Computer Information Systems
Your future. Your choice.
I was amazed how much detail goes into coding, and cybersecurity just fascinated me!
George Cameron, Chancellor of the Exchequer of the United Kingdom spoke about the importance of cybersecurity in 2016, he said:
“If we do not act decisively, the skills gap will grow, and limit everything we want to achieve in cyberspace. So we will …build the cyber skills our country needs, identifying young people with cyber talent, training them, and giving them a diversity of routes into cyber careers.”
Read the fascinating insights to Mr. Braught’s thoughts and opinions on Computer Information Systems, how they relate to CAL and changing the world forever!
“My colleague, Tobin Shields, sent an email to the staff that they needed to change their student information password as an experiment. We have a small staff, 16 teachers, and nine of them clicked on the link in the email to change their password. This was an experiment to demonstrate and educate how easy it is to fall for a phishing attack. As I mentioned in my last post, this is Cyber Awareness month and both of us are trying to educate our staff.”
Did you know October is Cyber Awareness month? Cyber Security is a misnomer as you cannot secure the cyber only the hardware and the information that is connected to the network. Hopefully, our students will be able to explain the difference to you.
I saw a tv by the tree and it was unwrapped. Huh? Why would they give me a small tv? There was a wrapped present in front of it. I looked at the tag and it was from Santa for all of us. I had to wait for my siblings to get up before I could unwrap the present. What did this have to do with the tv?
This technological infrastructure depends on well-trained professionals to support the systems and networks necessary for essential computer operations. At CAL, students learn programming, networking, and are exposed to multiple cybersecurity technologies, processes, and procedures. Our students learn how to analyze cybersecurity threats, vulnerabilities and risks and develop appropriate strategies to mitigate potential cybersecurity problems.