Cyber Security Skill Set Analysis for Common Curricula Development
Author(s): YAMIN, Muhammad Mudassar; KATT, Basel
Author(s) keywords: curricula, cyber security, skill set
Reference keywords: cyberawareness, cybersecurity
Abstract:
The field of cyber security is getting diversified day by day, with new specialist responsibilities and roles at different levels of competence being required by the industry. The competencies can be mapped with required skills set in multiple cyber security certification programs. However, different certification programs use different curricula and terminology, which makes the offerings overlap in some aspect and be distinct in others. This makes it hard for new institutes and cyber ranges to decide upon their training offerings. The aim of this study is to identify commonalities in skill set requirement for multiple cyber security roles like penetration tester, security operation center analysts, digital forensic and incident responders and information security managers. The identified commonalities will be used for development of a standard common curricula to set skill set requirement for the achievement of specific competence levels in a specific cyber security field.
References:
[1]. Grimes, John G., ”Information assurance workforce improvement program” Publication. DoD. December 19 (2005).
[2]. DoD Approved 8570 Baseline Certifications, https://iase.disa.mil/iawip/pages/iabaseline.aspx. Last accessed 26 Mar 2019.
[3]. Paulsen, Celia, et al., ”NICE: Creating a cybersecurity workforce and aware public”. IEEE Security & Privacy 10.3 (2012): 76-79.
[4]. Hoffman, Lance, Diana Burley, and Costis Toregas. ”Holistically building the cybersecurity workforce.” IEEE Security & Privacy 10.2 (2012): 33-39.
[5]. Knapp, Kenneth J., Christopher Maurer, and Miloslava Plachkinova. ”Maintaining a Cybersecurity Curriculum: Professional Certifications as Valuable Guidance.” Journal of Information Systems Education 28.2 (2017): 101.
[6]. Parekh, Geet, et al. ”Identifying core concepts of cybersecurity: Results of twoDelphi processes.” IEEE Transactions on Education 61.1 (2018): 11-20.
[7]. Mento, A. J., Martinelli, P., and Jones, R. M. (1999). Mind mapping in executive education: applications and outcomes. Journal of Management Development, 18(4), 390-416.
[8]. Gchq, https://www.gchq.gov.uk/. Last accessed 26 Mar 2019.
[9]. Defining It Standards in the Workplace, https://certnexus.com/. Last accessed 26 Mar 2019.
[10]. Global Home Page, https://www.cisco.com/. Last accessed 26 Mar 2019.
[11]. Operational Efficiency in It Businesses, https://www.comptia.org/. Last accessed 26 Mar 2019.
[12]. Certified Ethical Hacker - Infosec Cyber Security Certification, https://www. eccouncil.org. Last accessed 26 Mar 2019.
[13]. Cybersecurity and It Security Certifications and Training - (isc), https://www.isc2.org. Last accessed 26 Mar 2019.
[14]. Trust In, and Value From, Information Systems, https://www.isaca.org/Pages/default.aspx. Last accessed 26 Mar 2019.
[15]. Giac Certifications: The Highest Standard in Cyber Security Certifications, https://www.giac.org/. Last accessed 26 Mar 2019.
Article Title: Cyber Security Skill Set Analysis for Common Curricula Development
Author(s): YAMIN, Muhammad Mudassar; KATT, Basel
Date of Publication: 2019-06-28
Publication: International Journal of Information Security and Cybercrime
ISSN: 2285-9225 e-ISSN: 2286-0096
Digital Object Identifier: 10.19107/IJISC.2019.01.08
Issue: Volume 8, Issue 1, Year 2019
Section: Cyber-Attacks Evolution and Cybercrime Trends
Page Range: 59-64 (6 pages)
Copyright ©2012-2024
The International Journal of Information Security and Cybercrime (IJISC)
All rights reserved
The International Journal of Information Security and Cybercrime is a trademark of the Romanian Association for Information Security Assurance (RAISA).
No part of this publication may be reproduced, stored in a retrieval system, photocopied, recorded or archived, without the written permission from RAISA. When authors submit their papers for publication, they agree that the copyright for their article be transferred to the Romanian Association for Information Security Assurance, if the articles are accepted for publication. The copyright covers the exclusive rights to reproduce and distribute the article, including reprints and translations.