Publication Date
In 2024 | 0 |
Since 2023 | 1 |
Since 2020 (last 5 years) | 2 |
Since 2015 (last 10 years) | 4 |
Since 2005 (last 20 years) | 4 |
Descriptor
Certification | 4 |
Computer Science Education | 4 |
Computer Security | 4 |
Employment Qualifications | 3 |
Information Security | 3 |
Academic Degrees | 2 |
College Graduates | 2 |
Curriculum Design | 2 |
Information Technology | 2 |
Career Choice | 1 |
Career Readiness | 1 |
More ▼ |
Source
Information Systems Education… | 1 |
Journal of Cybersecurity… | 1 |
Journal of Information… | 1 |
Journal of Information… | 1 |
Author
Binh Tran | 1 |
Elnoshokaty, Ahmed | 1 |
Karen C. Benson | 1 |
Knapp, Kenneth J. | 1 |
Li, Chengcheng | 1 |
Lorraine Jonassen | 1 |
Marquardson, Jim | 1 |
Maurer, Christopher | 1 |
Plachkinova, Miloslava | 1 |
Publication Type
Journal Articles | 4 |
Reports - Research | 3 |
Information Analyses | 1 |
Reports - Descriptive | 1 |
Education Level
Higher Education | 4 |
Postsecondary Education | 3 |
High Schools | 1 |
Secondary Education | 1 |
Audience
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Binh Tran; Karen C. Benson; Lorraine Jonassen – Journal of Cybersecurity Education, Research and Practice, 2023
One only needs to listen to the news reports to recognize that the gap between securing the enterprise and cybersecurity threats, breaches, and vulnerabilities appears to be widening at an alarming rate. An untapped resource to combat these attacks lies in the students of the secondary educational system. Necessary in the cybersecurity education…
Descriptors: Certification, College Curriculum, Information Security, Computer Security
Marquardson, Jim; Elnoshokaty, Ahmed – Information Systems Education Journal, 2020
People starting cybersecurity careers have three main avenues for achieving entry-level job qualifications: learning in-demand skills, earning industry certifications, and graduating with a college degree. Though people can pursue skills, certificates, and degrees together, financial and time constraints often make people focus their efforts to…
Descriptors: Information Security, Computer Security, Employment Opportunities, Employment Qualifications
Knapp, Kenneth J.; Maurer, Christopher; Plachkinova, Miloslava – Journal of Information Systems Education, 2017
Much has been published about developing a cybersecurity curriculum for institutes of higher learning (IHL). Now that a growing number of IHLs globally offer such programs, a need exists on how to guide, maintain, and improve the relevancy of existing curricula. Just as cybersecurity professionals must be hone their skills continually to keep with…
Descriptors: Information Security, Computer Security, Computer Science Education, Certification
Li, Chengcheng – Journal of Information Technology Education: Innovations in Practice, 2015
As both the frequency and the severity of network breaches have increased in recent years, it is essential that cybersecurity is incorporated into the core of business operations. Evidence from the U.S. Bureau of Labor Statistics (Bureau of Labor Statistics, 2012) indicates that there is, and will continue to be, a severe shortage of cybersecurity…
Descriptors: Curriculum Development, Computer Security, Internet, Computer Networks