Sort by
Refine Your Search
-
Listed
-
Category
-
Country
-
Program
-
Employer
- George Mason University
- SINGAPORE INSTITUTE OF TECHNOLOGY (SIT)
- Eastern Washington University
- NTNU Norwegian University of Science and Technology
- Indiana University
- Jönköping University
- MUNSTER TECHNOLOGICAL UNIVERSITY
- National University of Science and Technology POLITEHNICA Bucharest
- North Carolina State University
- Pennsylvania State University
- UNIVERSITY OF ADELAIDE
- University of Arkansas
- University of Colorado
- University of Toronto
- University of the West of England
- 5 more »
- « less
-
Field
-
, Cyber Physical Systems security, security analytics, digital forensics, vulnerability assessment, malware analysis and defence, Privacy-enhancing technologies, AI security. Computer Science and Software
-
, security analytics, digital forensics, malware analysis, vulnerability assessment, privacy technologies, and AI security. Computer Science and Software Engineering: Software development lifecycle (SDLC
-
background, the teaching may be centred around cybersecurity (e.g., penetration testing, usable security, ICS/OT security, incident response, digital forensics, etc.), information security (e.g., risk
-
Engineering (ECE) Department offers B.S. and M.S. degrees in both Electrical Engineering and Computer Engineering, a Ph.D. in Electrical and Computer Engineering, as well as M.S. degrees in Digital Forensics
-
well as M.S. degrees in Digital Forensics and Telecommunications. The department comprises more than 30 faculty members and serves over 950 students, including more than 300 graduate students. ECE maintains a
-
up the position. If you can document that the PhD thesis has been submitted, your application can be assessed even if you have not yet defended your dissertation. Documentation of the doctoral degree
-
Qualifications: Applicants must have received a PhD in Cyber Security, Engineering, Computer Science or a related field by the start date of the position; Should have demonstrated potential for excellence and
-
positively to a diverse academic community. DESIRED CHARACTERISTICS Proficiency in at least one programming language (e.g., Python, C#, or Ruby) and platforms commonly used in digital forensics and backend
-
, Cyber Physical Systems security, security analytics, digital forensics, vulnerability assessment, malware analysis and defence, Privacy-enhancing technologies, AI security. Computer Science and Software
-
security · Distributed computing · Digital Forensics Bibliography: · KATHRYN KNERLER, INGRID PARKER, CARSON ZIMMERMAN, "11 STRATEGIES OF A WORLD-CLASS CYBERSECURITY OPERATIONS CENTER" - https://www.mitre.org