D 2023

Enhancing Cybersecurity Education in Europe: The REWIRE's Course Selection Methodology

BRIONES DELGADO, Alan, Sara RICCI, Argyro CHATZOPOULOU, Jakub ČEGAN, Petr DZURENDA et. al.

Základní údaje

Originální název

Enhancing Cybersecurity Education in Europe: The REWIRE's Course Selection Methodology

Autoři

BRIONES DELGADO, Alan, Sara RICCI, Argyro CHATZOPOULOU, Jakub ČEGAN (203 Česká republika, domácí), Petr DZURENDA a Ioannis KOUTOUDIS

Vydání

Benevento, Italy, 18TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY & SECURITY, ARES 2023, od s. 1-15, 15 s. 2023

Nakladatel

ACM

Další údaje

Jazyk

angličtina

Typ výsledku

Stať ve sborníku

Obor

10201 Computer sciences, information science, bioinformatics

Stát vydavatele

Spojené státy

Utajení

není předmětem státního či obchodního tajemství

Forma vydání

elektronická verze "online"

Kód RIV

RIV/00216224:14330/23:00133942

Organizační jednotka

Fakulta informatiky

ISBN

979-8-4007-0772-8

UT WoS

001122662500064

Klíčová slova anglicky

Cybersecurity; Education; Training Program; Methodology; Cyber Ranges

Příznaky

Mezinárodní význam, Recenzováno
Změněno: 8. 4. 2024 06:58, RNDr. Pavel Šmerk, Ph.D.

Anotace

V originále

The European Cybersecurity Skills Framework (ECSF) was intro-duced by the European Union Agency for Cybersecurity (ENISA) to identify the necessary competencies, knowledge, and skills required for European cybersecurity professionals. The ECSF condenses all cybersecurity-related positions into 12 role profiles, aiming to es-tablish a mutual understanding of essential roles and support the creation of cybersecurity training programs. In order to address the shortage of cybersecurity experts, a multi-criteria selection method is developed to increase the availability, accessibility, and quality of cybersecurity courses and certifications. This Course Selection methodology ensures high-quality training materials that meet the current and future needs of the cybersecurity industry and benefit a wide range of participants. The methodology considers six criteria and provides a scoring system to rank the occupational profiles and select the most relevant profiles for the course design. Our final score formula identifies Chief Information Security Offcer (CISO), Cyber Incident Responder, Cyber Threat Intelligence Specialist, and Penetration Tester for the Course creation.