{"id":1102,"date":"2012-12-02T11:34:54","date_gmt":"2012-12-02T16:34:54","guid":{"rendered":"http:\/\/community.mis.temple.edu\/cybersecurity-center\/?page_id=1102"},"modified":"2018-07-25T11:11:42","modified_gmt":"2018-07-25T15:11:42","slug":"current-students-2","status":"publish","type":"page","link":"https:\/\/community.mis.temple.edu\/cybersecurity-center\/current-students-2\/","title":{"rendered":"Resources"},"content":{"rendered":"<p>Fox MIS ITACS\u00a0students have access to the world-class resources of the\u00a0<a href=\"http:\/\/sbm.temple.edu\">Fox School\u00a0of Business<\/a>\u00a0and the\u00a0<a href=\"http:\/\/community.mis.temple.edu\" target=\"_blank\" rel=\"noopener\">Department of Management Information Systems<\/a>. ITACS students are provided access to resources of Temple University&#8217;s research\u00a0<a href=\"https:\/\/library.temple.edu\/\">library system<\/a>, Gartner Inc.&#8217;s Information Technology (IT) research portal, and computational resources of Fox School&#8217;s teaching laboratories. ITACS degree students are also provided with a starter <a href=\"https:\/\/www.isaca.org\/Membership\/Professional-Membership\/Pages\/Benefits.aspx\">ISACA membership<\/a> which provides access to a broad range of ITACS knowledge products, authoritative publications and practical guidance.<\/p>\n<p>In addition to research materials, Students work with a wide range of software resources including IT infrastructure capabilities from Microsoft and\u00a0<a href=\"https:\/\/www.vmware.com\/\">VMware<\/a>, information security tools from leading vendors such as <a href=\"https:\/\/www.acl.com\/\">ACL<\/a>, <a href=\"https:\/\/www.tenable.com\/products\/nessus-vulnerability-scanner\">Nessus and<\/a>\u00a0<a href=\"https:\/\/portswigger.net\/burp\">BurpSuite<\/a>, <a href=\"https:\/\/en.wikipedia.org\/wiki\/Open-source_software\">open source software<\/a>\u00a0products such as <a href=\"https:\/\/www.kali.org\/\">Kali Linux<\/a>, <a href=\"https:\/\/www.wireshark.org\/\">Wireshark<\/a>, and public domain software tools from governmental agencies such as the Department of Homeland <a href=\"https:\/\/cset.inl.gov\/SitePages\/Home.aspx\">Security&#8217;s Cyber Security Evaluation Tool<\/a>. \u00a0We care about our students and if you have a problem or question, please do not hesitate to contact the Associate Director, <a href=\"\/jallegra\">Joseph Allegra<\/a>.<\/p>\n<h3>ITACS career counseling<\/h3>\n<p>ITACS\u00a0students receive one-on-one career counseling provided by the <a href=\"http:\/\/www.fox.temple.edu\/institutes-and-centers\/center_for_student_professional_development\/\">Fox Business School&#8217;s Center for Student Professional Development<\/a>\u00a0(CSPD). \u00a0You will have the opportunity\u00a0to sit down with career counselors, <a href=\"http:\/\/community.mis.temple.edu\/cybersecurity-center\/faculty\/\">ITACS faculty<\/a>, <a href=\"http:\/\/community.mis.temple.edu\/cybersecurity-center\/about\/advisory-council\/\">ITACS Advisory Council<\/a> members, and the <a href=\"http:\/\/community.mis.temple.edu\/dlanter\/\">ITACS Program Director<\/a> &#8211; all possessing significant industry experience and able to provide you with insight into the roles ITACS\u00a0professionals play in organizations and potential career paths offered in industry and government. You will opportunities to meet one on one with career counselors, discuss your career goals and learn about ITACS\u00a0career paths best aligned with your interests. <span style=\"color: #222222;\">en.<\/span>\u00a0Career counseling is offered by CSPD during the fall and spring terms and is available by appointment. For more information, contact Program Director Professor <a href=\"http:\/\/community.mis.temple.edu\/dlanter\/\">David Lanter<\/a>.<\/p>\n<h3><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-904 alignnone\" title=\"ITACS Students\" src=\"http:\/\/community.mis.temple.edu\/cybersecurity-center\/files\/2012\/08\/itacs.jpg\" alt=\"ITACS Students\" width=\"400\" height=\"320\" srcset=\"https:\/\/community.mis.temple.edu\/cybersecurity-center\/files\/2012\/08\/itacs.jpg 400w, https:\/\/community.mis.temple.edu\/cybersecurity-center\/files\/2012\/08\/itacs-300x240.jpg 300w\" sizes=\"auto, (max-width: 400px) 100vw, 400px\" \/><\/h3>\n<h3><a href=\"\/eportfolios\">Fox MIS e-portfolios<\/a><\/h3>\n<p>All ITACS students receive a site on the Fox MIS community. Students create an e-portfolio to showcase their achievements which they can share with prospective employers.<\/p>\n<h3><a href=\"http:\/\/ibit.temple.edu\/\">Institute for Business and Information Technology<\/a><\/h3>\n<p>IBIT offers extensive networking and professional development opportunities through events such as the Fox IT Symposium as well as real-world projects.<\/p>\n<h3><a href=\"http:\/\/www.fox.temple.edu\/cms_research\/institutes-and-centers\/center_for_student_professional_development\/\" target=\"_blank\" rel=\"noopener\">Center for Student Professional Development (CSPD)<\/a><\/h3>\n<p>CSPD offers professional development expertise and career management workshops.<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Fox MIS ITACS\u00a0students have access to the world-class resources of the\u00a0Fox School\u00a0of Business\u00a0and the\u00a0Department of Management Information Systems. ITACS students are provided access to resources of Temple University&#8217;s research\u00a0library system, Gartner Inc.&#8217;s Information Technology (IT) research portal, and computational resources of Fox School&#8217;s teaching laboratories. ITACS degree students are also provided with a starter ISACA [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"open","ping_status":"closed","template":"","meta":{"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","jetpack_post_was_ever_published":false,"footnotes":""},"class_list":{"0":"post-1102","1":"page","2":"type-page","3":"status-publish","5":"entry"},"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/P2CTMC-hM","_links":{"self":[{"href":"https:\/\/community.mis.temple.edu\/cybersecurity-center\/wp-json\/wp\/v2\/pages\/1102","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/community.mis.temple.edu\/cybersecurity-center\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/community.mis.temple.edu\/cybersecurity-center\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/community.mis.temple.edu\/cybersecurity-center\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/community.mis.temple.edu\/cybersecurity-center\/wp-json\/wp\/v2\/comments?post=1102"}],"version-history":[{"count":29,"href":"https:\/\/community.mis.temple.edu\/cybersecurity-center\/wp-json\/wp\/v2\/pages\/1102\/revisions"}],"predecessor-version":[{"id":2823,"href":"https:\/\/community.mis.temple.edu\/cybersecurity-center\/wp-json\/wp\/v2\/pages\/1102\/revisions\/2823"}],"wp:attachment":[{"href":"https:\/\/community.mis.temple.edu\/cybersecurity-center\/wp-json\/wp\/v2\/media?parent=1102"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}