skip to main content
10.1145/3125659.3125715acmconferencesArticle/Chapter ViewAbstractPublication PagesiteConference Proceedingsconference-collections
poster
Public Access

Improving the Pipeline: Modules for an After-School Program for Preparing Information Assurance and Cyber Defense Professionals

Authors Info & Claims
Published:27 September 2017Publication History

ABSTRACT

There is currently significant demand for information security professionals. Preparing students to enter the workforce in an information security career often begins in college. This poster provides an overview of the educational modules used in an after-high school for college credit program to push the pipeline into high schools.

References

  1. A. Corrin. 2003. Workforce Management: Is There a Cyberseucirty Workforce Crisis? FCW: The Business of Federal Technology (2003). http://fcw.com/articles/2013/10/15/cybersecurity-workforce-crisis.aspx.Google ScholarGoogle Scholar
  2. K. Evans and F. Reeder. 2010. A Human Capital Crisis in Cybersecurity: Technical Proficiency Matters. A Report of the CSIS Commission on Cybersecurity for the 44th Presidency. Center for Strategic and International Studies (2010). http://csis.org/files/publication/101111_Evans_HumanCapital_Web.pdf.Google ScholarGoogle Scholar
  3. H. Golden. 2015. Shortage of IT Security Professionals not Unique to Government. Government Executive Media Group (April 2015). http://www.nextgov.com/ciobriefing/wired-workplace/2015/04/calling-all-information-security-professionals-world-needsyou/110338/.Google ScholarGoogle Scholar
  4. M. Loeb. 2015. Cybersecurity Talent: Worse than a Skills Shortage, It's a Critical Gap. The Hill (April 2015). http://thehill.com/blogs/congressblog/technology/239113-cybersecurity-talent-worse-than-a-skills-shortage-its-a.Google ScholarGoogle Scholar
  5. Bureau of Labor Statistics. 2012. Fastest growing occupations. (2012). http://www.bls.gov/emp/ep_table_103.htm.Google ScholarGoogle Scholar
  6. Bureau of Labor Statistics. 2015. Occupational Outlook Handbook, 2014-2015 Edition, Information Security Analysts. (2015). http://www.bls.gov/ooh/computer-andinformation-technology/information-security-analysts.htm.Google ScholarGoogle Scholar
  7. Burning Glass Technologies. 2015. Job Market Intelligence: Cybersecurity Jobs, 2015. (2015). http://burning-glass.com/wp-content/uploads/Cybersecurity_Jobs_Report_2015.pdfGoogle ScholarGoogle Scholar

Index Terms

  1. Improving the Pipeline: Modules for an After-School Program for Preparing Information Assurance and Cyber Defense Professionals

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Conferences
      SIGITE '17: Proceedings of the 18th Annual Conference on Information Technology Education
      September 2017
      202 pages
      ISBN:9781450351003
      DOI:10.1145/3125659

      Copyright © 2017 Owner/Author

      Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for third-party components of this work must be honored. For all other uses, contact the Owner/Author.

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 27 September 2017

      Check for updates

      Qualifiers

      • poster

      Acceptance Rates

      SIGITE '17 Paper Acceptance Rate23of58submissions,40%Overall Acceptance Rate176of429submissions,41%

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader