Open Access. Powered by Scholars. Published by Universities.®

Education Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 4 of 4

Full-Text Articles in Education

Proposal For A Joint Cybersecurity And Information Technology Management Program, Christopher Simpson, Debra Bowen, William Reid, James Juarez Oct 2019

Proposal For A Joint Cybersecurity And Information Technology Management Program, Christopher Simpson, Debra Bowen, William Reid, James Juarez

KSU Proceedings on Cybersecurity Education, Research and Practice

Cybersecurity and Information Technology Management programs have many similarities and many similar knowledge, skills, and abilities are taught across both programs. The skill mappings for the NICE Framework and the knowledge units required to become a National Security Agency and Department of Homeland Security Center of Academic Excellence in Cyber Defense Education contain many information technology management functions. This paper explores one university’s perception on how a joint Cybersecurity and Information Technology Management program could be developed to upskill students to be work force ready.


Adversarial Thinking: Teaching Students To Think Like A Hacker, Frank Katz Oct 2019

Adversarial Thinking: Teaching Students To Think Like A Hacker, Frank Katz

KSU Proceedings on Cybersecurity Education, Research and Practice

Today’s college and university cybersecurity programs often contain multiple laboratory activities on various different hardware and software-based cybersecurity tools. These include preventive tools such as firewalls, virtual private networks, and intrusion detection systems. Some of these are tools used in attacking a network, such as packet sniffers and learning how to craft cross-site scripting attacks or man-in-the-middle attacks. All of these are important in learning cybersecurity. However, there is another important component of cybersecurity education – teaching students how to protect a system or network from attackers by learning their motivations, and how they think, developing the students’ “abilities to …


Cloud Computing Architecture For Elearning Systems In Secondary Schools In Tanzania, Kennedy F. Mwakisole, Mussa M. Kissaka Dr, Joel S. Mtebe Phd Oct 2019

Cloud Computing Architecture For Elearning Systems In Secondary Schools In Tanzania, Kennedy F. Mwakisole, Mussa M. Kissaka Dr, Joel S. Mtebe Phd

The African Journal of Information Systems

In recent years, schools have been investing heavily on information and communications technology (ICT) infrastructure to implement eLearning systems to enhance the quality of education in secondary schools in Tanzania. The majority of these systems are implemented using a traditional web-based eLearning approach on school premises which is costly and limits usage due to lack of scalability and flexibility. Consequently, many schools have started adopting cloud computing as a solution. However, this adaption depends on well-defined cloud eLearning architecture. This study proposed cloud architecture for implementing an eLearning system in secondary schools in Tanzania by adopting various layers proposed in …


Cybersecurity Education: The Need For A Top-Driven, Multidisciplinary, School-Wide Approach, Lucy Tsado Jun 2019

Cybersecurity Education: The Need For A Top-Driven, Multidisciplinary, School-Wide Approach, Lucy Tsado

Journal of Cybersecurity Education, Research and Practice

The human resource skills gap in cybersecurity has created an opportunity for educational institutions interested in cybersecurity education. The current number of schools designated by the Department of Homeland Security (DHS) and National Security Agency (NSA) as Centers of Academic Excellence (CAE) to train cybersecurity experts are not sufficient to meet the shortfall in the industry. The DHS has clearly mapped out knowledge areas for cybersecurity education for both technical and non-technical disciplines; it is therefore possible for institutions not yet designated CAEs to generate cybersecurity experts, with the long-term goal of attaining the CAE designation. The purpose of this …