yourfanat wrote: I am using another tool for Oracle developers - dbForge Studio for Oracle. This IDE has lots of usefull features, among them: oracle designer, code competion and formatter, query builder, debugger, profiler, erxport/import, reports and many others. The latest version supports Oracle 12C. More information here.
Cloud Expo on Google News

2008 West
Data Direct
SOA, WOA and Cloud Computing: The New Frontier for Data Services
Red Hat
The Opening of Virtualization
User Environment Management – The Third Layer of the Desktop
Cloud Computing for Business Agility
CMIS: A Multi-Vendor Proposal for a Service-Based Content Management Interoperability Standard
Freedom OSS
Practical SOA” Max Yankelevich
Architecting an Enterprise Service Router (ESR) – A Cost-Effective Way to Scale SOA Across the Enterprise
Return on Assests: Bringing Visibility to your SOA Strategy
Managing Hybrid Endpoint Environments
Game-Changing Technology for Enterprise Clouds and Applications
Click For 2008 West
Event Webcasts

2008 West
Get ‘Rich’ Quick: Rapid Prototyping for RIA with ZERO Server Code
Keynote Systems
Designing for and Managing Performance in the New Frontier of Rich Internet Applications
How Can AJAX Improve Homeland Security?
Beyond Widgets: What a RIA Platform Should Offer
REAs: Rich Enterprise Applications
Click For 2008 Event Webcasts
Top Links You Must Click On

Utica College Cybersecurity Programs Earn Prestigious NSA Approval

Undergraduate, Graduate Level Courses Approved by National Security Agency

UTICA, N.Y., Jan. 15, 2013 /PRNewswire-USNewswire/ -- Utica College's cybersecurity and information assurance courses have been approved by the National Security Agency (NSA) in the college's quest to become a Center of Academic Excellence in Information Assurance Education (CAE/IAE), marking the first step in achieving the "gold standard" in education in the field.

The approval validated that Utica College courseware meets all of the elements of the Committee on National Security Systems (CNSS) rigorous standards for Information Systems Security Professionals (4011) and Risk Analyst (4016). The IACE Program provides consistency in training and education for the information assurance skills that are critical to the U.S. Courseware approval is the first step toward this prestigious designation. The Utica College programs will be recognized at the CNSS Ceremony at the 17th Colloquium for Information Systems Security Education (CISSE) in June.

"Achieving this approval took an intensive, collaborative effort by the faculty, staff and students," said Joseph Giordano, professor and chair of cybersecurity undergraduate and graduate programs at the college. "The criteria for approval is a very specific and complicated process. Seven courses from both the undergraduate and graduate programs were sent to the National Security Agency for approval," Giordano said.

Utica College has a unique graduate program with two distinct concentrations:  one in intelligence and one in computer forensics. The intelligence concentration involves counterintelligence, cyber counterterrorism, cyber countersabotage, while the computer forensics concentration is more hands-on, focusing on collecting and preparing evidence of computer crimes such as fraud, child pornography, and cyber espionage.

"Our concentrations set the Utica College graduate program apart from those of other schools," Giordano said. "Achieving this gold standard will further validate the value of these degrees."

For more information about the program, contact Giordano at or (315) 223-2521.

About Utica CollegeUtica College, founded in 1946, is a comprehensive private institution offering bachelors, masters and doctoral degrees. The College, located in upstate central New York, approximately 90 miles west of Albany and 50 miles east of Syracuse, currently enrolls over 3,700 students in 37 undergraduate majors, 29 minors, 20 graduate and a number of pre-professional and special programs.

Contact: Christine Leogrande, Director of Media Relations, (315) 223-2519
Alexis March '13 PR Intern

SOURCE Utica College

About PR Newswire
Copyright © 2007 PR Newswire. All rights reserved. Republication or redistribution of PRNewswire content is expressly prohibited without the prior written consent of PRNewswire. PRNewswire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

Enterprise Open Source Magazine Latest Stories . . .
Using any programming framework to the fullest extent possible first requires an understanding of advanced software architecture concepts. While writing a little client-side JavaScript does not necessarily require as much consideration when designing a scalable software architecture, t...
Test-driven development (TDD) has been around for a while now. Behavior-driven development (BDD), a comparably recent methodology, emerged from the practice of TDD and could reasonably be called a narrower application of TDD. The TDD process allows a developer to use a failing unit t...
Developers generally like to share their code, and many of them do so by open sourcing it on GitHub, a social code hosting and collaboration service. Many companies also use GitHub as a convenient place to host both private and public code repositories by creating GitHub organizations ...
It is no surprise that OpenStack has evolved into a widely adopted cloud management framework. As it hurtles on a trajectory of rapid growth, a new breed of demands are making themselves felt – demands that a mature platform of this nature and scope must satisfy. One such requirement i...
The combined notions of open source and the ‘community contribution’ model of collaborative software application development are, of course, not new. The history of open source is actually traced back to early software exchanges between universities driven by academic principles of kn...
Cloud computing delivers on-demand IT resources that provide businesses flexibility. The challenge is the cost and complexity of cloud security compliance (PCI, HIPAA, FFIEC). Raxak Protect automated cloud security enables cloud apps to be deployed quickly and cost-effectively. Get the...
Subscribe to the World's Most Powerful Newsletters
Subscribe to Our Rss Feeds & Get Your SYS-CON News Live!
Click to Add our RSS Feeds to the Service of Your Choice:
Google Reader or Homepage Add to My Yahoo! Subscribe with Bloglines Subscribe in NewsGator Online
myFeedster Add to My AOL Subscribe in Rojo Add 'Hugg' to Newsburst from CNET Kinja Digest View Additional SYS-CON Feeds
Publish Your Article! Please send it to editorial(at)!

Advertise on this site! Contact advertising(at)! 201 802-3021

SYS-CON Featured Whitepapers