Cross-Boundary Cyber Education Design

Edward J. Glantz, Michael R. Bartolacci, Mahdi Nasereddin, David Joseph Fusco

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Scopus citations

Abstract

This paper provides a cross-boundary process to guide colleges and universities creating undergraduate cyber curriculum or reviewing established programs. There is growing demand for academic institutions to help close the skills gap by developing cyber curriculum preparing students for careers in cybersecurity. The cross-boundary process in this paper builds on a multi-level, multi-discipline approach previously used to launch a new undergraduate cyber program. This expanded approach recommends evaluating advisory consortium feedback, master's degree programs, certifications, and internal considerations (e.g., faculty expertise). This paper is prepared by cyber faculty at a university offering both residential and online general education courses as well as undergraduate and master's degrees in cybersecurity. This paper further advances the call for discussion on the topic of cyber education.

Original languageEnglish (US)
Title of host publicationSIGITE 2020 - Proceedings of the 21st Annual Conference on Information Technology Education
PublisherAssociation for Computing Machinery, Inc
Pages336-341
Number of pages6
ISBN (Electronic)9781450370455
DOIs
StatePublished - Oct 7 2020
Event21st Annual Conference of the Special Interest Group in Information Technology Education, SIGITE 2020 - Virtual, Online, United States
Duration: Oct 7 2020Oct 9 2020

Publication series

NameSIGITE 2020 - Proceedings of the 21st Annual Conference on Information Technology Education

Conference

Conference21st Annual Conference of the Special Interest Group in Information Technology Education, SIGITE 2020
Country/TerritoryUnited States
CityVirtual, Online
Period10/7/2010/9/20

All Science Journal Classification (ASJC) codes

  • Computational Theory and Mathematics
  • Artificial Intelligence
  • Computer Science Applications
  • Software

Fingerprint

Dive into the research topics of 'Cross-Boundary Cyber Education Design'. Together they form a unique fingerprint.

Cite this