<html> <p><img src="https://i.postimg.cc/3JjGb6dS/Cybersecurity-Curricula-x700.png" width="700" height="393"/></p> <p>The cybersecurity industry has long needed a solid foundation for academia to build consistent and effective degree programs. There has been far too much inconsistency in cybersecurity and cyber-science education. In order to prepare the next generations of cybersecurity professionals, academic standards and curriculum must be defines and implemented. </p> <p>This was the goal for the Joint Task Force on Cybersecurity Education (CSEC2017), established in 2015, to develop a guidance for curriculum content, applicable across global academic institutionโs degree programs. </p> <h2><strong>Cybersecurity Curricula Report</strong> </h2> <p>The <a href="https://cybered.hosting.acm.org/wp-content/uploads/2018/02/newcover_csec2017.pdf">Cybersecurity Curricula guidelines</a> for post-secondary degree programs are published and available for anyone to review!</p> <p><strong> </strong><a href="https://cybered.hosting.acm.org/wp-content/uploads/2018/02/newcover_csec2017.pdf"><strong>https://cybered.hosting.acm.org/wp-content/uploads/2018/02/newcover_csec2017.pdf</strong></a><strong> </strong></p> <p>The guidelines are a leading resource of comprehensive cybersecurity curricular content for faculty members of global academic institutions seeking to develop a broad range of cybersecurity offerings at the post-secondary level. It aligns with the <a href="https://www.nist.gov/itl/applied-cybersecurity/nice/resources/nice-cybersecurity-workforce-framework">NICE Cybersecurity Workforce Framework</a> and the <a href="https://www.nsa.gov/resources/educators/centers-academic-excellence/">National Centers of Academic Excellence in Cybersecurity</a> requirements. </p> <h2> <strong>The Goals of the Cybersecurity Curricula Program:</strong> </h2> <ul> <li><em>To describe a vision of proficiency in cybersecurity,</em> </li> <li><em>To define a structure for the cybersecurity discipline by developing a thought-model that defines the boundaries of the discipline and outlines key dimensions of the curricular structure,</em> </li> <li><em>To support the alignment of academic programs with industry needs in cybersecurity,</em> </li> <li><em>To involve a broad global audience of stakeholders through continuous community engagement during the development process,</em> </li> <li><em>To develop curricular guidance that is comprehensive enough to support a wide range of program types, and</em> </li> <li><em>To develop curricular guidance that is grounded in fundamental principles that provide stability yet is structured to provide flexibility to support evolving program needs.</em> </li> </ul> <p>A team of over 300 professionals collaborated to create the curriculum guidelines. I had the honor of being on the Industrial Advisory Board and contributing to the content. A job well done by everyone involved in the effort to build a framework for universities to establish consistent and comprehensive cybersecurity degree programs! </p> <p>Alignment across global academic institutions for cybersecurity degrees represents a powerful capability for sustainable on-boarding and building skilled talent pools to protect technology, data, and people. </p> <p>I encourage everyone to take a look at the recommended scope and framework for university-level cybersecurity programs. </p> <p><br></p> <p><br></p> <p>- Matthew Rosenquist is a Cybersecurity Strategist and advisor, benefiting from 30 years across the industry. Follow his insights, rants, industry reviews, and perspectives on your favorite social sites: <a href="https://www.linkedin.com/today/author/matthewrosenquist">LinkedIn</a>, <a href="https://twitter.com/Matt_Rosenquist">Twitter (@Matt_Rosenquist)</a>, <a href="https://www.youtube.com/channel/UCf2h9t2P1ilRSQ4OgGd4mbw">YouTube</a>, <a href="http://infosecstrategy.blogspot.com/">Information Security Strategy blog</a>, and <a href="https://medium.com/@matthew.rosenquist">Medium</a>. </p> </html>
author | mrosenquist |
---|---|
permlink | cybersecurity-guidelines-for-university-programs-to-align-the-industry |
category | security |
json_metadata | {"tags":["security","news","technology","cybersecurity","education"],"image":["https://i.postimg.cc/3JjGb6dS/Cybersecurity-Curricula-x700.png"],"links":["https://cybered.hosting.acm.org/wp-content/uploads/2018/02/newcover_csec2017.pdf","https://www.nist.gov/itl/applied-cybersecurity/nice/resources/nice-cybersecurity-workforce-framework","https://www.nsa.gov/resources/educators/centers-academic-excellence/","https://www.linkedin.com/today/author/matthewrosenquist","https://twitter.com/Matt_Rosenquist","https://www.youtube.com/channel/UCf2h9t2P1ilRSQ4OgGd4mbw","http://infosecstrategy.blogspot.com/","https://medium.com/@matthew.rosenquist"],"app":"steemit/0.1","format":"html"} |
created | 2019-09-27 17:02:45 |
last_update | 2019-09-27 17:02:45 |
depth | 0 |
children | 3 |
last_payout | 2019-10-04 17:02:45 |
cashout_time | 1969-12-31 23:59:59 |
total_payout_value | 1.929 HBD |
curator_payout_value | 1.601 HBD |
pending_payout_value | 0.000 HBD |
promoted | 0.000 HBD |
body_length | 4,243 |
author_reputation | 177,646,619,415,270 |
root_title | "Cybersecurity Guidelines for University Programs to Align the Industry" |
beneficiaries | [] |
max_accepted_payout | 1,000,000.000 HBD |
percent_hbd | 10,000 |
post_id | 91,005,209 |
net_rshares | 12,057,846,263,606 |
author_curate_reward | "" |
voter | weight | wgt% | rshares | pct | time |
---|---|---|---|---|---|
mauricemikkers | 0 | 1,331,179,983 | 100% | ||
gikitiki | 0 | 12,175,563,595 | 25% | ||
inertia | 0 | 35,956,718,029 | 100% | ||
remlaps | 0 | 22,800,935,679 | 100% | ||
mrosenquist | 0 | 379,518,884,380 | 100% | ||
mchavarriaot | 0 | 1,782,649,904 | 100% | ||
goblu96 | 0 | 7,212,673,793 | 100% | ||
ultimus | 0 | 13,010,659,234 | 100% | ||
jeremyfromwi | 0 | 1,769,780,304 | 100% | ||
doitvoluntarily | 0 | 11,544,832,273 | 100% | ||
techslut | 0 | 45,355,012,526 | 10% | ||
newhope | 0 | 1,913,715,494,232 | 22% | ||
ejemai | 0 | 1,220,325,731 | 100% | ||
benjemar | 0 | 180,454,853 | 100% | ||
fredrikaa | 0 | 2,857,389,511,279 | 100% | ||
avlion | 0 | 470,719,526 | 100% | ||
themarkymark | 0 | 4,539,307,389,417 | 25% | ||
storysharing | 0 | 13,184,239,200 | 100% | ||
espoem | 0 | 12,495,327,845 | 5% | ||
imisstheoldkanye | 0 | 3,076,683,412 | 1% | ||
tute | 0 | 469,928,814 | 100% | ||
upmyvote | 0 | 1,752,748,628,915 | 25% | ||
didic | 0 | 9,834,336,826 | 20% | ||
upboater | 0 | 258,599,947,601 | 25% | ||
enforcer48 | 0 | 39,156,729,146 | 15% | ||
followv | 0 | 4,650,596,768 | 100% | ||
remlaps-lite | 0 | 24,817,988,838 | 100% | ||
aicurator | 0 | 90,741,677,436 | 25% | ||
onespringday | 0 | 876,299,448 | 10% | ||
partitura.stem | 0 | 513,808,692 | 100% | ||
abh12345.stem | 0 | 930,765,327 | 100% | ||
sasifuddin | 0 | 0 | 100% | ||
stem.alfa | 0 | 492,886,685 | 100% | ||
stemd | 0 | 184,856,246 | 30% | ||
yggdrasil.laguna | 0 | 328,777,669 | 70% |
Great info!!! Keep it coming.
author | goblu96 |
---|---|
permlink | pyi2ij |
category | security |
json_metadata | {"tags":["security"],"app":"steemit/0.1"} |
created | 2019-09-27 17:13:33 |
last_update | 2019-09-27 17:13:33 |
depth | 1 |
children | 0 |
last_payout | 2019-10-04 17:13:33 |
cashout_time | 1969-12-31 23:59:59 |
total_payout_value | 0.040 HBD |
curator_payout_value | 0.040 HBD |
pending_payout_value | 0.000 HBD |
promoted | 0.000 HBD |
body_length | 29 |
author_reputation | 895,122,805,291 |
root_title | "Cybersecurity Guidelines for University Programs to Align the Industry" |
beneficiaries | [] |
max_accepted_payout | 1,000,000.000 HBD |
percent_hbd | 10,000 |
post_id | 91,005,524 |
net_rshares | 386,180,388,923 |
author_curate_reward | "" |
voter | weight | wgt% | rshares | pct | time |
---|---|---|---|---|---|
mrosenquist | 0 | 371,932,778,482 | 100% | ||
mchavarriaot | 0 | 1,746,327,801 | 100% | ||
ultimus | 0 | 12,501,282,640 | 100% |
So now there will be specific "cybersecurity" degrees that can be earned?
author | ultimus |
---|---|
permlink | pyi3j6 |
category | security |
json_metadata | {"tags":["security"],"app":"steemit/0.1"} |
created | 2019-09-27 17:35:33 |
last_update | 2019-09-27 17:35:33 |
depth | 1 |
children | 1 |
last_payout | 2019-10-04 17:35:33 |
cashout_time | 1969-12-31 23:59:59 |
total_payout_value | 0.039 HBD |
curator_payout_value | 0.010 HBD |
pending_payout_value | 0.000 HBD |
promoted | 0.000 HBD |
body_length | 73 |
author_reputation | 6,664,676,750,516 |
root_title | "Cybersecurity Guidelines for University Programs to Align the Industry" |
beneficiaries | [] |
max_accepted_payout | 1,000,000.000 HBD |
percent_hbd | 10,000 |
post_id | 91,006,034 |
net_rshares | 377,058,986,513 |
author_curate_reward | "" |
voter | weight | wgt% | rshares | pct | time |
---|---|---|---|---|---|
mrosenquist | 0 | 364,498,394,703 | 100% | ||
enforcer48 | 0 | 12,560,591,810 | 5% |
Yes, universities can use this framework to create a formal cybersecurity or cyberscience degree program!
author | mrosenquist |
---|---|
permlink | pyi3kn |
category | security |
json_metadata | {"tags":["security"],"app":"steemit/0.1"} |
created | 2019-09-27 17:36:24 |
last_update | 2019-09-27 17:36:24 |
depth | 2 |
children | 0 |
last_payout | 2019-10-04 17:36:24 |
cashout_time | 1969-12-31 23:59:59 |
total_payout_value | 0.000 HBD |
curator_payout_value | 0.000 HBD |
pending_payout_value | 0.000 HBD |
promoted | 0.000 HBD |
body_length | 105 |
author_reputation | 177,646,619,415,270 |
root_title | "Cybersecurity Guidelines for University Programs to Align the Industry" |
beneficiaries | [] |
max_accepted_payout | 1,000,000.000 HBD |
percent_hbd | 10,000 |
post_id | 91,006,055 |
net_rshares | 25,305,409,277 |
author_curate_reward | "" |
voter | weight | wgt% | rshares | pct | time |
---|---|---|---|---|---|
ultimus | 0 | 12,757,246,165 | 100% | ||
enforcer48 | 0 | 12,548,163,112 | 5% |