skip to main content
research-article

Multifarious initiatives in cybersecurity education

Published:01 September 2013Publication History

Abstract

No abstract available.

References

  1. ATE Centers, http://www.atecenters.org/ Accessed 2013 March 1Google ScholarGoogle Scholar
  2. Comprehensive National Cybersecurity Initiative, National Security Council, http://www.whitehouse.gov/cybersecurity/comprehensive-national-cybersecurity-initiative/ Accessed 2013 March 1Google ScholarGoogle Scholar
  3. CSEC, University of Tulsa, http://atecenters.org/csec/ Accessed 2013 March 1Google ScholarGoogle Scholar
  4. CSSIA, Moraine Valley Community College, http://atecenters.org/cssia/ Accessed 2013 March 1Google ScholarGoogle Scholar
  5. CyberWatch, Prince George's Community College, http://atecenters.org/cyberwatch/ Accessed 2013 March 1Google ScholarGoogle Scholar
  6. CyberWatch West, Mt. San Antonio College, http://www.cyberwatchwest.org/ Accessed 2013 March 1Google ScholarGoogle Scholar
  7. National Cybersecurity Workforce Framework, National Initiative for Cybersecurity Education, http://csrc.nist.gov/nice/framework/ Accessed 2013 March 1Google ScholarGoogle Scholar
  8. National Initiative for Cybersecurity Education, http://csrc.nist.gov/nice/ Accessed 2013 March 1Google ScholarGoogle Scholar
  9. O'Brien, M. & Kellan A. (January 28, 2013). Community College Cybersecurity Program Trains 21st Century Workforce, Science Nation, National Science Foundation, http://www.nsf.gov/news/special_reports/science_nation/cybersecurity.jsp?WT.mc_id=USNSF_51 Accessed 2013 March 1Google ScholarGoogle Scholar
  10. Perez, L., Cooper, S., Hawthorne, E., Wetzel, S., Brynielsson, J., Gökce, A., Impagliazzo, J., Khmelevsky, Y., Klee, K., Leary, M., Philips, A., Pohlmann, N., Taylor, B., Upadhyaya, S. Information assurance education in two- and four-year institutions (2011), ACM ITiCSE-WGR '11 Proceedings of the 16th annual conference reports on Innovation and technology in computer science education - working group reports; doi: 10.1145/2078856.2078860 Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. Taylor, B. & Kaza, S. Security Injections, Towson University, http://www.towson.edu/securityinjections/ Accessed 2013 March 1Google ScholarGoogle Scholar

Recommendations

Comments

Login options

Check if you have access through your login credentials or your institution to get full access on this article.

Sign in

Full Access

  • Published in

    cover image ACM Inroads
    ACM Inroads  Volume 4, Issue 3
    September 2013
    75 pages
    ISSN:2153-2184
    EISSN:2153-2192
    DOI:10.1145/2505990
    Issue’s Table of Contents

    Copyright © 2013 Copyright held by author.

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    • Published: 1 September 2013

    Permissions

    Request permissions about this article.

    Request Permissions

    Check for updates

    Qualifiers

    • research-article
    • Popular
    • Un-reviewed

PDF Format

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

HTML Format

View this article in HTML Format .

View HTML Format