Skip to main content

Cybersecurity Curriculum Design: A Survey

  • Chapter
  • First Online:
Book cover Transactions on Edutainment XV

Part of the book series: Lecture Notes in Computer Science ((TEDUTAIN,volume 11345))

Abstract

The threat of cyber attacks continue to grow with the increasing number of sophisticated and successful targeted cyber attacks throughout the globe. To address this issue, there is a dire need for cybersecurity professionals with adequate motivation and skills to prevent, detect, respond, or even mitigate the effect of such threats. To this end, several cybersecurity educational programs and concentrations have been established over the past years both at the graduate and undergraduate levels. Moreover, a number of initiatives taken by the government standard bodies in the cybersecurity domain have emerged to help in framing cybersecurity education. Due to the interdisciplinary (and sometimes multidisciplinary) nature of cybersecurity, educational institutions face many issues when designing a cybersecurity curriculum. In this context, we believe that there is a desideratum to provide a big picture of the overall efforts done so far in the direction of cybersecurity curriculum design. In this paper, we present an overview and comparison of existing curriculum design approaches for cybersecurity education. This survey will help the researchers and educators to have an overview of the existing approaches for the purpose of developing a suitable and more effective cybersecurity curriculum in their future endeavour.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Symantec Corporation. http://www.symantec.com

  2. National Training Standard for Information Systems Security (INFOSEC) Professionals (1994). http://www.sis.pitt.edu/jjoshi/courses/IS2150/Fall11/nstissi_4011.pdf

  3. National Initiative for Cybersecurity Education Strategic Plan. Building a Digital Nation (2011). http://www.cssia.org/pdf/20000168-NationalInitiativeforCybersecurityEducationStrategicPlan.pdf

  4. DHS Task Force on CyberSkills: CyberSkills Taks Force Report. D.o.H, Security, Washington, DC (2012)

    Google Scholar 

  5. International Information Systems Audit and Control Association (ISACA) (2017). https://www.isaca.org/

  6. The Fast-Growing Job With A Huge Skills Gap: Cyber Security (Forbes article) (2017). https://www.forbes.com/sites/jeffkauflin/2017/03/16/the-fast-growing-job-with-a-huge-skills-gap-cyber-security/#465297be5163

  7. Cyber Security Challenge UK (2018). https://www.cybersecuritychallenge.org.uk/

  8. CyberQuest Competition (2018). https://cyberquest.ae/en

  9. SEED Labs (2018). http://www.cis.syr.edu/~wedu/seed/lab_env.html

  10. Tele-Lab (2018). https://hpi.de/meinel/security-tech/security-awareness/tele-lab-it-security.html

  11. The International Capture The Flag (“iCTF”) Competition (2018). https://ictf.cs.ucsb.edu/

  12. Cyber Security Breaches Survey 2017, April 2017. https://www.gov.uk/government/statistics/cyber-security-breaches-survey-2017

  13. Anderson, B.R., Joines, A.K., Daniels, T.E.: Xen worlds: leveraging virtualization in distance education. SIGCSE Bull. 41(3), 293–297 (2009). http://doi.acm.org/10.1145/1595496.1562967

    Article  Google Scholar 

  14. Azadegan, S., O’Leary, M.: An undergraduate cyber operations curriculum in the making: a 10+ year report. In: 2016 IEEE Conference on Intelligence and Security Informatics (ISI), pp. 251–254. IEEE (2016)

    Google Scholar 

  15. Bicak, A., Liu, X.M., Murphy, D.: Cybersecurity curriculum development: introducing specialties in a graduate program. Inf. Syst. Educ. J. 13(3), 99 (2015)

    Google Scholar 

  16. Carlsson, A., Gustavsson, R., Truksans, L., Balodis, M.: Remote security labs in the cloud ReSeLa. In: 2015 IEEE Global Engineering Education Conference (EDUCON), pp. 199–206, March 2015

    Google Scholar 

  17. Conklin, W.A., Cline, R.E., Roosa, T.: Re-engineering cybersecurity education in the US: an analysis of the critical factors. In: 2014 47th Hawaii International Conference on System Sciences (HICSS), pp. 2006–2014. IEEE (2014)

    Google Scholar 

  18. Faily, S.: Ethical hacking assessment as a vehicle for undergraduate cyber-security education. In: BCS 19th Annual INSPIRE Conference (2014)

    Google Scholar 

  19. Howles, T., Romanowski, C., Mishra, S., Raj, R.K.: A holistic, modular approach to infuse cybersecurity into undergraduate computing degree programs. In: Annual Symposium On Information Assurance (ASIA), Albany, NY, pp. 7–8 (2011)

    Google Scholar 

  20. Irvine, C.E., Thompson, M.F., Allen, K.: Cyberciege: gaming for information assurance. IEEE Secur. Priv. 3(3), 61–64 (2005)

    Article  Google Scholar 

  21. Iv, A.L.Z.: Cyber-Security Curricula for Basic Users. Thesis at Naval Postgraduate School, Monterey, California (2013)

    Google Scholar 

  22. Kessler, G.C., Ramsay, J.D.: A proposed curriculum in cybersecurity education targeting homeland security students. In: 2014 47th Hawaii International Conference on System Sciences (HICSS), pp. 4932–4937. IEEE (2014)

    Google Scholar 

  23. LaPiedra, J.: The Information Security Process Prevention, Detection and Response (2002). https://www.giac.org/paper/gsec/501/information-security-process-prevention-detection-response/101197

  24. Lo, D.C.T., North, M., North, S.: Hardware Components in Cybersecurity Education. DigitalCommons@ Kennesaw State University (2014)

    Google Scholar 

  25. Lukowiak, M., Radziszowski, S., Vallino, J., Wood, C.: Cybersecurity education: bridging the gap between hardware and software domains. ACM Trans. Comput. Educ. (TOCE) 14(1), 2 (2014)

    Google Scholar 

  26. Nagarajan, A., Allbeck, J.M., Sood, A., Janssen, T.L.: Exploring game design for cybersecurity training. In: 2012 IEEE International Conference on Cyber Technology in Automation, Control, and Intelligent Systems (CYBER), pp. 256–262, May 2012

    Google Scholar 

  27. Patterson, W., Winston, C.E., Fleming, L.: Behavioral cybersecurity: a needed aspect of the security curriculum. In: SoutheastCon 2016, pp. 1–7 (2016)

    Google Scholar 

  28. Powell, V.J.H., Davis, C.T., Johnson, R.S., Wu, P.Y., Turchek, J.C., Parker, I.W.: VLabNet: the integrated design of hands-on learning in information security and networking. In: Proceedings of the 4th Annual Conference on Information Security Curriculum Development, InfoSecCD 2007, pp. 9:1–9:7. ACM, New York (2007). http://doi.acm.org/10.1145/1409908.1409918

  29. Ramirez, C.D., Rioux, G.A.: Advancing curricula development for homeland security education through a survey of DHS personnel. J. Homeland Secur. Educ. 1, 6–25 (2012)

    Google Scholar 

  30. Rowe, D.C., Lunt, B.M., Ekstrom, J.J.: The role of cyber-security in information technology education. In: Proceedings of the 2011 Conference on Information Technology Education, SIGITE 2011, pp. 113–122. ACM, New York (2011). http://doi.acm.org/10.1145/2047594.2047628

  31. Santos, H., Pereira, T., Mendes, I.: Challenges and reflections in designing cyber security curriculum. In: 2017 IEEE World Engineering Education Conference (EDUNINE), pp. 47–51, March 2017

    Google Scholar 

  32. Siraj, A., Taylor, B., Kaza, S., Ghafoor, S.: Integrating security in the computer science curriculum. ACM Inroads 6(2), 77–81 (2015)

    Article  Google Scholar 

  33. Smith, T., Alex Koohang, R.B.: Formulating an effective cybersecurity curriculum. Issues Inf. Syst. XI(1), 410–416 (2010)

    Google Scholar 

  34. Trabelsi, Z., Ibrahim, W.: A hands-on approach for teaching denial of service attacks: a case study. J. Inf. Technol. Educ. Innovations Pract. 12, 299–319 (2013)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Sohail Abbas .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer-Verlag GmbH Germany, part of Springer Nature

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Mouheb, D., Abbas, S., Merabti, M. (2019). Cybersecurity Curriculum Design: A Survey. In: Pan, Z., Cheok, A., Müller, W., Zhang, M., El Rhalibi, A., Kifayat, K. (eds) Transactions on Edutainment XV. Lecture Notes in Computer Science(), vol 11345. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-662-59351-6_9

Download citation

  • DOI: https://doi.org/10.1007/978-3-662-59351-6_9

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-662-59350-9

  • Online ISBN: 978-3-662-59351-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics