Efforts and Suggestions for Improving Cybersecurity Education

Saed Alrabaee, Mousa Al-Kfairy, Ezedin Barka

Research output: Chapter in Book/Report/Conference proceedingConference contribution

7 Citations (Scopus)

Abstract

In this growing technology epoch, one of the main concerns is about the cyber threats. To tackle this issue, highly skilled and motivated cybersecurity professionals are needed, who can prevent, detect, respond, or even mitigate the effect of such threats. However, the world faces workforce shortage of qualified cybersecurity professionals and practitioners. To solve this dilemma several cybersecurity educational programs have arisen. Before it was just a couple of courses in a computer science graduate program. Now a day's different cybersecurity courses are introduced at the high school level, undergraduate computer science and information systems programs, even in the government level. Due to some peculiar nature of cybersecurity, educational institutions face many issues when designing a cybersecurity curriculum or cybersecurity activities.

Original languageEnglish
Title of host publicationProceedings of the 2022 IEEE Global Engineering Education Conference, EDUCON 2022
EditorsMohammed Jemni, Ilhem Kallel, Abdeljalil Akkari
PublisherIEEE Computer Society
Pages1161-1168
Number of pages8
ISBN (Electronic)9781665444347
DOIs
Publication statusPublished - 2022
Event13th IEEE Global Engineering Education Conference, EDUCON 2022 - Tunis, Tunisia
Duration: Mar 28 2022Mar 31 2022

Publication series

NameIEEE Global Engineering Education Conference, EDUCON
Volume2022-March
ISSN (Print)2165-9559
ISSN (Electronic)2165-9567

Conference

Conference13th IEEE Global Engineering Education Conference, EDUCON 2022
Country/TerritoryTunisia
CityTunis
Period3/28/223/31/22

Keywords

  • Cybersecurity
  • Cybersecurity Activities
  • Education

ASJC Scopus subject areas

  • Information Systems and Management
  • Education
  • General Engineering

Fingerprint

Dive into the research topics of 'Efforts and Suggestions for Improving Cybersecurity Education'. Together they form a unique fingerprint.

Cite this