Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 1 |
Since 2016 (last 10 years) | 2 |
Since 2006 (last 20 years) | 5 |
Descriptor
Computer Science | 5 |
Computer Security | 5 |
Information Security | 5 |
Computer Networks | 2 |
Computer Software | 2 |
Higher Education | 2 |
Information Technology | 2 |
Internet | 2 |
STEM Education | 2 |
Skill Development | 2 |
Academic Advising | 1 |
More ▼ |
Source
Industry and Higher Education | 1 |
Information Systems Education… | 1 |
Jobs for the Future | 1 |
Journal on Educational… | 1 |
ProQuest LLC | 1 |
Author
Acheampong, Zoe | 1 |
Babb, Jeffry S. | 1 |
Barkanic, Steve | 1 |
Cardenas-Navia, Isabel | 1 |
Chen, Frankie | 1 |
Elzey, Karen | 1 |
Fitzgerald, Brian K. | 1 |
Frydenberg, Mark | 1 |
Hughes, Debbie | 1 |
Jenness, Sarah | 1 |
Kashiri, Erica | 1 |
More ▼ |
Publication Type
Journal Articles | 3 |
Reports - Descriptive | 3 |
Dissertations/Theses -… | 1 |
Reports - Research | 1 |
Education Level
Higher Education | 3 |
Postsecondary Education | 3 |
High Schools | 1 |
Secondary Education | 1 |
Audience
Location
Massachusetts | 1 |
Texas | 1 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Jenness, Sarah; Acheampong, Zoe – Jobs for the Future, 2022
This resource provides helpful information for high school teachers and counselors to better understand computer science, an industry that has many high-wage jobs open across the country. The resource supports effective advising by including an overview of computer science, cybersecurity, and networking; defines in-demand computer science skills…
Descriptors: High School Teachers, Counselors, Computer Science, Academic Advising
Dotting i's and Crossing T's: Integrating Breadth and Depth in an Undergraduate Cybersecurity Course
Yates, David J.; Frydenberg, Mark; Waguespack, Leslie J.; McDermott, Isabelle; OConnell, Jake; Chen, Frankie; Babb, Jeffry S. – Information Systems Education Journal, 2019
The importance of updating, expanding and improving what is taught in cybersecurity curricula is increasing as the security threat landscape becomes more dangerous, breaches become more frequent, and the number of deployed Internet of Things (IoT) devices, known for their security challenges, grows exponentially. This paper argues that a profile…
Descriptors: Information Security, Computer Security, Curriculum Design, Internet
Fitzgerald, Brian K.; Barkanic, Steve; Cardenas-Navia, Isabel; Elzey, Karen; Hughes, Debbie; Kashiri, Erica; Troyan, Danielle – Industry and Higher Education, 2014
Partnerships between higher education and business have long been an important part of the academic landscape, but often they are based on shorter-term transactional objectives rather than on longer-term strategic goals. BHEF's National Higher Education and Workforce Initiative brings together business and academia at the institutional,…
Descriptors: School Business Relationship, Partnerships in Education, Computer Security, STEM Education
Nunnery, Christopher Edward – ProQuest LLC, 2011
Botnets remain a potent threat due to evolving modern architectures, inadequate remediation methods, and inaccurate measurement techniques. In response, this research exposes the architectures and operations of two advanced botnets, techniques to enumerate infected hosts, and pursues the scientific refinement of infected-host enumeration data by…
Descriptors: Measurement Techniques, Computer Science, Computer Security, Information Technology
Shumba, Rose – Journal on Educational Resources in Computing, 2006
In the summer of 2003, a project to augment and improve the teaching of information assurance courses was started at IUP. Thus far, ten hands-on exercises have been developed. The exercises described in this article, and presented in the appendix, are based on actions required to secure a Linux host. Publicly available resources were used to…
Descriptors: Computer Security, Experiential Learning, Computer Software, Open Source Technology