Skip to main content

Find us on

facebook youtube flickr twitter itunes u logo

 


Recent Talks
  

Harold Thimbleby

 

 

 

The Best Way to Improve Healthcare is to Improve Computers
Harold Thimbleby
Swansea University
April 23, 2015

Craig Shue

 

 

 

Managing User-Level Compromises in Enterprise Network
Craig Shue
Worcester Polytechnic Institute
March 31, 2015

 

Newsletter 

Feb news 2015

 

ISTS Information Pamphlet


2012BrochureCover

 

Institute for Security, Technology, and Society
Dartmouth College
6211 Sudikoff Laboratory
Hanover, NH 03755 USA
info.ists@dartmouth.edu
HomeEvents > SISMAT >

Applying to SISMAT


sismat2015Application deadline: May 15, 2015.

We are seeking exceptionally motivated community college students with an interest in systems security and the real-world application of cryptology. 

Prerequisites

More specifically, a qualified student applicant:

  • Has completed the core systems curriculum at their institution, which will likely entail at least two programming classes, a discrete math class, and one or more "systems" courses (e.g., advanced programming, programming in the large, operating systems, databases, or networking). Equivalent technical experience will be considered in lieu of formal coursework.
  • Can commit to attending the two-week training course June 23-July 3, 2015.  Due to the intense, "boot camp" nature of the course, students are expected to live in residence at Dartmouth College and give the course their full attention for the duration of the program. Class will be held part of the day on the interim Saturday and Sunday will be a free day.  

Applications

To apply for the SISMAT 2015 program, candidates should submit the following information by May 15.  Please submit the application form online and the rest via a single email to ISTS.  There may be a short interview via Skype or teleconference.  There are three parts to the application process that are the responsibility of the student.

  1. Complete the application form. Be sure to include the reference contact information for a technology faculty member in the appropriate field.
  2. Email: A copy of your transcript. You do not need to submit official transcripts.
  3. Email: A cover letter explaining in 2-3 paragraphs why you are interested in computer security.  

Please do NOT submit a hard copy of this information.

Attachment Formats

We ask applicants to submit letters and other attached materials in .pdf format. However, other formats (such as .rtf or .doc) are acceptable.

Last Updated: 4/15/15