ABSTRACT
Demand for cybersecurity experts is high, driven by the increasing digitization of society and increasing number of sophisticated, targeted cyber attacks. Despite this pressing need, a significant shortfall in the number of cybersecurity experts remains due to very diverse landscape of knowledge and complex curriculum accreditation process. In this paper, we present a new model for curriculum analysis and adjustment that addresses entire curricula or course material. It employs machine learning and text-mining techniques for keyword extraction and further comparison with reference skills frameworks. The analysis illustrates a new measurement that quantifies coverage of cybersecurity role and its importance within curriculum based on keyword matching. The case study was conducted with university curricula from Europe and North America. The results illustrate curriculum coverage according to the ENISA's European Cybersecurity Skills Framework (ECSF) roles and optimization progress after our method application.
- CheckPoint Corporation, https://resources.checkpoint.com/cyber-security-resources/2022-cyber-security-report(accessed 04.05.2023)Google Scholar
- (ISC)2. 2021. (ISC)2 Cybersecurity Workforce Study, https://www.isc2.org/-/media/ISC2/Research/2021/ISC2-Cybersecurity-Workforce-Study-2021.ashx (accessed 04.05.2023)Google Scholar
- Europe council decision 765/2008, setting out the requirements for accreditation and market surveillance relating to the marketing of products and repealing Regulation (EEC) No 339/93Google Scholar
- Computer Science Curricula 2013, Association for Computing Machinery (ACM) IEEE Computer Society https://www.acm.org/binaries/content/assets/education/cs2013_web_final.pdf (accessed 04.05.2023)Google Scholar
- ACM Curriculum Guidelines for Undergraduate Degree Programs in Computer Science CC2001 https://www.acm.org/binaries/content/assets/education/curricula-recommendations/cc2001.pdf (accessed 04.05.2023)Google Scholar
- ACM Computing Curricula Computer Science Volume CS2008 https://www.acm.org/binaries/content/assets/education/curricula-recommendations/cc2001.pdf (accessed 04.05.2023)Google Scholar
- Yoshitatsu Matsuda, 2018, “Curriculum Analysis of Computer Science Departments by Simplified, Supervised LDA“, Journal of information processingGoogle ScholarCross Ref
- Kornraphop Kawintiranon, Peerapon Vateekul and Proadpran Punyabukkana, 2016, “Understanding knowledge areas in curriculum through text mining from course materials”, TALEGoogle Scholar
- Cyber security certification, https://www.cybersecurityeducation.org/certifications/ (accessed 17.04.2023)Google Scholar
- ACM cyber security curricula 2017, https://www.acm.org/binaries/content/assets/education/curricula-recommendations/csec2017.pdf (accessed 04.05.2023)Google Scholar
- Andrea Danyluk and Scott Buck, 2019, “Artificial Intelligence Competencies for Data Science Undergraduate Curricula”, The Ninth AAAI Symposium on Educational Advances in Artificial Intelligence (EAAI-19)Google ScholarDigital Library
- Diana Burley and Alfred H. Lewis Jr, 2019, “Cybersecurity Curricula 2017 and Boeing: Linking Curricular Guidance to Professional Practice”, IEEEGoogle Scholar
- Gary L. Wallace, 2021, “The Need for Certification-Based Security Curriculum: A Matter of National Security”, IEEEGoogle Scholar
- Akhtar Lodgher, Jeong Yang and Ummugul Bulut, 2018, “An Innovative Modular Approach of Teaching CyberSecurity across Computing Curricula”, IEEEGoogle Scholar
- Jan Hajny, Sara Ricci, Edmundas Piesarskas, Olivier Levillain, Letterio Galletta and Rocco De Nicola, 2021, “Framework, Tools and Good Practices for Cybersecurity Curricula”, IEEEGoogle Scholar
- Concordia courses database for cyber security professionals https://www.concordia-h2020.eu/map-courses-cyber-professionals/ (accessed 04.05.2023)Google Scholar
- Cyberseek framework, https://www.cyberseek.org/pathway.html (accessed 04.05.2023)Google Scholar
- ENISA European Cybersecurity Skills Framework2022, https://www.enisa.europa.eu/publications/european-cybersecurity-skills-framework-role-profiles/download/fullReport, (accessed 04.05.2023)Google Scholar
- Tomáš Brychcín and Miloslav Konopík, 2015, “HPS: High precision stemmer”, Information Processing & ManagementGoogle Scholar
- Robert Ramirez and Nazli Choucri, 2016, “Improving Interdisciplinary Communication With Standardized Cyber Security Terminology: A Literature Review”, IEEEGoogle Scholar
- Cyber security academic programs database https://www.enisa.europa.eu/topics/education/cyberhead #Google Scholar
- KU Leuven Cyber Security curriculum https://wms.cs.kuleuven.be/cs/studeren/master-of-cybersecurity/cybersecurity-programme (accessed 04.05.2023)Google Scholar
- University of Agder Cyber Security curriculum https://www.uia.no/en/studieplaner/programme/M-SEC (accessed 04.05.2023)Google Scholar
- Masaryk University Brno Cyber Security curriculum, https://www.fi.muni.cz/catalogue-current/?program=nmgr_pskb_en (accessed 04.05.2023)Google Scholar
- KTH Royal Institute of Technology Cyber Security curriculum https://www.kth.se/en/studies/master/cybersecurity/courses-cybersecurity-1.1076018 (accessed 04.05.2023)Google Scholar
- St. Pölten University of Applied Sciences Cyber Security curriculum https://www.fhstp.ac.at/en/academic-studies-continuing-education/computer-science-security/cyber-security-and-resilience/course-contents#/ (accessed 04.05.2023)Google Scholar
- Berkeley School of Information Cyber Security curriculum https://ischoolonline.berkeley.edu/cybersecurity/curriculum/ (accessed 04.05.2023)Google Scholar
- Faculty of technical sciences, University of Novi Sad(FTN) Cyber Security curriculum http://www.ftn.uns.ac.rs/1149659633/informaciona-bezbednost (accessed 04.05.2023)Google Scholar
- Concordia “Becoming a Cybersecurity Consultant” course https://www.concordia-h2020.eu/becoming-a-cybersecurity-consultant (accessed 04.05.2023)Google Scholar
- SANS Institute “Enterprise Penetration Testing” course https://www.sans.org/cyber-security-courses/enterprise-penetration-testing (accessed 04.05.2023)Google Scholar
Index Terms
- Dynamic Cybersecurity Curriculum Optimization Method (DyCSCOM)
Recommendations
Cybersecurity in liberal arts general education curriculum
ITiCSE 2018: Proceedings of the 23rd Annual ACM Conference on Innovation and Technology in Computer Science EducationCybersecurity learning has been explored through different analytical lenses, across a range of grade levels and academic institutions. From attempts to standardize learning with accreditation to refining curricula and labs, there is currently ...
Development and Analysis of a Spiral Theory-based Cybersecurity Curriculum: (Abstract Only)
SIGCSE '18: Proceedings of the 49th ACM Technical Symposium on Computer Science EducationThe current emphasis on cybersecurity worldwide, demonstrates the importance of this topic. This poster describes a unique NSF funded project that aims to create cybersecurity education opportunities at Virginia Tech (VT). It is a collaborative effort ...
Improving wireless and networking cybersecurity curriculum
This investigation expands previous work responding to the growing need to educate and train cyber professionals of wireless and networking devices by guiding cyber education curricular development in undergraduate and master's degree programs. In the ...
Comments