Design recommendations for online cybersecurity courses
Nowadays, a significant amount of free online cybersecurity training courses are offered. When preparing further courses, the designer has to decide what to teach and how to do it. In this paper, we provide with a set of recommendations for both issues. Concerning topic selection, 35 free online cou...
Saved in:
Published in: | Computers & security Vol. 80; pp. 238 - 256 |
---|---|
Main Authors: | , |
Format: | Journal Article |
Language: | English |
Published: |
Amsterdam
Elsevier Ltd
01-01-2019
Elsevier Sequoia S.A |
Subjects: | |
Online Access: | Get full text |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Abstract | Nowadays, a significant amount of free online cybersecurity training courses are offered. When preparing further courses, the designer has to decide what to teach and how to do it. In this paper, we provide with a set of recommendations for both issues. Concerning topic selection, 35 free online courses are analysed using NIST’s NICE reference framework. Thus, several training gaps are discovered. Concerning the way of preparing the course (or refining it after the first edition), a set of good practices is proposed based on students’ performance and commitment in a cybersecurity MOOC with +2,000 initially active students. To foster further research in this area, an open-source framework is released to enable the analysis of students’ performance in EdX MOOCs. |
---|---|
AbstractList | Nowadays, a significant amount of free online cybersecurity training courses are offered. When preparing further courses, the designer has to decide what to teach and how to do it. In this paper, we provide with a set of recommendations for both issues. Concerning topic selection, 35 free online courses are analysed using NIST’s NICE reference framework. Thus, several training gaps are discovered. Concerning the way of preparing the course (or refining it after the first edition), a set of good practices is proposed based on students’ performance and commitment in a cybersecurity MOOC with +2,000 initially active students. To foster further research in this area, an open-source framework is released to enable the analysis of students’ performance in EdX MOOCs. |
Author | de Fuentes, Jose M. González-Manzano, Lorena |
Author_xml | – sequence: 1 givenname: Lorena orcidid: 0000-0002-3490-621X surname: González-Manzano fullname: González-Manzano, Lorena email: lgmanzan@inf.uc3m.es – sequence: 2 givenname: Jose M. orcidid: 0000-0002-4023-3197 surname: de Fuentes fullname: de Fuentes, Jose M. |
BookMark | eNp9kE9LAzEQxYNUsK1-AU8LnnedZJPNLniR-hcKXvQcYjKRLG1Sk63Qb29KPXsaZua9mR9vQWYhBiTkmkJDgXa3Y2NixoYB7RsYGoDhjMxpL1ndMehnZF5EsubA-wuyyHkEoLLr-zmRD5j9V6gSmrjdYrB68jHkysVUxbDxAStz-MSU0eyTnw6VifvS5Ety7vQm49VfXZKPp8f31Uu9fnt-Xd2va8MZTHUrDFrLjNUM3WAoaMpFNwzOFUQmaZnxsm-dcB1jhptetLplljsJ0mpol-TmdHeX4vce86TGAhDKS8WoGJiQAnhRsZPKpJhzQqd2yW91OigK6hiQGtUxIHUMSMGgyvdiujuZsPD_eEwqG4-hAPuSxqRs9P_ZfwGXDHDg |
CitedBy_id | crossref_primary_10_1007_s10796_022_10332_y crossref_primary_10_1007_s00779_021_01561_0 crossref_primary_10_3390_app13095700 crossref_primary_10_1007_s10207_023_00704_z crossref_primary_10_1007_s10922_024_09816_w crossref_primary_10_3390_educsci12010004 crossref_primary_10_1080_08874417_2023_2221200 crossref_primary_10_1108_ICS_01_2021_0013 crossref_primary_10_3390_educsci9030182 crossref_primary_10_1016_j_cose_2020_101875 |
Cites_doi | 10.1037/0022-0663.98.1.198 10.1109/MSP.2016.119 10.1111/j.1467-8535.2006.00626.x 10.1109/MSP.2012.23 10.1016/j.cose.2018.01.015 10.1073/pnas.1314788111 10.1109/MSP.2012.73 10.1016/j.cose.2006.10.005 10.17485/ijst/2015/v8i7/67760 |
ContentType | Journal Article |
Copyright | 2018 Elsevier Ltd Copyright Elsevier Sequoia S.A. Jan 2019 |
Copyright_xml | – notice: 2018 Elsevier Ltd – notice: Copyright Elsevier Sequoia S.A. Jan 2019 |
DBID | AAYXX CITATION 7SC 8FD JQ2 K7. L7M L~C L~D |
DOI | 10.1016/j.cose.2018.09.009 |
DatabaseName | CrossRef Computer and Information Systems Abstracts Technology Research Database ProQuest Computer Science Collection ProQuest Criminal Justice (Alumni) Advanced Technologies Database with Aerospace Computer and Information Systems Abstracts Academic Computer and Information Systems Abstracts Professional |
DatabaseTitle | CrossRef ProQuest Criminal Justice (Alumni) Technology Research Database Computer and Information Systems Abstracts – Academic ProQuest Computer Science Collection Computer and Information Systems Abstracts Advanced Technologies Database with Aerospace Computer and Information Systems Abstracts Professional |
DatabaseTitleList | ProQuest Criminal Justice (Alumni) |
DeliveryMethod | fulltext_linktorsrc |
Discipline | Computer Science |
EISSN | 1872-6208 |
EndPage | 256 |
ExternalDocumentID | 10_1016_j_cose_2018_09_009 S0167404818302050 |
GroupedDBID | --K --M -~X .DC .~1 0R~ 1B1 1RT 1~. 1~5 29F 4.4 457 4G. 5GY 5VS 7-5 71M 8P~ 9JN AACTN AAEDT AAEDW AAIAV AAIKJ AAKOC AALRI AAOAW AAQFI AAQXK AAXUO AAYFN ABBOA ABFSI ABMAC ABXDB ABYKQ ACDAQ ACGFO ACGFS ACNNM ACRLP ACZNC ADBBV ADEZE ADHUB ADJOM ADMUD AEBSH AEKER AENEX AFFNX AFKWA AFTJW AGHFR AGUBO AGYEJ AHHHB AHZHX AIALX AIEXJ AIKHN AITUG AJBFU AJOXV ALMA_UNASSIGNED_HOLDINGS AMFUW AMRAJ AOUOD ASPBG AVWKF AXJTR AZFZN BKOJK BKOMP BLXMC CS3 DU5 E.L EBS EFJIC EFLBG EJD EO8 EO9 EP2 EP3 FDB FEDTE FGOYB FIRID FNPLU FYGXN G-2 G-Q GBLVA GBOLZ HLX HLZ HVGLF HZ~ IHE J1W KOM LG8 LG9 M41 MO0 MS~ N9A O-L O9- OAUVE OZT P-8 P-9 P2P PC. PQQKQ Q38 R2- RIG RNS ROL RPZ RXW SBC SBM SDF SDG SDP SES SEW SPC SPCBC SSV SSZ T5K TAE TN5 TWZ WH7 WUQ XJE XPP XSW YK3 ZMT ~G- AAXKI AAYXX AFJKZ AKRWK CITATION 7SC 8FD JQ2 K7. L7M L~C L~D |
ID | FETCH-LOGICAL-c420t-35cedd2cda2ef9c10a145699ff009271f9c4dd23f5f622c4c853a32d4f707da03 |
ISSN | 0167-4048 |
IngestDate | Thu Oct 10 19:43:19 EDT 2024 Thu Sep 26 16:23:31 EDT 2024 Fri Feb 23 02:33:37 EST 2024 |
IsDoiOpenAccess | false |
IsOpenAccess | true |
IsPeerReviewed | true |
IsScholarly | true |
Keywords | Media in cybersecurity education Cybersecurity teaching/learning strategies NICE framework Cybersecurity distance education and telelearning Cybersecurity course guidance |
Language | English |
LinkModel | OpenURL |
MergedId | FETCHMERGED-LOGICAL-c420t-35cedd2cda2ef9c10a145699ff009271f9c4dd23f5f622c4c853a32d4f707da03 |
ORCID | 0000-0002-4023-3197 0000-0002-3490-621X |
OpenAccessLink | https://e-archivo.uc3m.es/bitstream/10016/29946/2/design_gonzalez_CS_2019_ps.pdf |
PQID | 2159257504 |
PQPubID | 46289 |
PageCount | 19 |
ParticipantIDs | proquest_journals_2159257504 crossref_primary_10_1016_j_cose_2018_09_009 elsevier_sciencedirect_doi_10_1016_j_cose_2018_09_009 |
PublicationCentury | 2000 |
PublicationDate | January 2019 2019-01-00 20190101 |
PublicationDateYYYYMMDD | 2019-01-01 |
PublicationDate_xml | – month: 01 year: 2019 text: January 2019 |
PublicationDecade | 2010 |
PublicationPlace | Amsterdam |
PublicationPlace_xml | – name: Amsterdam |
PublicationTitle | Computers & security |
PublicationYear | 2019 |
Publisher | Elsevier Ltd Elsevier Sequoia S.A |
Publisher_xml | – name: Elsevier Ltd – name: Elsevier Sequoia S.A |
References | O. for Economic Co-operation, D. (OECD). Skills beyond school. synthesis report. 2017c. 2014a. N/Ag. R. Institute. Cybersecurity fundamentals. U. S. of Georgia. Cybersecurity and its ten domains. Cybrary. Comptia network+. N/Ac. U. of Adelaide. Cyberwar, surveillance and security. Sullivan F. 2017 global information security workforce study; 2017. U. Maryland. Cryptography. Irvine UC. Networking and security in ios applications. 2017. Mirkovic, Benzel (bib0035) 2012; 10 2014b. of Washington U.. Introduction to cybersecurity. U. Maryland. Hardware security. 2017d. Vasserman, Bell, Sayre (bib0051) 2015 Cabaj, Domingos, Kotulski, Respício (bib0006) 2018 G. Tech. Cyber-physical systems security. N/Af. N/Ab. U. of Virginia. Applied cryptography. Cybrary. Comptia casp. U. Maryland. Software security. G. Tech. Network security. U. Maryland. Usable security. 2018. Cybrary. Ethical hacking and penetration testing. N/Ae. MIT. Computer systems security. EDUCATION, RESEARCH, BOARD (bib0020) 2016 C. I. U. of Madrid. Cyber security basics: a hands-on approach. Paulsen, McDuffie, Newhouse, Toth (bib0039) 2012; 10 2011. Cybrary. Python for security professionals. O. for Economic Co-operation, D. (OECD). At what age do university students earn their first degree? T. O. University. Introduction to cybersecurity. N/A. U. of Washington. Building a cybersecurity toolkit. N/Aa. Academy K. Intro to cryptography. Pusey, Gondree, Peterson (bib0040) 2016; 14 U. of Delft. Cybersecurity economics. Cybrary. Advanced penetration testing. U. of London. Information security: context and introduction. Beuran R, Chinen KI, Tan Y, Shinoda Y. Towards effective cybersecurity education and training; 2016. MIT. Network and computer security. Wang (bib0053) 2007; 38 2017a. Salah (bib0042) 2014 R. Institute. Network security. Patriciu, Furtuna (bib0038) 2009 N. I. of Standards, T. (NIST), National initiative for cybersecurity education (nice). cybersecurity workforce framework. S. University. Cryptography i. Bashir M, Lambert A, Wee JMC, Guo B. An examination of the vocational and psychological characteristics of cybersecurity competition participants. 2015 USENIX Summit on Gaming, Games, and Gamification in Security Education (3GSE 15); 2015. G. Tech. Intro to information security. N/Ad. Cybrary. Certified information systems security professional. U. of Colorado. Homeland security and cybersecurity. Ferrer Mico, M.T. (2016). Community of Inquiry (COI) and Self-Directed Learning (SDL) in Online Environments: An Exploratory, Correlational and Critical Analysis of MOOCs. Introduction to Cybersecurity MOOC Case Study (Doctoral dissertation, Universitat Ramon Llull); 2016. Boopathi, Sreejith, Bithin (bib0005) 2015; 8 Trickel, Disperati, Gustafson, Kalantari, Mabey, Tiwari, Safaei, Doupé, Vigna (bib0048) 2017 Duckworth, Seligman (bib0017) 2006; 98 Reuben, Sapienza, Zingales (bib0041) 2014; 111 U. of Washington. Cybersecurity - the cisos view. U. of London. Malicious software and its underground economy: Two sides to every story. Cybrary. Secure coding. G. Tech. Computer networking. 2017b. U. of Michigan. Internet history, technology, and security. Cone, Irvine, Thompson, Nguyen (bib0008) 2007; 26 Duckworth (10.1016/j.cose.2018.09.009_bib0017) 2006; 98 Trickel (10.1016/j.cose.2018.09.009_bib0048) 2017 10.1016/j.cose.2018.09.009_bib0031 10.1016/j.cose.2018.09.009_bib0030 10.1016/j.cose.2018.09.009_bib0034 10.1016/j.cose.2018.09.009_bib0033 10.1016/j.cose.2018.09.009_bib0032 Patriciu (10.1016/j.cose.2018.09.009_bib0038) 2009 10.1016/j.cose.2018.09.009_bib0037 10.1016/j.cose.2018.09.009_bib0036 10.1016/j.cose.2018.09.009_bib0009 EDUCATION (10.1016/j.cose.2018.09.009_bib0020) 2016 Pusey (10.1016/j.cose.2018.09.009_bib0040) 2016; 14 10.1016/j.cose.2018.09.009_bib0007 Boopathi (10.1016/j.cose.2018.09.009_bib0005) 2015; 8 Salah (10.1016/j.cose.2018.09.009_bib0042) 2014 10.1016/j.cose.2018.09.009_bib0002 10.1016/j.cose.2018.09.009_bib0046 10.1016/j.cose.2018.09.009_bib0001 10.1016/j.cose.2018.09.009_bib0045 10.1016/j.cose.2018.09.009_bib0044 10.1016/j.cose.2018.09.009_bib0043 Cone (10.1016/j.cose.2018.09.009_bib0008) 2007; 26 10.1016/j.cose.2018.09.009_bib0049 10.1016/j.cose.2018.09.009_bib0004 10.1016/j.cose.2018.09.009_bib0003 10.1016/j.cose.2018.09.009_bib0047 10.1016/j.cose.2018.09.009_bib0019 10.1016/j.cose.2018.09.009_bib0018 Mirkovic (10.1016/j.cose.2018.09.009_bib0035) 2012; 10 Vasserman (10.1016/j.cose.2018.09.009_bib0051) 2015 10.1016/j.cose.2018.09.009_bib0052 10.1016/j.cose.2018.09.009_bib0050 10.1016/j.cose.2018.09.009_bib0013 10.1016/j.cose.2018.09.009_bib0012 10.1016/j.cose.2018.09.009_bib0056 10.1016/j.cose.2018.09.009_bib0011 10.1016/j.cose.2018.09.009_bib0055 10.1016/j.cose.2018.09.009_bib0010 10.1016/j.cose.2018.09.009_bib0054 10.1016/j.cose.2018.09.009_bib0016 10.1016/j.cose.2018.09.009_bib0015 10.1016/j.cose.2018.09.009_bib0014 10.1016/j.cose.2018.09.009_bib0029 Paulsen (10.1016/j.cose.2018.09.009_bib0039) 2012; 10 Cabaj (10.1016/j.cose.2018.09.009_bib0006) 2018 Reuben (10.1016/j.cose.2018.09.009_bib0041) 2014; 111 Wang (10.1016/j.cose.2018.09.009_bib0053) 2007; 38 10.1016/j.cose.2018.09.009_bib0024 10.1016/j.cose.2018.09.009_bib0023 10.1016/j.cose.2018.09.009_bib0022 10.1016/j.cose.2018.09.009_bib0021 10.1016/j.cose.2018.09.009_bib0028 10.1016/j.cose.2018.09.009_bib0027 10.1016/j.cose.2018.09.009_bib0026 10.1016/j.cose.2018.09.009_bib0025 |
References_xml | – volume: 38 start-page: 294 year: 2007 end-page: 311 ident: bib0053 article-title: Designing online courses that effectively engage learners from diverse cultural backgrounds publication-title: Br J Educ Technol contributor: fullname: Wang – year: 2018 ident: bib0006 article-title: Cybersecurity education: evolution of the discipline and analysis of master programs publication-title: Computers & Security contributor: fullname: Respício – volume: 10 start-page: 73 year: 2012 end-page: 76 ident: bib0035 article-title: Teaching cybersecurity with deterlab publication-title: IEEE Secur Priv contributor: fullname: Benzel – volume: 98 start-page: 198 year: 2006 ident: bib0017 article-title: Self-discipline gives girls the edge: Gender in self-discipline, grades, and achievement test scores publication-title: Journal of educational psychology contributor: fullname: Seligman – volume: 14 start-page: 90 year: 2016 end-page: 95 ident: bib0040 article-title: The outcomes of cybersecurity competitions and implications for underrepresented populations publication-title: IEEE Secur Priv contributor: fullname: Peterson – start-page: 172 year: 2009 end-page: 177 ident: bib0038 article-title: Guide for designing cyber security exercises publication-title: Proceedings of the 8th WSEAS international conference on E-activities and information security and privacy contributor: fullname: Furtuna – volume: 111 start-page: 4403 year: 2014 end-page: 4408 ident: bib0041 article-title: How stereotypes impair womens careers in science publication-title: Proc Natl Acad Sci contributor: fullname: Zingales – volume: 26 start-page: 63 year: 2007 end-page: 72 ident: bib0008 article-title: A video game for cyber security training and awareness publication-title: Comput Secur contributor: fullname: Nguyen – year: 2015 ident: bib0051 article-title: Developing and piloting a quantitative assessment tool for cybersecurity courses contributor: fullname: Sayre – volume: 8 start-page: 642 year: 2015 end-page: 649 ident: bib0005 article-title: Learning cyber security through gamification publication-title: Indian Journal of Science and Technology contributor: fullname: Bithin – start-page: 529 year: 2014 end-page: 534 ident: bib0042 article-title: Harnessing the cloud for teaching cybersecurity publication-title: Proceedings of the 45th ACM technical symposium on computer science education contributor: fullname: Salah – year: 2017 ident: bib0048 article-title: Shell we play a game? ctf-as-a-service for security education publication-title: Proceedings of the 2017 {USENIX} workshop on advances in security education ({ASE} 17) contributor: fullname: Vigna – volume: 10 start-page: 76 year: 2012 end-page: 79 ident: bib0039 article-title: Nice: Creating a cybersecurity workforce and aware public publication-title: IEEE Secur Priv contributor: fullname: Toth – year: 2016 ident: bib0020 article-title: Massive open online courses (moocs): Trends and future perspectives publication-title: EDU/CERI/CD/RD; contributor: fullname: BOARD – ident: 10.1016/j.cose.2018.09.009_bib0026 – year: 2017 ident: 10.1016/j.cose.2018.09.009_bib0048 article-title: Shell we play a game? ctf-as-a-service for security education contributor: fullname: Trickel – ident: 10.1016/j.cose.2018.09.009_bib0022 – ident: 10.1016/j.cose.2018.09.009_bib0003 – ident: 10.1016/j.cose.2018.09.009_bib0016 – ident: 10.1016/j.cose.2018.09.009_bib0055 – volume: 98 start-page: 198 issue: 1 year: 2006 ident: 10.1016/j.cose.2018.09.009_bib0017 article-title: Self-discipline gives girls the edge: Gender in self-discipline, grades, and achievement test scores publication-title: Journal of educational psychology doi: 10.1037/0022-0663.98.1.198 contributor: fullname: Duckworth – ident: 10.1016/j.cose.2018.09.009_bib0036 – ident: 10.1016/j.cose.2018.09.009_bib0032 – ident: 10.1016/j.cose.2018.09.009_bib0013 – ident: 10.1016/j.cose.2018.09.009_bib0029 – ident: 10.1016/j.cose.2018.09.009_bib0023 – ident: 10.1016/j.cose.2018.09.009_bib0050 – ident: 10.1016/j.cose.2018.09.009_bib0002 – volume: 14 start-page: 90 issue: 6 year: 2016 ident: 10.1016/j.cose.2018.09.009_bib0040 article-title: The outcomes of cybersecurity competitions and implications for underrepresented populations publication-title: IEEE Secur Priv doi: 10.1109/MSP.2016.119 contributor: fullname: Pusey – ident: 10.1016/j.cose.2018.09.009_bib0054 – volume: 38 start-page: 294 issue: 2 year: 2007 ident: 10.1016/j.cose.2018.09.009_bib0053 article-title: Designing online courses that effectively engage learners from diverse cultural backgrounds publication-title: Br J Educ Technol doi: 10.1111/j.1467-8535.2006.00626.x contributor: fullname: Wang – ident: 10.1016/j.cose.2018.09.009_bib0019 – start-page: 529 year: 2014 ident: 10.1016/j.cose.2018.09.009_bib0042 article-title: Harnessing the cloud for teaching cybersecurity contributor: fullname: Salah – volume: 10 start-page: 73 issue: 1 year: 2012 ident: 10.1016/j.cose.2018.09.009_bib0035 article-title: Teaching cybersecurity with deterlab publication-title: IEEE Secur Priv doi: 10.1109/MSP.2012.23 contributor: fullname: Mirkovic – ident: 10.1016/j.cose.2018.09.009_bib0009 – ident: 10.1016/j.cose.2018.09.009_bib0037 – year: 2015 ident: 10.1016/j.cose.2018.09.009_bib0051 contributor: fullname: Vasserman – ident: 10.1016/j.cose.2018.09.009_bib0033 – year: 2018 ident: 10.1016/j.cose.2018.09.009_bib0006 article-title: Cybersecurity education: evolution of the discipline and analysis of master programs publication-title: Computers & Security doi: 10.1016/j.cose.2018.01.015 contributor: fullname: Cabaj – ident: 10.1016/j.cose.2018.09.009_bib0012 – start-page: 172 year: 2009 ident: 10.1016/j.cose.2018.09.009_bib0038 article-title: Guide for designing cyber security exercises contributor: fullname: Patriciu – year: 2016 ident: 10.1016/j.cose.2018.09.009_bib0020 article-title: Massive open online courses (moocs): Trends and future perspectives publication-title: EDU/CERI/CD/RD; contributor: fullname: EDUCATION – ident: 10.1016/j.cose.2018.09.009_bib0043 – ident: 10.1016/j.cose.2018.09.009_bib0024 – ident: 10.1016/j.cose.2018.09.009_bib0047 – ident: 10.1016/j.cose.2018.09.009_bib0001 – ident: 10.1016/j.cose.2018.09.009_bib0030 – ident: 10.1016/j.cose.2018.09.009_bib0018 – ident: 10.1016/j.cose.2018.09.009_bib0034 – ident: 10.1016/j.cose.2018.09.009_bib0015 – ident: 10.1016/j.cose.2018.09.009_bib0011 – ident: 10.1016/j.cose.2018.09.009_bib0027 – ident: 10.1016/j.cose.2018.09.009_bib0044 – ident: 10.1016/j.cose.2018.09.009_bib0025 – volume: 111 start-page: 4403 issue: 12 year: 2014 ident: 10.1016/j.cose.2018.09.009_bib0041 article-title: How stereotypes impair womens careers in science publication-title: Proc Natl Acad Sci doi: 10.1073/pnas.1314788111 contributor: fullname: Reuben – ident: 10.1016/j.cose.2018.09.009_bib0046 – ident: 10.1016/j.cose.2018.09.009_bib0021 – volume: 10 start-page: 76 issue: 3 year: 2012 ident: 10.1016/j.cose.2018.09.009_bib0039 article-title: Nice: Creating a cybersecurity workforce and aware public publication-title: IEEE Secur Priv doi: 10.1109/MSP.2012.73 contributor: fullname: Paulsen – ident: 10.1016/j.cose.2018.09.009_bib0004 – ident: 10.1016/j.cose.2018.09.009_bib0031 – volume: 26 start-page: 63 issue: 1 year: 2007 ident: 10.1016/j.cose.2018.09.009_bib0008 article-title: A video game for cyber security training and awareness publication-title: Comput Secur doi: 10.1016/j.cose.2006.10.005 contributor: fullname: Cone – volume: 8 start-page: 642 issue: 7 year: 2015 ident: 10.1016/j.cose.2018.09.009_bib0005 article-title: Learning cyber security through gamification publication-title: Indian Journal of Science and Technology doi: 10.17485/ijst/2015/v8i7/67760 contributor: fullname: Boopathi – ident: 10.1016/j.cose.2018.09.009_bib0052 – ident: 10.1016/j.cose.2018.09.009_bib0056 – ident: 10.1016/j.cose.2018.09.009_bib0014 – ident: 10.1016/j.cose.2018.09.009_bib0007 – ident: 10.1016/j.cose.2018.09.009_bib0010 – ident: 10.1016/j.cose.2018.09.009_bib0028 – ident: 10.1016/j.cose.2018.09.009_bib0045 – ident: 10.1016/j.cose.2018.09.009_bib0049 |
SSID | ssj0017688 |
Score | 2.3945277 |
Snippet | Nowadays, a significant amount of free online cybersecurity training courses are offered. When preparing further courses, the designer has to decide what to... |
SourceID | proquest crossref elsevier |
SourceType | Aggregation Database Publisher |
StartPage | 238 |
SubjectTerms | CAI Computer assisted instruction Cybersecurity Cybersecurity course guidance Cybersecurity distance education and telelearning Cybersecurity teaching/learning strategies Design Distance learning Media in cybersecurity education NICE framework Online instruction Studies Technology education Training |
Title | Design recommendations for online cybersecurity courses |
URI | https://dx.doi.org/10.1016/j.cose.2018.09.009 https://www.proquest.com/docview/2159257504 |
Volume | 80 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://sdu.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV1LT9wwELYWuPRSSh_irRx6i7JybGcdHxEsAgRcoBI3y_hxQCWLWPZQfn3Hr-yyVVGpxCWKnJc0Mxl_Hs98g9B3qmzjRtRv_TNRMW5NBXeKyjSNpko3hIWF4skVv7xpj8ZsPBjkdkDzsXfVNIyBrn3l7Bu03b8UBuAcdA5H0Doc_0nvRyElo_QL3ft7m1omBdKFMrJilPrXLWC-1Leu1JOQxrEIUnOnh2mwi3xnn6kz6Z7D9nr90z5XF4AtVWjfXZ5PHm3Xe3ljy-OZJ_zsNxrKi-FijMGXNb2IMfTFL_NMoxCL9JTpOBJlDm30ny0n1YjgdtHBxlZN2UPSdmGyJZFV_A8_HkMKd0OftO_z79pARovFfNbqcwmvQiGFp73xVGbYx2_WCHgdcHprB6fjm7N-UwlWVm1P9Q4PpBqqmO63_KW_4ZSlGTvAkOtP6GNaPxQHUfEbaGC7z2g9a6xIrvoL4tEOiiU7KMAOimgHxQs7KJIdfEU_jsfXhydVapJRaUbwU0UbbY0h2ihindA1VjVgYiGc83RavIYxBtepg1-SEM004DNFiWGOY24Upt_Qajfp7CYqBDcaM-oc04o5rJStR_iWc9UypTTRW6jMIpEPkQtF5iTBO-kFKL0AJRYSvr2Fmiw1mdBcRGkSlPzqc7tZxDL9V1MJwFTA5NJgtv2fr91BH-aWvYtWnx5ndg-tTM1sP9nJb5yZdkA |
link.rule.ids | 315,782,786,27933,27934 |
linkProvider | Elsevier |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Design+recommendations+for+online+cybersecurity+courses&rft.jtitle=Computers+%26+security&rft.au=Gonz%C3%A1lez-Manzano%2C+Lorena&rft.au=de+Fuentes%2C+Jose+M.&rft.date=2019-01-01&rft.pub=Elsevier+Ltd&rft.issn=0167-4048&rft.eissn=1872-6208&rft.volume=80&rft.spage=238&rft.epage=256&rft_id=info:doi/10.1016%2Fj.cose.2018.09.009&rft.externalDocID=S0167404818302050 |
thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=0167-4048&client=summon |
thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=0167-4048&client=summon |
thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=0167-4048&client=summon |