TY - GEN
T1 - Enhancing Cybersecurity Education in Europe
T2 - 18th International Conference on Availability, Reliability and Security, ARES 2023
AU - Briones Delgado, Alan
AU - Ricci, Sara
AU - Chatzopoulou, Argyro
AU - Cegan, Jakub
AU - Dzurenda, Petr
AU - Koutoudis, Ioannis
N1 - Publisher Copyright:
© 2023 Owner/Author.
PY - 2023/8/29
Y1 - 2023/8/29
N2 - The European Cybersecurity Skills Framework (ECSF) was introduced by the European Union Agency for Cybersecurity (ENISA) to identify the necessary competencies, knowledge, and skills required for European cybersecurity professionals. The ECSF condenses all cybersecurity-related positions into 12 role profiles, aiming to establish a mutual understanding of essential roles and support the creation of cybersecurity training programs. In order to address the shortage of cybersecurity experts, a multi-criteria selection method is developed to increase the availability, accessibility, and quality of cybersecurity courses and certifications. This Course Selection methodology ensures high-quality training materials that meet the current and future needs of the cybersecurity industry and benefit a wide range of participants. The methodology considers six criteria and provides a scoring system to rank the occupational profiles and select the most relevant profiles for the course design. Our final score formula identifies Chief Information Security Officer (CISO), Cyber Incident Responder, Cyber Threat Intelligence Specialist, and Penetration Tester for the Course creation.
AB - The European Cybersecurity Skills Framework (ECSF) was introduced by the European Union Agency for Cybersecurity (ENISA) to identify the necessary competencies, knowledge, and skills required for European cybersecurity professionals. The ECSF condenses all cybersecurity-related positions into 12 role profiles, aiming to establish a mutual understanding of essential roles and support the creation of cybersecurity training programs. In order to address the shortage of cybersecurity experts, a multi-criteria selection method is developed to increase the availability, accessibility, and quality of cybersecurity courses and certifications. This Course Selection methodology ensures high-quality training materials that meet the current and future needs of the cybersecurity industry and benefit a wide range of participants. The methodology considers six criteria and provides a scoring system to rank the occupational profiles and select the most relevant profiles for the course design. Our final score formula identifies Chief Information Security Officer (CISO), Cyber Incident Responder, Cyber Threat Intelligence Specialist, and Penetration Tester for the Course creation.
KW - Cyber Ranges
KW - Cybersecurity
KW - Education
KW - Methodology
KW - Training Program
UR - http://www.scopus.com/inward/record.url?scp=85169696177&partnerID=8YFLogxK
U2 - 10.1145/3600160.3605091
DO - 10.1145/3600160.3605091
M3 - Conference contribution
AN - SCOPUS:85169696177
T3 - ACM International Conference Proceeding Series
BT - ARES 2023 - 18th International Conference on Availability, Reliability and Security, Proceedings
PB - Association for Computing Machinery
Y2 - 29 August 2023 through 1 September 2023
ER -