Article

Cybersecurity activities for education and curriculum design: A survey

Oct 21, 2024

DOI: https://doi.org/10.1016/j.chbr.2024.100501

Published in: Computers in Human Behavior Reports

Publisher: Elsevier

Muhusina Ismail Nisha Thorakkattu Madathil Meera Alalawi Saed Alrabaee Mohammad Al Bataineh Suhib Melhem Djedjiga Mouheb

Cyber threats are one of the main concerns in this growing technology epoch. To tackle this issue, highly skilled and motivated cybersecurity professionals are increasingly in demand to prevent, detect, respond to, or even mitigate the effects of such threats. However, the world faces a workforce shortage of qualified cybersecurity professionals and practitioners. To address this dilemma, several cybersecurity educational programs have been introduced, such as specialized cybersecurity courses in computer science graduate programs. With the increasing demand, different cybersecurity courses are introduced at the high school level, undergraduate computer science and information systems programs, and even at the government level. Due to the peculiar nature of cybersecurity, educational institutions face many issues when designing a curriculum or cybersecurity activities. In this paper, we study existing cybersecurity curriculum approaches and activities. We also present case studies on cybersecurity education around the globe.

Other Researches

EdgeAI-Powered Hybrid ESN-GRU Model for High-Accuracy and Efficient Short-Term Load Forecasting in Smart Grids

With the widespread use of renewable energy sources (RES) in the smart grid, the next generation power system, short-term load forecasting (STLF) is of critical importance in grid stability and energy optimization. Traditional STLF models include is...

LENS: Lightweight and Explainable LLM-Based APT Detection at the Edge for 6G Security

Expected to be deployed in the early 2030s, sixth-generation (6G) wireless networks, with their high speed and integration with cutting-edge technology such as intelligent edge computing, expand the attack surface and face serious cyber threat risks...

LLM-Driven APT Detection for 6G Wireless Networks: A Systematic Review and Taxonomy

Sixth Generation (6G) wireless networks, which are expected to be deployed in the 2030s, have already created great excitement in academia and the private sector with their extremely high communication speed and low latency rates. However, despite t...

Deep Reinforcement Learning-Based Joint Trajectory Design and Resource Allocation for Secure and Energy-Efficient UAV Networks

Unmanned Aerial Vehicles (UAVs) have been extensively used recently for wireless networks. However, such networks encounter several challenges that remain unsolved. In this paper, we address the issue of joint optimization of trajectory design and r...

Supervised methods of machine learning for email classification: a literature survey

In today’s digital landscape, email is acknowledged as a critical conduit for global data exchanges. With a surge in data volume, malefactors exploit user identities, leading to data misuse. Cybercriminals employ electronic transgressions such as ph...

Dynamic Resource Management for Cloud Spot Markets

Resource management for cloud computing environments that are characterized by many layers emerges as a critical task for cloud computing providers. Such providers are compelled by the demands and strategies of stochastic customers to adopt dynamic ...

Dynamic mobility load balancing for 5G small-cell networks based on utility functions

Deployment of small cells was introduced to support high data rate services and expand macro cell coverage for the envisioned 5G networks. A small cell network, which has a smaller size, along with the user equipment (UE) mobility, frequently underg...

Markov prediction model for host load detection and VM placement in live migration

The design of good host overload/underload detection and virtual machine (VM) placement algorithms plays a vital role in assuring the smoothness of VM live migration. The presence of the dynamic environment that leads to a changing load on the VMs m...

Soap-based vs. restful web services: A case study for multimedia conferencing

RESTful Web services are now emerging as an alternative to SOAP-based Web services and might be a more suitable choice in some cases. A comparison of two Web programming interfaces — the standard Parlay-X multimedia SOAP-based Web service and a REST...