How Can a Cybersecurity Student Become a Cybersecurity Professional and Succeed in a Cybersecurity Career?

2022 ◽  
pp. 74-92
Author(s):  
Sandra Blanke ◽  
Paul Christian Nielsen ◽  
Brian Wrozek

The need for cybersecurity professionals extends across government and private industries. Estimates place the shortage of cybersecurity professionals at 1.8 million by 2022. This chapter provides aspiring cybersecurity students a clear understanding of the various educational pathways they can choose to achieve their goals. The authors describe educational categories and include an assessment of each that students will want to consider based on their own situation. The authors discuss how the study of cybersecurity can be accomplished from a computer science, engineering, and business perspective. Students with STEM skills can accomplish their goals in numerous cybersecurity roles including cyber engineer, architect, and other technical roles. Finally, students with cyber business interest can accomplish their goals with a focus on strategy, compliance, awareness, and others. Organizations need employees with all these skills. This chapter concludes with the recommendation for continual learning, the value of networking, and the encouragement for students to start creating a cyber career.

Author(s):  
Sandra Blanke ◽  
Paul Christian Nielsen ◽  
Brian Wrozek

The need for cybersecurity professionals extends across government and private industries. Estimates place the shortage of cybersecurity professionals at 1.8 million by 2022. This chapter provides aspiring cybersecurity students a clear understanding of the various educational pathways they can choose to achieve their goals. The authors describe educational categories and include an assessment of each that students will want to consider based on their own situation. The authors discuss how the study of cybersecurity can be accomplished from a computer science, engineering, and business perspective. Students with STEM skills can accomplish their goals in numerous cybersecurity roles including cyber engineer, architect, and other technical roles. Finally, students with cyber business interest can accomplish their goals with a focus on strategy, compliance, awareness, and others. Organizations need employees with all these skills. This chapter concludes with the recommendation for continual learning, the value of networking, and the encouragement for students to start creating a cyber career.


1987 ◽  
Vol 1 (1) ◽  
pp. 56-58
Author(s):  
Kenneth E. Haughton ◽  
Cary Y. Yang

The principal prerequisite for being a modern professional in any field is the acceptance and conscious execution of a life long process of continual learning. In particular, in a rapidly changing technological society, the working engineer must be abreast of current developments in his or her field. While this awareness can be achieved through occasional seminars and keeping up with trade and technical journals, it is best accomplished by attending courses and/or enrolling in a degree programme offered by a local university. Although the return from such an arrangement is largely a function of the individual's effort, on the whole every participant (engineer, employer and university) benefits from it. The curriculum offered by the university must be dynamic and flexible and must be administered by a faculty with a clear understanding of current industrial needs. The ‘Early Bird’ programme at Santa Clara University is given as an example. With the current critical need to upgrade manufacturing technologies, the role of quality continuing education for our engineers and managers becomes increasingly important.


2021 ◽  
Vol 1916 (1) ◽  
pp. 012238

This article has been retracted by IOP Publishing following an allegation that this article contains text overlap from multiple unreferenced sources [1, 2]. IOP Publishing has investigated and agrees the article constitutes plagiarism. IOP Publishing also expresses concern regarding a number of nonsensical phrases used in the article, which suggests the article may have been created at least partly by artificial intelligence or translation software. IOP Publishing wishes to credit the PubPeer commenters for bringing the issue to our attention. The authors disagree to this retraction. 1. G. A. Tahir and C. K. Loo, "An Open-Ended Continual Learning for Food Recognition Using Class Incremental Extreme Learning Machines," in IEEE Access, vol. 8, pp. 82328-82346, 2020, doi: 10.1109/ACCESS.2020.2991810. 2. Wang H., Min W., Li X., Jiang S. (2016) Where and What to Eat: Simultaneous Restaurant and Dish Recognition from Food Image. In: Chen E., Gong Y., Tie Y. (eds) Advances in Multimedia Information Processing - PCM 2016. PCM 2016. Lecture Notes in Computer Science, vol 9916. Springer, Cham. https://doi.org/10.1007/978-3-319-48890-5_51. Retraction published: 10 January 2022


2020 ◽  
Vol 32 (2) ◽  
Author(s):  
Pakiso Joseph Khomokhoana ◽  
Liezel Nel

Many novice programmers fail to comprehend source code and its related concepts in the same way that their instructors do. As emphasised in the Decoding the Disciplines (DtDs) framework, each discipline (including Computer Science) has its own unique set of mental operations. However, instructors often take certain important mental operations for granted and do not explain these 'hidden' steps explicitly when modelling problem solutions. A clear understanding of the underlying cognitive processes and related support strategies employed by experts during source code comprehension (SCC) could ultimately be utilised to help novice programmers to better execute the cognitive processes necessary to efficiently comprehend source code. Positioned within Step 2 of the DtDs framework, this study employed decoding interviews and observations, followed by narrative data analysis, to identify the underlying cognitive processes and related support (though often 'hidden') strategies utilised by a select group of experienced programming instructors during an SCC task. The insights gained were then used to formulate a set of important cognitive-related support strategies for efficient SCC. Programming instructors are encouraged to continuously emphasise strategies like these when modelling their expert ways of thinking regarding efficient SCC more explicitly to their novice students.


Author(s):  
P.L. Moore ◽  
P.L. Sannes ◽  
H.L. Bank ◽  
S.S. Spicer

It is thought that calcium and/or magnesium may play important roles in polymorphonuclear (PMN) leukocyte functions such as chemotaxis, adhesion and phagocytosis. Yet, a clear understanding of the biological roles of these ions has awaited the development of techniques which permit a selective alteration of intracellular ion concentrations. Recently, treatment of cells with the ionophore A23187 has been used to alter intracellular divalent cation concentrations. This ionophore is a lipid soluble antibiotic produced by Streptomyces chartreusensis that complexes with both calcium and magnesium (3) and is believed to carry these ions across biological membranes (4). Biochemical investigations of human PMN leukocytes demonstrate that cells treated with A23187 and extracellular calcium release their lysosomal enzymes into the extracellular medium without rupturing and releasing their soluble cytoplasmic enzymes (5,6). The aim of the present study and and a companion report (7) was to investigate the structural changes that occur in leukocytes during ionophore-induced lysosomal enzyme release.


1997 ◽  
Vol 42 (11) ◽  
pp. 1007-1008
Author(s):  
Rodney L. Lowman

2008 ◽  
Author(s):  
Donald D. Davis ◽  
Shannon K. Meert ◽  
Debra A. Major ◽  
Janis V. Sanchez-Hucles ◽  
Sandra J. Deloatch
Keyword(s):  

Sign in / Sign up

Export Citation Format

Share Document