Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/2325296.2325367acmconferencesArticle/Chapter ViewAbstractPublication PagesiticseConference Proceedingsconference-collections
short-paper

Anatomy, dissection, and mechanics of an introductory cyber-security course's curriculum at the United States naval academy

Published: 03 July 2012 Publication History

Abstract

Due to the high priority of cyber-security education, the United States Naval Academy rapidly developed and implemented a new cyber-security course that is required for all of its first-year students. During the fall semester in 2011, half of the incoming class (about 600 students) took the course through a total of 31 sections offered by 16 instructors from a variety of disciplines and backgrounds. In the following spring semester, the remaining half of the first-year students will take the course. This paper explains the motivation that instigated and drove course development, the curriculum, teaching mechanics implemented, personnel required, as well as challenges and lessons learned from the first offering of the course. The information contained in this paper will be useful to those thinking of implementing a technical course required of all students at the same level in an institution (in our case first-year students) and particularly those interested in implementing such a course in cyber security.

References

[1]
Academic Program. Curriculum and Course Descriptions. Office of the Dean. United States Military Academy. West Point, New York. DOI = http://www.dean.usma.edu/sebpublic/curriccat/static/index.htm.
[2]
Brown, M. H. 2011. Naval Academy Preparing Officers for Cyberwarfare. Baltimore Sun. DOI = http://www.baltimoresun.com/news/maryland/education/bs-md-naval-academy-cyber-security-20111019,0,2371754.story.
[3]
Carroll, C. 2011. Cyberwarfare Joins the Curriculum at Service Academies. Stars and Stripes. DOI = http://www.stripes.com/news/cyberwarfare-joins-the-curriculum-at-service-academies-1.158642.
[4]
Witte, B. 2010. Military Academies Teach More Cyberwarfare. Navy Times. DOI = http://www.navytimes.com/news/2010/03/ap_cyberwarfare_030810/.
[5]
Naval Academy Weaves Cybersecurity into Curriculum. DOI = http://defensesystems.com/articles/2011/03/08/naval-academy-adds-cybersecurity-courses.aspx.
[6]
Needham, D., and Patrick, V. Initial Report of the Dean's Cyber Warfare Ad Hoc Committee, USNA-CS-TR-2011-02. U.S. Naval Academy Computer Science Department, Annapolis, MD, 2011.
[7]
President's Cyberspace Policy Review: Assuring a Trusted and Resilient Information and Communications Infrastructure, May 2009. DOI = http://www.whitehouse.gov/assets/documents/Cyberspace_Policy_Review_final.pdf.
[8]
United States Naval Academy. Class of 2015 Profile. DOI = http://www.usna.edu/admissions/USNA%202015%20Class%20Portrait.pdf

Cited By

View all
  • (2022)Cryptography in Grade 10Proceedings of the 27th ACM Conference on on Innovation and Technology in Computer Science Education Vol. 110.1145/3502718.3524767(456-462)Online publication date: 7-Jul-2022
  • (2021)A Hands-On Mobile Device Forensics Course in Cybersecurity Education2021 IEEE International Conference on Engineering, Technology & Education (TALE)10.1109/TALE52509.2021.9678660(01-05)Online publication date: 5-Dec-2021
  • (2020)Establishing a criminal justice cyber lab to develop and enhance professional and educational opportunitiesSECURITY AND PRIVACY10.1002/spy2.1233:5Online publication date: 21-Jul-2020
  • Show More Cited By

Index Terms

  1. Anatomy, dissection, and mechanics of an introductory cyber-security course's curriculum at the United States naval academy

      Recommendations

      Comments

      Information & Contributors

      Information

      Published In

      cover image ACM Conferences
      ITiCSE '12: Proceedings of the 17th ACM annual conference on Innovation and technology in computer science education
      July 2012
      424 pages
      ISBN:9781450312462
      DOI:10.1145/2325296
      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Sponsors

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      Published: 03 July 2012

      Permissions

      Request permissions for this article.

      Check for updates

      Author Tags

      1. active learning
      2. computer security awareness
      3. cyber-security education
      4. cyberspace policy review
      5. freshmen-required
      6. information assurance
      7. naval academy
      8. networks

      Qualifiers

      • Short-paper

      Conference

      ITiCSE '12
      Sponsor:

      Acceptance Rates

      Overall Acceptance Rate 552 of 1,613 submissions, 34%

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)11
      • Downloads (Last 6 weeks)2
      Reflects downloads up to 22 Sep 2024

      Other Metrics

      Citations

      Cited By

      View all
      • (2022)Cryptography in Grade 10Proceedings of the 27th ACM Conference on on Innovation and Technology in Computer Science Education Vol. 110.1145/3502718.3524767(456-462)Online publication date: 7-Jul-2022
      • (2021)A Hands-On Mobile Device Forensics Course in Cybersecurity Education2021 IEEE International Conference on Engineering, Technology & Education (TALE)10.1109/TALE52509.2021.9678660(01-05)Online publication date: 5-Dec-2021
      • (2020)Establishing a criminal justice cyber lab to develop and enhance professional and educational opportunitiesSECURITY AND PRIVACY10.1002/spy2.1233:5Online publication date: 21-Jul-2020
      • (2017)Educational Approach to Cyber Foundations in an Undergraduate Core ProgramProceedings of the 18th Annual Conference on Information Technology Education10.1145/3125659.3125691(21-26)Online publication date: 27-Sep-2017
      • (2016)A Capstone Design Project for Teaching Cybersecurity to Non-technical UsersProceedings of the 17th Annual Conference on Information Technology Education10.1145/2978192.2978216(142-147)Online publication date: 28-Sep-2016
      • (2016)Enhancing Computational Science Curriculum at Liberal Arts InstitutionsProcedia Computer Science10.1016/j.procs.2016.05.51080:C(1940-1946)Online publication date: 1-Jun-2016
      • (2015)Cyber EducationProceedings of the 16th Annual Conference on Information Technology Education10.1145/2808006.2808038(43-47)Online publication date: 29-Sep-2015

      View Options

      Get Access

      Login options

      View options

      PDF

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      Media

      Figures

      Other

      Tables

      Share

      Share

      Share this Publication link

      Share on social media