The Cybersecurity Workforce Challenge: Are Academically Qualified Faculty Members the Bottleneck?

Submitted by CAE Community on

This mini workshop will start with a short presentation to provide latest statistics on the cybersecurity workforce challenge, followed by a discussion about the nationwide demand and open positions for academically qualified cybersecurity faculty, both full-time and adjunct. Then, an interactive workshop will be provided where the audience will collaboratively share their own stories regarding the recruitment of academically qualified faculty members at their institution.

Beyond GenCyber: Promoting Diversity and Inclusion in Cybersecurity with an Effective Outreach Program

Submitted by CAE Community on

Community outreach is essential for building relationships between the community, potential students, and the college. Increasing visibility in the local area helps to attract more students, donors, and industry partnerships. A successful outreach program can help a college to connect with people from diverse backgrounds and promote a culture of inclusion. It can also help to create a more welcoming and supportive environment for all students and staff.

Helping to Increase the Numbers of Underrepresented Minorities in Cybersecurity

Submitted by CAE Community on

Miami Dade College has made strides in increasing the number of underrepresented minorities in the field of cybersecurity. MDC provides stackable programs, certifications, professional development, and other initiatives to help students come to our programs, graduate, and get a career. 

National Cybersecurity Curriculum Task Force

Submitted by CAE Community on

Funded by the NSA through the NCAE-C program, the mission of the National Cybersecurity Curriculum Task Force is to catalog and create high-quality and relevant curricula on emerging cybersecurity topics, mapping to curricular and workforce guidelines, and make them freely available. The mission is being accomplished with the following goals: (1) Conduct a comprehensive search of available curricula in cybersecurity repositories, directories, and among the community. (2) Perform gap analysis to identify high-need areas to create a cyber-ready workforce.

NCAE-C Student Code of Ethics and Professional Conduct

Submitted by CAE Community on

More than 60 percent of university students freely admit to cheating in some form, according to Dr. Donald McCabe of the International Center for Academic Integrity. The NCAE-C Student Code of Ethics and Professional Conduct sub-committee has drafted a Code of Ethics and Professional Conduct for faculty consideration. A Code of Ethics establishes core values, ethical principles and ethical standards that student professionals use to guide their academic and professional conduct. We will also suggest some guidance to faculty on how to implement it in their courses.

CAE Community of Practice (CoP)-CD

Submitted by CAE Community on

The CAE Community of Practice (CoP) for Cyber Defense (CD) (https://www.caecommunity.org/community-of-practice/cyber-defense) was established in 2020 with the mission: “To collaborate with both the CAE Community and the NCAE-C Program Management Office (PMO) to build a Cybersecurity Excellence Community of Practice in Cyber Defense (CoP-CD) in order to gather and share input from the broader community as well as to provide continuous program improvement".

Stepping-Stone Intrusion Detection using Crossover Packets

Submitted by CAE Community on

Stepping-stone intrusion is a hacking strategy in which an attacker sends attacking commands through compromised hosts, called stepping-stones, in order to remotely access a target host. These stepping-stones form part of a connection chain that serves as an intermediary between the target and attacker hosts, providing the attacker with increased anonymity and detection avoidance capabilities. It is well-known that a long connection chain with three or more connections often indicates malicious activities.

The Applications of Internet of Things in the Medical Field

Submitted by CAE Community on

The Internet of Things (IoT) paradigm promises to make “things” include a more generic set of entities such as smart devices, sensors, human beings, and any other IoT objects to be accessible at any time and anywhere. IoT allows for the interconnectivity of devices or objects to collect, send, and receive information. IoT varies widely in its applications, but one of its most beneficial uses is in the medical field. Healthcare utilizes IoT and its emerging technologies to provide more efficient and quality care for patients while reducing the workload and burden on healthcare facilities.

Honeypots and Knowledge Discovery in Teaching Network Defense

Submitted by CAE Community on

This presentation shares a best practice in teaching network defense based on recent research on network security. Computer networks as part of critical infrastructure facilities and assets for most organizations are facing increasing challenges in defending against various and sophisticated cyber threats, intrusions, and attacks. Knowledge discovery is a key factor in cyber defense, and honeypots could be an effective tool for gaining knowledge for cyber defense.

Developing a “Hands On” Security Compliance Course

Submitted by CAE Community on

The North Carolina Community College System’s Security Compliance course (SEC-258) introduces information security compliance and standards along with how they apply to corporate IT environments. Topics included in the catalog description of the course include ISO standards, government NIST frameworks, federal and state compliance requirements, security policies, incident response and business continuity planning. We have also added a CMMC module to the course. Unfortunately, many times the course content is dry and requires pure memorization.

Subscribe to Presentations