2021
DOI: 10.1007/s40692-021-00194-9
|View full text |Cite
|
Sign up to set email alerts
|

Incorporating active learning activities to the design and development of an undergraduate software and web security course

Abstract: Data breaches and cybersecurity incidents have been a major concern for companies in various sectors, including healthcare, financial, entertainment, business, education, and government. Maintaining and protecting these systems requires a workforce that is educated with the practical and technical skills needed by cybersecurity experts for information warfare and non-technical skills demanded by the industry. This paper describes the design and development of an undergraduate software and web security course u… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
3
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 8 publications
(5 citation statements)
references
References 37 publications
0
3
0
Order By: Relevance
“…It also explains how it can affect the system and discovers how it can protect the system from cyber-attacks [19][20][21]. These mitigations provide solutions that can be included in the designing of software by the software developer and contribute to secure coding standards for commonly used programming languages, regardless of the device used for programming [22]. After all, putting stronger latches on your home gate is of no use if the windows are left open.…”
Section: Discussionmentioning
confidence: 99%
“…It also explains how it can affect the system and discovers how it can protect the system from cyber-attacks [19][20][21]. These mitigations provide solutions that can be included in the designing of software by the software developer and contribute to secure coding standards for commonly used programming languages, regardless of the device used for programming [22]. After all, putting stronger latches on your home gate is of no use if the windows are left open.…”
Section: Discussionmentioning
confidence: 99%
“…In the instance where no corroborative studies were found for the optimal number of project presentations, it was determined that both three and four class presentations worked well. When additional project guidance was requested, a portion of face-to-face time shifted to active learning through guided discussions, Scrum tools, agile practices, and group learning (Srivatanakul & Annansingh, 2022). It was unexpected that a second project would be requested, and it was a pleasant surprise to find that a single standardized template could be combined with active learning to effectively add projects to both courses.…”
Section: Discussionmentioning
confidence: 99%
“…Corporations have also signed cooperation agreements with learning institutions to increase the number of students training to become cybersecurity professionals. Srivatanakul and Annansingh (2021) found that corporations helped institutions of learning to design cybersecurity courses and training programs based on the requirements and skillset that cybersecurity specialists should possess. The collaboration between colleges and organizations has ensured that students undertaking cybersecurity courses can access practical training from such organizations through internships.…”
Section: Addressing the Scarcity Of Cybersecurity Professionalsmentioning
confidence: 99%