{"id":657,"date":"2012-01-20T16:26:44","date_gmt":"2012-01-20T21:26:44","guid":{"rendered":"http:\/\/goodwin.drexel.edu\/isensor\/drho\/?page_id=657"},"modified":"2023-07-03T14:39:40","modified_gmt":"2023-07-03T14:39:40","slug":"teaching-2","status":"publish","type":"page","link":"https:\/\/shuyuanmaryho.com\/?page_id=657","title":{"rendered":"Teaching"},"content":{"rendered":"<div class=\"fcbkbttn_buttons_block\" id=\"fcbkbttn_left\"><div class=\"fcbkbttn_button\">\n                            <a href=\"https:\/\/www.facebook.com\/\" target=\"_blank\">\n                                <img decoding=\"async\" src=\"https:\/\/shuyuanmaryho.com\/wp-content\/plugins\/facebook-button-plugin\/images\/standard-facebook-ico.png\" alt=\"Fb-Button\" \/>\n                            <\/a>\n                        <\/div><div class=\"fcbkbttn_like \"><fb:like href=\"https:\/\/shuyuanmaryho.com\/?page_id=657\" action=\"like\" colorscheme=\"light\" layout=\"standard\"  width=\"450px\" size=\"small\"><\/fb:like><\/div><\/div><p><span style=\"font-family: bell mt; font-size: large;\"><span style=\"color: #ff6600;\">Information Systems Security (ISS)<\/span><br \/>\n<span style=\"font-family: Eras Light ITC; font-size: small;\"><span style=\"color: #003366;\"> Interdisciplinary Focus <\/span><\/span><\/span><\/p>\n<p><span style=\"color: #333333;\">Shuyuan has twenty years of professional knowledge and technological experience in information systems security (aka cybersecurity). Shuyuan&#8217;s teaching has focused on the intersections between computing security, information content security and information security management, which is synergistically called Information Systems Security (ISS).<\/span><\/p>\n<p><span style=\"color: #333333;\">As a cybersecurity professional and educator with extensive practical experience and knowledge, Shuyuan has taught courses in digital cyber-citizenship, as well as introduction, advanced and organizational cybersecurity essentials, and cyber defense operations. To educate the next generation on complex analysis, Shuyuan presents essential keys in evaluating\/assessing information ethics, and provides insights in innovation and emerging technologies. Shuyuan also offers doctoral seminars on research in information systems and information science at Florida State University. Shuyuan taught information security management at Universidad Ana G. M\u00e9ndez, Puerto Rico, information technology (IT), and information security architecture (ISA) at Syracuse University. Shuyuan teaches doctoral, graduate and undergraduate courses in information systems, cybersecurity, information ethics, cyber defense operations, ethics, privacy, risk analysis (RA) and risk management (RM), as well as behavioral information security.<\/span><\/p>\n<p>Shuyuan has been the faculty advisor for <a href=\"https:\/\/cybersecurity.fsu.edu\/club\/\">Cybersecurity Club<\/a> at Florida State University since 2013. Cybersecurity Club creates an interactive, hands-on and fun learning environment for students to learn from one another as well from the industry professionals.<\/p>\n<h2><strong><span style=\"color: #333333;\">Cybersecurity Curriculum\/Courses Developed<\/span><\/strong><\/h2>\n<p>Teaching cybersecurity requires objectively transferring the body of knowledge, while subjectively conveying &#8220;critical thinking&#8221; skills and &#8220;troubleshooting&#8221; ability. Shuyuan&#8217;s teaching philosophy can be best characterized by the idea that theory and practice must be integrated and interesting. Lectures, hands-on labs, and teamwork are utilized in conjunction with small-group mentoring and periodic quizzes leading up to each significant test.<\/p>\n<h4><span style=\"color: #333333;\"><strong>Florida State University<\/strong><\/span><\/h4>\n<p><span style=\"color: #333333;\">LIS6269 Seminar in Information Science (2023)<br \/>\nLIS6106 Information Systems Research in Organizations and Society (2022)<br \/>\nLIS5916\/4930 Cyber Defense Operations &amp; Incident Response (2019)<br \/>\n<\/span><span style=\"color: #333333;\">LIS5487 Information Systems Management (2014)<br \/>\n<\/span><span style=\"color: #333333;\">LIS5775 Organizational Cybersecurity (2013)<br \/>\nLIS4777 Advanced Cybersecurity (2013)<br \/>\nLIS4774 Intro to Cybersecurity (2012)<br \/>\nLIS3778 Cybersecurity for Digital Citizens (2021)<br \/>\nIDS2144 Information Ethics (2023)<br \/>\nIDS2141 Innovation &amp; Emerging Technology (2023)<\/span><\/p>\n<h4 class=\"LC20lb MBeuO DKV0Md\"><strong><span style=\"color: #333333;\">Universidad Ana G. M\u00e9ndez, Puerto Rico<\/span><br \/>\n<\/strong><\/h4>\n<p class=\"LC20lb MBeuO DKV0Md\"><span style=\"color: #333333;\">MAIS 825 Doctoral Seminar on Information Security Management (2010)<\/span><\/p>\n<h4 class=\"LC20lb MBeuO DKV0Md\"><span style=\"color: #333333;\"><strong>Drexel University<\/strong><\/span><\/h4>\n<p class=\"LC20lb MBeuO DKV0Md\"><span style=\"color: #333333;\">CST312 Intrusion Detection and Access Control (2010)<br \/>\n<\/span><span style=\"color: #333333;\">CST395 Computing Security Basics (2010)<br \/>\nCST415 Disaster Recovery (2010)<br \/>\nCT420 Computing Security Advanced (2010)<br \/>\n<\/span><span style=\"color: #333333;\">CST422 Computer Incident Response (2010)<\/span><\/p>\n<h4 class=\"LC20lb MBeuO DKV0Md\"><span style=\"color: #333333;\"><strong>Syracuse University<\/strong><\/span><\/h4>\n<p class=\"LC20lb MBeuO DKV0Md\"><span style=\"color: #333333;\">IST700, Leading and Securing Cyber Organizations co-teaching with Major General Dale W. Meyerrose, (Ret.) USAF (2008)<br \/>\nIST700 Conceptualizing Security Architecture co-developing with Scott Bernard (2006)<br \/>\nIST233 Introduction to Networking co-developing with Dave Molta (2008)<br \/>\n<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Information Systems Security (ISS) Interdisciplinary Focus Shuyuan has twenty years of professional knowledge and technological experience in information systems security (aka cybersecurity). Shuyuan&#8217;s teaching has focused on the intersections between computing security, information content security and information security management, which &hellip; <a href=\"https:\/\/shuyuanmaryho.com\/?page_id=657\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":1481,"parent":0,"menu_order":0,"comment_status":"open","ping_status":"open","template":"","meta":{"footnotes":""},"class_list":["post-657","page","type-page","status-publish","has-post-thumbnail","hentry"],"_links":{"self":[{"href":"https:\/\/shuyuanmaryho.com\/index.php?rest_route=\/wp\/v2\/pages\/657","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/shuyuanmaryho.com\/index.php?rest_route=\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/shuyuanmaryho.com\/index.php?rest_route=\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/shuyuanmaryho.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/shuyuanmaryho.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=657"}],"version-history":[{"count":46,"href":"https:\/\/shuyuanmaryho.com\/index.php?rest_route=\/wp\/v2\/pages\/657\/revisions"}],"predecessor-version":[{"id":2636,"href":"https:\/\/shuyuanmaryho.com\/index.php?rest_route=\/wp\/v2\/pages\/657\/revisions\/2636"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/shuyuanmaryho.com\/index.php?rest_route=\/wp\/v2\/media\/1481"}],"wp:attachment":[{"href":"https:\/\/shuyuanmaryho.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=657"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}