This program is tentative and subject to change.
Improving cybersecurity education is a priority for many countries and organizations worldwide. Computing societies and professional associations have recognized cybersecurity as a distinctive computing discipline and created specialized cybersecurity curricular frameworks. Higher education institutions are introducing new cybersecurity programs, drawing students to this growing field. In this position paper, we examined 101 study programs in 24 countries. Based on their analysis, we argue that top-ranked universities have not yet fully reflected the guidelines and offer programs that have “cyber” in their name but lack some of the necessary essences of a cybersecurity program. In particular, most programs do not sufficiently cover non-technical aspects, such as law, policies, or risk management. Also, most programs teach knowledge and skills but do not expose students to experiential learning outside the traditional classroom environment (such as internships) to develop their competencies. As a result, graduates of these programs may fail to meet the expectations of their future employers and may require additional training. To inspire program directors and educators when improving their programs and courses, this paper offers examples of good practice from selected cybersecurity programs around the world and our own teaching practice.
This program is tentative and subject to change.
Thu 27 FebDisplayed time zone: Eastern Time (US & Canada) change
10:45 - 12:00 | |||
10:45 18mTalk | An Evidence-Based Curriculum Initiative for Hardware Reverse Engineering EducationGlobal Papers René Walendy Ruhr University Bochum, Max Planck Institute for Security and Privacy, Markus Weber Ruhr University Bochum, Steffen Becker Ruhr University Bochum, Christof Paar Max Planck Institute for Security and Privacy, Nikol Rummel Ruhr University Bochum, Center for Advanced Internet Studies (CAIS) Pre-print | ||
11:03 18mTalk | Bridging the community college cybersecurity classroom and workplace with the CyberSim LabCC Papers Judeth Oden Choi Carnegie Mellon University, Rotem Guttman Carnegie Mellon University, Matthew Kisow Community College of Allegheny College, Carolyn Penstein Rose Carnegie Mellon University Language Technologies Institute, William R. Nichols Carnegie Mellon University/Software Engineering Institute, James Winyard Community College of Allegheny College, Bruce Li Carnegie Mellon University, Lee Branstetter Carnegie Mellon University, Lauren Herckis CGFNS International, Inc. and Carnegie Mellon University (On Leave) | ||
11:22 18mTalk | Cybersecurity Study Programs: What's in a Name?Global Papers Jan Vykopal Masaryk University, Valdemar Švábenský Kyushu University, Michael T. Lopez II Ateneo de Manila University, Pavel Čeleda Masaryk University | ||
11:41 18mTalk | Strengthening Workforce Education: Excellence in Programming Securely (SWEEPS) Papers Deborah Kariuki University of Maryland, Baltimore County, Ida Ngambeki University of Maryland Baltimore County, Jun Dai Worcester Polytechnic Institute, Matt Bishop The University of California, Davis, Xiaoyan Sun Worcester Polytechnic Institute, Melissa Dark Dark Enterprises, Inc., Jenny Daugherty Dark Enterprises, Inc., Alex Lowrie University of California, Davis, Markus Geissler Cosumnes River College, Phil Nico California Polytechnic State University, Arshad Noor StrongKey, Inc. |