Cybersecurity Holding Event

You might also like

Download as ppt, pdf, or txt
Download as ppt, pdf, or txt
You are on page 1of 10

Manal part for holding events

and cost of holding events


Awareness of cybersecurity by holding
events
The cybersecurity awareness could be maintained through holding events
.sponsored by governmental and non- governmental sectors

Studies had found that implementing active learning sessions is a very helpful
educational tool in universities and this can be achieved through a variety of well
:organized events such as
,Web security courses
,Serious video gaming sessions
,Cyber defense competitions
,Conferences
Workshops, or
.Lectures that host top cybersecurity experts
.Software and web security courses to college students

Place: lecture rooms in universities

Content: involve expert in cybersecurity who can use the essential resources to
design and develop a cybersecurity course and curriculum that could be
.understood by university students at all levels

: Curriculum: should collaborate with what is known as the


NICE Cybersecurity Workforce Framework (NCWF). The NCWF serves as a-
reference source for agencies, organizations, education and training providers,
curriculum developers to utilize on different aspects of cybersecurity education,
.training, and work- force development

National Centers of Academic Excellence in Cybersecurity (NCAE-C), whose -


mission is "to create and manage a collaborative cybersecurity educational
.program with all universities" (NCAE, 2020)
:The skills required by the courses curriculum will include
.Understanding the security field -1
analytic and soft skills that will aid in professional -2
.communication, decision making and solving problems
creation of management plan and continuous learning of -3
cybersecurity
practical skills development of real world scenarios and -4
.simulation

The above mentioned skills can be achieved through active


learning activities that include: Case studies, Think-pair-share,
.Short-writing exercise , Buzz Group/Group work, Role-play
Case study
It involves a small group discussion to allow the student understand a real-world cybersecurity
incidents .
Think‐pair‐share
First, students work independently and spend time ’thinking’ how to solve the questions. Then one
student is ’paired’ with another student to encourage team work, and develop the communication
skills. Such way will examine students’ understanding of the cybersecurity topics taught at the
beginning of the class.
Short-writing exercise
This is done by pointing the students towards several selected topics to be viewed and studied
before the class. Short-writing exercises are then done in small groups, in pairs, or even individually.
Usually, the goal to encourage critical and analytical thinking, especially on security-related
problems
Buzz Group/Group work [ or panel discussion]
This technique involves breaking students into groups of 2–5 students and each group is guided to
solve problem by thinking together.
This will encourage communication and rescission making skills needed for cybersecurity technical
skills.
Roleplay
Students are required to take the position and act through the lens of malicious user and find out
to what extend he will proceed. Such method will develop the students technical skills and increase
their awareness level.
from ( Thitima Srivatanakul and Fenio Annansingh 2021))
: Serious Video gaming sessions
From research work it was found that video gaming could be
a method of training and raising awareness of cybersecurity
among college students but impacts and effects on learning
outcomes are commonly not reported ( Michael
.VanSteenburg 2017, page 23)
. Place: university labs or rooms
Content: videos could also be programmed by cybersecurity
.experts using international curriculum such as ( NCWF)
Videos applications could be played by using the personal
students laptops or ipads, or by using the university
.computers
cyber defense competitions
Cyber defense competitions (CDCs)’’ simulate a real-world environment
where the competitors must protect the information assets of a fictional
.organization’’ (from Amy B. Woszczynski Andrew Green 2017, page 1)
These competitions are becoming popular method of learning among
schools and universities but still more studies is required to know the
.learning outcomes from such events
Place: university halls
Content: advertisement of the competition using posters and emails,
collecting the simulation projects from participants at the deadline date,
then judging for the best project using experts opinion in the field of
cybersecurity and lastly arranging a celebration day for awarding the
.winners
. conferences and workshops
Place : university halls. Or public events halls
:Content
Inviting all universities in Dubai through email
.advertisements and university posters
College students are provided a free registration and are
.credited for attendance
Powerful experts in cybersecurity could help in arranging
.the events and providing cybersecurity awareness lectures
.Such an event can be arranged once or twice a year
:Table

Total cost approximate Special cost Type of events


Full course of 20 to 25 teaching Arranging experts and payment of Courses
hours in total 15 universities in 5000aed/hour. Arranging halls and lecture
Dubai will be of two million rooms. Providing projectors and teaching
dirhams screens. Students chairs. Microphones.

Full sessions of total 15 Providing programmed software done by Video gaming


university will be 250,000/ year. cybersecurity expert, providing Laptops, sessions
iPads, computers. Providing halls or rooms
for sessions.
100,000 aed per competition Advertisement using posters, cybersecurity Competitions
event. experts for judgment ( maybe volunteers ),
Rent of one day expedition hall (ex. at World
Trade Center) for awards and showing
participants work. purchase of valuable
awards [ ex. trophy]
200,000per conference or Advertisement using posters, cybersecurity Conferences or
workshop. experts as lecturers, renting halls, workshops
Slide of references:

References:
1- Incorporating active learning activities to the design and development of an undergraduate
software and web security course
Thitima Srivatanakul1 · Fenio Annansingh1
Received: 28 December 2020 / Revised: 30 April 2021 / Accepted: 7 June 2021 / Published
online: 16 June 2021
© Beijing Normal University 2021
2-APPLICATIONS OF SERIOUS GAMING TO CYBERSECURITY TRAINING AND AWARENESS
by
Michael VanSteenburg
A Capstone Project Submitted to the Faculty of Utica College
December 2017
3-Learning Outcomes for Cyber Defense Competitions.
Kennesaw, GA 30144, USA ,
Amy B. Woszczynski
Andrew Green
Department of Information Systems. ( 2017)

You might also like