Association for information systems


KSA Acquisition Strategies



Download 2,51 Mb.
Pdf ko'rish
bet69/85
Sana21.01.2022
Hajmi2,51 Mb.
#397811
1   ...   65   66   67   68   69   70   71   72   ...   85
Bog'liq
csec2017

5.4.4 KSA Acquisition Strategies 
Colleges and universities often have programs and courses housed across multiple 
university academic units. In addition, some relevant content may be accessible through 
activities that are external to the formal course structure. As a result, it can be challenging 
for students (and their faculty advisors) to identify the most effective knowledge 
acquisition strategies. The roadmaps will assist in this navigational effort. 
Taken together, the roadmap elements provide a comprehensive planning document for 
both students and faculty members by: 

 
Identifying the content and depth of knowledge of cybersecurity principles 
needed for the optimal development of the specific OV work roles.
 


Cybersecurity 2017
 
 
Version 1.0 Report
 
CSEC2017
 
 
31 December 2017
 
85 
 

 
Delineating knowledge and skills-based learning, both brick-and-mortar 
(traditional classroom) and online from various resources within and outside 
of George Washington University, with the goal of providing a range of 
choices that meet the individual needs of the student and the expectation that 
knowledge acquisition strategies may continue on a largely part-time basis 
within and outside of a formal degree program.
 

 
Identifying opportunities for students to engage in cohort experiences within 
and across programs that aid in the development of a multidisciplinary 
understanding and application of cybersecurity principles. 
 

 
Utilizing the multidisciplinary resources and educators across the university, 
which is home to several undergraduate and graduate programs focusing on 
cybersecurity, legal and policy practice relating to cybersecurity, and 
leadership/executive training relating to cybersecurity. 
 

 
Identifying special experiential learning opportunities – beyond a typical 
classroom experience – that will be included in the roadmaps; including 
simulations and/or tabletop exercises and special guest speakers (available 
both online and in the physical classroom). These will include opportunities to 
learn together with technical specialty areas with the objective of improving 
communication between OV and various technical skills language – i.e., 
becoming conversant in a different cybersecurity language and lexicon so 
Download 2,51 Mb.

Do'stlaringiz bilan baham:
1   ...   65   66   67   68   69   70   71   72   ...   85




Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©hozir.org 2024
ma'muriyatiga murojaat qiling

kiriting | ro'yxatdan o'tish
    Bosh sahifa
юртда тантана
Боғда битган
Бугун юртда
Эшитганлар жилманглар
Эшитмадим деманглар
битган бодомлар
Yangiariq tumani
qitish marakazi
Raqamli texnologiyalar
ilishida muhokamadan
tasdiqqa tavsiya
tavsiya etilgan
iqtisodiyot kafedrasi
steiermarkischen landesregierung
asarlaringizni yuboring
o'zingizning asarlaringizni
Iltimos faqat
faqat o'zingizning
steierm rkischen
landesregierung fachabteilung
rkischen landesregierung
hamshira loyihasi
loyihasi mavsum
faolyatining oqibatlari
asosiy adabiyotlar
fakulteti ahborot
ahborot havfsizligi
havfsizligi kafedrasi
fanidan bo’yicha
fakulteti iqtisodiyot
boshqaruv fakulteti
chiqarishda boshqaruv
ishlab chiqarishda
iqtisodiyot fakultet
multiservis tarmoqlari
fanidan asosiy
Uzbek fanidan
mavzulari potok
asosidagi multiservis
'aliyyil a'ziym
billahil 'aliyyil
illaa billahil
quvvata illaa
falah' deganida
Kompyuter savodxonligi
bo’yicha mustaqil
'alal falah'
Hayya 'alal
'alas soloh
Hayya 'alas
mavsum boyicha


yuklab olish