Download presentation
Presentation is loading. Please wait.
Published byMadlyn Lamb Modified over 6 years ago
1
Advancing Cybersecurity Education: What Can We Do?
Melissa Dark
2
Labor Demand and Supply
3
Theory of Constraints The Theory of Constraints is a methodology for identifying the most important limiting factors (i.e. constraints) that stand in the way of achieving a goal and then systematically improving those constraints until they are no longer the limiting factors.
4
Sources of Supply Total Number # of CAEs % of CAEs Community Colleges
1053 64 6% 4 Year Colleges and Universities 2618 178 6.8% Total 3671 242 6.6%
5
How to create more/the right kind of throughput by adding more schools, efforts, programs?
How to create more/the right kind of throughput at the current 242 schools?
6
Components of Academic Programs
Faculty Curriculum Administrative Support Infrastructure
7
Advancing Cybersecurity Education: What Can We Do?
Faculty Produce and retain more educators Retrain more faculty Curriculum Align curriculum to workforce needs Make high quality curriculum that aligns to workforce needs available for adoption and adaptation Keep high quality curriculum up to date Infrastructure Support high quality curriculum delivery with share infrastructure High quality specialty simulations, exercises, etc. Customized lab books
8
National Academy A multi-state alliance offering fully online courses in niche, high need cybersecurity areas. Each institution brings a unique strength to the multi-institution course-sharing program. Through the Cyber Academy Consortium, students can enroll at one university to take courses from the best faculty in the discipline from across the academy.
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.