Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 2 |
Since 2016 (last 10 years) | 6 |
Since 2006 (last 20 years) | 7 |
Descriptor
Computer Security | 7 |
Course Descriptions | 7 |
Information Security | 7 |
Computer Networks | 2 |
Computer Science Education | 2 |
Course Content | 2 |
Higher Education | 2 |
Internet | 2 |
Laboratory Experiments | 2 |
Professional Education | 2 |
Skill Development | 2 |
More ▼ |
Source
Advances in Engineering… | 1 |
American Journal of Business… | 1 |
Comparative Professional… | 1 |
Information Systems Education… | 1 |
Journal of Cybersecurity… | 1 |
Journal of Political Science… | 1 |
ProQuest LLC | 1 |
Author
Babb, Jeffry S. | 1 |
Belshaw, Scott H. | 1 |
Bhunia, Swarup | 1 |
Braiko, Bohdan | 1 |
Chen, Frankie | 1 |
Colaiuta, Alexandrea | 1 |
Frydenberg, Mark | 1 |
Guynes, Carl S. | 1 |
Herr, Trey | 1 |
Jensen, Bradley K. | 1 |
Laudrain, Arthur P. B. | 1 |
More ▼ |
Publication Type
Journal Articles | 6 |
Reports - Research | 4 |
Reports - Descriptive | 2 |
Dissertations/Theses -… | 1 |
Education Level
Higher Education | 7 |
Postsecondary Education | 7 |
Two Year Colleges | 1 |
Audience
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Herr, Trey; Laudrain, Arthur P. B.; Smeets, Max – Journal of Political Science Education, 2021
Colleges and universities continue to expand their curricula to include cybersecurity as an explicit course of study in political science. But what is taught in a course on cybersecurity? Are syllabi deep dives into technology, broad romps through contemporary policy debates, or do they reflect a more varied disposition? Studying the syllabi of an…
Descriptors: Computer Science Education, Computer Security, Information Security, Political Science
Belshaw, Scott H.; Nodeland, Brooke; Underwood, Lorrin; Colaiuta, Alexandrea – Journal of Cybersecurity Education, Research and Practice, 2020
Increasingly, criminal justice practitioners have been called on to help solve breaches in cyber security. However, while the demand for criminal justice participation in cyber investigations increases daily, most universities are lagging in their educational and training opportunities for students entering the criminal justice fields. This…
Descriptors: Law Enforcement, Community Colleges, Computer Security, Information Security
Dotting i's and Crossing T's: Integrating Breadth and Depth in an Undergraduate Cybersecurity Course
Yates, David J.; Frydenberg, Mark; Waguespack, Leslie J.; McDermott, Isabelle; OConnell, Jake; Chen, Frankie; Babb, Jeffry S. – Information Systems Education Journal, 2019
The importance of updating, expanding and improving what is taught in cybersecurity curricula is increasing as the security threat landscape becomes more dangerous, breaches become more frequent, and the number of deployed Internet of Things (IoT) devices, known for their security challenges, grows exponentially. This paper argues that a profile…
Descriptors: Information Security, Computer Security, Curriculum Design, Internet
Yang, Shuo; Paul, Shubhra Deb; Bhunia, Swarup – Advances in Engineering Education, 2021
Hardware security is one of the most researched areas in the field of security. It focuses on discovering and understanding attacks and countermeasures for electronic hardware that provides the "root-of-trust" for modern computing systems upon which the software stack is built. The increasing reliance on electronic devices in our…
Descriptors: Engineering Education, Computer Science Education, Computer Security, Information Security
Braiko, Bohdan – Comparative Professional Pedagogy, 2019
The article deals with the relevant problem of updating the system of graduate training (master's degree) in Ukraine. It analyzes the ways of Ukraine's integration into the European Higher Education Area and the legal framework of higher education in Ukraine and the UK. It also presents a comparative pedagogical analysis of the features of…
Descriptors: Comparative Education, Information Security, Computer Security, Masters Programs
Murphy, Colleen F. – ProQuest LLC, 2018
By 2020, the global need for information security professionals is expected to reach six million and the shortfall in meeting that need is expected to be over one and a half million. Not only is there a shortage of cybersecurity professionals but those who are graduates of a cybersecurity program are not adequately skilled to assume significant…
Descriptors: Instructional Design, Computer Security, Information Security, Labor Force Development
Jensen, Bradley K.; Guynes, Carl S.; Nyaboga, Andrew – American Journal of Business Education, 2009
Given the magnitude of real and potential losses, both private and public employers increasingly expect graduates of management information systems (MIS) programs to understand information security concepts. The infrastructure requirements for the course includes setting up a secure laboratory environment to accommodate the development of viruses…
Descriptors: Graduate Students, Management Information Systems, Information Security, Concept Teaching