Designing a Security System Administration Course for Cybersecurity with a Companion Project
- URL: http://arxiv.org/abs/2309.01839v2
- Date: Sat, 14 Oct 2023 02:55:31 GMT
- Title: Designing a Security System Administration Course for Cybersecurity with a Companion Project
- Authors: Fei Zuo, Junghwan Rhee, Myungah Park, Gang Qian,
- Abstract summary: A cybersecurity program has been constructed at University of Central Oklahoma.
As a core course, Secure System Administration focuses on the essential knowledge and skill set for system administration.
To enrich students with hands-on experience, we also develop a companion coursework project, named PowerGrader.
- Score: 2.188233359684067
- License: http://creativecommons.org/licenses/by-nc-nd/4.0/
- Abstract: In the past few years, an incident response-oriented cybersecurity program has been constructed at University of Central Oklahoma. As a core course in the newly-established curricula, Secure System Administration focuses on the essential knowledge and skill set for system administration. To enrich students with hands-on experience, we also develop a companion coursework project, named PowerGrader. In this paper, we present the course structure as well as the companion project design. Additionally, we survey the pertinent criterion and curriculum requirements from the widely recognized accreditation units. By this means, we demonstrate the importance of a secure system administration course within the context of cybersecurity education.
Related papers
- A Framework for Mapping Organisational Workforce Knowledge Profile in Cyber Security [11.934344823380615]
Building a comprehensive cyber security knowledge profile is a distinct challenge.
There has been a lack of a well-defined methodology for evaluating an organisation's cyber security knowledge.
We advance a framework leveraging CyBOK, to construct an organisation's knowledge profile.
arXiv Detail & Related papers (2024-06-05T14:34:37Z) - An Actionable Framework for Understanding and Improving Talent Retention
as a Competitive Advantage in IT Organizations [44.342141516382284]
This work presents an actionable framework for Talent Retention (TR) used in IT organizations.
Our framework encompasses a set of factors, contextual characteristics, barriers, strategies, and coping mechanisms.
Our findings indicated that software engineers can be differentiated from other professional groups.
arXiv Detail & Related papers (2024-02-02T17:08:14Z) - Cybersecurity as a Crosscutting Concept Across an Undergrad Computer
Science Curriculum: An Experience Report [1.6317061277457001]
We advocate to integrate cybersecurity as a crosscutting concept in Computer Science curricula.
The security education was incorporated within CS courses using a partnership between the responsible course instructor and a security expert.
We conducted a post-course survey to collect student perceptions, and semi-supervised interviews with responsible course instructors and the security expert to gauge their experience.
arXiv Detail & Related papers (2023-10-11T16:07:42Z) - Deep Learning Safety Concerns in Automated Driving Perception [43.026485214492105]
This paper introduces an additional categorization for a better understanding as well as enabling cross-functional teams to jointly address the concerns.
Recent advances in the field of deep learning and impressive performance of deep neural networks (DNNs) for perception have resulted in an increased demand for their use in automated driving (AD) systems.
arXiv Detail & Related papers (2023-09-07T15:25:47Z) - Towards a Success Model for Automated Programming Assessment Systems
Used as a Formative Assessment Tool [42.03652286907358]
The assessment of source code in university education is a central and important task for lecturers of programming courses.
The use of automated programming assessment systems (APASs) is a promising solution.
Measuring the effectiveness and success of APASs is crucial to understanding how such platforms should be designed, implemented, and used.
arXiv Detail & Related papers (2023-06-08T06:19:15Z) - XSS for the Masses: Integrating Security in a Web Programming Course
using a Security Scanner [3.387494280613737]
Cybersecurity education is an important part of undergraduate computing curricula.
Many institutions teach it only in dedicated courses or tracks.
An alternative approach is to integrate cybersecurity concepts across non-security courses.
arXiv Detail & Related papers (2022-04-26T16:20:36Z) - Recommender Systems for Configuration Knowledge Engineering [55.41644538483948]
We show how recommender systems can support knowledge base development and maintenance processes.
We report the results of empirical studies which show the importance of user-centered configuration knowledge organization.
arXiv Detail & Related papers (2021-02-16T12:29:54Z) - Data Science for Engineers: A Teaching Ecosystem [59.00739310930656]
We describe an ecosystem for teaching data science to engineers at the Faculty of Physical and Mathematical Sciences, Universidad de Chile.
This initiative has been motivated by the increasing demand for DS qualifications both from academic and professional environments.
By sharing our teaching principles and the innovative components of our approach to teaching DS, we hope our experience can be useful to those developing their own DS programmes and ecosystems.
arXiv Detail & Related papers (2021-01-14T14:17:57Z) - Dos and Don'ts of Machine Learning in Computer Security [74.1816306998445]
Despite great potential, machine learning in security is prone to subtle pitfalls that undermine its performance.
We identify common pitfalls in the design, implementation, and evaluation of learning-based security systems.
We propose actionable recommendations to support researchers in avoiding or mitigating the pitfalls where possible.
arXiv Detail & Related papers (2020-10-19T13:09:31Z) - Framework for an Integrated Learning Block with CDIO-led Engineering
Education [0.2578242050187029]
The School of Mechanical and Electrical Engineering Sheridan maintains a curriculum that is deeply rooted in skills-based learning, experiential learning, and engineering design.
An important challenge still impeding our students knowledge acquisition is the perception that program courses have disjointed learning outcomes.
One feasible approach to tackle this pedagogical challenge is to combine various courses into an integrated learning block (ILB) having a unified mission and objective.
arXiv Detail & Related papers (2020-06-04T22:00:58Z) - Experiences and Lessons Learned Creating and Validating Concept
Inventories for Cybersecurity [0.0]
Cybersecurity Concept Inventory (CCI) is for students who have recently completed any first course in cybersecurity.
The Cybersecurity Curriculum Assessment (CCA) is for students who have recently completed an undergraduate major or track in cybersecurity.
Each assessment tool comprises 25 multiple-choice questions (MCQs) of various difficulties that target the same five core concepts.
arXiv Detail & Related papers (2020-04-10T22:40:04Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.