Skip to main content

Toward a Holistic Approach of Cybersecurity Capacity Building Through an Innovative Transversal Sandwich Training

  • Chapter
  • First Online:
Industry Integrated Engineering and Computing Education

Abstract

This paper aims at proposing an original curriculum of sandwich training in cybersecurity in France responding to the context of the European shuffle on cybersecurity enforcement. Indeed, May of this year sets the milestone of the cybersecurity process in Europe and especially in France as it is the deadline for the transposition of the Network and Information Security (NIS) European Directive on cybersecurity. This European Directive is in line with the global crucial transition operating at all scales in the world. As a global concern, the cybersecurity capacity building of the next generations is at stakes. In order to formulate a viable and efficient training that meets real needs and challenges, we first analyze the current strategic and policy frameworks at many scales concerning the cybersecurity enforcement and awareness development. Once the best practices are outlined, we would then analyze the current trainings provided in France in that field. Noting the lack of transversality of most of the existing trainings, we formulate an innovative proposition of training including a holistic approach by including a larger range of skills thus better in line to the international overhaul and contributing to the effective capacity building in cybersecurity.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 54.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    Goal 17: “Strengthen the capacity to implement and revitalize the Global Partnership for Sustainable Development.” For technology especially: “17.6 Enhance access to and triangular regional and international cooperation in science, technology and innovation and North-South and South-South cooperation in these areas and improve knowledge-sharing through mutually agreed modalities, including through better coordination of existing mechanisms, in particular at the United Nations level, and through a global technology facilitation mechanism. 17.7 Promote the development, transfer and diffusion of environmentally sound technologies to developing countries on favorable, including concessional and preferential, mutually agreed terms. 17.8 Ensure that the technology bank and the mechanism for strengthening the scientific and technological and innovation capacities of the least developed countries are fully operational by 2017 and strengthen the use of key technologies, in particular information and communications technology.”

  2. 2.

    According to figures from the Council of Europe and the European Union

  3. 3.

    Framework of Experiential Learning to Enhance Student Skill Collaborative Learning

  4. 4.

    Defined by Article R1332–1 of the Defense Code. In France, an operator of vital importance (OVI) is an organization identified by the state as having essential or dangerous activities for the population.

References

  • Ali, B., Lu, M. X., & Diane, M. (2015). Cybersecurity curriculum development: Introducing specialties in a graduate program. Information Systems Education Journal, 13(3), 99–110.

    Google Scholar 

  • Australian Government. (2016). Australia’s cyber security strategy.

    Google Scholar 

  • Brave, S., & Nass, C. (2002). Emotion in human–computer interaction . no. Cmc (pp. 53–68).

    Google Scholar 

  • Cabinet, E. Y. (2017). Les formations et les compétences en France sur la cybersecurité.

    Google Scholar 

  • Cyber Security Agency of Singapore. (2016). Simgapore’s Cyber Security Strategy, no. 12, p. 27.

    Google Scholar 

  • European Parliament and Council of the European Union. (2016, July). Directive (EU) 2016/1148 of the European Parliament and of the Council of 6 July 2016 concerning measures for a high common level of security of network and information systems across the Union, vol. 2014, pp. 1–30.

    Google Scholar 

  • European Parliament; Council of the European Union. (2013). Proposal for a Directive of the european Parliament and of the Council concerning measures to ensure a high common level of network and information security across the Union, Brussels.

    Google Scholar 

  • French Network and Information Security Agency. (s.d.). “Glossaire.” [Online]. Available: https://www.ssi.gouv.fr/entreprise/glossaire/c/. Accessed 20 Aug 2003.

  • House of representative of the U.S. Congress. (2017). Cybersecurity and Infrastructure Security Agency Act of 2017.

    Google Scholar 

  • Institut des Hautes Etudes de la Securité et de la Justice. (2015). “La Loi de Programmation Militaire appliquée à la Cybersécurité.

    Google Scholar 

  • International Telecomunication Union. (2014). Resolution 130 (Rev . BUSAN, 2014) Strengthening the role of ITU in building confidence and security in the use of information and communication technologies, Busan.

    Google Scholar 

  • International Telecomunication Union, Global cybersecurity index & cyberwellness profiles-Global Cybersecurity Index (GCI) 2017. 2015.

    Google Scholar 

  • Journal Official. (2018). LOI n° 2018–133 du 26 février 2018 portant diverses dispositions d’adaptation au droit de l’Union européenne dans le domaine de la sécurité (1).

    Google Scholar 

  • Minister of Information and Communications Technology. (2014). Qatar National Cyber Security Strategy.

    Google Scholar 

  • National Information Systems Security Agency of the Secretary General for Defence and National Security. (2018). Formations labellisées SecNumedu, [Online]. Available: https://www.ssi.gouv.fr/particulier/formations/secnumedu/formations-labellisees-secnumedu/.

  • Patrick, H., & Fields, Z. (2017). A need for cyber security creativity (pp. 42–61). Pennsylvania, USA: IGI Global.

    Google Scholar 

  • Republic of Mauritius. (2014). National cyber security strategy 2014–2019: For resilent and secure Mauritius.

    Google Scholar 

  • The White House and Office of the Press secretary. (2016). Facts sheets: Cybersecurity national action plan. [Online]. Available: https://www.whitehouse.gov/the-press-office/2016/02/09/fact-sheet-cybersecurity-national-action-plan.

  • Willemant, R., & Foulgoc, S. (2016). Aspects Juridiques de la Cyber-sécurité. Action Canada Fr., 25, 18–19.

    Google Scholar 

Download references

Acknowledgment

This publication was made possible by NPRP grant # NPRP 7-1883-5-289 from the Qatar National Research Fund (a member of Qatar Foundation) toward which the authors would like to express their gratitude. The statements made herein are solely the responsibility of the authors.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Jessica El Melhem .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Switzerland AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

El Melhem, J., Bouras, A., Ouzrout, Y. (2019). Toward a Holistic Approach of Cybersecurity Capacity Building Through an Innovative Transversal Sandwich Training. In: Abdulwahed, M., Bouras, A., Veillard, L. (eds) Industry Integrated Engineering and Computing Education. Springer, Cham. https://doi.org/10.1007/978-3-030-19139-9_11

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-19139-9_11

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-19138-2

  • Online ISBN: 978-3-030-19139-9

  • eBook Packages: EducationEducation (R0)

Publish with us

Policies and ethics