Detailed Information on Publication Record
2023
Enhancing Cybersecurity Education in Europe: The REWIRE's Course Selection Methodology
BRIONES DELGADO, Alan, Sara RICCI, Argyro CHATZOPOULOU, Jakub ČEGAN, Petr DZURENDA et. al.Basic information
Original name
Enhancing Cybersecurity Education in Europe: The REWIRE's Course Selection Methodology
Authors
BRIONES DELGADO, Alan, Sara RICCI, Argyro CHATZOPOULOU, Jakub ČEGAN (203 Czech Republic, belonging to the institution), Petr DZURENDA and Ioannis KOUTOUDIS
Edition
Benevento, Italy, 18TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY & SECURITY, ARES 2023, p. 1-15, 15 pp. 2023
Publisher
ACM
Other information
Language
English
Type of outcome
Stať ve sborníku
Field of Study
10201 Computer sciences, information science, bioinformatics
Country of publisher
United States of America
Confidentiality degree
není předmětem státního či obchodního tajemství
Publication form
electronic version available online
RIV identification code
RIV/00216224:14330/23:00133942
Organization unit
Faculty of Informatics
ISBN
979-8-4007-0772-8
UT WoS
001122662500064
Keywords in English
Cybersecurity; Education; Training Program; Methodology; Cyber Ranges
Tags
International impact, Reviewed
Změněno: 8/4/2024 06:58, RNDr. Pavel Šmerk, Ph.D.
Abstract
V originále
The European Cybersecurity Skills Framework (ECSF) was intro-duced by the European Union Agency for Cybersecurity (ENISA) to identify the necessary competencies, knowledge, and skills required for European cybersecurity professionals. The ECSF condenses all cybersecurity-related positions into 12 role profiles, aiming to es-tablish a mutual understanding of essential roles and support the creation of cybersecurity training programs. In order to address the shortage of cybersecurity experts, a multi-criteria selection method is developed to increase the availability, accessibility, and quality of cybersecurity courses and certifications. This Course Selection methodology ensures high-quality training materials that meet the current and future needs of the cybersecurity industry and benefit a wide range of participants. The methodology considers six criteria and provides a scoring system to rank the occupational profiles and select the most relevant profiles for the course design. Our final score formula identifies Chief Information Security Offcer (CISO), Cyber Incident Responder, Cyber Threat Intelligence Specialist, and Penetration Tester for the Course creation.