Abstract
Nowhere is the problem of lack of human capital more keenly felt than in the field of cybersecurity where the numbers and quality of well-trained graduates are woefully lacking [10]. In 2005, the National Academy of Sciences indicted the US education system as the culprit contributing to deficiencies in our technical workforce, sounding the alarm that we are at risk of losing our competitive edge [14]. While the government has made cybersecurity education a national priority, seeking to stimulate university and community college production of information assurance (IA) expertise, they still have thousands of IA jobs going unfilled. The big question for the last decade [17] has been 'where will we find the talent we need?' In this article, we describe one university's approach to begin addressing this problem and discuss an innovative curricular model that holistically develops future cybersecurity professionals.
- Bespalko, V. Fundamentals of Theory of Pedagogical Systems. (Vorenege, RU: Voronege State University Press, 1977).Google Scholar
- Bloom, B., Mesia, B. and Krathwohl, D. Taxonomy of Educational Objectives. (New York: David McKay Company, 1964).Google Scholar
- Chabrow, E. "Placing in Context the Infosec Skills Gap: NASCIO's Chad Grant Analyzes Challenges." GovInfoSecurity.com, Princeton, NJ. http://www.govinfosecurity.com/interviews/placing-in-context-infosec-skills-gap-i-986. Accessed 2013 June 30.Google Scholar
- Chief Information Officer, US Department of Defense. "Information Assurance Scholarship Program: Are You Ready?" US Department of Defense, Washington, D.C. http://dodcio.defense.gov/Home/Initiatives/InformationAssuranceScholarshipProgram(IASP).aspx. Accessed 2013 June 30.Google Scholar
- Endicott-Popovsky, B., Frincke, D., Popovsky, V. "Designing a Computer Forensics Course for an Information Assurance Track." in Proceedings of the Eighth Colloquium for Information Systems Security Education. (West Point, NY: Colloquium for Information Systems Security Education, 2004): 59--64.Google Scholar
- Endicott-Popovsky, B., Frincke, D., Popovsky, V. "Secure Code: The Capstone Class in an IA Track." in Proceedings of the Ninth Colloquium for Information Systems Security Education. (Atlanta, GA: Colloquium for Information Systems Security Education, 2005). The Printing House, Inc., Stoughton, WI.: 100--108.Google Scholar
- Endicott-Popovsky, B., Seifert, C. Frincke, D. "Adopting Extreme Programming on a Graduate Student Project." in Proceedings of the Sixth IEEE Systems, Man and Cybernetics Information Assurance and Security Workshop. (West Point, NY: 2005) IEEE Publishing, Los Alamitos, CA. ©2005: 454--455.Google Scholar
- Fitzpatrick, A. "For Job Security, Try Cybersecurity, Experts Say." Mashable.com, Mashable, Inc., New York. http://mashable.com/2012/05/29/cybersecurity-career/. Accessed 2013 June 30.Google Scholar
- Gates, W. "Trustworthy Computing." January 15, 2002 Memo. Microsoft Corporation, Seattle, WA.Google Scholar
- Goldman, A. (2009). "Feds Need 10,000 Cyber Security Experts." Internet News.com, Quin-Street Enterprise, Louisville, KY. http://www.internetnews.com/security/article.php/3823806. Accessed 2013 June 30.Google Scholar
- Hansel, L., Chung, S. and Endicott-Popovsky, B. "Software Reengineering Approach to Teaching Secure Coding Practices. in Proceedings of the Fifteenth Colloquium for Information Systems Security Education. (Fairborn, OH: Colloquium for Information Systems Security Education, 2011). The Printing House, Inc., Stoughton, WI: 29--36.Google Scholar
- Kuzmina, U. Fundamentals of Pedagogy of Higher Education. (Leningrad, RU: Lenizdat, 1972).Google Scholar
- Michailova, A. "Establishing a System of Professional--Practical Activity." Messenger of Higher Education, Moscow, RU, 11, (1985): 31--33.Google Scholar
- National Academies of Science. Rising above the Gathering Storm: Energizing and Employing America for a Brighter Economic Future. (Washington, D.C.: The National Academies Press, 2005).Google Scholar
- National Security Agency Central Security Service. "National Centers of Academic Excellence." National Security Agency, Washington, D.C. http://www.nsa.gov/ia/academic_outreach/nat_cae/index.shtml. Accessed 2013 June 30.Google Scholar
- NIST/NICE framework. http://csrc.nist.gov/nice/framework/. Accessed 2014 January 6.Google Scholar
- Pecinovsky, E. "A Human Capital Crisis in Cybersecurity." ClearanceJobs.com. Dice, Inc., Urbandale, IA; http://www.clearancejobs.com/cleared-news/152/a-human-capital-crisis-in-cybersecurity. Accessed 2013 June 30.Google Scholar
- Popovsky, V. and Endicott-Popovsky, B. "Integrating Academics, the Community and Industry." in Proceedings of the Physical Culture and Sports: Analysis of Social Processes '08. (St. Petersburg, RU: 2008), Lesgaft National State University Press, St. Petersburg, RU: 239--243.Google Scholar
- Popovsky, V. "Coaching Volleyball with Unleashing Personal Potential in Mind." in Proceedings of the Int'l Conference Honoring 70th Anniversary Sports Games Dept. Lesgaft State Academy of Physical Education '04, (St. Petersburg, RU 2004), Lesgaft National State University Press, St. Petersburg, RU: 136--140.Google Scholar
- Popovsky, V., Endicott-Popovsky, B., "Physical Culture Pedagogy: Coaching by Design." in Methods for Modernizing Physical Culture: Selection of Scientific and Methodological Works, edited by V.E. Grigoriev, (St. Petersburg, Russia, 2005): 176--187.Google Scholar
- Roginsky, V. Alphabet of Pedagogical Work. (Moscow, RU: Higher Education, 1990).Google Scholar
- Simpson, J. and Endicott-Popovsky, B. "A Systematic Approach to Information Systems Security Education." in Proceedings of the Fourteenth Colloquium for Information Systems Security Education, (Baltimore, MD: Colloquium for Information Systems Security Education, 2010). The Printing House Inc., Stoughton, WI: 173--179.Google Scholar
- Simpson, J., et al. Secure software education: A contextual model-based approach. International Journal of Secure Software Engineering, (2010). 1(4). pp. 35--61. Google ScholarDigital Library
- Talizina, N. Activity approach to the development of the model specialist. Messenger of Higher Education, Moscow, RU, 11, (1986): 10--13.Google Scholar
- Talizina, N. Management of the Learning Process. (Moscow, RU. Higher Education, 1975).Google Scholar
- US Office of Personnel Management. "Cybercorps: Scholarship for Service." https://www.sfs.opm.gov/. Accessed 2013 June 30.Google Scholar
- Wiggins, G. and McTighe, J. Understanding by Design, 2nd ed. (Alexandria, VA: Association for Supervision and Curriculum Development, 2005).Google Scholar
Index Terms
- Application of pedagogical fundamentals for the holistic development of cybersecurity professionals
Recommendations
Game based Cybersecurity Training for High School Students
SIGCSE '18: Proceedings of the 49th ACM Technical Symposium on Computer Science EducationCybersecurity is critical to the national infrastructure, federal and local government, military, industry, and personal privacy. To defend the U.S. against the cyber threats, a significant demand for skilled cybersecurity workforce is predicted in ...
Engaging learners in cybersecurity careers: lessons from the launch of the national cyber league
Educators and sponsors endorse competitions as a strong, positive influence on career choice. However, empirical studies of cybersecurity competitions are lacking, and evidence from computer science and mathematics competitions has been mixed. Here we ...
Assessing the Development of Computer Science Pedagogical Content Knowledge in the TEALS Program (Abstract Only)
SIGCSE '16: Proceedings of the 47th ACM Technical Symposium on Computing Science EducationOne of the critical barriers to increasing pre-collegiate computer science course offerings in the U.S. is a lack of qualified computer science teachers. Programs such as TEALS, a teacher preparation program pairing high school teachers with computing ...
Comments