A Case Study of a Cybersecurity Programme Curriculum Design, Resource Management, and Reflections

被引:5
作者
Asghar, Muhammad Rizwan [1 ]
Luxton-Reilly, Andrew [1 ]
机构
[1] Univ Auckland, Auckland, New Zealand
来源
SIGCSE 2020: PROCEEDINGS OF THE 51ST ACM TECHNICAL SYMPOSIUM ON COMPUTER SCIENCE EDUCATION | 2020年
关键词
Cybersecurity education; Cybersecurity curriculum;
D O I
10.1145/3328778.3366918
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Cybersecurity is an area of growing international importance. In response to global shortages of Cybersecurity skills, many universities have introduced degree programmes in Cybersecurity. These programmes aim to prepare students to become Cybersecurity practitioners with advanced skills in a timely manner. Several universities offer Cybersecurity degrees, but these have been developed ad hoc, as there is currently no internationally accepted Cybersecurity curriculum. Recently, an ITiCSE working group on global perspectives on Cybersecurity education developed a competency-based framework that aims to help institutions to implement Cybersecurity programmes. In this report, we present a case study of a Cybersecurity programme at the University of Auckland. We discuss how the curriculum and resource management of this programme evolved, and we present some challenges for the design and delivery of a Cybersecurity programme in the light of this competency-based framework.
引用
收藏
页码:16 / 22
页数:7
相关论文
共 20 条
[1]  
[Anonymous], 2017, Association for Computing Machinery, DOI DOI 10.1145/3184594
[2]  
[Anonymous], 2013, J COMPUT SCI COLL
[3]   Teaching Cyber Security Using Competitive Software Obfuscation and Reverse Engineering Activities [J].
Asghar, Muhammad Rizwan ;
Luxton-Reilly, Andrew .
SIGCSE'18: PROCEEDINGS OF THE 49TH ACM TECHNICAL SYMPOSIUM ON COMPUTER SCIENCE EDUCATION, 2018, :179-184
[4]  
Cooper Stephen, 2009, SIGCSE Bulletin, V41, P109, DOI 10.1145/1709424.1709457
[5]  
Cooper S., 2010, P ITICSE WORK GROUP, P49, DOI [10.1145/1971681.1971686, DOI 10.1145/1971681.1971686]
[6]  
Henry Adam P, 2017, TECHNICAL REPORT
[7]  
Hoag J., 2013, P 2013 INF SEC CURR, DOI DOI 10.1145/2528908.2528925
[8]   Game based Cybersecurity Training for High School Students [J].
Jin, Ge ;
Tu, Manghui ;
Kim, Tao-Hoon ;
Heffron, Justin ;
White, Jonathan .
SIGCSE'18: PROCEEDINGS OF THE 49TH ACM TECHNICAL SYMPOSIUM ON COMPUTER SCIENCE EDUCATION, 2018, :68-73
[9]   On Designing a Cybersecurity Educational Program for Higher Education [J].
Kim, Eunyoung ;
Beuran, Razvan .
PROCEEDINGS OF THE 10TH INTERNATIONAL CONFERENCE ON EDUCATION TECHNOLOGY AND COMPUTERS (ICETC 2018), 2018, :195-200
[10]   Global Perspectives on Cybersecurity Education for 2030: A Case for a Meta-discipline [J].
Parrish, Allen ;
Impagliazzo, John ;
Raj, Rajendra K. ;
Santos, Henrique ;
Asghar, Muhammad Rizwan ;
Josang, Audun ;
Pereira, Teresa ;
Stavrou, Eliana .
ITICSE 2018 COMPANION: PROCEEDINGS COMPANION OF THE 23RD ANNUAL ACM CONFERENCE ON INNOVATION AND TECHNOLOGY IN COMPUTER SCIENCE EDUCATION, 2018, :36-54