Appointments are made on a term-by-term basis. Adjunct faculty are required to successfully complete an online Canvas LMS orientation course before being scheduled, as well as other training if required by the department. This is a face to face course. Local applicants only.
Click on Park University Locations for more information on our campus centers.
Click on Park University’s Catalog for more information on programs and courses.
To ensure timely submission of your credentials, qualified applicants should apply following the specific instructions noted in each job posting. For all positions, a Masters Degree in the relevant field is required, along with related work and/or academic experience. For most postings, a Ph.D. or other terminal degree is preferred.
Park University is an Equal Opportunity Employer encouraging applications from women and minorities. The university will recruit and employ qualified personnel and will provide equal opportunities during employment without regard to race, color, religion, sex, sexual orientation, national origin, age, disability or status as a qualified protected veteran. Clickhereto view Park University’s EEOC and related policies.
Please Note: Park University participates in E-Verify for all positions at all campus center locations nationwide.
Minimum Qualifications
Masters or Ph.D. level degree in the discipline (CS or IS) or in a related discipline (MBA, etc.) from an accredited school AND received graduate credit with a grade of B or better in the course applied to teach, OR one year work experience in subject material of course applied to teach, OR a professional certification in Network or Computer Systems Security
The Computer Science department requires that you specifically address how professional experience, or graduate coursework pertains to Core Learning Outcome with your Questionnaire submission.
Core Learning Outcomes:
Analyze basic cryptography algorithms and their applications.
Interpret the design and implementation of fundamental security systems.
Demonstrate various security vulnerabilities.
Experiment with various cyber security attacks and countermeasures.
Course Description
This course introduces students to various security concepts, issues, and countermeasures. The topics to be examined include, but are not limited to, cryptographic techniques and applications, attack and vulnerability identification, defenses and countermeasures, security tools and techniques, and ethical and legal issues. Several of these concepts may be put into practice using laboratory exercises.