{"id":23225,"date":"2025-04-25T20:34:35","date_gmt":"2025-04-25T20:34:35","guid":{"rendered":"https:\/\/www.tun.com\/home\/?p=23225"},"modified":"2025-04-25T20:34:37","modified_gmt":"2025-04-25T20:34:37","slug":"call-for-shared-educator-resources-in-cybersecurity-education","status":"publish","type":"post","link":"https:\/\/www.tun.com\/home\/call-for-shared-educator-resources-in-cybersecurity-education\/","title":{"rendered":"Call for Shared Educator Resources in Cybersecurity Education"},"content":{"rendered":"\n<div class=\"wp-block-group\"><div class=\"wp-block-group__inner-container is-layout-constrained wp-block-group-is-layout-constrained\">\n<div class=\"wp-block-uagb-blockquote uagb-block-e7eb3fc3 uagb-blockquote__skin-border uagb-blockquote__stack-img-none\"><blockquote class=\"uagb-blockquote\"><div class=\"uagb-blockquote__content\">Researchers from Carnegie Mellon University and Community College of Allegheny Co. emphasize the need for shared cybersecurity teaching resources. They introduce the innovative CyberSim Lab course, aiming to integrate technical and non-technical skills, profoundly impacting the cybersecurity workforce.<\/div><footer><div class=\"uagb-blockquote__author-wrap uagb-blockquote__author-at-left\"><\/div><\/footer><\/blockquote><\/div>\n\n\n\n<div class=\"wp-block-group is-content-justification-space-between is-nowrap is-layout-flex wp-container-core-group-is-layout-0dfbf163 wp-block-group-is-layout-flex\"><div style=\"font-size:16px;\" class=\"has-text-align-left wp-block-post-author\"><div class=\"wp-block-post-author__content\"><p class=\"wp-block-post-author__name\">The University Network<\/p><\/div><\/div>\n\n\n<div class=\"wp-block-uagb-social-share uagb-social-share__outer-wrap uagb-social-share__layout-horizontal uagb-block-ee584a31\">\n<div class=\"wp-block-uagb-social-share-child uagb-ss-repeater uagb-ss__wrapper uagb-block-ec619ce7\"><span class=\"uagb-ss__link\" data-href=\"https:\/\/www.facebook.com\/sharer.php?u=\" tabindex=\"0\" role=\"button\" aria-label=\"facebook\"><span class=\"uagb-ss__source-wrap\"><span class=\"uagb-ss__source-icon\"><svg xmlns=\"https:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 512 512\"><path d=\"M504 256C504 119 393 8 256 8S8 119 8 256c0 123.8 90.69 226.4 209.3 245V327.7h-63V256h63v-54.64c0-62.15 37-96.48 93.67-96.48 27.14 0 55.52 4.84 55.52 4.84v61h-31.28c-30.8 0-40.41 19.12-40.41 38.73V256h68.78l-11 71.69h-57.78V501C413.3 482.4 504 379.8 504 256z\"><\/path><\/svg><\/span><\/span><\/span><\/div>\n\n\n\n<div class=\"wp-block-uagb-social-share-child uagb-ss-repeater uagb-ss__wrapper uagb-block-32d99934\"><span class=\"uagb-ss__link\" data-href=\"https:\/\/twitter.com\/share?url=\" tabindex=\"0\" role=\"button\" aria-label=\"twitter\"><span class=\"uagb-ss__source-wrap\"><span class=\"uagb-ss__source-icon\"><svg xmlns=\"https:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 512 512\"><path d=\"M389.2 48h70.6L305.6 224.2 487 464H345L233.7 318.6 106.5 464H35.8L200.7 275.5 26.8 48H172.4L272.9 180.9 389.2 48zM364.4 421.8h39.1L151.1 88h-42L364.4 421.8z\"><\/path><\/svg><\/span><\/span><\/span><\/div>\n\n\n\n<div class=\"wp-block-uagb-social-share-child uagb-ss-repeater uagb-ss__wrapper uagb-block-1d136f14\"><span class=\"uagb-ss__link\" data-href=\"https:\/\/www.linkedin.com\/shareArticle?url=\" tabindex=\"0\" role=\"button\" aria-label=\"linkedin\"><span class=\"uagb-ss__source-wrap\"><span class=\"uagb-ss__source-icon\"><svg xmlns=\"https:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 448 512\"><path d=\"M416 32H31.9C14.3 32 0 46.5 0 64.3v383.4C0 465.5 14.3 480 31.9 480H416c17.6 0 32-14.5 32-32.3V64.3c0-17.8-14.4-32.3-32-32.3zM135.4 416H69V202.2h66.5V416zm-33.2-243c-21.3 0-38.5-17.3-38.5-38.5S80.9 96 102.2 96c21.2 0 38.5 17.3 38.5 38.5 0 21.3-17.2 38.5-38.5 38.5zm282.1 243h-66.4V312c0-24.8-.5-56.7-34.5-56.7-34.6 0-39.9 27-39.9 54.9V416h-66.4V202.2h63.7v29.2h.9c8.9-16.8 30.6-34.5 62.9-34.5 67.2 0 79.7 44.3 79.7 101.9V416z\"><\/path><\/svg><\/span><\/span><\/span><\/div>\n<\/div>\n<\/div>\n\n\n\n<p>The modern cybersecurity landscape demands professionals who are equipped with both technical prowess and social intelligence. In an <a href=\"https:\/\/dl.acm.org\/doi\/10.1145\/3641554.3701834\" target=\"_blank\" rel=\"noopener\" title=\"\">article<\/a>, researchers at Carnegie Mellon University and Community College of Allegheny County have emphasized the importance of integrating technical and non-technical skills in cybersecurity education. <\/p>\n\n\n\n<p>Their findings are presented in the Proceedings of the 56th ACM Technical Symposium on Computer Science Education.<\/p>\n<\/div><\/div>\n\n\n\n<p>&#8220;Most cybersecurity education at the postsecondary level is focused on technical knowledge and skills without enough attention to vital non-technical skills,&#8221; co-author Lee Branstetter, a professor of public policy and economics in Carnegie Mellon\u2019s Heinz College of Information Systems and Public Policy, said in a news release. &#8220;Cybersecurity education has to integrate teaching and practicing non-technical competencies alongside technical knowledge and skills to ensure that both technical and non-technical skills transfer to cybersecurity workplaces.&#8221;<\/p>\n\n\n\n<p>In response to this educational gap, the researchers have designed a course that facilitates the sharing of resources to teach these essential competencies.<\/p>\n\n\n\n<p> The CyberSim Lab, a one-semester course, uses experiential learning, role play, collaborative learning, technical simulation and metacognitive engagement to bridge the gap between classroom learning and real-world application.<\/p>\n\n\n\n<p>The study underscores the significant role community colleges play in training entry-level cybersecurity professionals, especially for students who may not pursue a four-year degree. By identifying specific learning outcomes and suggesting research-based pedagogical approaches, the researchers aim to support learning and skills transfer effectively.<\/p>\n\n\n\n<p>The innovative CyberSim Lab allows students to work in small groups to identify vulnerabilities in systems, create and present change management plans, and implement feedback to fortify network security. <\/p>\n\n\n\n<p>This hands-on approach mirrors the complexities and collaborative nature of actual cybersecurity work environments.<\/p>\n\n\n\n<p>Co-author Judeth Oden Choi, who recently received her doctoral degree from Carnegie Mellon\u2019s Human-Computer Interaction Institute, highlighted the critical importance of this educational evolution.<\/p>\n\n\n\n<p>&#8220;Gaps in the cybersecurity workforce threaten national security, commercial innovation and the nature of public discourse in the digital age,&#8221; she said in the news release. \u201cThe CyberSim Lab serves as a curricular bridge between the classroom and the workplace, supporting cybersecurity curriculum designers by sharing learning outcomes and teaching strategies drawn from the educational research literature and tailored to the cybersecurity educational context.\u201d<\/p>\n\n\n\n<p>Co-author Rotem Guttman, a doctoral student at the same institute, underscored the value of these resources, particularly for community colleges. <\/p>\n\n\n\n<p>&#8220;The resources we identify are especially useful for under-resourced cybersecurity programs, such as those in community colleges,&#8221; he added.<\/p>\n\n\n\n<div style=\"height:11px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p><strong>Source:<\/strong> <a href=\"https:\/\/www.heinz.cmu.edu\/media\/2025\/April\/cybersecurity-educators-should-share-resources-to-teach-students-important-technical-and-non-technical-skills\" target=\"_blank\" rel=\"noopener\" title=\"\">Carnegie Mellon University<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>The modern cybersecurity landscape demands professionals who are equipped with both technical prowess and social intelligence. In an article, researchers at Carnegie Mellon University and Community College of Allegheny County have emphasized the importance of integrating technical and non-technical skills in cybersecurity education. Their findings are presented in the Proceedings of the 56th ACM Technical [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"single-no-separators","format":"standard","meta":{"_acf_changed":false,"_uag_custom_page_level_css":"","_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"categories":[18],"tags":[149,317],"class_list":["post-23225","post","type-post","status-publish","format-standard","hentry","category-education","tag-carnegie-mellon-university","tag-community-college-of-allegheny-county"],"acf":[],"aioseo_notices":[],"uagb_featured_image_src":{"full":false,"thumbnail":false,"medium":false,"medium_large":false,"large":false,"1536x1536":false,"2048x2048":false},"uagb_author_info":{"display_name":"The University Network","author_link":"https:\/\/www.tun.com\/home\/author\/funky_junkie\/"},"uagb_comment_info":0,"uagb_excerpt":"The modern cybersecurity landscape demands professionals who are equipped with both technical prowess and social intelligence. In an article, researchers at Carnegie Mellon University and Community College of Allegheny County have emphasized the importance of integrating technical and non-technical skills in cybersecurity education. Their findings are presented in the Proceedings of the 56th ACM Technical&hellip;","_links":{"self":[{"href":"https:\/\/www.tun.com\/home\/wp-json\/wp\/v2\/posts\/23225","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.tun.com\/home\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.tun.com\/home\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.tun.com\/home\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.tun.com\/home\/wp-json\/wp\/v2\/comments?post=23225"}],"version-history":[{"count":10,"href":"https:\/\/www.tun.com\/home\/wp-json\/wp\/v2\/posts\/23225\/revisions"}],"predecessor-version":[{"id":23252,"href":"https:\/\/www.tun.com\/home\/wp-json\/wp\/v2\/posts\/23225\/revisions\/23252"}],"wp:attachment":[{"href":"https:\/\/www.tun.com\/home\/wp-json\/wp\/v2\/media?parent=23225"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.tun.com\/home\/wp-json\/wp\/v2\/categories?post=23225"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.tun.com\/home\/wp-json\/wp\/v2\/tags?post=23225"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}