You are on page 1of 12

computers & security 75 (2018) 24–35

Available online at www.sciencedirect.com

ScienceDirect

j o u r n a l h o m e p a g e : w w w. e l s e v i e r. c o m / l o c a t e / c o s e

Cybersecurity education: Evolution of the


discipline and analysis of master programs

Krzysztof Cabaj a, Dulce Domingos b,*, Zbigniew Kotulski c, Ana Respício d


a
Institute of Computer Science, Warsaw University of Technology, ul. Nowowiejska 15/19, 00-665 Warsaw, Poland
b
LASIGE, Faculdade de Ciências, Universidade de Lisboa, Campo Grande, 1749-016 Lisboa, Portugal
c
Institute of Telecommunications, Warsaw University of Technology, ul. Nowowiejska 15/19, 00-665 Warsaw, Poland
d
CMAF-CIO, Faculdade de Ciências, Universidade de Lisboa, 1749-016 Lisboa, Portugal

A R T I C L E I N F O A B S T R A C T

Article history: As the amount of information, critical services, and interconnected computers and “things”
Received 30 June 2017 in the cyberspace is steadily increasing, the number, sophistication, and impact of cyberattacks
Received in revised form 29 are becoming more and more significant. In the last decades, governmental and non-
December 2017 governmental organisations have become aware of this problem. However, the existing
Accepted 17 January 2018 cybersecurity workforce has not been sufficient for satisfying the increasing demand for
Available online 31 January 2018 qualified cybersecurity professionals, and the shortfall will increase in the next years. Mean-
while, to address the increasing demand for cybersecurity professionals, academic institutions
Keywords: have been establishing cybersecurity programs, particularly, cybersecurity master programs.
Cybersecurity master programs This paper aims at analysing which cybersecurity topics are covered by existing
Cybersecurity discipline evolution cybersecurity master programs of top universities and how these topics are distributed through
Graduate cybersecurity education courses. It starts by reviewing the evolution and maturation of the cybersecurity disci-
Comparative study pline, focusing on the ACM efforts, which include the early addition of the Information
Cybersecurity curricula Assurance and Security Knowledge Areas to the computer science curricula and, more re-
cently, the development of curricular recommendations to support the definition of post-
secondary cybersecurity programs. These latest guidelines are used to analyse and review
21 cybersecurity master programs, focusing on the contents of their courses, structure, ad-
mission requirements, duration, requirements for completion, and evolution.
© 2018 Elsevier Ltd. All rights reserved.

has in the economy and safety of organisations and coun-


1. Introduction tries, the importance of cybersecurity has grown to such a level
that it is now considered an independent discipline.
The need for cybersecurity appeared in the early years of the Currently, there is a growing concern among governments
digital era, when the first mainframe computers were devel- that the cyberspace will become the next theatre of warfare.
oped. As networked computers and systems have progressively Despite the disparate increasing prominence of the disci-
come to dominate computing and communication plat- pline, the existing cybersecurity workforce cannot satisfy the
forms, the volume and severity of cybercrimes have increased increasing demand for qualified cybersecurity professionals.
to an extent that cybersecurity is now an underpinning area While the number and sophistication of cyberattacks in-
of computer systems. Owing to the huge impact cybercrime crease, the shortfall is expected to worsen in the next

* Corresponding author.
E-mail addresses: kcabaj@ii.pw.edu.pl (K. Cabaj), mddomingos@fc.ul.pt (D. Domingos), zkotulsk@tele.pw.edu.pl (Z. Kotulski), alrespicio@
fc.ul.pt (A. Respício).
https://doi.org/10.1016/j.cose.2018.01.015
0167-4048/© 2018 Elsevier Ltd. All rights reserved.
computers & security 75 (2018) 24–35 25

years—‘the demand for the (cybersecurity) workforce is ex- advanced security course could then cover emerging
pected to rise to 6 million (globally) by 2019, with a projected cybersecurity topics.
shortfall of 1.5 million’—stated Michael Brown, (former) CEO The report of McGettrick (2013) also emphasized the im-
of Symantec (Cisco, 2015; Frank, 2016; Setalvad, 2015; Randstad portance of master graduates to the cybersecurity workforce.
Technologies, 2016). Aware of this problem, several academic In the same year, Chen et al. (2013) compared graduate secu-
institutions worldwide have started to define and offer rity programs offered by top universities in China and in the
cybersecurity programs to address the shortage of cybersecurity United States of America (USA). They concluded that the main
professionals. In particular, ACM has undertaken special ini- differences between the programs in these two countries are
tiatives to develop educational programs in cybersecurity on that the programs in China emphasized telecommunications
the post-secondary level. security, whereas the programs in the USA assigned more im-
This paper aims at framing the requirements for portance to enterprise-level security strategy, security policy,
cybersecurity master studies facing present security chal- security management, and cyber law. In addition, Malhotra
lenges as well as providing foundational and technical (2015) stressed the growing importance of cyber risk
knowledge for future security professionals. The paper starts management.
by reviewing the progression and maturation of the Few years ago, McDuffie and Piotrowski (2014) pointed out
cybersecurity discipline to envisage a framework for the re- that, despite more than 182 colleges and universities in the
quired analysis. This review focuses on the ACM efforts, which USA have been designated as Centers of Academic Excel-
include the early addition of the Information Assurance and lence in Information Assurance Education (CAE/IAE), there
Security (IAS) Knowledge Areas (KAs) to the computer science are only a few specific cybersecurity baccalaureate-level degree
curricula and, more recently, the promotion of the Joint Task programs, and these do not offer consistent curricula. Most
Force (JTF) on Cybersecurity Education to advance curricular of these colleges offer computer science programs with some
guidelines supporting the definition of cybersecurity post- elective cybersecurity courses as a security track. To over-
secondary programs (JTF on Cybersecurity Education, 2017a, come the limitations on resources and expertise, Albert et al.
2017b). We select a sample of cybersecurity master programs (2015) reported the experience of four universities in the Uni-
from top-ranking worldwide universities and proceed versity of Maine system that worked together to achieve the
with the analysis of these programs, considering their designation of a National Center of Excellence in Cybersecurity
formal requirements, educational contents, structure, and Education and to define a multi-university program. Mew
evolution. (2016) described the three-year-long evolution of an under-
The paper is organised as follows. After the introductory graduate information security program of a small liberal arts
section that presents the motivation for our work, we give a college. To keep the initial investment as low as possible, the
brief presentation of related work concerning investigations program started by using the courses of the already existing
on master study programs in cybersecurity. The third section information systems program and creating only one addi-
describes the evolution of cybersecurity as a domain of edu- tional course. The interest of the students justified the evolution
cation. The fourth section presents the analysis of selected through the addition of other new courses and modifications
master programs in cybersecurity. First, we list the selected uni- of the core ones.
versities and then we provide a comparative description of their Grover et al. (2016) analysed the Information Technology
master programs, including admission requirements, dura- degree programs offered by the University of North Carolina
tion of studies, and description of the course of studies (such education system, with focus on security. They pairwise com-
as the program structure and specific courses, requirements pared the contents of courses in Information Technology
for completion, and evolution). The last section concludes the programs, the ACM curricula guidelines (Sahami et al., 2013),
paper with a summary of findings. and the requirements on the most popular certifications in
security-related fields. They aimed at assessing if IT pro-
grams met the needs of the security field as well as if the ACM
curricula guidelines met the skill/knowledge requirements of
2. Related work those certifications. Yang and Wen (2017) proposed a
cybersecurity curriculum model based on the most common
The related work in the area of deployment and analysis of core courses of 27 undergraduate cybersecurity-related
curricula of master programs in cybersecurity is scarce. Hence, programs.
this section surveys the literature regarding cybersecurity master Bicak et al. (2015) presented a study of adding three spe-
programs as well as undergraduate programs. cialties to the master in cybersecurity program at their
In 2013, the conclusions of the report of the workshop on university. Their objective was to handle emerging topics as
cybersecurity education and training already stated that gradu- well as to provide students with a more specialised curricu-
ates of computer science programs should have taken at least lum. Based on the CAE focus areas, they proposed the following
one cybersecurity course (McGettrick, 2013). Taking a step specialties: cybersecurity data analysis, cyber intelligence, and
forward, Harris and Patten (2015) described the strategy they healthcare information security and privacy.
used to include emerging cybersecurity topics within the in- Within a related security area, Yuan et al. (2016) surveyed
formation technology program, without increasing the credit existing efforts and resources in secure software engineering
requirements. Their strategy was to move most of the IAS topics, education on the graduate level. This work reviewed the pro-
which were taught in a single advanced security course, posal of a Common Body of Knowledge, a reference curriculum,
to introductory and intermediate courses. This way, the and other resources.
26 computers & security 75 (2018) 24–35

Currently, there is a gap in the literature with regard to


Table 2 – KAs which address IAS topics and their
cybersecurity master programs; therefore, before analysing the
distribution into core tier-1 and core tier-2 lecturing
existing programs, in the next section, we review the evolu- hours.
tion of the cybersecurity discipline.
KA Core tier-1 Core tier-2 Includes
hours hours electives
Architecture and 1.5 Y
3. Evolution of the cybersecurity discipline Organization
Human–Computer 1 Y
Since 2011, the National Initiative for Cybersecurity Educa- Interaction
tion (NICE) has been focused on defining the NICE Cybersecurity Information Management 0.5 0.5 Y
Workforce Framework (NCWF) to provide the cybersecurity au- Intelligent Systems Y
Networking and 1.5 5
dience with a common language to define cybersecurity work
Communications
and the set of tasks and skills it requires (Newhouse et al., 2016).
Operating Systems 3 7.5 Y
In 2013, for the first time, the ACM/IEEE computer science Platform-based Y
curricula guidelines (CS2013) included the IAS KA (Sahami et al., Development
2013). These guidelines divided IAS topics into two groups: a Parallel and Distributed 3 1 Y
group of topics that are only relevant to IAS and a group of Computing
topics that are distributed through other KAs. The topics in the Programming Languages 2.5 6 Y
Software Development 9
first group were organised in eleven knowledge units (KUs),
Fundamentals
which are listed in the first column of Table 1. Table 1 also shows Software Engineering 2 6.5 Y
the distribution of hours throughout core tier-1 and core tier-2 Systems Fundamentals 4.5 3
topics. The guidelines recommend that programs should include Social Issues and 5 0.5 Y
all core tier-1 topics, all or almost all core tier-2 topics, and a Professional Practice
significant number of elective topics. In sum, core tier-1 topics
are covered with a total of 3 h, which represents 1.8% of the
total number of hours, whereas core tier-2 topics are covered
with 6 h, representing 4.2% of the program. expertise, the National Security Agency (NSA) and the Depart-
Table 2 lists the other KAs through which IAS topics were ment of Homeland Security (DHS) through the National
distributed. These KAs are covered with additional lecturing Information Assurance Education and Training Programs defined
hours: 32 h (19.4% of total) for core tier-1 topics and 31.5 h (22% the requirements that should be met by academic programs
of total) for core tier-2 topics. seeking to receive the designation of a National Center of Aca-
In 2013, the recommendations in the report of the work- demic Excellence in Cyber Defense Two-Year Education Program
shop on cybersecurity education and training stated that the (CAE2Y) or the designation of a National Center of Academic
Core Leadership Group (with one dissention) felt that it was Excellence in Cyber Defense Education Program (CAE-CDE). They
premature to produce curriculum guidelines beyond CS2013, defined core for two-year-long programs as well as core and
as they considered that cybersecurity was an immature and optional KUs for four-year-long programs (NSA/DHS, 2013). In
ill-defined subject at that time (McGettrick, 2013; McGettrick addition, they defined focus areas (with a set of optional KUs),
et al., 2014). which institutions could take advantage of to differentiate
Meanwhile, to promote higher education and research in themselves (NSA/DHS, 2013a).
cyber defence, and to train professionals with cyber defence Table 3 outlines how the core topics of the ACM IAS KUs
are covered by the CAE-CDE core KUs. The topics of both sets
of KUs were analysed to determine the CAE-CDE KUs that cover
Table 1 – IAS KUs and their distribution into core tier-1 each ACM IAS KU topic. For instance, five core-tier-1 topics of
and core tier-2 hours. the Foundational Concepts in Security IAS KU are covered by
IAS KUs Core tier-1 Core tier-2 Includes three CAE-CDE core KUs: the IA Fundamentals which covers
hours hours electives three topics, the Cyber Defense which covers one, and the Policy,
Legal, Ethics, and Compliance which covers another one. All
Foundational Concepts 1 N
in Security
the CAE-CDE core KUs presented in Table 3 are included in the
Principles of Secure 1 1 N CAE2Y program curriculum, except the Network Defense KU,
Design which belongs to the CAE-CDE program.
Defensive Programming 1 1 Y By analysing this table, we conclude that the core topics of
Threats and Attacks 1 N three ACM IAS KUs are totally covered by the CAE-CDE KUs,
Network Security 2 Y
whereas the topics of two of them are almost covered. However,
Cryptography 1 N
the CAE2Y and CAE-CDE curricula do not include, in a mean-
Web Security Y
Platform Security Y ingful way, the IAS/Defensive Programming KU. Indeed, despite
Security Policy and Y the fact that Basic Scripting and Programming KUs cover some
Governance of its topics, this coverage is not sufficiently deep. This draw-
Digital Forensics Y back can, however, be minimised through optional KUs, which
Secure Software Y are listed in Table 4. In fact, the topics of the IAS/Defensive Pro-
Engineering
gramming KU are scattered over the following optional KUs:
computers & security 75 (2018) 24–35 27

Table 3 – IAS KUs of ACM vs. CAE-CDE core KUs.


ACM IAS KUs with core-tier-1 and core-tier-2 topics CAE-CDE core KUs
IAS/Foundational Concepts in Security (5 core-tier-1 topics) IA Fundamentals (3 core-tier-1 topics)
Cyber Defense (1 core-tier-1 topic)
Policy, Legal, Ethics, and Compliance (1 core-tier-1 topic)
IAS/Principles of Secure Design (7 core-tier-1 topics + 6 Fundamental Security Design Principles (5 core-tier-1 topics + 3
core-tier-2 topics) core-tier-2 topics)
IAS/Defensive Programming (5 core-tier-1 topics Basic Scripting or Introductory Programming (1 core-tier-1 topic)
+ 2 core-tier-2 topics) Systems Administration (1 core-tier-2 topic)
IAS/Threats and Attacks (4 core-tier-2 topics) Cyber Threats (4 core-tier-2 topics)
IAS/Network Security (4 core-tier-2 topics) Cyber Defense (2 core-tier-2 topics)
Network Defense (1 core-tier-2 topic)
IAS/Cryptography (3 core-tier-2 topics) Intro to Cryptography (3 core-tier-2 topics)

Secure Programming Practices, Database Management Systems,


Table 5 – NSA/DHS focus areas.
Operating Systems Theory, and Supply Chain Security.
Finally, Table 5 lists the focus areas defined by NSA/DHS. Cyber Investigations Secure Embedded Systems
Each focus area has a set of required optional KUs. For in- Data Management Systems Secure Mobile Technology
stance, the Secure Software Development focus area requires Security
Data Security Analysis Secure Software Development
the following optional KUs: Algorithms, Data Structures, Formal
Digital Forensics Secure Telecommunications
Methods, Secure Programming Practices, Software Assur-
Health Care Security Security Incident Analysis and
ance, Software Security Analysis, and Vulnerability Analysis. Response
In 2015, the ACM Education Board recognised the urgent need Industrial Control Security Policy Development
to define a cybersecurity curricular guidance and promoted the Systems – SCADA Security and Compliance
Joint Task Force (JTF) on Cybersecurity Education, which put Network Security Administration Systems Security
together the major international computing societies: Administration
Network Security Engineering Systems Security Engineering
Secure Cloud Computing

Table 4 – Optional KUs.


Advanced Cryptography Intrusion Detection
Association for Computing Machinery (ACM), IEEE Computer
Advanced Network Technology Life-Cycle Security
Society (IEEE CS), Association for Information Systems Special
and Protocols
Interest Group on Security (AIS SIGSEC), and International Fed-
Algorithms Low-Level Programming
Analog Telecommunications Mobile Technologies eration for Information Processing Technical Committee on
Cloud Computing Network Security Administration Information Security Education (IFIP WG 11.8). In 2017, the JTF
Cybersecurity Planning and Operating Systems Hardening published the Cybersecurity Curricula 2017 – Curriculum Guide-
Management lines for Post-Secondary Degree Programs in Cybersecurity
Data Administration Operating Systems Theory (CSEC2017) (JTF on Cybersecurity Education, 2017a, 2017b).
Data Structures Overview of Cyber Operations
The CSEC2017 defines cybersecurity as “a computing-
Database Management Penetration Testing
based discipline involving technology, people, information, and
Systems
Digital Communications QA/Functional Testing processes to enable assured operations in the context of ad-
Digital Forensics (Device RF Principles versaries. It involves the creation, operation, analysis, and testing
Forensics, Host Forensics, of secure computer systems. It is an interdisciplinary course
Media Forensics, Network of study, including aspects of law, policy, human factors, ethics,
Forensics) and risk management”.
Embedded Systems Secure Programming Practices
The CSEC2017 defines six KAs: Data Security, Software Se-
Forensic Accounting Security Program Management
Formal Methods Security Risk Analysis
curity, System Security, Human Security, Organizational Security,
Fraud Prevention and Software Assurance and Societal Security. These KAs are aligned with the entities
Management to be protected: data (at rest and in transit), software, systems,
Hardware Reverse Engineering Software Reverse Engineering individuals, organisations, and society.
Hardware/Firmware Security Software Security Analysis The Data Security KA is focused on achieving confidenti-
IA Architectures Supply Chain Security
ality of information and on preserving data and origin integrity.
IA Compliance Systems Programming
Its KUs include cryptography, confidentiality, and data integ-
IA Standards Systems Certification and
Accreditation rity. This KA includes all the topics (core and electives) of two
Independent/Directed Study/ Systems Security Engineering CS2013 IAS KUs: Foundational Concepts in Security and Cryp-
Research tography (as shown in Table 6). Compared with the CAE-CDE,
Industrial Control Systems Virtualisation Technologies the Data Security KA also covers all of the topics of three of
Intro to Theory of Computation Vulnerability Analysis its KUs: IA Fundamentals, Introduction to Cryptography, and
Wireless Sensor Networks
Advanced Cryptography (as shown in Table 7).
28 computers & security 75 (2018) 24–35

availability, authentication, access control, secure system


Table 6 – CSEC2017 KAs vs. CS2013 KA/KU.
design, reverse engineering, cyber physical systems, digital
CSEC2017 KAs CS2013 KA/KU forensics, supply chain management, and computer
Data Security IAS/Foundational Concepts in Security network defence. This KA covers the topics of the following
IAS/Cryptography CS2013 IAS KUs: Network Security (only the core topics)
Software IAS/Principles of Secure Design and Digital Forensics (this KU only has elective topics), as
Security IAS/Defensive Programming
presented in Table 6. It also includes two additional topics:
IAS/Secure Software Engineering
System Security IAS/Network Security
reverse engineering, and cyber physical systems. Moreover,
IAS/Digital Forensics all of the topics of the System Security KA are covered by
Human Security IAS/Security Policy and Governance CAE-CDE KUs, although distributed over a larger set of KUs
SP/Security Policies, Laws and Computer Crimes (Table 7).
HCI/Human Factors and Security While these three KAs provide a more technical perspec-
Organizational IAS/Security Policy and Governance
tive, the other three KAs make evident the interdisciplinary
Security SP/Security Policies, Laws and Computer Crimes
nature of cybersecurity by including aspects of law, policy,
Societal Security IAS/Security Policy and Governance
SP/Security Policies, Laws and Computer Crimes human factors, ethics, and risk management.
The Human Security KA is focused on protecting personal
data of individuals, and it includes identity management,
social engineering, privacy, and security on social networks.
The Software Security KA aims at developing and using soft-
The Organizational Security KA comprises subjects related to
ware applications that preserve the security properties of the
the protection of organisations from cybersecurity threats
information and systems they protect. This area covers high-
and to risk management. It includes risk management, mission
assurance software, secure software development, deployment,
assurance, disaster recovery, business continuity, security evalu-
and maintenance, software reverse engineering, and malware
ations and compliance, organisational behaviour as it relates
analysis. This KA includes almost all of the topics (core and
to cybersecurity, employee training, and intelligence. The So-
electives) that are scattered throughout three of the CS2013 IAS
cietal Security KA covers aspects of cybersecurity that can
KUs: Principles of Secure Design, Defensive Programming, and
affect society and it comprises cybercrime, cyber law, ethics,
Secure Software Engineering (Table 6). However, it does not
policy, intellectual property, professional responsibility, social
mention the “Correct usage of third-party components” and
responsibility, and cultural and international considerations.
“Effectively deploying security updates” topics of the Defen-
It is in these three KAs that it is possible to observe a more
sive Programming KU. Considering CAE-CDE KUs, the Software
significant evolution. Despite the fact that CS2013 already
Security KA comprises the topics of three KUs: Fundamental
covers some of these topics, they are scattered over KUs of
Security Design Principles, Secure Programming Practices,
different KAs, such as the Security Policy and Governance
and Software Assurance (Table 7). In addition, this KA in-
IAS KU, the Security Policies, Laws and Computer Crimes KU
cludes the topics of Exception Handling, Error Handling, and
of the Social Issues and Professional Practice (SP) KA, and the
Randomness.
Human Factors and Security KU of the Human Computer
The main goal of the System Security KA is to establish
Interaction (HCI) KA. In addition, some topics, such as secu-
and maintain the security properties of systems, including
rity of social networks, analytical tools, cybersecurity planning,
those of interconnected components. Its KUs include:
and risk management, are missing from KUs of CS2013.
Considering the KUs of CAE-CDE, the situation is similar but
they already include the topics of cybersecurity planning,
Table 7 – CSEC2017 KAs vs. CAE-CDE KUs.
and risk management (Table 6 and Table 7 present these
CSEC2017 KAs CAE-CDE KUs mappings).
Data Security IA Fundamentals The contents of the Threats and Attacks CS2013 IAS KU are
Introduction to Cryptography scattered throughout the various CSEC2017 KAs. For in-
Advanced Cryptography stance, the System Security KA includes attacks to availability,
Software Security Fundamental Security Design Principles whereas the Human Security KA includes social engineering.
Secure Programming Practices
Finally, the Web Security and the Platform Security 2013 IAS
Software Assurance
System Security IA Fundamentals
KUs are not explicitly included in any CSEC2017 KA although
IA Architectures their contents are partially covered by the first three CSEC2017
Intrusion Detection/Prevention Systems KAs in Table 1, Table 6.
Cyber Defense In the next section, we analyse cybersecurity master pro-
Software Reverse Engineering grams and how they are organised to train the cybersecurity
Digital Forensics
workforce.
Industrial Control Systems
Human Security Vulnerability Analysis
Cyber Threats
Organizational Policy, Legal, Ethics and Compliance
Security Cybersecurity Planning and Management 4. Analysis of cybersecurity master programs
Security Program Management
Security Risk Analysis Master level programs in cybersecurity are now widely offered
Societal Security Policy, Legal, Ethics, and Compliance
by universities worldwide. However, their target candidates as
computers & security 75 (2018) 24–35 29

well as duration and program structure slightly differ, as shown – Tallinn University of Technology, which is the only tech-
by the analysis that is presented in this section. nological university in Estonia (Tallinn University of
Technology, 2017);
– The George Washington University, which is a research uni-
4.1. Sample selection versity located in Washington, DC, USA (The George
Washington University, 2017);
This study was based on 21 master programs, whose selec- – The University of Waikato in New Zealand, which belongs
tion criteria were: the designation of the master program to the 100 “most international” universities in the world (The
includes the keywords cybersecurity or “Cyber Security”, the University of Waikato, 2017);
programs are led by universities belonging to the top 700 uni- – The University of Warwick in the UK, which was estab-
versities according to the 2017 ranking of QS World Ranking lished in 1961 and received its Royal Charter of Incorporation
of Universities (QS Top Universities, 2017), and the universi- in 1965 (The University of Warwick, 2017);
ties are spread across different countries. Thus, in our analysis – The University of Maryland, College Park, which was founded
we considered seven universities from the top hundred, six from on 6 March 1856 as Maryland Agricultural College (University
the second hundred, two from the third hundred, four from of Maryland, 2017);
the fourth hundred, and two from the seventh hundred. Con- – The University of South Australia, which was initiated in
cerning geographical locations, ten universities were from the 1991 on a basis of the South Australian Institute of Tech-
USA, five from the United Kingdom (UK), and one from each nology, located in Adelaide and Whyalli (University of South
of the following countries: Australia, New Zealand, Estonia, the Australia, 2017);
Netherlands, Israel, and Spain. – The University of Southampton, which is a research-
The universities that were considered in our study, to- intensive university in the UK (University of Southampton,
gether with links to the webpages of their master programs 2017);
in cybersecurity, were: – The University of Southern California, which is one of the
world’s leading private research universities located in the
– 4TU, which is a consortium of four leading universities in heart of Los Angeles (University of Southern California, 2017);
the Netherlands: Delft University of Technology, Univer- – The University of York, UK, which was opened in 1963
sity of Twente, Wageningen University and Eindhoven (University of York, 2017);
University of Technology (4TU.Federation, 2017); – Washington University in St. Louis, USA, founded in 1853,
– The Ben-Gurion University of the Negev, which is an inter- which is now a partner of 30 research universities around
disciplinary research university in Israel (Ben-Gurion the world (Washington University in St. Louis, 2017).
University of the Negev, 2017);
– Boston University, which is a more than 150 years old uni- Our analysis of the master programs in cybersecurity offered
versity in the USA (BU Computer Science, 2017); by these universities starts with the analysis of their admis-
– Charles III University of Madrid, which is a relatively small, sion requirements, as described in the next section.
innovative, and public university in Spain (Universidad Carlos
III de Madrid, 2017); 4.2. Admission requirements
– City, University of London, which is a university in the United
Kingdom, “committed to academic excellence, focused on Almost all of the analysed master programs required candi-
business and the professions” (City, University of London, dates to have a bachelor degree in computer science or
2017); equivalent, such as information systems, software engineer-
– The George Mason University, which is the largest public ing, computer engineering, mathematics, or statistics. The
research university in the state of Virginia in the USA (George multidisciplinary nature of cybersecurity master programs jus-
Mason University, 2017); tifies the admission of candidates with different backgrounds
– The Johns Hopkins University, which is “America’s first re- (see for instance the admission requirements of the Pennsyl-
search university”, located in Baltimore, state of Maryland vania State University). In addition, Ben-Gurion University of
in the USA (Johns Hopkins, 2017); The Negev, George Mason University, Queen’s University Belfast,
– Lancaster University, which is ranked among the top 10 of the University of Waikato, and the George Washington Uni-
all three major UK universities league tables (Lancaster versity, for instance, define requirements on the minimal grades
University, 2017); candidates should have.
– New York University (Polytechnic School of Engineering), Some universities go a step forward and state the re-
which is one of the largest private universities in the USA, quired background knowledge. It may include algebra, calculus,
founded in 1831 (New York University, 2017); computer programming, networks, theory of computation, op-
– Pennsylvania State University, which is an over 150-year- erating systems, and Linux. The Johns Hopkins University
old university in the state of Pennsylvania in the USA presents detailed information on background requirements:
(PennState, 2017); prior education of candidates should include one year of cal-
– Queen’s University Belfast, which belongs to the UK top ten culus; one mathematics course beyond calculus (e.g. discrete
research-intensive universities (Queen’s University, 2017). mathematics, linear algebra, or differential equations); a pro-
Its Centre for Secure Information Technologies (CSIT) is re- gramming course in Java or C++; a course in data structures;
sponsible for cybersecurity teaching (Centre for Secure and a course in computer organisation. Despite the require-
Information Technologies, 2017); ments of the Johns Hopkins University being focused on
30 computers & security 75 (2018) 24–35

academic knowledge that is obtained through courses, almost core courses, giving no choice to students. However, master pro-
all the analysed universities state that they will also consider grams of Washington University in St. Louis and Boston
applicants who gained knowledge through professional expe- University have no core courses. Students define their study
rience. Indeed, professional experience is generally considered plans, choosing courses from pre-defined sets and ensuring they
and it can even be used to justify the admission of candi- satisfy the program requirements. Between extremes, we can
dates with bachelor degrees in other areas. The Pennsylvania find master programs that include core and elective courses.
State University and the George Mason University recom- This way, one can assure the program character through the
mend a minimum of five years of relevant professional subjects all students learn in core courses, while enabling stu-
experience. dents to complement or specialise their knowledge by choosing
City, University of London, the 4TU.Federation, and the Johns elective courses. Indeed, some universities explicitly define the
Hopkins University offer alternatives for candidates who do specialisations or tracks students can take by choosing a set
not satisfy their admission requirements, such as complet- of elective courses. For instance, in the Tallinn University of
ing specific undergraduate courses. Technology, students can choose different elective courses to
Finally, proficiency in the English language is a prerequi- specialise in organisational (law, organisation, psychology, and
site for all universities. standards) or technological (networking, attack/defence tech-
To sum up, master programs in cybersecurity are very spe- nology, and cryptography) aspects of security. Instead of
cialised programs and to be able to focus on security aspects specialisations, the University of Warwick offers two differ-
applicants should have background knowledge in mathemat- ent master programs, the master in Cyber Security Engineering
ics and computer science, which can be obtained by taking and the master in Cyber Security and Management. The Johns
academic courses or through professional experience. Hopkins University requires students to choose a track (analy-
sis, networks, or systems) and to take at least three courses
from the selected track. Finally, the Charles III University of
4.3. Duration of programs
Madrid defines two routes and students choose elective courses
depending on the route they prefer. The Systems Security En-
Considering the set of master programs we analysed, almost
gineering route focuses on the specification, design and
all of them last for one to two years, on a full-time basis. Ex-
development, implementation and maintenance of secure
ceptions are Washington University in St. Louis, which offers
systems, whereas the Cybersecurity Analyst route focuses on
a part-time master program that lasts at least two years
the systems security analysis.
and a half, and the Pennsylvania State University that also offers
Considering final projects (thesis or capstone projects), our
a part-time program with two years. The Queen’s University
sample includes master programs with mandatory final proj-
Belfast has one-year and two-year options, depending on
ects, as well as master programs where students can attend
whether the students are engaged in a professional internship.
one or more courses instead of executing the final project. The
As universities structure their master programs by defin-
workload of final projects varies from three American credits
ing the number of points, units, or ECTS that should be obtained
to 45 ECTS. In City, University of London, final projects last 14
by students, the duration of programs is not mandatory. Some
weeks (or 600 h). However, their duration can be extended to
universities offer a part-time option, which in practice, is
up to six months in case they performed in industrial or re-
materialised as a lower fee. However, some universities define
search placements. In the Queen’s University Belfast, students
the maximum allowable durations of studies for completing
of the two-year-long master programs with professional in-
their programs. For instance, Boston University states that its
ternship can perform a professional internship for one year.
program should be completed within three years, whereas the
Nonetheless, the most common duration of final projects of
Johns Hopkins University defines that the 10 courses of the
the analysed master programs is one semester, the third one,
program must be completed within five years.
which is the summer semester in one-year-long master pro-
grams. In City, University of London and in the Queen’s
4.4. Structure of programs University Belfast, final projects of master programs can be per-
formed in industry.
Almost all the analysed master programs have 60 ECTS or 30
American credits per year, approximately. The number of 4.5. Contents of courses
courses varies from 6 to 14, excluding the individual research
project. The Queen’s University Belfast offers one-year-long The analysis we present in this section is organised accord-
master program with six courses, which can be extended with ing to the CSEC2017 KAs and their respective KUs.
a Professional Internship to a two-year-long full-time program, The Data Security KA includes cryptography, confidential-
while the two-year-long master program of the University of ity, and data integrity, as KUs. Almost all the analysed master
South Australia includes 14 courses. However, most of the programs have a course to cover the topics of these KUs, whose
analysed master programs have between 8 and 10 courses, per designation is cryptography, applied cryptography, or data pro-
year. tection. The other ones include the topics of these KUs in wider
When analysing the flexibility of study plans, they mainly courses, such as, for instance, the course on the Information,
differ in the percentage of core courses. For instance, the Uni- Security and Privacy of the New York University, which also
versity of York, the Queen’s University Belfast, the Lancaster covers operating systems security, malicious code, security-
University, the George Washington University, and the Univer- policy formation and enforcement, vulnerability analysis, and
sity of South Australia have master programs that only include system security evaluation. More advanced topics of this KA,
computers & security 75 (2018) 24–35 31

such as quantum cryptography, are covered within optional ad- none of them explicitly include aspects related to social en-
vanced cryptography courses. gineering and social network, they cover, for instance, the
The Software Security KA has four KUs: high assurance soft- subject of anonymity.
ware, secure software development, deployment, and While the Human Security KA focuses on protecting indi-
maintenance, software reverse engineering, and malware analy- viduals, the Organizational Security KA focuses on protecting
sis. The secure software development KU includes topics on organisations. Its KUs are risk management, mission assur-
defensive programming and secure software engineering. Con- ance, disaster recovery, business continuity, security evaluations
sidering the wide range of topics in this KA, they are covered and compliance, organisational behaviour as it relates to
by four main subjects/courses: cybersecurity, employee training, and intelligence. Within the
analysed master programs, we find different ways to organ-
– defensive programming – this topic is covered, for in- ise these KUs in courses. For instance, the Pennsylvania State
stance, by the Software Security mandatory course of the University offers the Information Security Management course
4TU.Federation and by the Software Systems Exploitation that covers almost all of these KUs. In addition, there are courses
mandatory course of the Charles III University of Madrid. focusing on some specific topics, such as risk management (the
In addition, focusing on one language, the New York Uni- Cyber Risk Management course offered by the 4TU.Federation
versity offers the Application Security mandatory course on and the Information System Risk Management course offered
writing secure distributed programs in Java and the Uni- by the Lancaster University), disaster recovery, business con-
versity of Maryland offers the Secure Programming in C tinuity, security evaluations and compliance (the Cyber Security
mandatory course. Management and Administration course offered by the Charles
– secure software engineering – this topic can be included as III University of Madrid and the Information System Security
a mandatory course (for instance, the software assurance Management course offered by the Lancaster University), and
course offered by the Queen’s University of Belfast), as a data analytics (the Cyber Data Analytics course offered by the
mandatory course only for one of the specialities of the 4TU.Federation). The examples of courses listed are not
master program (in the Charles III University of Madrid, the exhaustive.
system security engineering course is mandatory only for Finally, the Societal Security KA includes the following KUs:
the secure system route), or simply as an optional course. cybercrime, cyber law, ethics, policy, intellectual property, pro-
– reverse engineering – only three master programs of the fessional responsibility, social responsibility, and global impacts.
analysed sample offer a specific course in this KU. In the Almost all of the master programs include a course that covers
4TU.Federation and in the University of Maryland pro- the KUs in this KA. Considering more specific courses, for in-
grams, these are elective courses, whereas in the Johns stance, the 4TU.Federation and the George Washington
Hopkins University program, the course is mandatory only University offer elective courses on cyber law, and the George
for the analysis track. George Mason University has a course Washington University also offers an elective course on ethics,
that includes both reverse engineering and malware. policy, and intellectual property. In addition, the Tallinn Uni-
– malware – there are five master programs that offer courses versity of Technology offers a course named “History of Art of
on malware, namely Boston University, the Charles III Uni- War: From Ancient World to Network-Centric Warfare”, and the
versity of Madrid, the Queen’s University Belfast, the Tallinn University of Southampton offers an elective course “Crimi-
University of Technology, and the University of York. nal Behaviour – Applied Perspectives” (Cyber Security).
When considering cybersecurity master programs without
The System Security KA is considered a broad area and in- a specific focus (such as those on network security) that include
cludes KUs, availability, authentication, access control, secure mainly core courses on security, we conclude that most of them
system design, reverse engineering (which is also a KU of the have two semesters with lessons and their program struc-
Software Security KA), cyber physical systems, digital foren- ture includes:
sics, supply chain management, and computer network defence.
The most common course that covers topics in this KA is – One core course from the Data Security KA, the cryptogra-
network security. Most master programs also include a digital phy course;
forensics course. In addition, we find many different courses – One or two core courses from the Software Security KA, from
covering topics in systems security, such as cyber physical the following list: defensive programming, secure soft-
systems, identification and authentication, biometrics, secu- ware engineering, and malware;
rity of operating systems, mobile security, intrusion detection, – One or two core courses from the System Security KA, with
and defensive hacking or penetration testing. Most of these preference to network security, followed by the digital fo-
courses are offered as elective courses or as mandatory courses rensics course;
only in a specific track or route. – One or two courses from the Organizational Security KA,
The Human Security KA is focused on aspects related to with no course preference; and
privacy of individuals. Its KUs are: identity management, social – One course from the Societal Security KA.
engineering, privacy, and security of social networks. Within
the analysed master programs, we only find two specific courses 4.6. Requirements for completion
on privacy whose contents intersect with the topics in this KA:
the Privacy-Enhancing Technologies course offered by the 4TU. In most of the analysed master programs, there are two re-
Federation and the Privacy in the Digital Age course offered quirements that must be fulfilled to achieve graduation. The
by the Washington University in St. Louis. Despite the fact that first is associated with completion of the appropriate number
32 computers & security 75 (2018) 24–35

of courses. For example, at Boston University, the specialisation London. Market demand was another reason given as a mo-
in cybersecurity requires eight graduate courses, 32 credits, tivation for creation of these programs.
including at least five core courses, meeting the same require- Two types of program revisions were identified: revisions
ments as those of the Master in Computer Science. In addition, of the courses’ contents and revision of the program struc-
among the grades received for the five core courses, the number ture. The contents of courses were revised to follow recent
of B− grades must not be greater than the number of B+ grades developments in the field, to adjust the taught material, or to
or higher. No grade lower than B− may be used for graduate reduce the amount of overlapping material. For instance, at the
credits. In the George Mason University, the program re- Ben-Gurion University of the Negev, only revisions of the
quires 30 credits, comprising nine credits for core courses, 18 courses’ contents have been made.
credits for concentration courses, and three credits for a cap- Revisions of the programs’ structure were less substan-
stone course. tial, such as adding or removing elective courses, or more
The second requirement for completion relates to the prepa- substantial, such as changing core courses.
ration of some kind of written report or thesis. In most cases, A common observation for programs including elective
students at the end of the program should prepare a master courses is that their catalogues were often updated every year/
thesis concerning studied subjects. This work is done under semester, as was the case with the master program offered by
a supervision of a university faculty staff and must be ap- the Boston University, as announced on the university’s website.
proved by the university. However, some programs, especially This may happen in accordance with the catalogue of elec-
these directed to cybersecurity professionals, introduce other tive courses offered by the department leading the program
possibilities to end the course by doing research projects, or other collaborations, which often depends on the availabil-
without writing a dedicated thesis. In some cases, these proj- ity of faculty members and their sabbatical leaves. As a new
ects could be performed in places other than the degree- trend in cybersecurity courses, the subject Quantum Compu-
granting university. For example, City, University of London tation has emerged, being offered as an elective course at the
allows to perform projects in industry or other research Johns Hopkins University and at the 4TU.Federation.
organisations. The minimal project should last 600 h; however, At City, University of London, the program was revised in
if performed in the industry it could be extended up to six its third running year 2016/2017 to include more security elec-
months. tive choices, while removing one of the core modules. The
program offered by the Pennsylvania State University, created
4.7. Evolution in 2009, already suffered two revisions, and is currently in the
third one, slated to be effective for fall 2018.
To analyse the evolution of the programs, we followed three The reasons for restructuration were diverse: for accredi-
strategies: 1) we contacted, by email, the directors of the pro- tation (Lancaster University), to take into account feedback from
grams and asked them to answer some questions related to the students and external examiners (City, University of
the evolution of their programs; 2) we visited the websites of London), or to take advantage of faculty research interests and
the programs between April 2017 and May 2017 and again in expertise.
September 2017, to assess recent program changes; and 3) we Concerning the number of students enrolled in the pro-
collected information about past versions of programs’ grams, we observed that these numbers are rather different.
webpages by querying an Internet archive (https://archive.org/). Nevertheless, all the respondent directors stated that the
The directors’ inquiry was aimed at obtaining the follow- demand has been continuously increasing.
ing information: year of the program creation; motivation for
creating the program; restructurings (number, time, motiva-
tion, and scope); evolution of course contents; and the number
of students enrolled in the program. We received seven re- 5. Conclusion
sponses to our inquiries, which formed the basis of our analysis,
complemented with the information we extracted from web- The increasing need for cybersecurity workforce, today, is an
sites (current and past versions). unavoidable problem. In the last years, we have witnessed the
Our analysis allows to conclude that most of these pro- evolution and maturation of the discipline of cybersecurity, as
grams were created recently, between 2013 and 2015, with a we can perceive, for instance, by the ACM efforts since the in-
few exceptions, the oldest program being originated in 2007 clusion of the Information Assurance and Security KA into the
(Johns Hopkins University). Some programs emerged as tracks computer science curricula guidelines until the recent defini-
in previously existing programs in computer science or infor- tion of the cybersecurity curricular draft guidance. Meanwhile,
mation systems (for instance, Johns Hopkins University), universities have proposed undergraduate as well as gradu-
whereas others were designed from scratch (for instance, ate cybersecurity programs.
Charles III University of Madrid, George Mason University, Lan- Considering the relevance of more specialised higher edu-
caster University, and the Pennsylvania State University). Four cation programs in cybersecurity, we analysed cybersecurity
directors mentioned that the creation of their programs was master programs of top-ranking universities to identify, mainly,
motivated by the existence of significant expertise in the field which cybersecurity topics they cover and how they distrib-
affiliated with the department. This is the case of the Infor- ute these topics through courses. In addition, we reviewed the
mation Sciences and Technology Department at George Mason cybersecurity discipline to reach the baseline of our analysis.
University, where cybersecurity was always one of the main Within this review, we noticed the increasing importance
research fields. The same happened with City, University of of less technological areas, such as the KAs of human,
computers & security 75 (2018) 24–35 33

organisational, and societal security – this is one of the main This work was supported by the European Commission
conclusions of our work. [grant number 2014-1-LU01-KA203-000034] and by FCT [grant
Another main conclusion of our findings is that the broad- numbers UID/MAT/04561/2013, UID/CEC/00408/2013].
spectrum cybersecurity master programs that include mainly
core courses on security are in alignment with the 2017 JTF
REFERENCES
curriculum guidelines for cybersecurity post-secondary pro-
grams, including at least one or two courses from the six ACM
KAs. In addition, some programs offer a personalised curricu-
lum through the selection of more specialised or advanced 4TU.Federation. Cyber security; 2017. Available from: https://
www.4tu.nl/cybsec/en/. [Accessed 15 March 2017].
elective courses. Some elective courses are very peculiar, for
Albert RT, Bennett C, Briggs D, Ebben M, Felch H, Kokoska D, et al.
example, the course History of Art of War: from Ancient World Experiences with establishment of a multi-university center
to Network – Centric Warfare, offered by the Tallinn Univer- of academic excellence in information assurance/cyber
sity, the course Criminal Behaviour – Applied Perspectives (Cyber defense. In: Proceedings of the international conference on
Security), offered by the University of Southampton, or the Security and Management (SAM). Las Vegas; 2015.
course Industrial Espionage and Counterfeiting, offered by the Ben-Gurion University of the Negev. M.Sc. in information
systems engineering with specialization in cyber space
University of Warwick. Moreover, new elective courses are used
security; 2017. Available from: http://in.bgu.ac.il/en/engn/ise/
to cover more topical subjects, such as Quantum Computa-
Pages/Cyber_Space_Security_En.aspx. [Accessed 15 March
tion or, predictably, soon, Blockchain and Distributed Ledger 2017].
Technology. Bicak A, Liu XM, Murphy D. Cybersecurity curriculum
To remain up to date with the developments in the area development: introducing specialties in a graduate program.
and market needs, cybersecurity master programs evolve. Inf Syst Educ J 2015;13(3):99.
Their evolution includes updating the contents of their courses BU Computer Science. MS in CS with a specialization in cyber
security; 2017. Available from: http://www.bu.edu/cs/ms-in
as well as changing the structure of programs to incorporate
-cs-with-a-specialization-in-cyber-security. [Accessed 15
more specific security courses into the set of core courses March 2017].
and to offer more elective courses. We point out that this Centre for Secure Information Technologies. MSc applied cyber
evolution has been aligned with the available faculty and security; 2017. http://www.csit.qub.ac.uk/EducationatCSIT/
expertise. MSc-Applied-Cyber-Security. [Accessed 15 March 2017].
To conclude, we elaborate on the current labour market Chen H, Maynard SB, Ahmad A. A comparison of information
for master cybersecurity specialists and their future expecta- security curricula in China and the USA. In: Proceedings of
the 11th Australian information security management
tions. First, even more than other fields, the market is
conference. Perth, Australia: 2013.
characterised by employee mobility and remote work. Second, Cisco. Mitigating the cybersecurity skills shortage top insights
many cybersecurity experts and remote workers serve in geo- and actions from Cisco Security Advisory Services; 2015.
graphical areas and countries other than those of their native Available from: http://www.cisco.com/c/dam/en/us/products/
universities. The core knowledge obtained during studies is collateral/security/cybersecurity-talent.pdf. [Accessed 15
universal and suitable for any professional and for any geog- March 2017].
City, University of London. Cyber security; 2017. Available from:
raphy. However, there are some topics, such as cybersecurity
http://www.city.ac.uk/courses/postgraduate/cyber-security.
legal regulations, private data protection rules, protection of
[Accessed 15 March 2017].
intellectual property, and ethical hacking legal aspects that Frank H. Q1 Cybersecurity snaphot: cyber security market report
can vary widely across countries. Because cybersecurity spe- market sizing & projections; 2016. Available from: https://
cialists in their professional work are often approaching the www.linkedin.com/pulse/cyber-security-snapshot-hope
thin line between legal and illegal activities, moving between -frank. [Accessed 15 March 2017].
countries, (and legal regulatory systems), they can easily fall Furnell S, Fischer P, Finch A. Can’t get the staff? The growing
need for cyber-security skills. Comput Fraud Secur
into trouble. Finally, master studies in cybersecurity, in addi-
2017;2017(2):5–10.
tion to general academic and practical professional skills George Mason University. Applied information technology, cyber
and competences in the domain (Furnell et al., 2017), must security concentration (MS); 2017. Available from: http://
not forget about students’ social competences connected to masononline.gmu.edu/programs/applied-information
a wider security culture. -technology-cyber-security-concentration-ms. [Accessed 15
As far as we know, our work is the first that analyses the March 2017].
evolution and maturation of the cybersecurity discipline (from Grover M, Reinicke B, Cummings J. How secure is education in
Information Technology? A method for evaluating security
higher education needs point of view) and that fills the gap
education in IT. Inf Syst Educ J 2016;14(3):29–44.
in the literature regarding the analysis of existing cybersecurity Harris MA, Patten KP. Using Bloom’s and Webb’s taxonomies to
master programs and their alignment with the ACM and the integrate emerging cybersecurity topics into a computing
JTF curriculum guidelines. curriculum. J Inf Syst Educ 2015;26(3):219–34.
Johns Hopkins. Cybersecurity; 2017. Available from: https://
ep.jhu.edu/programs-and-courses/programs/cybersecurity.
[Accessed 15 March 2017].
JTF on Cybersecurity Education. Cybersecurity curricula 2017 –
Acknowledgements curriculum guidelines for undergraduate degree programs in
cybersecurity. Version 0.5 Report. ACM, IEEE, AIS, IFIP; 2017a.
We would like to thank program directors who kindly an- Available from: http://www.csec2017.org. [Accessed 8
swered our inquiry and reviewers for their comments. September 2017].
34 computers & security 75 (2018) 24–35

JTF on Cybersecurity Education. Cybersecurity curricula 2017 – Setalvad A. Demand to fill cybersecurity jobs booming.
curriculum guidelines for post-secondary degree programs in Peninsula Press; 2015. Available from: http://peninsulapress
cybersecurity. Version 0.75 Report. ACM, IEEE, AIS, IFIP; 2017b. .com/2015/03/31/cybersecurity-jobs-growth. [Accessed 15
Available from: http://www.csec2017.org. [Accessed 8 March 2017].
September 2017]. Tallinn University of Technology. Cyber security; 2017. Available
Lancaster University. Cyber security MSc; 2017. Available from: from: https://www.ttu.ee/studying/masters/masters
http://www.lancaster.ac.uk/scc/postgraduate/taught _programmes/cyber-security/?id=84572. [Accessed 15 March
-masters/courses/cyber-security-msc. [Accessed 15 March 2017].
2017]. The George Washington University. Master of Science in
Malhotra Y. Bridging networks, systems and controls cybersecurity in computer science; 2017. Available from:
frameworks for cybersecurity curricula & standards https://www.cs.seas.gwu.edu/master-science-cybersecurity
development. NY Cyber Security & Engineering Technology -computer-science. Accessed 15 March 2017.
Association Conference, Oct. 22, 2015 Rochester Institute The University of Waikato. Master of cyber security; 2017.
of Technology, Rosica Hall, NTID, Rochester, New York; Available from: http://www.waikato.ac.nz/study/
2015. qualifications/master-of-cyber-security. [Accessed 15 March
McDuffie EL, Piotrowski VP. The future of cybersecurity 2017].
education. Computer 2014;47(8):67–9. The University of Warwick. Cyber security MSc programmes;
McGettrick A. Toward curricular guidelines for cybersecurity: 2017. Available from: http://www2.warwick.ac.uk/fac/sci/
report of a workshop on cybersecurity education and training. wmg/education/wmgmasters/courses/cyber_security/.
ACM; 2013. [Accessed 15 March 2017].
McGettrick A, Cassel LN, Dark M, Hawthorne EK, Impagliazzo J. Universidad Carlos III de Madrid. Master in cybersecurity; 2017.
Toward curricular guidelines for cybersecurity. In: Available from: http://www.uc3m.es/ss/Satellite/Postgrado/
Proceedings of the 45th ACM technical symposium on en/Detalle/Estudio_C/1371209197821/1371219633369/
computer science education. ACM; 2014. p. 81–2. Master_in_Cybersecurity. [Accessed 15 March 2017].
Mew L. The information security undergraduate curriculum: University of Maryland. Cybersecurity; 2017. Available from:
evolution of a small program. In: Proceedings of the EDSIG http://advancedengineering.umd.edu/programs/
conference. Las Vegas, Nevada; 2016. Available from: cybersecurity/masters/courses. [Accessed 15 March 2017].
http://proc.iscap.info/2016/pdf/4071.pdf. [Accessed 15 March University of South Australia. Master of cybersecurity; 2017.
2017]. Available from: http://programs.unisa.edu.au/public/pcms/
New York University. Cybersecurity online; 2017. Available from: program.aspx?pageid=5882&sid=10377. [Accessed 15 March
http://engineering.nyu.edu/academics/online/masters/ 2017].
cybersecurity. [Accessed 15 March 2017]. University of Southampton. MSc cyber security; 2017. Available
Newhouse B, Keith S, Scribner B, Witte G. NICE Cybersecurity from: http://www.ecs.soton.ac.uk/programmes/msc-cyber
Workforce Framework (NCWF), National Initiative for -security#modules. [Accessed 15 March 2017].
Cybersecurity Education (NICE). Draft NIST special University of Southern California. Cyber security engineering
publication 800-181; 2016. Available from: http://csrc.nist.gov/ (MS); 2017. Available from: http://catalogue.usc.edu/preview
nice/framework/. [Accessed 15 March 2017]. _program.php?catoid=2&poid=1523&returnto=440. [Accessed
NSA/DHS. National centers of academic excellence in cyber 15 March 2017].
defense: knowledge units; 2013. Available from: https:// University of York. MSc in cyber security; 2017. Available from:
www.iad.gov/NIETP/CAERequirements.cfm. [Accessed 15 https://www.cs.york.ac.uk/postgraduate/taught-courses/msc
March 2017]. -cybersecurity/#tab-2. [Accessed 15 March 2017].
NSA/DHS. National centers of academic excellence for cyber Washington University in St. Louis. Cyber security management
defense: focus areas; 2013a. Available from: https:// curriculum; 2017. Available from: https://sever.wustl.edu/
www.iad.gov/NIETP/CAERequirements.cfm. [Accessed 15 degreeprograms/cyber-security-management/Pages/Cyber
March 2017]. -Security-Management-Curriculum.aspx. [Accessed 11 May
PennState. Master of professional studies in information 2017].
sciences – cybersecurity and information assurance; 2017. Yang SC, Wen B. Toward a cybersecurity curriculum model for
Available from: http://www.worldcampus.psu.edu/degrees undergraduate business schools: a survey of AACSB-
-and-certificates/information-sciences-masters/overview. accredited institutions in the United States. J Educ Bus
[Accessed 15 March 2017]. 2017;92(1):1–8.
QS Top Universities. QS world university rankings; 2017. Available Yuan X, Yang L, Jones B, Yu H, Chu BT. Secure software
from: https://www.topuniversities.com/qs-world-university engineering education: knowledge area, curriculum and
-rankings. Accessed 15 March 2017. resources. J Cybersecur Educ Res Pract 2016;2016(1):Article 3.
Queen’s University. Applied cyber security; 2017. Available from:
http://www.csit.qub.ac.uk/EducationatCSIT/MSc-Applied Krzysztof Cabaj holds an M.Sc. (2004) and a Ph.D. (2009) in com-
-Cyber-Security/. Accessed 15 March 2017. puter science from Faculty of Electronics and Information
Randstad Technologies. Cybersecurity workforce report: 12 Technology, Warsaw University of Technology (WUT). Cabaj is an
markets with high demand for top talent; 2016. Available Assistant Professor at WUT and Instructor of Cisco Academy courses:
from: https://www.randstadusa.com/corp/technologies/ CCNA, CCNP and NS at International Telecommunication Union In-
randstad_cybersecurity_report_2016.pdf. Accessed 15 March ternet Training Centre (ITU-ITC). His research interests include:
2017. network security, honeypots and data-mining techniques. He is the
Sahami M, Danyluk A, Fincher S, Fisher K, Grossman D, author or the co-author of over 40 publications in the field of in-
Hawthorne E, et al. Computer science curricula 2013: formation security.
curriculum guidelines for undergraduate degree programs in
computer science. Association for Computing Machinery Dulce Domingos is an Assistant Professor at the Informatics De-
(ACM)-IEEE Computer Society; 2013. Available from: https:// partment of the Faculty of Science of the University of Lisbon and
www.acm.org/binaries/content/assets/education/ a senior researcher of the Large Scale Computer Systems Labora-
cs2013_web_final.pdf. [Accessed 15 March 2017]. tory (LaSIGE). Her current research interests include security,
computers & security 75 (2018) 24–35 35

business processes, and Internet of Things (IoT). She is the Kotulski is the author and co-author of 5 books and over 200
coordinator of the master program in information security of Faculty research papers on applied probability, cryptographic protocols and
of Science of the University of Lisbon. network security.

Zbigniew Kotulski is a Professor at the Institute of Telecommuni- Ana Respício is an Assistant Professor in the Informatics Depart-
cations of the Faculty of Electronics and Information Technology, ment at Faculty of Science of the University of Lisbon and a senior
Warsaw University of Technology, Poland. He received his M.Sc. in researcher of CMAF-CIO. Her research interests include decision
applied mathematics from the Warsaw University of Technology support (theory and technologies), cybersecurity risk management,
and Ph.D. and D.Sc. Degrees from the Institute of Fundamental Tech- and optimization. She is vice-Chair of the IFIP WG8.3 on DSS and
nological Research of the Polish Academy of Sciences. Zbigniew Associate Editor of the Journal of Decision Systems (Taylor & Francis).

You might also like