create account

Cybersecurity Guidelines for University Programs to Align the Industry by mrosenquist

View this thread on: hive.blogpeakd.comecency.com
· @mrosenquist ·
$3.53
Cybersecurity Guidelines for University Programs to Align the Industry
<html>
<p><img src="https://i.postimg.cc/3JjGb6dS/Cybersecurity-Curricula-x700.png" width="700" height="393"/></p>
<p>The cybersecurity industry has long needed a solid foundation for academia to build consistent and effective degree programs. There has been far too much inconsistency in cybersecurity and cyber-science education. In order to prepare the next generations of cybersecurity professionals, academic standards and curriculum must be defines and implemented. &nbsp;</p>
<p>This was the goal for the Joint Task Force on Cybersecurity Education (CSEC2017), established in 2015, to develop a guidance for curriculum content, applicable across global academic institutionโ€™s degree programs. &nbsp;&nbsp;&nbsp;</p>
<h2><strong>Cybersecurity Curricula Report</strong>&nbsp;</h2>
<p>The <a href="https://cybered.hosting.acm.org/wp-content/uploads/2018/02/newcover_csec2017.pdf">Cybersecurity Curricula guidelines</a> for post-secondary degree programs are published and available for anyone to review!</p>
<p><strong>&nbsp;</strong><a href="https://cybered.hosting.acm.org/wp-content/uploads/2018/02/newcover_csec2017.pdf"><strong>https://cybered.hosting.acm.org/wp-content/uploads/2018/02/newcover_csec2017.pdf</strong></a><strong> &nbsp;&nbsp;</strong></p>
<p>The guidelines are a leading resource of comprehensive cybersecurity curricular content for faculty members of global academic institutions seeking to develop a broad range of cybersecurity offerings at the post-secondary level. &nbsp;It aligns with the <a href="https://www.nist.gov/itl/applied-cybersecurity/nice/resources/nice-cybersecurity-workforce-framework">NICE Cybersecurity Workforce Framework</a> and the <a href="https://www.nsa.gov/resources/educators/centers-academic-excellence/">National Centers of Academic Excellence in Cybersecurity</a> requirements. &nbsp;&nbsp;&nbsp;</p>
<h2>&nbsp;<strong>The Goals of the Cybersecurity Curricula Program:</strong>&nbsp;</h2>
<ul>
  <li><em>To describe a vision of proficiency in cybersecurity,</em>&nbsp;</li>
  <li><em>To define a structure for the cybersecurity discipline by developing a thought-model that defines the boundaries of the discipline and outlines key dimensions of the curricular structure,</em>&nbsp;</li>
  <li><em>To support the alignment of academic programs with industry needs in cybersecurity,</em>&nbsp;</li>
  <li><em>To involve a broad global audience of stakeholders through continuous community engagement during the development process,</em>&nbsp;</li>
  <li><em>To develop curricular guidance that is comprehensive enough to support a wide range of program types, and</em>&nbsp;</li>
  <li><em>To develop curricular guidance that is grounded in fundamental principles that provide stability yet is structured to provide flexibility to support evolving program needs.</em> &nbsp;&nbsp;</li>
</ul>
<p>A team of over 300 professionals collaborated to create the curriculum guidelines. I had the honor of being on the Industrial Advisory Board and contributing to the content. A job well done by everyone involved in the effort to build a framework for universities to establish consistent and comprehensive cybersecurity degree programs! &nbsp;&nbsp;</p>
<p>Alignment across global academic institutions for cybersecurity degrees represents a powerful capability for sustainable on-boarding and building skilled talent pools to protect technology, data, and people. &nbsp;&nbsp;</p>
<p>I encourage everyone to take a look at the recommended scope and framework for university-level cybersecurity programs. &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</p>
<p><br></p>
<p><br></p>
<p>- Matthew Rosenquist is a Cybersecurity Strategist and advisor, benefiting from 30 years across the industry. Follow his insights, rants, industry reviews, and perspectives on your favorite social sites: <a href="https://www.linkedin.com/today/author/matthewrosenquist">LinkedIn</a>, <a href="https://twitter.com/Matt_Rosenquist">Twitter (@Matt_Rosenquist)</a>, <a href="https://www.youtube.com/channel/UCf2h9t2P1ilRSQ4OgGd4mbw">YouTube</a>, <a href="http://infosecstrategy.blogspot.com/">Information Security Strategy blog</a>, and <a href="https://medium.com/@matthew.rosenquist">Medium</a>.&nbsp;</p>
</html>
๐Ÿ‘  , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , ,
properties (23)
authormrosenquist
permlinkcybersecurity-guidelines-for-university-programs-to-align-the-industry
categorysecurity
json_metadata{"tags":["security","news","technology","cybersecurity","education"],"image":["https://i.postimg.cc/3JjGb6dS/Cybersecurity-Curricula-x700.png"],"links":["https://cybered.hosting.acm.org/wp-content/uploads/2018/02/newcover_csec2017.pdf","https://www.nist.gov/itl/applied-cybersecurity/nice/resources/nice-cybersecurity-workforce-framework","https://www.nsa.gov/resources/educators/centers-academic-excellence/","https://www.linkedin.com/today/author/matthewrosenquist","https://twitter.com/Matt_Rosenquist","https://www.youtube.com/channel/UCf2h9t2P1ilRSQ4OgGd4mbw","http://infosecstrategy.blogspot.com/","https://medium.com/@matthew.rosenquist"],"app":"steemit/0.1","format":"html"}
created2019-09-27 17:02:45
last_update2019-09-27 17:02:45
depth0
children3
last_payout2019-10-04 17:02:45
cashout_time1969-12-31 23:59:59
total_payout_value1.929 HBD
curator_payout_value1.601 HBD
pending_payout_value0.000 HBD
promoted0.000 HBD
body_length4,243
author_reputation177,646,619,415,270
root_title"Cybersecurity Guidelines for University Programs to Align the Industry"
beneficiaries[]
max_accepted_payout1,000,000.000 HBD
percent_hbd10,000
post_id91,005,209
net_rshares12,057,846,263,606
author_curate_reward""
vote details (35)
@goblu96 ·
$0.08
Great info!!! Keep it coming.
๐Ÿ‘  , ,
properties (23)
authorgoblu96
permlinkpyi2ij
categorysecurity
json_metadata{"tags":["security"],"app":"steemit/0.1"}
created2019-09-27 17:13:33
last_update2019-09-27 17:13:33
depth1
children0
last_payout2019-10-04 17:13:33
cashout_time1969-12-31 23:59:59
total_payout_value0.040 HBD
curator_payout_value0.040 HBD
pending_payout_value0.000 HBD
promoted0.000 HBD
body_length29
author_reputation895,122,805,291
root_title"Cybersecurity Guidelines for University Programs to Align the Industry"
beneficiaries[]
max_accepted_payout1,000,000.000 HBD
percent_hbd10,000
post_id91,005,524
net_rshares386,180,388,923
author_curate_reward""
vote details (3)
@ultimus ·
$0.05
So now there will be specific "cybersecurity" degrees that can be earned?
๐Ÿ‘  ,
properties (23)
authorultimus
permlinkpyi3j6
categorysecurity
json_metadata{"tags":["security"],"app":"steemit/0.1"}
created2019-09-27 17:35:33
last_update2019-09-27 17:35:33
depth1
children1
last_payout2019-10-04 17:35:33
cashout_time1969-12-31 23:59:59
total_payout_value0.039 HBD
curator_payout_value0.010 HBD
pending_payout_value0.000 HBD
promoted0.000 HBD
body_length73
author_reputation6,664,676,750,516
root_title"Cybersecurity Guidelines for University Programs to Align the Industry"
beneficiaries[]
max_accepted_payout1,000,000.000 HBD
percent_hbd10,000
post_id91,006,034
net_rshares377,058,986,513
author_curate_reward""
vote details (2)
@mrosenquist ·
Yes, universities can use this framework to create a formal cybersecurity or cyberscience degree program!
๐Ÿ‘  ,
properties (23)
authormrosenquist
permlinkpyi3kn
categorysecurity
json_metadata{"tags":["security"],"app":"steemit/0.1"}
created2019-09-27 17:36:24
last_update2019-09-27 17:36:24
depth2
children0
last_payout2019-10-04 17:36:24
cashout_time1969-12-31 23:59:59
total_payout_value0.000 HBD
curator_payout_value0.000 HBD
pending_payout_value0.000 HBD
promoted0.000 HBD
body_length105
author_reputation177,646,619,415,270
root_title"Cybersecurity Guidelines for University Programs to Align the Industry"
beneficiaries[]
max_accepted_payout1,000,000.000 HBD
percent_hbd10,000
post_id91,006,055
net_rshares25,305,409,277
author_curate_reward""
vote details (2)