This paper aims to re-engineer cybersecurity education with an innovative top-down & case-driven (TDCD) teaching model by dissecting recent high-profile cybersecurity breaches. The traditional way of teaching cybersecurity is usually bottom-up where a list of security topics are taught separately in an isolated context, with little or no effort to link these topics together. The proposed TDCD model starts with real-world cyber breaches including the Target Corporation breach, the Anthem Inc. breach, and selected Distributed Denial of Service (DDoS) attacks. Students look into the details of these attacks and learn how these attacks took place from the beginning to the end. During the process of case analysis, a list of security topics refle...
The cybersecurity curriculum has grown dramatically over the past decade: once it was just a couple ...
Cybersecurity Law: An Evolving Field is a casebook that covers the duties of a cybersecurity profess...
Cyber-enabled devices are becoming more and more complex with integration of new capabilities and fu...
This paper aims to re-engineer cybersecurity education with an innovative top-down & case-driven (TD...
This paper introduces a holistic and case-analysis teaching model by integrating case studies into c...
This paper provides a look at the author’s experiences and approach to teaching a varying range of s...
Cybersecurity is a field of Computer Science that focuses on protecting networks, devices, and data ...
This study examines the effect of adopting cybersecurity concepts on the information and technology ...
This paper presents a national case study-based analysis of the numerous dimensions to cybersecurity...
In order to combat malicious actors of the digital age, cybersecurity experts have quickly become es...
According to ISACA, there will be a global shortage of 2 million cybersecurity professionals worldwi...
American philosopher John Dewey, in one of his most famous theories about the hands-on approach to l...
© The Author(s) 2020. Cybersecurity comprised all the technologies and practices that protect data a...
This chapter draws on current research and best practice into teaching in cybersecurity in higher ed...
Cyber-enabled devices are becoming more and more complex with integration of new capabilities and fu...
The cybersecurity curriculum has grown dramatically over the past decade: once it was just a couple ...
Cybersecurity Law: An Evolving Field is a casebook that covers the duties of a cybersecurity profess...
Cyber-enabled devices are becoming more and more complex with integration of new capabilities and fu...
This paper aims to re-engineer cybersecurity education with an innovative top-down & case-driven (TD...
This paper introduces a holistic and case-analysis teaching model by integrating case studies into c...
This paper provides a look at the author’s experiences and approach to teaching a varying range of s...
Cybersecurity is a field of Computer Science that focuses on protecting networks, devices, and data ...
This study examines the effect of adopting cybersecurity concepts on the information and technology ...
This paper presents a national case study-based analysis of the numerous dimensions to cybersecurity...
In order to combat malicious actors of the digital age, cybersecurity experts have quickly become es...
According to ISACA, there will be a global shortage of 2 million cybersecurity professionals worldwi...
American philosopher John Dewey, in one of his most famous theories about the hands-on approach to l...
© The Author(s) 2020. Cybersecurity comprised all the technologies and practices that protect data a...
This chapter draws on current research and best practice into teaching in cybersecurity in higher ed...
Cyber-enabled devices are becoming more and more complex with integration of new capabilities and fu...
The cybersecurity curriculum has grown dramatically over the past decade: once it was just a couple ...
Cybersecurity Law: An Evolving Field is a casebook that covers the duties of a cybersecurity profess...
Cyber-enabled devices are becoming more and more complex with integration of new capabilities and fu...