Eskenzi PR ad banner Eskenzi PR ad banner
  • About Us
Friday, 31 March, 2023
IT Security Guru
Eskenzi PR banner
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
IT Security Guru
No Result
View All Result

Well-Trained Cybersecurity Pros Needed to Fill 1.8 Million Open Jobs

by The Gurus
December 3, 2021
in Editor's News
Share on FacebookShare on Twitter

After an extensive two-year process, a joint task force led by the Association for Computing Machinery (ACM) and the IEEE Computer Society (IEEE-CS) has released a first-ever set of global curricular recommendations in cybersecurity education. This new set of guidelines, Cybersecurity Education Curriculum (CSEC2017), is designed to be the leading resource for comprehensive cybersecurity curricular content at the post-secondary level. More than 320 advisors drawn from 35 different countries contributed to CSEC2017.

The growing dependence on the world’s cyber infrastructure—which includes everything from banking and financial services, to critical infrastructures such as utility companies, to classified government documents, to the personal information of ordinary citizens—means that almost every aspect of the way we live in the digital age is vulnerable to cyberattack. As a consequence, the need for cybersecurity professionals has grown exponentially in the past 10 years and shows no signs of slowing. Government and non-government sources estimate that 1.8 million cybersecurity-related positions worldwide will go unfilled by the year 2022. In order to meet this demand, academic departments around the world are launching initiatives to establish new cybersecurity degree programs or add cybersecurity education on to existing degree programs.

“The field of cybersecurity is in its formative stages,” explained CSEC2017 Joint Task Force Co-Chair Diana Burley, a professor at The George Washington University. “Wonderful career opportunities exist for people who are interested in working in cybersecurity. At the same time, because it is a new discipline, the term ‘cybersecurity education’ has meant different things to different people. As a result, many students graduating from cybersecurity programs often lack the requisite knowledge and skills needed to fit within an industry or government environment. Higher-education professionals around the world have urgently needed a unified framework to help develop coursework and degree programs. CSEC2017 provides that framework. By bringing together computing educators and industry professionals from around the world, we’ve forged a set first-of-its-kind curricular guidelines that will meet the needs of students, higher-education professionals, and industry hiring managers.”

These inaugural guidelines were developed to help institutions structure cybersecurity programs with the twin goals of: 1) offering flexibility, to allow curricula to be tailored to type of institution (undergraduate, graduate, community college), and 2) offering guidelines that encompass the broad range of specializations and occupations within cybersecurity, rather than a single program type.

“Encouraging participation in the development of CSEC2017 from industry representatives strengthened the link between the curriculum guidance provided by CSEC2017 and the workforce needs,” explained CSEC2017 Joint Task Force Co-Chair Matt Bishop, Co-Director, Computer Security Laboratory at the University of California, Davis. “Workforce implementation roadmaps survey the current and projected employment landscape and lay out the skills needed for the job roles that are open. Various governments around the world are effectively using these frameworks to develop their cybersecurity workforces.”

CSEC2017 is organized around eight key knowledge areas (KAs). These include Data Security, Software Security, Component Security, Connection Security, System Security, Human Security, Organizational Security, and Societal Security. Within each knowledge area, the curricula list specific essential concepts in which every graduate should be proficient. For example, within the Data Security KA, jobs for new graduates are expected to demonstrate proficiency in essential concepts such as basic cryptography and data integrity and authentication. Within the Connection Security KA, graduates should demonstrate proficiency in essential concepts including connection and transmission attacks. At the more granular level, CSEC2017 guides educators in developing coursework by providing descriptors of topics that should be covered. For example, within the Access Control essential concept section of the Data Security KA, a topic descriptor lists several types of access controls to which students should be introduced.

With both the knowledge areas and essential concepts, the Curriculum outlines theoretical and conceptual knowledge essential to understanding the discipline, as well as opportunities for hands-on practice to gain proficiency.  CSEC2017 also reflects the fact that cybersecurity is a specialization that students typically pursue after receiving an introduction to computing by studying in one of five main disciplines, including computer science, computer engineering, information systems, information technology, or software engineering. The Curriculum’s Disciplinary Lens sections provide guidance to educators based on a student’s core discipline, influencing the approach of cybersecurity coursework, depth of content and learning outcomes. 

In addition to ACM and IEEE-CS, the CSEC2017 Joint Task Force included the Association for Information Systems Special Interest Group on Security (AIS SIGSEC) and the International Federation for Information Processing Technical Committee on Information Security Education (IFIP WG 11.8).

FacebookTweetLinkedIn
ShareTweetShare
Previous Post

Shop Direct automates cyberattack detection with Vectra

Next Post

British teen who tried to hack CIA chief finds ‘critical’ T-Mobile flaw exposing customer accounts

Recent News

cybersecurity training

Only 10% of workers remember all their cyber security training

March 30, 2023
Pie Chart, Purple

New API Report Shows 400% Increase in Attackers

March 29, 2023
Cato Networks delivers first CASB for instant visibility and control of cloud application data risk

Cato Networks Recognised as Leader in Single-Vendor SASE Quadrant Analysis

March 29, 2023
Outside of cinema with advertising

Back and Bigger Than Ever! The Inside Man Season 5 Takes a Stab at Power Hungry Adversaries

March 29, 2023

The IT Security Guru offers a daily news digest of all the best breaking IT security news stories first thing in the morning! Rather than you having to trawl through all the news feeds to find out what’s cooking, you can quickly get everything you need from this site!

Our Address: 10 London Mews, London, W2 1HY

Follow Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

This site uses functional cookies and external scripts to improve your experience.

Privacy settings

Privacy Settings / PENDING

This site uses functional cookies and external scripts to improve your experience. Which cookies and scripts are used and how they impact your visit is specified on the left. You may change your settings at any time. Your choices will not impact your visit.

NOTE: These settings will only apply to the browser and device you are currently using.

GDPR Compliance

Powered by Cookie Information