Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/3328778.3366918acmconferencesArticle/Chapter ViewAbstractPublication PagessigcseConference Proceedingsconference-collections
research-article

A Case Study of a Cybersecurity Programme: Curriculum Design, Resource Management, and Reflections

Published: 26 February 2020 Publication History

Abstract

Cybersecurity is an area of growing international importance. In response to global shortages of Cybersecurity skills, many universities have introduced degree programmes in Cybersecurity. These programmes aim to prepare students to become Cybersecurity practitioners with advanced skills in a timely manner. Several universities offer Cybersecurity degrees, but these have been developed ad hoc, as there is currently no internationally accepted Cybersecurity curriculum. Recently, an ITiCSE working group on global perspectives on Cybersecurity education developed a competency-based framework that aims to help institutions to implement Cybersecurity programmes. In this report, we present a case study of a Cybersecurity programme at the University of Auckland. We discuss how the curriculum and resource management of this programme evolved, and we present some challenges for the design and delivery of a Cybersecurity programme in the light of this competency-based framework.

References

[1]
Muhammad Rizwan Asghar and Andrew Luxton-Reilly. 2018. Teaching Cyber Security Using Competitive Software Obfuscation and Reverse Engineering Activities. In Proceedings of the 49th ACM Technical Symposium on Computer Science Education (SIGCSE '18). ACM, New York, NY, USA, 179--184. https://doi.org/10.1145/3159450.3159489
[2]
Stephen Cooper, Christine Nickell, Lance C. Pérez, Brenda Oldfield, Joel Brynielsson, Asim Gencer Gökce, Elizabeth K. Hawthorne, Karl J. Klee, Andrea Lawrence, and Susanne Wetzel. 2010a. Towards Information Assurance (IA) Curricular Guidelines. In Proceedings of the 2010 ITiCSE Working Group Reports (ITiCSE-WGR '10). ACM, New York, NY, USA, 49--64. https://doi.org/10.1145/1971681.1971686
[3]
Stephen Cooper, Christine Nickell, Victor Piotrowski, Brenda Oldfield, Ali Abdallah, Matt Bishop, Bill Caelli, Melissa Dark, Elizabeth K Hawthorne, Lance Hoffman, et almbox. 2010b. An exploration of the current state of information assurance education. ACM SIGCSE Bulletin, Vol. 41, 4 (2010), 109--125.
[4]
Adam P Henry. 2017. Mastering the cyber security skills crisis: realigning educational outcomes to industry requirements . Technical Report. ACCS Discussion paper.
[5]
Jim Hoag. 2013. Evolution of a Cybersecurity Curriculum. In Proceedings of the 2013 on InfoSecCD '13: Information Security Curriculum Development Conference (InfoSecCD '13). ACM, New York, NY, USA, Article 94, bibinfonumpages6 pages. https://doi.org/10.1145/2528908.2528925
[6]
Ge Jin, Manghui Tu, Tae-Hoon Kim, Justin Heffron, and Jonathan White. 2018. Game Based Cybersecurity Training for High School Students. In Proceedings of the 49th ACM Technical Symposium on Computer Science Education (SIGCSE '18). ACM, New York, NY, USA, 68--73. https://doi.org/10.1145/3159450.3159591
[7]
Joint Task Force on Cybersecurity Education. 2017. Cybersecurity Curricula 2017: Curriculum Guidelines for Post-Secondary Degree Programs in Cybersecurity.
[8]
Eunyoung Kim and Razvan Beuran. 2018. On Designing a Cybersecurity Educational Program for Higher Education. In Proceedings of the 10th International Conference on Education Technology and Computers (ICETC '18). ACM, New York, NY, USA, 195--200. https://doi.org/10.1145/3290511.3290524
[9]
Allen Parrish, John Impagliazzo, Rajendra K. Raj, Henrique Santos, Muhammad Rizwan Asghar, Audun Jøsang, Teresa Pereira, and Eliana Stavrou. 2018. Global Perspectives on Cybersecurity Education for 2030: A Case for a Meta-discipline. In Proceedings Companion of the 23rd Annual ACM Conference on Innovation and Technology in Computer Science Education (ITiCSE 2018 Companion). ACM, New York, NY, USA, 36--54. https://doi.org/10.1145/3293881.3295778
[10]
Lance C. Pérez, Stephen Cooper, Elizabeth K. Hawthorne, Susanne Wetzel, Joel Brynielsson, Asim Gencer Gökce, John Impagliazzo, Youry Khmelevsky, Karl Klee, Margaret Leary, Amelia Philips, Norbert Pohlmann, Blair Taylor, and Shambhu Upadhyaya. 2011. Information Assurance Education in Two- and Four-year Institutions. In Proceedings of the 16th Annual Conference Reports on Innovation and Technology in Computer Science Education - Working Group Reports (ITiCSE-WGR '11). ACM, New York, NY, USA, 39--53. https://doi.org/10.1145/2078856.2078860
[11]
Mihaela Sabin, H Alrumaih, B Lunt, M Zhang, B Byers, W Newhouse, B Paterson, S Peltsverger, C Tang, G van der Veer, et almbox. 2017. Curriculum Guidelines for Baccalaureate Degree Programs in Information Technology . Technical Report. Technical Report, Association of Computing Machinery, New York, NY, USA.
[12]
Ambareen Siraj, Blair Taylor, Siddarth Kaza, and Sheikh Ghafoor. 2015. Integrating Security in the Computer Science Curriculum. ACM Inroads, Vol. 6, 2 (May 2015), 77--81. https://doi.org/10.1145/2766457
[13]
The University of Auckland. 2019 a. Graduate Profile. https://www.auckland.ac.nz/en/students/forms-policies-and-guidelines/student-policies-and-guidelines/graduate-profile.html
[14]
The University of Auckland. 2019 b. Postgraduate study in Digital Security. https://www.auckland.ac.nz/en/study/study-options/find-a-study-option/digital-security/postgraduate.html
[15]
The University of Auckland. 2019 c. Three Levels of the Graduate Profile. https://cdn.auckland.ac.nz/assets/auckland/students/forms-policies-and-guidelines/student-policies-and-guidelines/graduate-profile/graduate-profile-visual-overview-of-3-levels.pdf
[16]
Universities New Zealand. 2019 a. Committee on University Academic Programmes (CUAP) . https://www.universitiesnz.ac.nz/about-universities-new-zealand/unz-committees-and-working-groups/committee-university-academic
[17]
Universities New Zealand. 2019 b. Universities New Zealand. https://www.universitiesnz.ac.nz
[18]
Valdemar vSvábenský, Jan Vykopal, Milan Cermak, and Martin Lavstovivcka. 2018. Enhancing Cybersecurity Skills by Creating Serious Games. In Proceedings of the 23rd Annual ACM Conference on Innovation and Technology in Computer Science Education (ITiCSE 2018). ACM, New York, NY, USA, 194--199. https://doi.org/10.1145/3197091.3197123
[19]
Richard Weiss, Michael Locasto, Jens Mache, and Vincent Nestler. 2013. Teaching Cybersecurity Through Games: A Cloud-based Approach. J. Comput. Sci. Coll., Vol. 29, 1 (Oct. 2013), 113--115. http://dl.acm.org/citation.cfm?id=2527148.2527175
[20]
Dongqing Yuan. 2017. Developing a Hands-on Cybersecurity Laboratory with Virtualization. J. Comput. Sci. Coll., Vol. 32, 5 (May 2017), 118--124. http://dl.acm.org/citation.cfm?id=3069621.3069649

Cited By

View all
  • (2024)Cybersecurity as a Crosscutting Concept Across an Undergrad Computer Science Curriculum: An Experience ReportProceedings of the 55th ACM Technical Symposium on Computer Science Education V. 110.1145/3626252.3630821(916-922)Online publication date: 7-Mar-2024
  • (2023)Enhancing a cybersecurity curriculum development tool with a competence framework to meet industry needs for cybersecurityProceedings of the 24th International Conference on Computer Systems and Technologies10.1145/3606305.3606325(123-128)Online publication date: 16-Jun-2023
  • (2023)Research-led Active Learning Sessions in Cyber Security through Research Paper ReadingProceedings of the 7th Conference on Computing Education Practice10.1145/3573260.3573269(33-36)Online publication date: 6-Jan-2023
  • Show More Cited By

Index Terms

  1. A Case Study of a Cybersecurity Programme: Curriculum Design, Resource Management, and Reflections

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Conferences
    SIGCSE '20: Proceedings of the 51st ACM Technical Symposium on Computer Science Education
    February 2020
    1502 pages
    ISBN:9781450367936
    DOI:10.1145/3328778
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Sponsors

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 26 February 2020

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. cybersecurity curriculum
    2. cybersecurity education

    Qualifiers

    • Research-article

    Conference

    SIGCSE '20
    Sponsor:

    Acceptance Rates

    Overall Acceptance Rate 1,595 of 4,542 submissions, 35%

    Upcoming Conference

    SIGCSE Virtual 2024
    1st ACM Virtual Global Computing Education Conference
    December 5 - 8, 2024
    Virtual Event , NC , USA

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)66
    • Downloads (Last 6 weeks)7
    Reflects downloads up to 22 Sep 2024

    Other Metrics

    Citations

    Cited By

    View all
    • (2024)Cybersecurity as a Crosscutting Concept Across an Undergrad Computer Science Curriculum: An Experience ReportProceedings of the 55th ACM Technical Symposium on Computer Science Education V. 110.1145/3626252.3630821(916-922)Online publication date: 7-Mar-2024
    • (2023)Enhancing a cybersecurity curriculum development tool with a competence framework to meet industry needs for cybersecurityProceedings of the 24th International Conference on Computer Systems and Technologies10.1145/3606305.3606325(123-128)Online publication date: 16-Jun-2023
    • (2023)Research-led Active Learning Sessions in Cyber Security through Research Paper ReadingProceedings of the 7th Conference on Computing Education Practice10.1145/3573260.3573269(33-36)Online publication date: 6-Jan-2023
    • (2023)Devising a cyber security management module through integrated course designJournal of Further and Higher Education10.1080/0309877X.2023.225072947:10(1389-1403)Online publication date: 8-Sep-2023
    • (2023)Computing Education Research in AustralasiaPast, Present and Future of Computing Education Research10.1007/978-3-031-25336-2_17(373-394)Online publication date: 5-Jan-2023
    • (2021)Designing Dissemination and Validation of a Framework for Teaching Cloud FundamentalsProceedings of the 2021 Working Group Reports on Innovation and Technology in Computer Science Education10.1145/3502870.3506569(163-181)Online publication date: 28-Dec-2021
    • (2021)A Competence-Based Three-Layer Cybersecurity Education Framework and Its ApplicationProceedings of the ACM Turing Award Celebration Conference - China10.1145/3472634.3472649(54-60)Online publication date: 30-Jul-2021
    • (2021)A Reference Point for Designing a Cybersecurity Curriculum for UniversitiesHuman Aspects of Information Security and Assurance10.1007/978-3-030-81111-2_5(46-62)Online publication date: 8-Jul-2021

    View Options

    Get Access

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media