The CFATE NSF project focuses on achieving three goals:
2. To offer regional professional development opportunities for educators to develop expertise needed for teaching these programs. In addition to workshops on CJ and IT integration, extensive workshops on CF and the use of state-of-the-art software are being offered. Curriculum development workshops emphasize learner-centered pedagogy that give students needed skills. CF experts work individually with faculty and mentor them as they deliver CF courses.
3. To expand the capacity in the region to attract students from diverse backgrounds to CF programs at each institution and support them in gaining employment in related positions. CFATE is creating recruitment materials such as CDs, brochures, and interactive websites to reach local schools and local and regional community organizations. This is combined with targeted personal outreach to schools and organizations.
You can get more information on the CFATE rogram at Bunker Hill Community College here. The project website at CFATE.ORG will also be up shortly.
*****
This is one of many interviews we did at SAME-TEC 2008 - there will be many more posted and you can get them different ways:
Streaming and Downloading: View streaming videos and download content using your web browser at: http://nctt.org/podcast
iTunes: If you have iTunes installed you can watch and listen to this one, watch and listen to others, and subscribe to our video and audio podcasts by following this link.
3 comments:
Thanks for the interview with Paula. She is continue to challenge not only her students and herself, but her colleagues. She is a great role-model.
Must have been past my bedtime! I meant to say: She continues to challenge not only her students and herself, but her colleagues.
Thank you for the wonderful post. Just like other forms of forensic science, computer experts use very methodical approaches to find the data they need to prove cases. There are numerous methods for revealing the information needed in a case such as the recovery of deleted, encrypted, or damaged files to reveal information stored in a computer.
Post a Comment