Pre-Bachelor's Curricular Guidance For Cybersecurity Programs
Abstract
References
Index Terms
- Pre-Bachelor's Curricular Guidance For Cybersecurity Programs
Recommendations
Curricular Guidance for Associate-Degree Cybersecurity Programs
SIGCSE '20: Proceedings of the 51st ACM Technical Symposium on Computer Science EducationAs projections of the shortage of cybersecurity workers grow, the ACM CCECC (Committee for Computing Education in Community Colleges) has led creation of a set of guidelines for two-year cybersecurity programs at the associate-degree level, called ...
Shaping Curricular Guidelines for Associate-Degree Cybersecurity Programs
SIGCSE '19: Proceedings of the 50th ACM Technical Symposium on Computer Science EducationAs projections of the shortage of cybersecurity workers grow [4], the spotlight is on cybersecurity education. In December of 2017, the Joint Task Force on Cybersecurity Education published Cybersecurity Curricula 2017: Curriculum Guidelines for Post-...
ACM Undergraduate Curricular Guidance in Computer Science: The First Two Years
ITiCSE '16: Proceedings of the 2016 ACM Conference on Innovation and Technology in Computer Science EducationUnder the auspices of the ACM Education Board, the Committee for Computing Education in Community Colleges (CCECC) is updating the 2009 ACM associate-degree curricular guidance in computer science with inclusion of contemporary cybersecurity concepts. ...
Comments
Information & Contributors
Information
Published In
- General Chairs:
- Michail Giannakos,
- Guttorm Sindre,
- Program Chairs:
- Andrew Luxton-Reilly,
- Monica Divitini
Sponsors
Publisher
Association for Computing Machinery
New York, NY, United States
Publication History
Check for updates
Author Tags
Qualifiers
- Poster
Conference
Acceptance Rates
Contributors
Other Metrics
Bibliometrics & Citations
Bibliometrics
Article Metrics
- 0Total Citations
- 109Total Downloads
- Downloads (Last 12 months)6
- Downloads (Last 6 weeks)0
Other Metrics
Citations
View Options
Login options
Check if you have access through your login credentials or your institution to get full access on this article.
Sign in