IJISC
  • Indexed in

  • Latest News

    July 1, 2024
    Volume 13, Issue 1 of the International Journal of Information Security and Cybercrime was published
    December 27, 2023
    Volume 12, Issue 2 of the International Journal of Information Security and Cybercrime was published
    June 28, 2023
    Volume 12, Issue 1 of the International Journal of Information Security and Cybercrime was published
  • --- More News ---
  • Popular Articles

  • Cyber Security Skill Set Analysis for Common Curricula Development


    Author(s): YAMIN, Muhammad Mudassar; KATT, Basel

    Quick view | Full article | Citations | Views: 376


    Author(s) keywords: , ,


    Reference keywords: ,


    Abstract:

    The field of cyber security is getting diversified day by day, with new specialist responsibilities and roles at different levels of competence being required by the industry. The competencies can be mapped with required skills set in multiple cyber security certification programs. However, different certification programs use different curricula and terminology, which makes the offerings overlap in some aspect and be distinct in others. This makes it hard for new institutes and cyber ranges to decide upon their training offerings. The aim of this study is to identify commonalities in skill set requirement for multiple cyber security roles like penetration tester, security operation center analysts, digital forensic and incident responders and information security managers. The identified commonalities will be used for development of a standard common curricula to set skill set requirement for the achievement of specific competence levels in a specific cyber security field.



    References:

    [1]. Grimes, John G., ”Information assurance workforce improvement program” Publication. DoD. December 19 (2005).

    [2]. DoD Approved 8570 Baseline Certifications, https://iase.disa.mil/iawip/pages/iabaseline.aspx. Last accessed 26 Mar 2019.

    [3]. Paulsen, Celia, et al., ”NICE: Creating a cybersecurity workforce and aware public”. IEEE Security & Privacy 10.3 (2012): 76-79.

    [4]. Hoffman, Lance, Diana Burley, and Costis Toregas. ”Holistically building the cybersecurity workforce.” IEEE Security & Privacy 10.2 (2012): 33-39.

    [5]. Knapp, Kenneth J., Christopher Maurer, and Miloslava Plachkinova. ”Maintaining a Cybersecurity Curriculum: Professional Certifications as Valuable Guidance.” Journal of Information Systems Education 28.2 (2017): 101.

    [6]. Parekh, Geet, et al. ”Identifying core concepts of cybersecurity: Results of twoDelphi processes.” IEEE Transactions on Education 61.1 (2018): 11-20.

    [7]. Mento, A. J., Martinelli, P., and Jones, R. M. (1999). Mind mapping in executive education: applications and outcomes. Journal of Management Development, 18(4), 390-416.

    [8]. Gchq, https://www.gchq.gov.uk/. Last accessed 26 Mar 2019.

    [9]. Defining It Standards in the Workplace, https://certnexus.com/. Last accessed 26 Mar 2019.

    [10]. Global Home Page, https://www.cisco.com/. Last accessed 26 Mar 2019.

    [11]. Operational Efficiency in It Businesses, https://www.comptia.org/. Last accessed 26 Mar 2019.

    [12]. Certified Ethical Hacker - Infosec Cyber Security Certification, https://www. eccouncil.org. Last accessed 26 Mar 2019.

    [13]. Cybersecurity and It Security Certifications and Training - (isc), https://www.isc2.org. Last accessed 26 Mar 2019.

    [14]. Trust In, and Value From, Information Systems, https://www.isaca.org/Pages/default.aspx. Last accessed 26 Mar 2019.

    [15]. Giac Certifications: The Highest Standard in Cyber Security Certifications, https://www.giac.org/. Last accessed 26 Mar 2019.



    Additional Information

    Article Title: Cyber Security Skill Set Analysis for Common Curricula Development
    Author(s): YAMIN, Muhammad Mudassar; KATT, Basel
    Date of Publication: 2019-06-28
    Publication: International Journal of Information Security and Cybercrime
    ISSN: 2285-9225 e-ISSN: 2286-0096
    Digital Object Identifier: 10.19107/IJISC.2019.01.08
    Issue: Volume 8, Issue 1, Year 2019
    Section: Cyber-Attacks Evolution and Cybercrime Trends
    Page Range: 59-64 (6 pages)



    Copyright ©2012-2024
    The International Journal of Information Security and Cybercrime (IJISC)

    All rights reserved
    The International Journal of Information Security and Cybercrime is a trademark of the Romanian Association for Information Security Assurance (RAISA).
    No part of this publication may be reproduced, stored in a retrieval system, photocopied, recorded or archived, without the written permission from RAISA. When authors submit their papers for publication, they agree that the copyright for their article be transferred to the Romanian Association for Information Security Assurance, if the articles are accepted for publication. The copyright covers the exclusive rights to reproduce and distribute the article, including reprints and translations.