Lecturer, Global Health and Human Services

FDU-Vancouver is seeking a full-time lecturer in Global Health and Human Services for AY 2021-22. All qualified candidates are encouraged to apply; however, Canadians and Permanent Residents will be given priority.

Fairleigh Dickinson University is the largest private (not-for-profit) university in the state of New Jersey (USA), with campuses also in Vancouver Canada, and Wroxton, UK. It has approximately 10,000 graduate and undergraduate students and more than 100 degree programs ranging from the Associate of Arts (A.A.) to the Doctor of Philosophy (Ph.D.).

The University’s Vancouver campus currently offers the Master of Administrative Science, a professional degree program with six different specializations. The Vancouver Campus boasts an excellent and dedicated core of full- and part-time faculty; a new, state-of-the art facilities; small class sizes; close working relations between students, faculty and staff; and an intensive and unrivaled student support system focused on individual student success.

Required Qualifications:
The Ph.D. or other terminal degree is preferred, although doctoral students with teaching experience and applicants with professional qualifications will be considered. Candidates should be able to teach at least four of the following courses:

  • MADS 6637 – Computer Systems Seizure and Examination

This analytic course will cover the appropriate protocols for seizure of computer systems and their examination in cases of Internet or computer fraud, terrorism, child pornography, internet sex crimes, and other high-tech crimes or violations of organization rules and regulations. This course focuses on the matters relating to the law and technology. Includes discussions on how to manage a digital forensics operation in today’s business environment. It will explore the use of technology to retrieve data and copy data on computers and on websites without disturbing the original data/site. It will study essential protocols needed to ensure the integrity of the data from the investigation process through prosecution or administrative disciplinary procedures

  • MADS 6638 – Computer Security Administration

This course will introduce the basics of computer security (CIA-Confidentiality, Integrity, Availability) and (AAA-Authentication, Authorization, and Auditing) and investigate ways to prevent hackers from accessing websites. Encryption process and firewall protection by itself may not be enough for someone who wants to access data stored and processed on your computer system. The course will analyze formal criteria and properties of system and network security and will determine ways to improve overall IT infrastructure security. Additional topics to be reviewed include formal specifications, verification of security properties, security policies that includes hardening, and preventing an intrusion, detection and how to react to such an attempt

  • MADS 6639 – The Forensic Expert

This analytic course will study what is necessary to become a forensic expert, the methods for preparing and presenting technical information in a courtroom or administrative hearing setting, and the use of technical and scientific witnesses in the area of high-tech crimes or violations of agency rules and regulations. Appropriate interaction with criminal justice agencies to develop internal security protocols will be emphasized. Individuals will learn how to trace security intrusions, what constitutes admissible proof, how to manage evidence, and how to develop proactive initiatives in this area

  • MADS 6654 – Forensics Administration

This course examines the principles of forensics administration and how to become a forensic expert. Proper administration forensic work is required to produce consistently high-quality forensic analysis. Topics covered include training and education of forensic analysis, accreditation, proficiency testing, audits, evidence presentation, information hiding, and strategic redundancy. The course will also explore quality control and quality assurance of cyber forensics administration, cyber forensics labor in legal, political, and social context, and emerging cyber technology trends. Also, this course will introduce the methods for preparing and presenting technical information in a courtroom or administrative hearing setting, and use of technical and scientific witnesses in the area of high-tech crimes or violations of agency rules and regulations

  • MADS 6697 – Current Issues in Cyber Forensics

This course examines the principles of forensics administration and how to become a forensic expert. Proper administration forensic work is required to produce consistently high-quality forensic analysis. Topics covered include training and education of forensic analysis, accreditation, proficiency testing, audits, evidence presentation, information hiding, and strategic redundancy. The course will also explore quality control and quality assurance of cyber forensics administration, cyber forensics labor in legal, political and social context, and emerging cyber technology trends. Also, this course will introduce the methods for preparing and presenting technical information in a courtroom or administrative hearing setting, and use of technical and scientific witnesses in the area of high-tech crimes or violations of agency rules and regulations

  • MADS 6701 – Intro. To Computer Network Security

This course provides a detailed review of the network security field, including essential terminology, the history of the discipline, and practical techniques to manage implementation of network security solutions. After an overview of information, network, and web security, students will explore network perimeter defense technologies and methods, including access controls, firewalls, VPNs, and instruction detection systems, as well as applied cryptography in public key infrastructures, wireless security, and web commerce. Assessment of network security, professional careers in the field, and contingency planning are also covered. The course gives knowledge and ability to students for helping organizations protect critical information assets and secure their systems and networks, both by recognizing current threats and vulnerabilities, and by designing and developing the secure system of the future

  • MADS 6702 – Invest Comp Sys/Network Emergencies

This course will introduce students to computer system emergencies and response to these emergencies. It will explore proper techniques and system configurations to create redundancy in critical computer systems and learn proper standards for data backup and recovery. It will also cover the pros and cons of adapt encryption. Students will learn how common hacking techniques are used for computer system intrusion as well as common techniques used to obtain information from employees. Also covered will be the development of a user agreement for the workplace, remote users, vendors with access to systems and consultants

  • MADS 6735 – Introduction to Countermeasures for Malware

This course will offer ethical hacking as well as computer and network security countermeasures for the professional or personal user who encounters various types of malware such as spyware, phishing sites, spam, bots, root kits, viruses, trojans, key loggers, cookies, and hijackers. The course will include both theoretical and practical application processes to block unauthorized access, remove convert programs, and assess network vulnerabilities. The students learn about security testing and monitoring methodologies and practice their knowledge with the various penetration testing tools. In addition, it will provide mechanisms for strengthening computers and networks from malicious users

  • MADS 6773 – Current Issues Forensic Science

This course explores current issues and challenges confronting the forensic science community. The issues include reviews of the scope of forensic services, the various ways forensic services are organized, the professional and education requirements for careers in forensic science. The challenges include the uneven levels of service, the admissibility of scientific evidence and testimony in courts of law and the differences between criminal and homeland security forensic investigations

  • MADS 6830 – Cloud Security

At the end of this course, the students will be able to discuss Cloud specific policies and agreements. Threats and Risks of clouds, Best practices for cloud security, Security Challenges of cloud, Policy and governance of cloud. Compliance and legal consideration of cloud, and Risk, Audit and Assessment

  • MADS 6831 – Ethical and Legal Issues in Cybersecurity and Digital Forensics

The objective of this course is to examine the ethical and legal issues related to cybersecurity and digital forensics. The course surveys the foundational theories of ethics and applies these theories to the analysis of moral questions that often arise in the context of cybersecurity and digital forensics. The course also introduces key laws and codes of conduct that regulate practices in the cybersecurity and digital forensics field. Contemporary real-world cases will be used to highlight the ethical and legal dilemmas faced by professionals in the field

  • MADS 6832 – Data Governance

At the end of the course, the student will be able to describe; what is data governance and why it is important, Data as enterprise asset, Compliance and Risk Management, Enterprise Data Management Program, Business drivers of data governance, and Role of business and IT in data governance

Employment is contingent upon a satisfactory background check. Candidates for hire will be required to sign a waiver authorizing the background check and produce a Social Security Card.

Preferred Qualifications: Hours Worked Posting Date: 04/23/2021 Special Instructions to Applicants: Application Types Accepted: Faculty Profile

Apply Now
To help us with our recruitment effort, please indicate your email/cover letter where (vacanciesincanada.ca) you saw this job posting.

Leave a Comment

Your email address will not be published. Required fields are marked *