fbpx
Contact Us Apply

Institute For Cyber Security

Cybersecurity is defined as the art of protecting networks, devices, and data from unauthorized access or criminal use and the practice of ensuring confidentiality, integrity, and availability of information. 

The Institute for Cyber Security (ICS) promotes and encourages cybersecurity awareness and practice through teaching, research, and service activities.

To do this, dedicated faculty and community members train the next line of defense: IT and cybersecurity specialists.

Apply Now

benefits of the institute for cyber security

Students that participate in programs within the College’s Institute For Cyber Security have access to a number of benefits through the PC4A Grant.

  • Financial aid availability. 
  • Paid internships with local employers.
  • Paid certification tests.
  • Certificate or degree upon completion.
  • Connected to a National Center for Excellence in Cyber Defense

ICS Programs

Apply Now

Quality Programs

Programs in Computer Information Sciences uphold strong associations between both information sciences and computer sciences, treating computers as a necessary tool.

Dedicated Faculty

Our faculty are here for you. They will listen, give advice, and provide the education you need to succeed. With a student-to-faculty ratio of 18:1, every student gets a truly hands-on experience.

Accredited Institution

We are accredited by the Middle States Commission on Higher Education, the same as major four-year institutions. Your degree or certificate here will get you same the future as others.

programs within the institute for cyber security

national center of academic excellence in cyber defense

We are a National Center of Academic Excellence in Cyber Defense (CAE2Y) as designated by the National Security Agency and the Department of Homeland Security.

Member of the PC4A Consortium

Pennsylvania Highlands Community College is a part of the PC4A Consortium. PC4A is comprised of Indiana University of Pennsylvania and six community colleges in Pennsylvania. The goal of PC4A is to support and strengthen the cyber security workforce in the United States of America.

The PC4A Project is proudly funded by the US Department of Defense. Any opinions, findings, conclusions, or recommendations expressed in this material are those of the author(s) and do not necessarily reflect the views of the Office of Naval Research.

Activities

Penn Highlands has a strong working relationship through articulation agreements and more with Indiana University of Pennsylvania (IUP) that allow our Cyber Security program students the ability to attend any of their events. Click the icon for details.

Contact Us

For additional information, please contact Instructor Leisa Custer at 814.262.4862. Click the icon to email.

Faculty Members

  • Leisa Custer
  • Greg Paonessa
  • Lucas Swartz
  • John Young

Resources and Awareness

Penn Highlands is committed to protecting user confidentiality and guarding the institution against cyber security threats. The College has a full Information Security Plan that can be obtained in full from the College’s Information Technology Department.

Information Security Committee

Penn Highlands has a committee assigned to continually monitor and implement key security measures to protect the institution. The members of the committee are:

  • Matt Hoffman (Chief Information Officer)
  • John Zlater (Cloud Analyst)

Risk Management

There are internal and external risks associated with the security of Penn Highlands systems and the confidentiality of its users. These risks include, but are not limited to:

  • Loss of data integrity
  • Physical loss of information/data in a disaster or otherwise
  • Unauthorized requests for confidential information
  • Unauthorized access of confidential information by employees
  • Unauthorized transmission of confidential info through third parties
  • Viruses/Malware and/or errors introduced into our systems
  • Compromised system security by an unauthorized person
  • Unauthorized access of confidential system by a non-owner

This list is not a complete list of risks associated with the protection of confidential information. Risks can be introduced into a system at any time because technology is constantly changing and new. IT will monitor these risks regularly and address any issues that may be uncovered.

Policies and Standards

Penn Highlands has an Acceptable Use Policy and Cloud Policy that are approved by the Board of Trustees of the college. They are located in a public area that all users of the system can view. The acceptable use policy must be accepted once a user signs into a college computer and/or wireless access point.

Information Security Incident Response

Incidents are reported via the Penn Highlands IT Help Desk via telephone and/or submitting the issue via our ticketing system. If the incident is of an urgent nature, the end user is to call the Chief Information Officer’s desk and/or cell phone immediately 24/7.

Professional Organizations

Industry Organizations

follow us on social media