calibri","sans-serif"; mso-ascii-font-family:Calibri; mso-ascii-theme-font:minor-latin; mso-fareast-font-family:"Times New Roman"; mso-fareast-theme-font:minor-fareast; mso-hansi-font-family:Calibri; mso-hansi-theme-font:minor-latin;} Dr. David Seelow, founder of the Center for Game and Simulation-Based Learning, discusses the upcoming Revolutionary Learning 2015: Using Games and Simulations to Solve Critical Issues in Public Health. The event will be held on May 20 in Washington, DC.
-
61
Initiative for Women in Cybersecurity: Interview with Anne Kohnke, PhD
Normal 0 false false false EN-US X-NONE X-NONE /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Table Normal"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-priority:99; mso-style-qformat:yes; mso-style-parent:""; mso-padding-alt:0in 5.4pt 0in 5.4pt; mso-para-margin-top:0in; mso-para-margin-right:0in; mso-para-margin-bottom:10.0pt; mso-para-margin-left:0in; line-height:115%; mso-pagination:widow-orphan; font-size:11.0pt; font-family:"Calibri","sans-serif"; mso-ascii-font-family:Calibri; mso-ascii-theme-font:minor-latin; mso-fareast-font-family:"Times New Roman"; mso-fareast-theme-font:minor-fareast; mso-hansi-font-family:Calibri; mso-hansi-theme-font:minor-latin;} The goal of the National Cybersecurity Initiative for Women in Cybersecurity is to offer support and solutions to women in cybersecurity by offering skills training and identifying best practices for utilization by women in the cyber security field to help understand and influence perceptions. Women in Cybersecurity Leadership will cover best practices utilized by women in the cybersecurity field in various areas of critical infrastructure. Each podcast will feature a noted woman leader in the cyber security arena who will share with Who she is! What she does! and How she gets it done! Interviewee: Anne Kohnke, PhD is an Assistant Professor of IT at Lawrence Technological University and teaches courses in both the Information Technology and Organization Development/Change Management disciplines at the bachelor through doctorate levels. Anne started as an Adjunct Professor in 2002 and joined the faculty full-time in 2011. Prior to joining LTU, Anne worked in Industry for 25 years where she focused in information technology and management. Her IT career started in the mid-1980's on a help desk, and over the years Anne developed technical proficiency as a database administrator, network administrator, and technical business analyst. After a decade, Anne was promoted to management and worked as a project manager, IT Director, and Vice President of IT and Chief Information Security Officer (CISO). Dr. Kohnke's technical experience and organization development background aided her in building collaborative, high performance teams to work on complex medium to large-scale technical projects. Anne has managed multi-million dollar IT budgets in fast paced entrepreneurial environments. As a former CISO, Anne has extensive hands-on experience in risk management, IT security controls, IT governance, and IT audits to include NIST and PCI certifications. Dr. Kohnke earned her PhD from Benedictine University and an MBA from Lawrence Technological University.
-
60
Distance EDU On Demand: Excelsior College Student Success Center
Glen Braddock, director of student success at Excelsior, presents to the college community on the development of the Excelsior College Student Success Center. Braddock discusses the central role of academic advising, enhanced student services, data informed outreach to vulnerable student populations, and other efforts to increase persistence, retention, and graduation rates.
-
59
Distance EDU On Demand: How to fund higher education innovation
Normal 0 false false false EN-US X-NONE X-NONE MicrosoftInternetExplorer4 /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Table Normal"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-priority:99; mso-style-qformat:yes; mso-style-parent:""; mso-padding-alt:0in 5.4pt 0in 5.4pt; mso-para-margin-top:0in; mso-para-margin-right:0in; mso-para-margin-bottom:10.0pt; mso-para-margin-left:0in; line-height:115%; mso-pagination:widow-orphan; font-size:11.0pt; font-family:"Calibri","sans-serif"; mso-ascii-font-family:Calibri; mso-ascii-theme-font:minor-latin; mso-fareast-font-family:"Times New Roman"; mso-fareast-theme-font:minor-fareast; mso-hansi-font-family:Calibri; mso-hansi-theme-font:minor-latin;} The Office of Grant Writing and Management at Excelsior College discusses how to write a winning award proposal and what it takes to secure funding for the institution’s most innovative projects and initiatives. Guests include Patti Croop, Director of Grants and Research, Bethany de Barros, Grants Manager, and Jane Weyers, Grants Writer. 0:24 HESC Grant and the key elements of a successful proposal. 3:04 Data and building upon existing research. 4:27 Managing multiple stakeholders. 5:36 Are successful grant proposals always successful grants projects? 6:50 Every proposal demands a “champion.” 7:43 Challenges and opportunities. 8:52 How does a proposal get started? Vetted? 10:35 Why great proposals don’t start with a funder, but with an idea.
-
58
Distance EDU on Demand: Nursing entrepreneur Robert Freeman
Normal 0 false false false EN-US X-NONE X-NONE MicrosoftInternetExplorer4 /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Table Normal"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-priority:99; mso-style-qformat:yes; mso-style-parent:""; mso-padding-alt:0in 5.4pt 0in 5.4pt; mso-para-margin-top:0in; mso-para-margin-right:0in; mso-para-margin-bottom:10.0pt; mso-para-margin-left:0in; line-height:115%; mso-pagination:widow-orphan; font-size:11.0pt; font-family:"Calibri","sans-serif"; mso-ascii-font-family:Calibri; mso-ascii-theme-font:minor-latin; mso-fareast-font-family:"Times New Roman"; mso-fareast-theme-font:minor-fareast; mso-hansi-font-family:Calibri; mso-hansi-theme-font:minor-latin;} Clinical nurse specialist and tech entrepreneur Robert Freeman, ’14, discusses how Excelsior’s Master of Science in nursing program prepared him for a career in health care and innovation.
-
57
Today in Cybersecurity: How to Establish Effective Cybersecurity Metrics
Normal 0 false false false EN-US X-NONE X-NONE /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Table Normal"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-priority:99; mso-style-qformat:yes; mso-style-parent:""; mso-padding-alt:0in 5.4pt 0in 5.4pt; mso-para-margin-top:0in; mso-para-margin-right:0in; mso-para-margin-bottom:10.0pt; mso-para-margin-left:0in; line-height:115%; mso-pagination:widow-orphan; font-size:11.0pt; font-family:"Calibri","sans-serif"; mso-ascii-font-family:Calibri; mso-ascii-theme-font:minor-latin; mso-fareast-font-family:"Times New Roman"; mso-fareast-theme-font:minor-fareast; mso-hansi-font-family:Calibri; mso-hansi-theme-font:minor-latin;} In this National Cybersecurity Institute podcast, Derek Smith provides a definition of security metrics, explains the value of these metrics, and provides seven steps for building a security metrics program. Derek A. Smith Biography Derek A. Smith is the Director of Cyber Security Initiatives at the National Cyber Security Institute at Excelsior College. Mr. Smith has years of government and military leadership experience and holds an MBA, Master of Science in Information Assurance, Master in Information Technology Project Management, and B.S in Education. He also holds the following certifications: Certified Information Systems Security Professional (CISSP), Certified Authorization Professional (CAP), Certified Ethical Hacker (CEH), Certified Hacking Forensic Investigator, Computer Network Defense Architect, Certified EC-Council Instructor, Certified SCADA Security Architect (CSSA), and Security+.
-
56
Today in Cybersecurity: The Importance of Security Awareness Training
Normal 0 false false false EN-US X-NONE X-NONE MicrosoftInternetExplorer4 /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Table Normal"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-priority:99; mso-style-qformat:yes; mso-style-parent:""; mso-padding-alt:0in 5.4pt 0in 5.4pt; mso-para-margin-top:0in; mso-para-margin-right:0in; mso-para-margin-bottom:10.0pt; mso-para-margin-left:0in; line-height:115%; mso-pagination:widow-orphan; font-size:11.0pt; font-family:"Calibri","sans-serif"; mso-ascii-font-family:Calibri; mso-ascii-theme-font:minor-latin; mso-fareast-font-family:"Times New Roman"; mso-fareast-theme-font:minor-fareast; mso-hansi-font-family:Calibri; mso-hansi-theme-font:minor-latin;} In this National Cybersecurity Institute podcast, Derek A. Smith discusses the importance of organizations having a good security awareness program and provides seven tips to more effectively communicate and educate employees on the topic of security awareness. Derek A. Smith Biography Derek A. Smith is the Director of Cyber Security Initiatives at the National Cyber Security Institute at Excelsior College. Mr. Smith has years of government and military leadership experience and holds an MBA, Master of Science in Information Assurance, Master in Information Technology Project Management, and B.S in Education. He also holds the following certifications: Certified Information Systems Security Professional (CISSP), Certified Authorization Professional (CAP), Certified Ethical Hacker (CEH), Certified Hacking Forensic Investigator, Computer Network Defense Architect, Certified EC-Council Instructor, Certified SCADA Security Architect (CSSA), and Security+.
-
55
Distance EDU On Demand: Deborah Golden Alecson on Dying in America
Normal 0 false false false EN-US X-NONE X-NONE /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Table Normal"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-priority:99; mso-style-qformat:yes; mso-style-parent:""; mso-padding-alt:0in 5.4pt 0in 5.4pt; mso-para-margin-top:0in; mso-para-margin-right:0in; mso-para-margin-bottom:10.0pt; mso-para-margin-left:0in; line-height:115%; mso-pagination:widow-orphan; font-size:11.0pt; font-family:"Calibri","sans-serif"; mso-ascii-font-family:Calibri; mso-ascii-theme-font:minor-latin; mso-hansi-font-family:Calibri; mso-hansi-theme-font:minor-latin;} Deborah Golden Alecson, a faculty member in the Schools of Health Science and Nursing at Excelsior College, joins the show to discuss a September 2014 report issued by the Institute of Medicine called “Dying in America: Improving Quality and Honoring Individual Preferences Near the End of Life.” Alecson is faculty member in the Schools of Health Science and Nursing, an author, and one of Excelsior’s resident experts on death, dying and bereavement. 0:30 Top takeaways from “Dying in America” report. 4:55 “Most people aren’t planning for their demise.” 5:48 Palliative care versus hospice care. 7:50 Characteristics of the U.S. health care system that impede high quality end-of-life care. 11:45 Why a lack of physician-patient communication leads to higher ER visits. 13:38 Transparency over reimbursements. 13:26 Opportunities for improvement. 15:00 Reform - what do accountability measures look like? 16:25 Public education and awareness campaigns. Show Notes Deborah Golden Alecson Expert Profile Dying in America: Improving Quality and Honoring Individual Preferences Near the End of Life (Institute of Medicine) School of Health Sciences School of Nursing
-
54
Today in Cybersecurity: Cyber Stalking...Protect Yourself
Normal 0 false false false EN-US X-NONE X-NONE MicrosoftInternetExplorer4 /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Table Normal"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-priority:99; mso-style-qformat:yes; mso-style-parent:""; mso-padding-alt:0in 5.4pt 0in 5.4pt; mso-para-margin-top:0in; mso-para-margin-right:0in; mso-para-margin-bottom:10.0pt; mso-para-margin-left:0in; line-height:115%; mso-pagination:widow-orphan; font-size:11.0pt; font-family:"Calibri","sans-serif"; mso-ascii-font-family:Calibri; mso-ascii-theme-font:minor-latin; mso-hansi-font-family:Calibri; mso-hansi-theme-font:minor-latin;} Cyber Stalking is a new occurrence that media and law enforcement have struggled to define. In this National Cybersecurity Institute podcast, Dr. Deanne Cranford-Wesley will define cyber stalking, discuss its targets, what law enforcement is combating the problem, and present ways to protect yourself from cyber stalking. Dr. Deanne Cranford-Wesley Dr. Deanne Cranford-Wesley is a fellow at the National Cybersecurity Institute (NCI) and is the Department Coordinator of the Information System Security Program at Forsyth Technical Community College. Dr. Cranford -Wesley is a cybersecurity professional and has appeared as a subject matter expert on Fox8 and Time Warner News discussing recent advances in cyber security vulnerability. She holds a PhD in Education Leadership with a focus in Instructional Technology and a Master of Art in Administration. Furthermore, she has obtained the following certifications; Security +, Cisco Certified Network Professional (CCNP®), Cisco Certified Network Associate (CCNA®), and Cisco Certified Instructor (CCAI).
-
53
Today in Cybersecurity: Preventing Online Identity Theft
Normal 0 false false false EN-US X-NONE X-NONE MicrosoftInternetExplorer4 /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Table Normal"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-priority:99; mso-style-qformat:yes; mso-style-parent:""; mso-padding-alt:0in 5.4pt 0in 5.4pt; mso-para-margin-top:0in; mso-para-margin-right:0in; mso-para-margin-bottom:10.0pt; mso-para-margin-left:0in; line-height:115%; mso-pagination:widow-orphan; font-size:11.0pt; font-family:"Calibri","sans-serif"; mso-ascii-font-family:Calibri; mso-ascii-theme-font:minor-latin; mso-hansi-font-family:Calibri; mso-hansi-theme-font:minor-latin;} In this National Cybersecurity Institute podcast, former Federal investigator Derek A. Smith offers several ways to protect your personal information while working online. Derek A. Smith Biography Derek A. Smith is the Director of Cyber Security Initiatives at the National Cyber Security Institute at Excelsior College. Mr. Smith has years of government and military leadership experience and holds an MBA, Master of Science in Information Assurance, Master in Information Technology Project Management, and B.S in Education. He also holds the following certifications: Certified Information Systems Security Professional (CISSP), Certified Authorization Professional (CAP), Certified Ethical Hacker (CEH), Certified Hacking Forensic Investigator, Computer Network Defense Architect, Certified EC-Council Instructor, Certified SCADA Security Architect (CSSA), and Security+.
-
52
Today in Cybersecurity: Are Public Wireless Networks Safe?
Normal 0 false false false EN-US X-NONE X-NONE MicrosoftInternetExplorer4 /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Table Normal"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-priority:99; mso-style-qformat:yes; mso-style-parent:""; mso-padding-alt:0in 5.4pt 0in 5.4pt; mso-para-margin-top:0in; mso-para-margin-right:0in; mso-para-margin-bottom:10.0pt; mso-para-margin-left:0in; line-height:115%; mso-pagination:widow-orphan; font-size:12.0pt; mso-bidi-font-size:11.0pt; font-family:"Times New Roman","serif"; mso-bidi-font-family:"Times New Roman"; mso-bidi-theme-font:minor-bidi;} In this National Cybersecurity Institute podcast, Derek Smith highlights security threats you may encounter when using public wireless access points, and explains what you need to know to use wireless safely in public. Normal 0 false false false EN-US X-NONE X-NONE MicrosoftInternetExplorer4 /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Table Normal"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-priority:99; mso-style-qformat:yes; mso-style-parent:""; mso-padding-alt:0in 5.4pt 0in 5.4pt; mso-para-margin-top:0in; mso-para-margin-right:0in; mso-para-margin-bottom:10.0pt; mso-para-margin-left:0in; line-height:115%; mso-pagination:widow-orphan; font-size:12.0pt; mso-bidi-font-size:11.0pt; font-family:"Times New Roman","serif"; mso-bidi-font-family:"Times New Roman"; mso-bidi-theme-font:minor-bidi;} Derek A. Smith Biography Derek A. Smith is the Director of Cyber Security Initiatives at the National Cyber Security Institute at Excelsior College. Mr. Smith has years of government and military leadership experience and holds an MBA, Master of Science in Information Assurance, Master in Information Technology Project Management, and B.S in Education. He also holds the following certifications: Certified Information Systems Security Professional (CISSP), Certified Authorization Professional (CAP), Certified Ethical Hacker (CEH), Certified Hacking Forensic Investigator, Computer Network Defense Architect, Certified EC-Council Instructor, Certified SCADA Security Architect (CSSA), and Security+.
-
51
Today in Cybersecurity: Cyber Investigations....What is the Procedure?
Normal 0 false false false EN-US X-NONE X-NONE MicrosoftInternetExplorer4 /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Table Normal"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-priority:99; mso-style-qformat:yes; mso-style-parent:""; mso-padding-alt:0in 5.4pt 0in 5.4pt; mso-para-margin-top:0in; mso-para-margin-right:0in; mso-para-margin-bottom:10.0pt; mso-para-margin-left:0in; line-height:115%; mso-pagination:widow-orphan; font-size:11.0pt; font-family:"Calibri","sans-serif"; mso-ascii-font-family:Calibri; mso-ascii-theme-font:minor-latin; mso-fareast-font-family:"Times New Roman"; mso-fareast-theme-font:minor-fareast; mso-hansi-font-family:Calibri; mso-hansi-theme-font:minor-latin;} In this National Cybersecurity Institute podcast, Dr. Deanne Cranford-Wesley discusses the topic of cyber investigations and various procedures that an investigator may utilize during a crime investigation. Normal 0 false false false EN-US X-NONE X-NONE MicrosoftInternetExplorer4 /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Table Normal"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-priority:99; mso-style-qformat:yes; mso-style-parent:""; mso-padding-alt:0in 5.4pt 0in 5.4pt; mso-para-margin-top:0in; mso-para-margin-right:0in; mso-para-margin-bottom:10.0pt; mso-para-margin-left:0in; line-height:115%; mso-pagination:widow-orphan; font-size:11.0pt; font-family:"Calibri","sans-serif"; mso-ascii-font-family:Calibri; mso-ascii-theme-font:minor-latin; mso-fareast-font-family:"Times New Roman"; mso-fareast-theme-font:minor-fareast; mso-hansi-font-family:Calibri; mso-hansi-theme-font:minor-latin;} Dr. Deanne Cranford-Wesley Dr. Deanne Cranford-Wesley is a fellow at the National Cybersecurity Institute (NCI) and is the Department Coordinator of the Information System Security Program at Forsyth Technical Community College. Dr. Cranford -Wesley is a cybersecurity professional and has appeared as a subject matter expert on Fox8 and Time Warner News discussing recent advances in cyber security vulnerability. She holds a PhD in Education Leadership with a focus in Instructional Technology and a Master of Art in Administration. Furthermore, she has obtained the following certifications; Security +, Cisco Certified Network Professional (CCNP®), Cisco Certified Network Associate (CCNA®), and Cisco Certified Instructor (CCAI).
We're indexing this podcast's transcripts for the first time — this can take a minute or two. We'll show results as soon as they're ready.
No matches for "" in this podcast's transcripts.
No topics indexed yet for this podcast.
Loading reviews...
ABOUT THIS SHOW
"Excelsior Life: Distance EDU on Demand" showcases the people, events, and programs that make Excelsior a vibrant community. Ranging from behind-the-scenes looks at faculty research to the passionate pursuits of staff and achievements of graduates, "Excelsior Life: Distance EDU on Demand" is the insider's source for all things Excelsior, whether across campus or around the world.
HOSTED BY
Mike Lesczinski
CATEGORIES
Loading similar podcasts...