CSEC2017 Update: Joint Task Force on Cybersecurity Education Diana Burley, Matt Bishop, and the members of the Joint Task Force.

Slides:



Advertisements
Similar presentations
National Accessible Reading Assessment Projects Defining Reading Proficiency for Accessible Large Scale Assessments Principles and Issues Paper American.
Advertisements

National Accessible Reading Assessment Projects Defining Reading Proficiency for Accessible Large Scale Assessments Discussion of the Principles and Issues.
Reform and Innovation in Higher Education
Foundations of Excellence ® in the First College Year (4-year institutions) Salisbury University Project Description of Review Process of First College.
Columbia, MD Nov 4-5,  What is the goal of CEP? To facilitate an effort to … 1.create broad/inclusive guidance for the development of “Cyber Science”
Cyber Education Project Accreditation Committee November 2014.
Be a Part of Something Great! Learning Communities at Wayne State.
Mohammad Alshayeb 19 May Agenda Update on Computer Science Program Assessment/Accreditation Work Update on Software Engineering Program Assessment/Accreditation.
4 August st Century Computing Curricula 1 Richard J. LeBlanc, Jr. Professor, College of Computing Georgia Institute of Tech nology Atlanta, Georgia,
Framework for Improving Critical Infrastructure Cybersecurity Overview and Status Executive Order “Improving Critical Infrastructure Cybersecurity”
The Influence of the University/College/Department Mission How your university and department’s missions influence your engineering degree requirements.
1. 2 Why is the Core important? To set high expectations –for all students –for educators To attend to the learning needs of students To break through.
Overview of NIPP 2013: Partnering for Critical Infrastructure Security and Resilience October 2013 DRAFT.
Indiana’s Early Learning Development Framework
Curriculum Mapping Kim Anderson ASLO Subcommittee Chair Spring 2011.
Standard 5 - Faculty Qualifications, Performance, and Development Kate Steffens St. Cloud State University.
Whitacre College of Engineering Panel Interdisciplinary Cybersecurity Education Texas Tech University NSF-SFS Workshop on Educational Initiatives in Cybersecurity.
Certified Software Development Associate. Slide 2 What Is the IEEE Computer Society? l The IEEE CS was established in 1946, has nearly 100,000 members.
“PLANNING” CREATING A CULTURE OF EVIDENCE Elizabeth Noel, PhD Associate Vice President, Research Office of Research and Development.
Preparing and Evaluating 21 st Century Faculty Aligning Expectations, Competencies and Rewards The NACU Teagle Grant Nancy Hensel, NACU Rick Gillman, Valporaiso.
The Conceptual Framework: What It Is and How It Works Linda Bradley, James Madison University Monica Minor, NCATE April 2008.
Opportunity Structures for Preparation and Inspiration (OSPrI): Case Studies of 8 “Exemplar” Inclusive STEM-focused High Schools This work was conducted.
HLC Criterion Three Primer: Teaching and Learning: Quality, Resources, and Support Thursday, September 24, :40 – 11:40 a.m. Event Center.
Managing Enterprise Architecture
1 IT/Cybersecurity - ICRDCE Conference Day Aligning Program, Course, and Class Objectives / Outcomes.
Phase-1: Prepare for the Change Why stepping back and preparing for the change is so important to successful adoption: Uniform and effective change adoption.
Bringing it All Together Focus on Curriculum Development & Instructional Delivery Focus on Instructional Practices Focus on Instructional Alignment Where.
AQIP Categories Category One: Helping Students Learn focuses on the design, deployment, and effectiveness of teaching-learning processes (and on the processes.
CHAPTER 7 DELIVERY OF YOUR COMPREHENSIVE SCHOOL COUNSELING PROGRAM
Universal Standards for Social Performance Management
Using core competencies in curriculum design
Principles of Good Governance
Presenter: Sue Hackett
WORKSHOP Computer Science Curriculum Development
SNOMED CT Education SIG: Strategic Plan Review
Revised Curriculum.
Phyllis Lynch, PhD Director, Instruction, Assessment and Curriculum
C-ID and CTE Robert Cabral: C-ID CTE Director
California's Early Learning and Development System Overview
SAMPLE Develop a Comprehensive Competency Framework
Curriculum and Accreditation
Mastery-Based Learning:
Curriculum and Accreditation
A Guaranteed, Viable, and Engaging Curriculum
TSMO Program Plan Development
“CareerGuide for Schools”
6. The School Curriculum The Principal’s Role in Curriculum Administration Understanding Curriculum Theory The Humanistic Perspective Social Reconstruction.
Institutional Effectiveness USF System Office of Decision Support
ACM/IEEE-CS Computer Science Curriculum
Department of Computer Science The University of Texas at Dallas
Information Technology (IT)
Learn change Learning to to Changing.
12/11/2015.
Implementation Guide for Linking Adults to Opportunity
Course Sequencing and Program Mapping 2018 Curriculum Institute Riverside, California Daniel Keller, Dean of Curriculum and Instructional Support Services,
Continuity Guidance Circular Webinar
COMMUNITY COLLEGE PARTNERS
COURSE DEVELOPMENT PROCESS OVERVIEW AND GUIDELINES
Cybersecurity ATD technical
K–8 Session 1: Exploring the Critical Areas
CS 410 Professional Workforce Development I
Introductions Introduction
Portfolio, Programme and Project
Student Learning Outcomes at CSUDH
Cynthia Curry, Director National AEM Center
Introduction Introduction
Coastal Bend College’s Quality Enhancement Plan
Unit 14 Emergency Planning IS 235
BUS120 Principle of Marketing
Central New York HEALTH EMERGENCY PREPAREDNESS COALITION
Presentation transcript:

CSEC2017 Update: Joint Task Force on Cybersecurity Education Diana Burley, Matt Bishop, and the members of the Joint Task Force

http://cybered.acm.org Available now!

Sponsors Association for Computing Machinery (ACM) IEEE Computer Society (IEEE-CS) Association for Information Systems Special Interest Group on Security and Privacy (AIS SIGSEC) International Federation for Information Processing Technical Committee on Information Security Education (IFIP WG 11.8) US National Science Foundation (Award 1623104) Intel US National Security Agency (Grant H98230-17-1-0219)

JTF Members Diana Burley, Co-Chair, The George Washington University Matt Bishop, Co-Chair, University of California Davis Scott Buck, Intel Labs J Ekstrom, Brigham Young University Lynn Fletcher, Nelson Mandela Metropolitan University, South Africa David Gibson, U.S. Air Force Academy Beth Hawthorne, Union County College Sidd Kaza, Towson University Yair Levy, Nova Southeastern University Herb Mattord, Kennesaw State University Allen Parish, U.S. Naval Academy

Developed with the assistance of > 325 contributors across 35 countries, CSEC2017 is the first set of global cybersecurity curricular guidelines and we envision that it will be the leading resource of comprehensive curricular content for global institutions seeking to develop a broad range of cybersecurity offerings. DBURLEY@GWU.EDU

Mission To develop comprehensive and flexible undergraduate curricular guidance in cybersecurity education that will support future program development and associated educational efforts at the post- secondary level. To produce a curricular volume that structures the cybersecurity discipline and provides guidance to institutions seeking to develop or modify a broad range of programs rather than a prescriptive document to support a single program type.

Goals To describe a vision of proficiency in cybersecurity; To define a structure for the cybersecurity discipline by developing a thought model that defines the boundaries of the discipline and outlines key dimensions of the curricular structure; To support the alignment of academic programs and industry needs in cybersecurity; To involve broad global audience of stakeholders through continuous community engagement during the development process; To develop curricular guidance that is comprehensive enough to support a wide range of program types; and To develop curricular guidance that is grounded in fundamental principles that provide stability, yet is structured to provide flexibility to support evolving program needs.

CSEC 2017 Thought Model

Knowledge Area Organization

Knowledge Area Descriptions Data Security: focuses on the protection of data at rest, during processing, and in transit. Software Security: focuses on the development and use of software that reliably preserves the security properties of the information and systems it protects. Component Security: focuses on the design, procurement, testing, analysis and maintenance of components integrated into larger systems. Connection Security: focuses on the security of the connections between components including both physical and logical connections.

Knowledge Area Descriptions (continued) System Security: focuses on the security aspects of systems that are composed of components and connections, and use software. Human Security: focuses on protecting individuals’ data and privacy in the context of organizations (i.e., as employees) and personal life, in addition to the study of human behavior as it relates to cybersecurity. Organizational Security: focuses on protecting organizations from cybersecurity threats and managing risk to support the successful accomplishment of the organization’s mission. Societal Security: focuses on aspects of cybersecurity that broadly impact society as a whole for better or for worse.

Knowledge Area Essentials The essential concepts of each knowledge area capture the cybersecurity proficiency that every student needs to achieve regardless of program focus. Essentials should be introduced early and reinforced throughout every cybersecurity program. These concepts may also appear as specific knowledge units, as topics within knowledge units, or as aggregates of topics across knowledge units. Taken together, the essential concepts in all of the knowledge areas should be covered in every cybersecurity program. In the curricular volume, the essential concepts are explicitly identified for each knowledge area along with learning outcomes.

Exemplars The CSEC2017 Body of Knowledge affords the flexibility to support many different types of programs. The exemplars will demonstrate how a variety of institutions cover the knowledge area essentials and some subset of the knowledge units. Appendix C of the curricular volume contains the Curricular, Workforce, and Course exemplar templates The exemplars will be provided on the cybered.acm.org community engagement website to demonstrate the ways that the Body of Knowledge may be organized into a complete curriculum.

Example: Knowledge Unit Table w/Outcomes

Mapping CSEC to Workforce Frameworks Purpose Mapping Process Next Steps

Mapping CSEC to NICE Workforce Framework

Roadmaps connect curriculum to CSEC and NICE WF through a two-stage Process Part 1 CSEC Guidelines Essential Concepts College/UniversityCurriculum NICE WF Specialty Area Work Roles Part 2

Crosswalk Tables

Part 1: Map Courses to the CSEC Documents the breadth and depth of cybersecurity offerings at the institution within the context of the 8 CSEC Knowledge Areas. Mapping to essential concepts is the minimum Content spread across the institution Highlights curricular gaps in the context of CSEC

Part 2: Curriculum to NICE Workforce Framework Shows the connection between curricular content and workforce requirements. The information in this tab can be organized and displayed in two ways: For Students and Advisors: The KSAs can be grouped by work role to display which courses develop competencies for each work role. For Faculty and Administrators: The NICE Framework KSA for each course and/or program can be listed to review the competencies covered. This ensures that academic intuitions are preparing students with the competencies required for their future work role.  

Next Steps Review CSEC Website: cybered.acm.org for Overview and Instructions Crosswalk Tables George Washington University Example Blank Template GW Roadmaps Seeking CSEC Exemplar and Roadmap developers June 1st target (in advance of CISSE)