skip to main content
10.1145/3368308.3415374acmconferencesArticle/Chapter ViewAbstractPublication PagesiteConference Proceedingsconference-collections
research-article

Cross-Boundary Cyber Education Design

Published:07 October 2020Publication History

ABSTRACT

This paper provides a cross-boundary process to guide colleges and universities creating undergraduate cyber curriculum or reviewing established programs. There is growing demand for academic institutions to help close the skills gap by developing cyber curriculum preparing students for careers in cybersecurity. The cross-boundary process in this paper builds on a multi-level, multi-discipline approach previously used to launch a new undergraduate cyber program. This expanded approach recommends evaluating advisory consortium feedback, master's degree programs, certifications, and internal considerations (e.g., faculty expertise). This paper is prepared by cyber faculty at a university offering both residential and online general education courses as well as undergraduate and master's degrees in cybersecurity. This paper further advances the call for discussion on the topic of cyber education.

References

  1. CEP, 2014. About the Cyber Education Project (CEP). https://cybereducationproject.org/Google ScholarGoogle Scholar
  2. James Coker, 2020. CISSP qualification given cert status equivalent to master's degree level. In Infosecurity Magazine Infosecurity Group. https://www.infosecurity-magazine.com/Google ScholarGoogle Scholar
  3. Louis Columbus, 2019. Top 10 most popular cybersecurity certifications in 2019. In Forbes Forbes Media. (August 28).Google ScholarGoogle Scholar
  4. William Crumpler and James A. Lewis, 2019. The cybersecurity workforce gap. Center for Strategic & International Studies (CSIS). (January).Google ScholarGoogle Scholar
  5. DoD, 2018. Joint publication 3--12 cyberspace operations. US Department of Defense. Cyberspace Operations (February 13).Google ScholarGoogle Scholar
  6. ISC2, 2020. CISSP -- The world's premier cybersecurity certification (ISC)2, Clearwater, FL. https://www.isc2.org/.Google ScholarGoogle Scholar
  7. Kenneth J. Knapp, Christopher Maurer, and Miloslava Plachkinova, 2017. Maintaining a cybersecurity curriculum: Professional certifications as valuable guidance. Journal of Information Systems Education 28, 2 (December), pp. 101--113.Google ScholarGoogle Scholar
  8. McAfee, 2016. Hacking the skills shortage. (July). https://www.mcafee.com/enterprise/en-us/assets/reports/rp-hacking-skills-shortage.pdf.Google ScholarGoogle Scholar
  9. Steve Morgan, 2019. Cybersecurity talent crunch to create 3.5 million unfilled jobs globally by 2021. (October 24). https://cybersecurityventures.com/jobs/.Google ScholarGoogle Scholar
  10. NAE, 2017. NAE Grand challenges for engineering: Secure cyberspace. http://www.engineeringchallenges.org/challenges/11574.aspxGoogle ScholarGoogle Scholar
  11. NICE, 2017. NICE cybersecurity workforce framework. National Initiative for Cybersecurity Careers and Studies.Google ScholarGoogle Scholar
  12. NSA, 2020. National centers of academic excellence National Security Agency Central Security Service, Washington, DC. https://www.nsa.gov/resources/students-educators/centers-academic-excellence/.Google ScholarGoogle Scholar
  13. Paulette Perhach, 2018. The mad dash to find a cybersecurity force. In New York Times, New York, NY. (November 7). https://nyti.ms/2yZXkPZ.Google ScholarGoogle Scholar
  14. Edward Sobiesk, Jean Blair, Gregory Conti, Michael Lanham, and Howard Taylor, 2015. Cyber education: A multi-level, multi-discipline approach. In Proceedings of the 16th ACM Conference on Information Technology Education (SIGITE '15). Chicago, IL, USA., September 30--October 3 2015, ACM Inc., New York, NY, 43--47. DOI: http://dx.doi.org/10.1145/2656450.2656478.Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. Brian Thomas, 2020. 5 shocking IT & cybersecurity burnout statistics. (January 7). https://www.bitsight.com/.Google ScholarGoogle Scholar
  16. Ed Tittel, Kim Lindros, and Mary Kyle, 2020. Best infosec and cybersecurity certifications of 2020 Business News Daily, Waltham, MA. (February 3). https://www.businessnewsdaily.com.Google ScholarGoogle Scholar

Index Terms

  1. Cross-Boundary Cyber Education Design

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Conferences
      SIGITE '20: Proceedings of the 21st Annual Conference on Information Technology Education
      October 2020
      446 pages
      ISBN:9781450370455
      DOI:10.1145/3368308

      Copyright © 2020 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 7 October 2020

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article

      Acceptance Rates

      Overall Acceptance Rate176of429submissions,41%

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader