Academic literature on the topic 'Cybersecurity students'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Cybersecurity students.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Cybersecurity students"

1

Mwansa, Gardner, Ricky Ngandu, and Onke Khala. "Cyberbullying Prevalence at a Rural Based University in the Eastern Cape, South Africa." International Journal of Social Science Research and Review 6, no. 12 (2023): 361–86. http://dx.doi.org/10.47814/ijssrr.v7i1.1783.

Full text
Abstract:
Defences within the digital space against cybersecurity include detection, prevention and response to threats using software tools, however, there no significant technology-based defence systems that deal with cyberbullying related threats. A lack of cybersecurity defence systems and limited cybersecuriy awareness may expose students to cyberbullying and students are likely to suffer, resulting in effects such as psychological and emotional abuse that may eventually contribute towards high drop-outs rates. The objective of this study was to investigate the prevalence of cyberbullying among stu
APA, Harvard, Vancouver, ISO, and other styles
2

Nagahawatta, Ruwan, Matthew Warren, and William Yeoh. "A Study of Cyber Security Issues in Sri Lanka." International Journal of Cyber Warfare and Terrorism 10, no. 3 (2020): 59–72. http://dx.doi.org/10.4018/ijcwt.2020070105.

Full text
Abstract:
Cybersecurity is focused on helping the community to make knowledgeable decisions on its adaptation and mitigation. This survey evaluated the level of cybersecurity awareness and discernment amongst university students in Sri Lanka. The study was based on primary data collected through a questionnaire on awareness and the perception of cybersecurity from respondents at universities in Sri Lanka. The results indicated that experience and the level of cybersecurity awareness among university students in Sri Lanka are not significantly low, but there are some knowledge gaps with new threats. Furt
APA, Harvard, Vancouver, ISO, and other styles
3

Booc, Neil Bryan B., Kenneth Budiongan, and Ramil Carballo. "Cybersecurity Awareness, and Cybersecurity Behavior of High School Students in Davao City: A Mediation Role of Perceived Behavioral Control." European Journal of Applied Science, Engineering and Technology 2, no. 3 (2024): 4–9. http://dx.doi.org/10.59324/ejaset.2024.2(3).01.

Full text
Abstract:
This study aims to determine the mediating effect of perceived behavioral control in the relationship between cybersecurity awareness and cybersecurity behavior of high school students in Davao City, Philippines drawing on the Theory of Planned Behavior (TPB). Using a quantitative approach, data were collected through a survey questionnaire distributed to 100 high school students in a private school in Davao City. Established measures were used to assess cybersecurity awareness, perceived behavioral control, and cybersecurity behavior, with strict adherence to ethical considerations and data c
APA, Harvard, Vancouver, ISO, and other styles
4

Booc, Neil Bryan B., Kenneth Budiongan, and Ramil Carballo. "Cybersecurity Awareness, and Cybersecurity Behavior of High School Students in Davao City: A Mediation Role of Perceived Behavioral Control." European Journal of Applied Science, Engineering and Technology 2, no. 3 (2024): 4–9. https://doi.org/10.59324/ejaset.2024.2(3).01.

Full text
Abstract:
This study aims to determine the mediating effect of perceived behavioral control in the relationship between cybersecurity awareness and cybersecurity behavior of high school students in Davao City, Philippines drawing on the Theory of Planned Behavior (TPB). Using a quantitative approach, data were collected through a survey questionnaire distributed to 100 high school students in a private school in Davao City. Established measures were used to assess cybersecurity awareness, perceived behavioral control, and cybersecurity behavior, with strict adherence to ethical considerations and data c
APA, Harvard, Vancouver, ISO, and other styles
5

Alammari, Abdullah, Osama Sohaib, and Sayed Younes. "Developing and evaluating cybersecurity competencies for students in computing programs." PeerJ Computer Science 8 (January 17, 2022): e827. http://dx.doi.org/10.7717/peerj-cs.827.

Full text
Abstract:
Changes due to technological development in the workplace are putting pressure on academia to keep pace with the changing nature of work. Due to the growing need for cybersecurity professionals, universities improve their cybersecurity programs to develop qualified cybersecurity competencies. The purpose of this study is to validate the cybersecurity knowledge, skills, and abilities (KSAs) competencies of cybersecurity degree programs using a fuzzy linguistic group decision-making method. This study shows that cybersecurity knowledge is essential, along with technical skills and human abilitie
APA, Harvard, Vancouver, ISO, and other styles
6

Agrawal, Garima, Kuntal Pal, Yuli Deng, Huan Liu, and Ying-Chih Chen. "CyberQ: Generating Questions and Answers for Cybersecurity Education Using Knowledge Graph-Augmented LLMs." Proceedings of the AAAI Conference on Artificial Intelligence 38, no. 21 (2024): 23164–72. http://dx.doi.org/10.1609/aaai.v38i21.30362.

Full text
Abstract:
Building a skilled cybersecurity workforce is paramount to building a safer digital world. However, the diverse skill set, constantly emerging vulnerabilities, and deployment of new cyber threats make learning cybersecurity challenging. Traditional education methods struggle to cope with cybersecurity's rapidly evolving landscape and keep students engaged and motivated. Different studies on students' behaviors show that an interactive mode of education by engaging through a question-answering system or dialoguing is one of the most effective learning methodologies. There is a strong need to cr
APA, Harvard, Vancouver, ISO, and other styles
7

Scott, Ben, and Raina Mason. "Cyber as a Second Language? A Challenge to Cybersecurity Education." Journal of The Colloquium for Information Systems Security Education 9, no. 1 (2022): 6. http://dx.doi.org/10.53735/cisse.v9i1.137.

Full text
Abstract:
Cybersecurity pedagogical approaches do not address the challenges faced by students with English as an additional language (EAL). Despite EAL students representing a critical labour force for this important global and multidisciplinary industry, there lacks both research and cohesive solutions to address this issue. Via student interviews and semi-thematic analysis, this paper demonstrates that EAL cybersecurity students express challenges with aspects of cybersecurity content. Secondly, it is shown that predominant cybersecurity education bodies of knowledge and frameworks do not address cha
APA, Harvard, Vancouver, ISO, and other styles
8

Mike Nkongolo, Wa Nkongolo, Thami Sithole, and Jahrad Sewnath. "Cybersecurity Awareness Through Interactive Learning Using the CyberVigilance Game." International Conference on Cyber Warfare and Security 20, no. 1 (2025): 501–10. https://doi.org/10.34190/iccws.20.1.3207.

Full text
Abstract:
Cybersecurity has become increasingly important in today’s digital landscape, with end users bearing a major duty to ensure the security of computer systems. A significant percent of data breaches are associated with human involvement, highlighting the crucial role individuals play in cybersecurity and the necessity of developing practical solutions to mitigate security risks associated with human factors. Traditional training approaches often fail to adequately address cybersecurity-related human errors due to low engagement levels and lack of interactivity. To address these shortcomings, thi
APA, Harvard, Vancouver, ISO, and other styles
9

Jafri, Azma Melia, Nur'ain Zulaikha Jamaluddin, and Zahidah Zulkifli. "CYBERSECURITY AWARENESS MOBILE APPS FOR SECONDARY SCHOOL STUDENTS: LETSECURE." Journal of Information Systems and Digital Technologies 3, no. 2 (2021): 94–108. http://dx.doi.org/10.31436/jisdt.v3i2.240.

Full text
Abstract:
As our world is connected through information technology, home internet users, including school students, are threatened by cyber-attacks. It leads to an increase in cybersecurity issues and cases. This proves that cybersecurity is receiving insufficient awareness. The most worrying part is when the pandemic Covid-19 outbreak occurred, more people spent their time working from home using the internet and filling their time by browsing the internet. More concern is for the people who did not have any idea how bad and dangerous cybersecurity threats could happen to them. The objective of this pa
APA, Harvard, Vancouver, ISO, and other styles
10

Kam, Hwee-Joo, and Pairin Katerattanakul. "Enhancing Student Learning in Cybersecurity Education using an Out-of-class Learning Approach." Journal of Information Technology Education: Innovations in Practice 18 (2019): 029–47. http://dx.doi.org/10.28945/4200.

Full text
Abstract:
Aim/Purpose: In this study, the researchers investigated whether the out-of-class learning approach could help the students to attain any valuable learning outcomes for cybersecurity learning and could enhance the perceived value of cybersecurity education among the students. Background: Cybersecurity learning poses challenges for its students to learn a complicated subject matter and the students may be intimidated by the challenging courses in cybersecurity programs. Therefore, it is essential for the faculty members to devise some mechanisms to promote cybersecurity learning to increase its
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Cybersecurity students"

1

Mushtaq, Wafaa. "Cybersecurity in the Technology Subject from the Swedish Perspective : Investigation, Analysis, and Evaluation Tool." Thesis, KTH, Lärande, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-283112.

Full text
Abstract:
This thesis contains pioneer work in Sweden which contributes to the research on cybersecurity teaching within the Technology subject as formulated in the course and subject governing documents.The work goes in line with a bigger strategy of the Swedish Civil Contingencies Agency (MSB) and the European Union (EU). A discourse analysis was performed on the interviews with four Swedish expertsfrom MSB, Internetstiftelsen, and #290CyberSecurity respectively where the interview questions were formulated around three axes; the first axis was the cybersecurity content and knowledge aimed at young in
APA, Harvard, Vancouver, ISO, and other styles
2

Roberts, Anthea Elizabeth. "Is International Law International?" Phd thesis, Canberra, ACT : The Australian National University, 2017. http://hdl.handle.net/1885/124611.

Full text
Abstract:
International lawyers are familiar with the question: “Is international law law?” But this thesis instead asks the question: “Is international law international?” Using a variety of methods, this work sheds light on some of the ways in which international law as a transnational legal field is constructed by international law academics, and is conceptualized in international law textbooks, in the five permanent members of the Security Council: the People’s Republic of China, the French Republic, the Russian Federation, the United Kingdom of Great Bri
APA, Harvard, Vancouver, ISO, and other styles
3

(9768428), Gabriel Alejandro Castro Aguayo. "A VISUALIZATION TOOL FOR CYBERSECURITY EDUCATION FOR HIGH SCHOOL STUDENTS." Thesis, 2020.

Find full text
Abstract:
<p>Technology evolves at such a rapid pace nowadays, keeping up with education on cyber security tends to fall. Even with the rising threats, people put their personal information in their computers without knowing who could access the information. Many people keep their personal information online when they do shopping, banking, or on social media. These online activities attract adversaries that may have malicious attentions. The lack of cyber security practices is evident as we often hear the news of large-scale cyberattack incidents against financial institutions that leads to breach of p
APA, Harvard, Vancouver, ISO, and other styles
4

Oliveira, Bruno Tomé de. "Viver sem segredos: a privacidade dos dados pessoais na era dos smartphones." Master's thesis, 2020. http://hdl.handle.net/10071/22198.

Full text
Abstract:
Atualmente, verifica-se que os Smartphones têm enfrentado um grande crescimento a nível mundial na vida das pessoas. As inúmeras vantagens destes dispositivos para os seus utilizadores têm sido cada vez mais evidentes. Estes aparelhos vivem da partilha de informação: os utilizadores não só recebem a informação pretendida, como também a podem partilhar. No entanto, em muitas instâncias, o utilizador acaba por compartilhar dados privados sem se aperceber, sem ter conhecimento, e muitas vezes sem o seu consentimento - dados estes que são recolhidos pelas empresas de telecomunicações e, pio
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "Cybersecurity students"

1

Moallem, Abbas. Cybersecurity Awareness Among Students and Faculty. CRC Press, 2019. http://dx.doi.org/10.1201/9780429031908.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

United States. Congress. House. Committee on Homeland Security. Subcommittee on Cybersecurity, Infrastructure Protection, and Security Technologies. How data mining threatens student privacy: Joint hearing before the Subcommittee on Cybersecurity, Infrastructure Protection, and Security Technologies of the Committee on Homeland Security, House of Representatives and the Subcommittee on Early Childhood, Elementary, and Secondary Education of the Committee on Education and the Workforce, House of Representatives, One Hundred Thirteenth Congress, second session, June 25, 2014. U.S. Government Printing Office, 2015.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Maksurov, Aleksey. Ensuring information security on the Internet. INFRA-M Academic Publishing LLC., 2023. http://dx.doi.org/10.12737/1942595.

Full text
Abstract:
The monograph examines the features of legal relations in the field of information security in the global information space. The concept of "cybersecurity" is investigated, the institutional independence of the norms of law on ensuring security in the cyber environment is substantiated from the point of view of the subject and method of legal regulation. Considerable attention is paid to the characteristics of the sources of law on ensuring information security on the Internet. Substantial proposals have been made to improve legal regulation in this area both at the national (primarily Russian
APA, Harvard, Vancouver, ISO, and other styles
4

Cybersecurity Awareness among Students and Faculty. Taylor & Francis Group, 2019.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Moallem, Abbas. Cybersecurity Awareness among Students and Faculty. Taylor & Francis Group, 2019.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Moallem, Abbas. Cybersecurity Awareness among Students and Faculty. Taylor & Francis Group, 2019.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Moallem, Abbas. Cybersecurity Awareness among Students and Faculty. Taylor & Francis Group, 2019.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Moallem, Abbas. Cybersecurity Awareness among Students and Faculty. Taylor & Francis Group, 2019.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Monthie, Heather. Beginner's Guide to Developing a High School Cybersecurity Program - for High School Teachers, Counselors, Principals, Homeschool Families, Parents and Cybersecurity Education Advocates - Developing a Cybersecurity Program for High School Students. Lulu Press, Inc., 2019.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Mihai, Ioan-Cosmin, Costel Ciuchi, and Gabriel Petrica. Cybersecurity - Challenges and Perspectives in Education. Romanian Association for Information Security Assurance, 2020. http://dx.doi.org/10.19107/cybersec-edu.2020.en.

Full text
Abstract:
The book emphasises the importance of implementing cybersecurity curricula in the university environment, in order to prepare future experts in the field. The book brings together the contributions of professors, PhD students, researchers, experts and trainers, for the development of a reference framework for education, research and cooperation in the field of cybersecurity.
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "Cybersecurity students"

1

Moallem, Abbas. "Students Cybersecurity Awareness." In Cybersecurity Awareness Among Students and Faculty. CRC Press, 2019. http://dx.doi.org/10.1201/9780429031908-2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Moallem, Abbas. "Faculty Cybersecurity Awareness." In Cybersecurity Awareness Among Students and Faculty. CRC Press, 2019. http://dx.doi.org/10.1201/9780429031908-4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Sussman, Lori L. "Everyday Cyber Safety for Students." In Kids Cybersecurity Using Computational Intelligence Techniques. Springer International Publishing, 2023. http://dx.doi.org/10.1007/978-3-031-21199-7_1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Moallem, Abbas. "Students’ Secured and Unsecured Behaviours." In Cybersecurity Awareness Among Students and Faculty. CRC Press, 2019. http://dx.doi.org/10.1201/9780429031908-3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Cabaj, Krzysztof, Luca Caviglione, Patrick Georgi, Jörg Keller, Wojciech Mazurczyk, and Andreas Schaffhauser. "Teaching Cyber Security Through Distance Learning with International Students." In Innovations in Cybersecurity Education. Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-50244-7_15.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Moallem, Abbas. "Introduction." In Cybersecurity Awareness Among Students and Faculty. CRC Press, 2019. http://dx.doi.org/10.1201/9780429031908-1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Moallem, Abbas. "How to Improve Awareness." In Cybersecurity Awareness Among Students and Faculty. CRC Press, 2019. http://dx.doi.org/10.1201/9780429031908-5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Moallem, Abbas. "Conclusion." In Cybersecurity Awareness Among Students and Faculty. CRC Press, 2019. http://dx.doi.org/10.1201/9780429031908-6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Wang, Longjuan, Xiaoyi Zhou, Xiaoli Qin, and Zhaoxin Shi. "Exploring How Cybersecurity Competitions Can Help Improve Students’ Practical Abilities in Cybersecurity." In Lecture Notes in Electrical Engineering. Springer Nature Singapore, 2024. http://dx.doi.org/10.1007/978-981-97-4182-3_20.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Pirta-Dreimane, Rūta, Agnė Brilingaitė, Evita Roponena, et al. "CyberEscape Approach to Advancing Hard and Soft Skills in Cybersecurity Education." In Augmented Cognition. Springer Nature Switzerland, 2023. http://dx.doi.org/10.1007/978-3-031-35017-7_28.

Full text
Abstract:
AbstractIncorporating gamification elements and innovative approaches in training and educational programs are promising for addressing cybersecurity knowledge gaps. Cybersecurity training should consider a combination of hard and soft skills to deal with the diversity of cyber incidents. Therefore, this research aims to investigate if soft skills such as communication and collaboration enhances students’ performance in practical task execution and if the CyberEscape approach promotes students engagement and self-efficacy.This paper presents a cybersecurity game CyberEscape based on the interv
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Cybersecurity students"

1

Cymer, Emil, Tomasz Szymczyk, Marcin Matczuk, and Piotr Kisała. "MEDICINE STUDENTS' CYBERSECURITY AWARENESS AND ITS IMPROVEMENT." In 19th International Technology, Education and Development Conference. IATED, 2025. https://doi.org/10.21125/inted.2025.1727.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Kasera, Gungun, Manya Solanki, Hargeet Kaur, and Kaushal Shah. "A Detailed Exploration to Deepfake: A Cybersecurity Threat." In 2025 IEEE International Students' Conference on Electrical, Electronics and Computer Science (SCEECS). IEEE, 2025. https://doi.org/10.1109/sceecs64059.2025.10940812.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Aliyev, Rashad, Ziyafat Amirov, and Alakbar Aliyev. "Building Unique Interactive, Gamified Practical Exams for Cybersecurity Students." In 2025 IEEE 4th International Conference on AI in Cybersecurity (ICAIC). IEEE, 2025. https://doi.org/10.1109/icaic63015.2025.10848836.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Yu, Qiaoyan, Sandeep Sunkavilli, Mashrafi Alam Kajol, et al. "Hands-on Project Oriented Cybersecurity Education for High School Students." In 2024 IEEE Integrated STEM Education Conference (ISEC). IEEE, 2024. http://dx.doi.org/10.1109/isec61299.2024.10664924.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Pöhler, Luca, Marko Schuba, Tim Höner, Sacha Hack, and Georg Neugebauer. "CampusQuest: Motivating Computer Science Students for Cybersecurity from Day One." In 11th International Conference on Information Systems Security and Privacy. SCITEPRESS - Science and Technology Publications, 2025. https://doi.org/10.5220/0013164800003899.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Hossain, Gahangir, Mikyung Shin, and Mehnaz Afrose. "Bridging the Gap: Exploring Cybersecurity Careers for High School Students." In 2024 IEEE Frontiers in Education Conference (FIE). IEEE, 2024. https://doi.org/10.1109/fie61694.2024.10893310.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Bordel, Borja, Ramón Alcarria, and Tomás Robles. "ADVERSARIAL LEARNING: TEACHING CYBERSECURITY THROUGH CREATIVE BATTLES BETWEEN STUDENTS AND CHATBOTS." In 17th annual International Conference of Education, Research and Innovation. IATED, 2024. https://doi.org/10.21125/iceri.2024.2541.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Zhao, Qingsong, Urska Cvek, and Kevin Zhao. "Cybersecurity Fundamentals Training Among Middle School Students: Building a Strong Foundation." In 11th International Conference on Information Systems Security and Privacy. SCITEPRESS - Science and Technology Publications, 2025. https://doi.org/10.5220/0013144500003899.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Švábenský, Valdemar, Kristián Tkáčik, Aubrey Birdwell, et al. "Detecting Unsuccessful Students in Cybersecurity Exercises in Two Different Learning Environments." In 2024 IEEE Frontiers in Education Conference (FIE). IEEE, 2024. https://doi.org/10.1109/fie61694.2024.10893135.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Pimple, Jagdish, and Avinash Sharma. "Enhancing Cybersecurity in Medical Cyber-Physical Systems Using Blockchain and Deep Learning." In 2025 IEEE International Students' Conference on Electrical, Electronics and Computer Science (SCEECS). IEEE, 2025. https://doi.org/10.1109/sceecs64059.2025.10941630.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Cybersecurity students"

1

Petersen, Rodney, Danielle Santos, Matthew C. Smith, Karen A. Wetzel, and Greg Witte. Workforce Framework for Cybersecurity (NICE Framework). National Institute of Standards and Technology, 2020. http://dx.doi.org/10.6028/nist.sp.800-181r1.

Full text
Abstract:
This publication from the National Initiative for Cybersecurity Education (NICE) describes the Workforce Framework for Cybersecurity (NICE Framework), a fundamental reference for describing and sharing information about cybersecurity work. It expresses that work as Task statements and describes Knowledge and Skill statements that provide a foundation for learners including students, job seekers, and employees. The use of these statements helps students to develop skills, job seekers to demonstrate competencies, and employees to accomplish tasks. As a common, consistent lexicon that categorizes
APA, Harvard, Vancouver, ISO, and other styles
2

Koslosky, Luke, Ali Crawford, and Sara Abdulla. Building the Cybersecurity Workforce Pipeline. Center for Security and Emerging Technology, 2023. http://dx.doi.org/10.51593/20220005.

Full text
Abstract:
Creating adequate talent pipelines for the cybersecurity workforce is an ongoing priority for the federal government. Understanding the effectiveness of current education initiatives will help policymakers make informed decisions. This report analyzes the National Centers of Academic Excellence in Cyber (NCAE-C), a consortium of institutions designated as centers of excellence by the National Security Agency. It aims to determine how NCAE-C designated institutions fare compared to other schools in graduating students with cyber-related degrees and credentials.
APA, Harvard, Vancouver, ISO, and other styles
3

Goode, Kayla, Ali Crawford, and Christopher Back. U.S. High School Cybersecurity Competitions: Building Cyber Talent Through Extracurricular Activities. Center for Security and Emerging Technology, 2022. http://dx.doi.org/10.51593/2021ca012.

Full text
Abstract:
In the current cyber-threat environment, a well-educated workforce is critical to U.S. national security. Today, however, nearly six hundred thousand cybersecurity positions remain unfilled across the public and private sectors. This report explores high school cybersecurity competitions as a potential avenue for increasing the domestic cyber talent pipeline. The authors examine the competitions, their reach, and their impact on students’ educational and professional development.
APA, Harvard, Vancouver, ISO, and other styles
4

Balyk, Nadiia, Yaroslav Vasylenko, Vasyl Oleksiuk, and Galina Shmyger. Designing of Virtual Cloud Labs for the Learning Cisco CyberSecurity Operations Course. [б. в.], 2019. http://dx.doi.org/10.31812/123456789/3177.

Full text
Abstract:
The article is devoted to the study of the problem of the cybersecurity basics teaching. The training of the ICT-specialties students using the course “CCNA Cyber Operations” of the network academy Cisco is considered. At present, many universities have similar academies, while others can open them. On the basis of free software platforms Apache CloudStack and EVE-NG Community authors designed and implemented a virtual cloud laboratory. It operates according to the “IaaS” model. Thanks to the technology of embedded virtualization, the work of many virtual machines, storing of their status, tra
APA, Harvard, Vancouver, ISO, and other styles
5

Kiv, Arnold E., Vladyslav V. Bilous, Dmytro M. Bodnenko, Dmytro V. Horbatovskyi, Oksana S. Lytvyn, and Volodymyr V. Proshkin. The development and use of mobile app AR Physics in physics teaching at the university. [б. в.], 2021. http://dx.doi.org/10.31812/123456789/4629.

Full text
Abstract:
This paper outlines the importance of using Augmented Reality (AR) in physics education at the university as a valuable tool for visualization and increasing the attention and motivation of students to study, solving educational problems related to future professional activities, improving the interaction of teachers and students. Provided an analysis of the types of AR technology and software for developing AR apps. The sequences of actions for developing the mobile application AR Physics in the study of topics: “Direct electronic current”, “Fundamentals of the theory of electronic circuits”.
APA, Harvard, Vancouver, ISO, and other styles
6

Striuk, Andrii M., and Serhiy O. Semerikov. The Dawn of Software Engineering Education. [б. в.], 2020. http://dx.doi.org/10.31812/123456789/3671.

Full text
Abstract:
Designing a mobile-oriented environment for professional and practical training requires determining the stable (fundamental) and mobile (technological) components of its content and determining the appropriate model for specialist training. In order to determine the ratio of fundamental and technological in the content of software engineers’ training, a retrospective analysis of the first model of training software engineers developed in the early 1970s was carried out and its compliance with the current state of software engineering development as a field of knowledge and a new the standard
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!