Design recommendations for online cybersecurity courses

Nowadays, a significant amount of free online cybersecurity training courses are offered. When preparing further courses, the designer has to decide what to teach and how to do it. In this paper, we provide with a set of recommendations for both issues. Concerning topic selection, 35 free online cou...

Full description

Saved in:
Bibliographic Details
Published in:Computers & security Vol. 80; pp. 238 - 256
Main Authors: González-Manzano, Lorena, de Fuentes, Jose M.
Format: Journal Article
Language:English
Published: Amsterdam Elsevier Ltd 01-01-2019
Elsevier Sequoia S.A
Subjects:
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
Abstract Nowadays, a significant amount of free online cybersecurity training courses are offered. When preparing further courses, the designer has to decide what to teach and how to do it. In this paper, we provide with a set of recommendations for both issues. Concerning topic selection, 35 free online courses are analysed using NIST’s NICE reference framework. Thus, several training gaps are discovered. Concerning the way of preparing the course (or refining it after the first edition), a set of good practices is proposed based on students’ performance and commitment in a cybersecurity MOOC with +2,000 initially active students. To foster further research in this area, an open-source framework is released to enable the analysis of students’ performance in EdX MOOCs.
AbstractList Nowadays, a significant amount of free online cybersecurity training courses are offered. When preparing further courses, the designer has to decide what to teach and how to do it. In this paper, we provide with a set of recommendations for both issues. Concerning topic selection, 35 free online courses are analysed using NIST’s NICE reference framework. Thus, several training gaps are discovered. Concerning the way of preparing the course (or refining it after the first edition), a set of good practices is proposed based on students’ performance and commitment in a cybersecurity MOOC with +2,000 initially active students. To foster further research in this area, an open-source framework is released to enable the analysis of students’ performance in EdX MOOCs.
Author de Fuentes, Jose M.
González-Manzano, Lorena
Author_xml – sequence: 1
  givenname: Lorena
  orcidid: 0000-0002-3490-621X
  surname: González-Manzano
  fullname: González-Manzano, Lorena
  email: lgmanzan@inf.uc3m.es
– sequence: 2
  givenname: Jose M.
  orcidid: 0000-0002-4023-3197
  surname: de Fuentes
  fullname: de Fuentes, Jose M.
BookMark eNp9kE9LAzEQxYNUsK1-AU8LnnedZJPNLniR-hcKXvQcYjKRLG1Sk63Qb29KPXsaZua9mR9vQWYhBiTkmkJDgXa3Y2NixoYB7RsYGoDhjMxpL1ndMehnZF5EsubA-wuyyHkEoLLr-zmRD5j9V6gSmrjdYrB68jHkysVUxbDxAStz-MSU0eyTnw6VifvS5Ety7vQm49VfXZKPp8f31Uu9fnt-Xd2va8MZTHUrDFrLjNUM3WAoaMpFNwzOFUQmaZnxsm-dcB1jhptetLplljsJ0mpol-TmdHeX4vce86TGAhDKS8WoGJiQAnhRsZPKpJhzQqd2yW91OigK6hiQGtUxIHUMSMGgyvdiujuZsPD_eEwqG4-hAPuSxqRs9P_ZfwGXDHDg
CitedBy_id crossref_primary_10_1007_s10796_022_10332_y
crossref_primary_10_1007_s00779_021_01561_0
crossref_primary_10_3390_app13095700
crossref_primary_10_1007_s10207_023_00704_z
crossref_primary_10_1007_s10922_024_09816_w
crossref_primary_10_3390_educsci12010004
crossref_primary_10_1080_08874417_2023_2221200
crossref_primary_10_1108_ICS_01_2021_0013
crossref_primary_10_3390_educsci9030182
crossref_primary_10_1016_j_cose_2020_101875
Cites_doi 10.1037/0022-0663.98.1.198
10.1109/MSP.2016.119
10.1111/j.1467-8535.2006.00626.x
10.1109/MSP.2012.23
10.1016/j.cose.2018.01.015
10.1073/pnas.1314788111
10.1109/MSP.2012.73
10.1016/j.cose.2006.10.005
10.17485/ijst/2015/v8i7/67760
ContentType Journal Article
Copyright 2018 Elsevier Ltd
Copyright Elsevier Sequoia S.A. Jan 2019
Copyright_xml – notice: 2018 Elsevier Ltd
– notice: Copyright Elsevier Sequoia S.A. Jan 2019
DBID AAYXX
CITATION
7SC
8FD
JQ2
K7.
L7M
L~C
L~D
DOI 10.1016/j.cose.2018.09.009
DatabaseName CrossRef
Computer and Information Systems Abstracts
Technology Research Database
ProQuest Computer Science Collection
ProQuest Criminal Justice (Alumni)
Advanced Technologies Database with Aerospace
Computer and Information Systems Abstracts – Academic
Computer and Information Systems Abstracts Professional
DatabaseTitle CrossRef
ProQuest Criminal Justice (Alumni)
Technology Research Database
Computer and Information Systems Abstracts – Academic
ProQuest Computer Science Collection
Computer and Information Systems Abstracts
Advanced Technologies Database with Aerospace
Computer and Information Systems Abstracts Professional
DatabaseTitleList ProQuest Criminal Justice (Alumni)

DeliveryMethod fulltext_linktorsrc
Discipline Computer Science
EISSN 1872-6208
EndPage 256
ExternalDocumentID 10_1016_j_cose_2018_09_009
S0167404818302050
GroupedDBID --K
--M
-~X
.DC
.~1
0R~
1B1
1RT
1~.
1~5
29F
4.4
457
4G.
5GY
5VS
7-5
71M
8P~
9JN
AACTN
AAEDT
AAEDW
AAIAV
AAIKJ
AAKOC
AALRI
AAOAW
AAQFI
AAQXK
AAXUO
AAYFN
ABBOA
ABFSI
ABMAC
ABXDB
ABYKQ
ACDAQ
ACGFO
ACGFS
ACNNM
ACRLP
ACZNC
ADBBV
ADEZE
ADHUB
ADJOM
ADMUD
AEBSH
AEKER
AENEX
AFFNX
AFKWA
AFTJW
AGHFR
AGUBO
AGYEJ
AHHHB
AHZHX
AIALX
AIEXJ
AIKHN
AITUG
AJBFU
AJOXV
ALMA_UNASSIGNED_HOLDINGS
AMFUW
AMRAJ
AOUOD
ASPBG
AVWKF
AXJTR
AZFZN
BKOJK
BKOMP
BLXMC
CS3
DU5
E.L
EBS
EFJIC
EFLBG
EJD
EO8
EO9
EP2
EP3
FDB
FEDTE
FGOYB
FIRID
FNPLU
FYGXN
G-2
G-Q
GBLVA
GBOLZ
HLX
HLZ
HVGLF
HZ~
IHE
J1W
KOM
LG8
LG9
M41
MO0
MS~
N9A
O-L
O9-
OAUVE
OZT
P-8
P-9
P2P
PC.
PQQKQ
Q38
R2-
RIG
RNS
ROL
RPZ
RXW
SBC
SBM
SDF
SDG
SDP
SES
SEW
SPC
SPCBC
SSV
SSZ
T5K
TAE
TN5
TWZ
WH7
WUQ
XJE
XPP
XSW
YK3
ZMT
~G-
AAXKI
AAYXX
AFJKZ
AKRWK
CITATION
7SC
8FD
JQ2
K7.
L7M
L~C
L~D
ID FETCH-LOGICAL-c420t-35cedd2cda2ef9c10a145699ff009271f9c4dd23f5f622c4c853a32d4f707da03
ISSN 0167-4048
IngestDate Thu Oct 10 19:43:19 EDT 2024
Thu Sep 26 16:23:31 EDT 2024
Fri Feb 23 02:33:37 EST 2024
IsDoiOpenAccess false
IsOpenAccess true
IsPeerReviewed true
IsScholarly true
Keywords Media in cybersecurity education
Cybersecurity teaching/learning strategies
NICE framework
Cybersecurity distance education and telelearning
Cybersecurity course guidance
Language English
LinkModel OpenURL
MergedId FETCHMERGED-LOGICAL-c420t-35cedd2cda2ef9c10a145699ff009271f9c4dd23f5f622c4c853a32d4f707da03
ORCID 0000-0002-4023-3197
0000-0002-3490-621X
OpenAccessLink https://e-archivo.uc3m.es/bitstream/10016/29946/2/design_gonzalez_CS_2019_ps.pdf
PQID 2159257504
PQPubID 46289
PageCount 19
ParticipantIDs proquest_journals_2159257504
crossref_primary_10_1016_j_cose_2018_09_009
elsevier_sciencedirect_doi_10_1016_j_cose_2018_09_009
PublicationCentury 2000
PublicationDate January 2019
2019-01-00
20190101
PublicationDateYYYYMMDD 2019-01-01
PublicationDate_xml – month: 01
  year: 2019
  text: January 2019
PublicationDecade 2010
PublicationPlace Amsterdam
PublicationPlace_xml – name: Amsterdam
PublicationTitle Computers & security
PublicationYear 2019
Publisher Elsevier Ltd
Elsevier Sequoia S.A
Publisher_xml – name: Elsevier Ltd
– name: Elsevier Sequoia S.A
References O. for Economic Co-operation, D. (OECD). Skills beyond school. synthesis report.
2017c.
2014a.
N/Ag.
R. Institute. Cybersecurity fundamentals.
U. S. of Georgia. Cybersecurity and its ten domains.
Cybrary. Comptia network+.
N/Ac.
U. of Adelaide. Cyberwar, surveillance and security.
Sullivan F. 2017 global information security workforce study; 2017.
U. Maryland. Cryptography.
Irvine UC. Networking and security in ios applications.
2017.
Mirkovic, Benzel (bib0035) 2012; 10
2014b.
of Washington U.. Introduction to cybersecurity.
U. Maryland. Hardware security.
2017d.
Vasserman, Bell, Sayre (bib0051) 2015
Cabaj, Domingos, Kotulski, Respício (bib0006) 2018
G. Tech. Cyber-physical systems security.
N/Af.
N/Ab.
U. of Virginia. Applied cryptography.
Cybrary. Comptia casp.
U. Maryland. Software security.
G. Tech. Network security.
U. Maryland. Usable security.
2018.
Cybrary. Ethical hacking and penetration testing. N/Ae.
MIT. Computer systems security.
EDUCATION, RESEARCH, BOARD (bib0020) 2016
C. I. U. of Madrid. Cyber security basics: a hands-on approach.
Paulsen, McDuffie, Newhouse, Toth (bib0039) 2012; 10
2011.
Cybrary. Python for security professionals.
O. for Economic Co-operation, D. (OECD). At what age do university students earn their first degree?
T. O. University. Introduction to cybersecurity.
N/A.
U. of Washington. Building a cybersecurity toolkit.
N/Aa.
Academy K. Intro to cryptography.
Pusey, Gondree, Peterson (bib0040) 2016; 14
U. of Delft. Cybersecurity economics.
Cybrary. Advanced penetration testing.
U. of London. Information security: context and introduction.
Beuran R, Chinen KI, Tan Y, Shinoda Y. Towards effective cybersecurity education and training; 2016.
MIT. Network and computer security.
Wang (bib0053) 2007; 38
2017a.
Salah (bib0042) 2014
R. Institute. Network security.
Patriciu, Furtuna (bib0038) 2009
N. I. of Standards, T. (NIST), National initiative for cybersecurity education (nice). cybersecurity workforce framework.
S. University. Cryptography i.
Bashir M, Lambert A, Wee JMC, Guo B. An examination of the vocational and psychological characteristics of cybersecurity competition participants. 2015 USENIX Summit on Gaming, Games, and Gamification in Security Education (3GSE 15); 2015.
G. Tech. Intro to information security.
N/Ad.
Cybrary. Certified information systems security professional.
U. of Colorado. Homeland security and cybersecurity.
Ferrer Mico, M.T. (2016). Community of Inquiry (COI) and Self-Directed Learning (SDL) in Online Environments: An Exploratory, Correlational and Critical Analysis of MOOCs. Introduction to Cybersecurity MOOC Case Study (Doctoral dissertation, Universitat Ramon Llull); 2016.
Boopathi, Sreejith, Bithin (bib0005) 2015; 8
Trickel, Disperati, Gustafson, Kalantari, Mabey, Tiwari, Safaei, Doupé, Vigna (bib0048) 2017
Duckworth, Seligman (bib0017) 2006; 98
Reuben, Sapienza, Zingales (bib0041) 2014; 111
U. of Washington. Cybersecurity - the cisos view.
U. of London. Malicious software and its underground economy: Two sides to every story.
Cybrary. Secure coding.
G. Tech. Computer networking.
2017b.
U. of Michigan. Internet history, technology, and security.
Cone, Irvine, Thompson, Nguyen (bib0008) 2007; 26
Duckworth (10.1016/j.cose.2018.09.009_bib0017) 2006; 98
Trickel (10.1016/j.cose.2018.09.009_bib0048) 2017
10.1016/j.cose.2018.09.009_bib0031
10.1016/j.cose.2018.09.009_bib0030
10.1016/j.cose.2018.09.009_bib0034
10.1016/j.cose.2018.09.009_bib0033
10.1016/j.cose.2018.09.009_bib0032
Patriciu (10.1016/j.cose.2018.09.009_bib0038) 2009
10.1016/j.cose.2018.09.009_bib0037
10.1016/j.cose.2018.09.009_bib0036
10.1016/j.cose.2018.09.009_bib0009
EDUCATION (10.1016/j.cose.2018.09.009_bib0020) 2016
Pusey (10.1016/j.cose.2018.09.009_bib0040) 2016; 14
10.1016/j.cose.2018.09.009_bib0007
Boopathi (10.1016/j.cose.2018.09.009_bib0005) 2015; 8
Salah (10.1016/j.cose.2018.09.009_bib0042) 2014
10.1016/j.cose.2018.09.009_bib0002
10.1016/j.cose.2018.09.009_bib0046
10.1016/j.cose.2018.09.009_bib0001
10.1016/j.cose.2018.09.009_bib0045
10.1016/j.cose.2018.09.009_bib0044
10.1016/j.cose.2018.09.009_bib0043
Cone (10.1016/j.cose.2018.09.009_bib0008) 2007; 26
10.1016/j.cose.2018.09.009_bib0049
10.1016/j.cose.2018.09.009_bib0004
10.1016/j.cose.2018.09.009_bib0003
10.1016/j.cose.2018.09.009_bib0047
10.1016/j.cose.2018.09.009_bib0019
10.1016/j.cose.2018.09.009_bib0018
Mirkovic (10.1016/j.cose.2018.09.009_bib0035) 2012; 10
Vasserman (10.1016/j.cose.2018.09.009_bib0051) 2015
10.1016/j.cose.2018.09.009_bib0052
10.1016/j.cose.2018.09.009_bib0050
10.1016/j.cose.2018.09.009_bib0013
10.1016/j.cose.2018.09.009_bib0012
10.1016/j.cose.2018.09.009_bib0056
10.1016/j.cose.2018.09.009_bib0011
10.1016/j.cose.2018.09.009_bib0055
10.1016/j.cose.2018.09.009_bib0010
10.1016/j.cose.2018.09.009_bib0054
10.1016/j.cose.2018.09.009_bib0016
10.1016/j.cose.2018.09.009_bib0015
10.1016/j.cose.2018.09.009_bib0014
10.1016/j.cose.2018.09.009_bib0029
Paulsen (10.1016/j.cose.2018.09.009_bib0039) 2012; 10
Cabaj (10.1016/j.cose.2018.09.009_bib0006) 2018
Reuben (10.1016/j.cose.2018.09.009_bib0041) 2014; 111
Wang (10.1016/j.cose.2018.09.009_bib0053) 2007; 38
10.1016/j.cose.2018.09.009_bib0024
10.1016/j.cose.2018.09.009_bib0023
10.1016/j.cose.2018.09.009_bib0022
10.1016/j.cose.2018.09.009_bib0021
10.1016/j.cose.2018.09.009_bib0028
10.1016/j.cose.2018.09.009_bib0027
10.1016/j.cose.2018.09.009_bib0026
10.1016/j.cose.2018.09.009_bib0025
References_xml – volume: 38
  start-page: 294
  year: 2007
  end-page: 311
  ident: bib0053
  article-title: Designing online courses that effectively engage learners from diverse cultural backgrounds
  publication-title: Br J Educ Technol
  contributor:
    fullname: Wang
– year: 2018
  ident: bib0006
  article-title: Cybersecurity education: evolution of the discipline and analysis of master programs
  publication-title: Computers & Security
  contributor:
    fullname: Respício
– volume: 10
  start-page: 73
  year: 2012
  end-page: 76
  ident: bib0035
  article-title: Teaching cybersecurity with deterlab
  publication-title: IEEE Secur Priv
  contributor:
    fullname: Benzel
– volume: 98
  start-page: 198
  year: 2006
  ident: bib0017
  article-title: Self-discipline gives girls the edge: Gender in self-discipline, grades, and achievement test scores
  publication-title: Journal of educational psychology
  contributor:
    fullname: Seligman
– volume: 14
  start-page: 90
  year: 2016
  end-page: 95
  ident: bib0040
  article-title: The outcomes of cybersecurity competitions and implications for underrepresented populations
  publication-title: IEEE Secur Priv
  contributor:
    fullname: Peterson
– start-page: 172
  year: 2009
  end-page: 177
  ident: bib0038
  article-title: Guide for designing cyber security exercises
  publication-title: Proceedings of the 8th WSEAS international conference on E-activities and information security and privacy
  contributor:
    fullname: Furtuna
– volume: 111
  start-page: 4403
  year: 2014
  end-page: 4408
  ident: bib0041
  article-title: How stereotypes impair womens careers in science
  publication-title: Proc Natl Acad Sci
  contributor:
    fullname: Zingales
– volume: 26
  start-page: 63
  year: 2007
  end-page: 72
  ident: bib0008
  article-title: A video game for cyber security training and awareness
  publication-title: Comput Secur
  contributor:
    fullname: Nguyen
– year: 2015
  ident: bib0051
  article-title: Developing and piloting a quantitative assessment tool for cybersecurity courses
  contributor:
    fullname: Sayre
– volume: 8
  start-page: 642
  year: 2015
  end-page: 649
  ident: bib0005
  article-title: Learning cyber security through gamification
  publication-title: Indian Journal of Science and Technology
  contributor:
    fullname: Bithin
– start-page: 529
  year: 2014
  end-page: 534
  ident: bib0042
  article-title: Harnessing the cloud for teaching cybersecurity
  publication-title: Proceedings of the 45th ACM technical symposium on computer science education
  contributor:
    fullname: Salah
– year: 2017
  ident: bib0048
  article-title: Shell we play a game? ctf-as-a-service for security education
  publication-title: Proceedings of the 2017 {USENIX} workshop on advances in security education ({ASE} 17)
  contributor:
    fullname: Vigna
– volume: 10
  start-page: 76
  year: 2012
  end-page: 79
  ident: bib0039
  article-title: Nice: Creating a cybersecurity workforce and aware public
  publication-title: IEEE Secur Priv
  contributor:
    fullname: Toth
– year: 2016
  ident: bib0020
  article-title: Massive open online courses (moocs): Trends and future perspectives
  publication-title: EDU/CERI/CD/RD;
  contributor:
    fullname: BOARD
– ident: 10.1016/j.cose.2018.09.009_bib0026
– year: 2017
  ident: 10.1016/j.cose.2018.09.009_bib0048
  article-title: Shell we play a game? ctf-as-a-service for security education
  contributor:
    fullname: Trickel
– ident: 10.1016/j.cose.2018.09.009_bib0022
– ident: 10.1016/j.cose.2018.09.009_bib0003
– ident: 10.1016/j.cose.2018.09.009_bib0016
– ident: 10.1016/j.cose.2018.09.009_bib0055
– volume: 98
  start-page: 198
  issue: 1
  year: 2006
  ident: 10.1016/j.cose.2018.09.009_bib0017
  article-title: Self-discipline gives girls the edge: Gender in self-discipline, grades, and achievement test scores
  publication-title: Journal of educational psychology
  doi: 10.1037/0022-0663.98.1.198
  contributor:
    fullname: Duckworth
– ident: 10.1016/j.cose.2018.09.009_bib0036
– ident: 10.1016/j.cose.2018.09.009_bib0032
– ident: 10.1016/j.cose.2018.09.009_bib0013
– ident: 10.1016/j.cose.2018.09.009_bib0029
– ident: 10.1016/j.cose.2018.09.009_bib0023
– ident: 10.1016/j.cose.2018.09.009_bib0050
– ident: 10.1016/j.cose.2018.09.009_bib0002
– volume: 14
  start-page: 90
  issue: 6
  year: 2016
  ident: 10.1016/j.cose.2018.09.009_bib0040
  article-title: The outcomes of cybersecurity competitions and implications for underrepresented populations
  publication-title: IEEE Secur Priv
  doi: 10.1109/MSP.2016.119
  contributor:
    fullname: Pusey
– ident: 10.1016/j.cose.2018.09.009_bib0054
– volume: 38
  start-page: 294
  issue: 2
  year: 2007
  ident: 10.1016/j.cose.2018.09.009_bib0053
  article-title: Designing online courses that effectively engage learners from diverse cultural backgrounds
  publication-title: Br J Educ Technol
  doi: 10.1111/j.1467-8535.2006.00626.x
  contributor:
    fullname: Wang
– ident: 10.1016/j.cose.2018.09.009_bib0019
– start-page: 529
  year: 2014
  ident: 10.1016/j.cose.2018.09.009_bib0042
  article-title: Harnessing the cloud for teaching cybersecurity
  contributor:
    fullname: Salah
– volume: 10
  start-page: 73
  issue: 1
  year: 2012
  ident: 10.1016/j.cose.2018.09.009_bib0035
  article-title: Teaching cybersecurity with deterlab
  publication-title: IEEE Secur Priv
  doi: 10.1109/MSP.2012.23
  contributor:
    fullname: Mirkovic
– ident: 10.1016/j.cose.2018.09.009_bib0009
– ident: 10.1016/j.cose.2018.09.009_bib0037
– year: 2015
  ident: 10.1016/j.cose.2018.09.009_bib0051
  contributor:
    fullname: Vasserman
– ident: 10.1016/j.cose.2018.09.009_bib0033
– year: 2018
  ident: 10.1016/j.cose.2018.09.009_bib0006
  article-title: Cybersecurity education: evolution of the discipline and analysis of master programs
  publication-title: Computers & Security
  doi: 10.1016/j.cose.2018.01.015
  contributor:
    fullname: Cabaj
– ident: 10.1016/j.cose.2018.09.009_bib0012
– start-page: 172
  year: 2009
  ident: 10.1016/j.cose.2018.09.009_bib0038
  article-title: Guide for designing cyber security exercises
  contributor:
    fullname: Patriciu
– year: 2016
  ident: 10.1016/j.cose.2018.09.009_bib0020
  article-title: Massive open online courses (moocs): Trends and future perspectives
  publication-title: EDU/CERI/CD/RD;
  contributor:
    fullname: EDUCATION
– ident: 10.1016/j.cose.2018.09.009_bib0043
– ident: 10.1016/j.cose.2018.09.009_bib0024
– ident: 10.1016/j.cose.2018.09.009_bib0047
– ident: 10.1016/j.cose.2018.09.009_bib0001
– ident: 10.1016/j.cose.2018.09.009_bib0030
– ident: 10.1016/j.cose.2018.09.009_bib0018
– ident: 10.1016/j.cose.2018.09.009_bib0034
– ident: 10.1016/j.cose.2018.09.009_bib0015
– ident: 10.1016/j.cose.2018.09.009_bib0011
– ident: 10.1016/j.cose.2018.09.009_bib0027
– ident: 10.1016/j.cose.2018.09.009_bib0044
– ident: 10.1016/j.cose.2018.09.009_bib0025
– volume: 111
  start-page: 4403
  issue: 12
  year: 2014
  ident: 10.1016/j.cose.2018.09.009_bib0041
  article-title: How stereotypes impair womens careers in science
  publication-title: Proc Natl Acad Sci
  doi: 10.1073/pnas.1314788111
  contributor:
    fullname: Reuben
– ident: 10.1016/j.cose.2018.09.009_bib0046
– ident: 10.1016/j.cose.2018.09.009_bib0021
– volume: 10
  start-page: 76
  issue: 3
  year: 2012
  ident: 10.1016/j.cose.2018.09.009_bib0039
  article-title: Nice: Creating a cybersecurity workforce and aware public
  publication-title: IEEE Secur Priv
  doi: 10.1109/MSP.2012.73
  contributor:
    fullname: Paulsen
– ident: 10.1016/j.cose.2018.09.009_bib0004
– ident: 10.1016/j.cose.2018.09.009_bib0031
– volume: 26
  start-page: 63
  issue: 1
  year: 2007
  ident: 10.1016/j.cose.2018.09.009_bib0008
  article-title: A video game for cyber security training and awareness
  publication-title: Comput Secur
  doi: 10.1016/j.cose.2006.10.005
  contributor:
    fullname: Cone
– volume: 8
  start-page: 642
  issue: 7
  year: 2015
  ident: 10.1016/j.cose.2018.09.009_bib0005
  article-title: Learning cyber security through gamification
  publication-title: Indian Journal of Science and Technology
  doi: 10.17485/ijst/2015/v8i7/67760
  contributor:
    fullname: Boopathi
– ident: 10.1016/j.cose.2018.09.009_bib0052
– ident: 10.1016/j.cose.2018.09.009_bib0056
– ident: 10.1016/j.cose.2018.09.009_bib0014
– ident: 10.1016/j.cose.2018.09.009_bib0007
– ident: 10.1016/j.cose.2018.09.009_bib0010
– ident: 10.1016/j.cose.2018.09.009_bib0028
– ident: 10.1016/j.cose.2018.09.009_bib0045
– ident: 10.1016/j.cose.2018.09.009_bib0049
SSID ssj0017688
Score 2.3945277
Snippet Nowadays, a significant amount of free online cybersecurity training courses are offered. When preparing further courses, the designer has to decide what to...
SourceID proquest
crossref
elsevier
SourceType Aggregation Database
Publisher
StartPage 238
SubjectTerms CAI
Computer assisted instruction
Cybersecurity
Cybersecurity course guidance
Cybersecurity distance education and telelearning
Cybersecurity teaching/learning strategies
Design
Distance learning
Media in cybersecurity education
NICE framework
Online instruction
Studies
Technology education
Training
Title Design recommendations for online cybersecurity courses
URI https://dx.doi.org/10.1016/j.cose.2018.09.009
https://www.proquest.com/docview/2159257504
Volume 80
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://sdu.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV1LT9wwELYWuPRSSh_irRx6i7JybGcdHxEsAgRcoBI3y_hxQCWLWPZQfn3Hr-yyVVGpxCWKnJc0Mxl_Hs98g9B3qmzjRtRv_TNRMW5NBXeKyjSNpko3hIWF4skVv7xpj8ZsPBjkdkDzsXfVNIyBrn3l7Bu03b8UBuAcdA5H0Doc_0nvRyElo_QL3ft7m1omBdKFMrJilPrXLWC-1Leu1JOQxrEIUnOnh2mwi3xnn6kz6Z7D9nr90z5XF4AtVWjfXZ5PHm3Xe3ljy-OZJ_zsNxrKi-FijMGXNb2IMfTFL_NMoxCL9JTpOBJlDm30ny0n1YjgdtHBxlZN2UPSdmGyJZFV_A8_HkMKd0OftO_z79pARovFfNbqcwmvQiGFp73xVGbYx2_WCHgdcHprB6fjm7N-UwlWVm1P9Q4PpBqqmO63_KW_4ZSlGTvAkOtP6GNaPxQHUfEbaGC7z2g9a6xIrvoL4tEOiiU7KMAOimgHxQs7KJIdfEU_jsfXhydVapJRaUbwU0UbbY0h2ihindA1VjVgYiGc83RavIYxBtepg1-SEM004DNFiWGOY24Upt_Qajfp7CYqBDcaM-oc04o5rJStR_iWc9UypTTRW6jMIpEPkQtF5iTBO-kFKL0AJRYSvr2Fmiw1mdBcRGkSlPzqc7tZxDL9V1MJwFTA5NJgtv2fr91BH-aWvYtWnx5ndg-tTM1sP9nJb5yZdkA
link.rule.ids 315,782,786,27933,27934
linkProvider Elsevier
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Design+recommendations+for+online+cybersecurity+courses&rft.jtitle=Computers+%26+security&rft.au=Gonz%C3%A1lez-Manzano%2C+Lorena&rft.au=de+Fuentes%2C+Jose+M.&rft.date=2019-01-01&rft.pub=Elsevier+Ltd&rft.issn=0167-4048&rft.eissn=1872-6208&rft.volume=80&rft.spage=238&rft.epage=256&rft_id=info:doi/10.1016%2Fj.cose.2018.09.009&rft.externalDocID=S0167404818302050
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=0167-4048&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=0167-4048&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=0167-4048&client=summon