Cyber Science Learning Outcomes Cyber Education Project Learning Outcomes Committee LAKEFRONT SHERATON HOTEL COLUMBIA, MARYLAND 4-5 NOVEMBER 2014 CO-CHAIRS DAVID S. “HOOT” GIBSON, US AIR FORCE ACADEMY ELIZABETH “BETH” HAWTHORNE, UNION COUNTY COLLEGE, ACM EDUCATION BOARD Learning Outcomes Committee Charter www.cybereducationproject.org The primary objective of this effort is to provide the cyber education community with useful guidance on developing undergraduate cyber science curricula. The Committee will build upon previous works to define related bodies of knowledge and seek diverse perspectives to build an interdisciplinary set of learning outcomes which broadly define cyber science education a the undergraduate level. The outcomes developed will also be used to guide the development of criteria for cyber science program accreditation. The Committee will develop learning outcomes which characterize the knowledge, skills, and abilities gained by students in an undergraduate cyber science program. Ultimately the work of the Committee should lead to a cyber science curricular guidance report formally endorsed by a professional society such as the Association for Computing Machinery (ACM). Other Cyber Curriculum Development Work NSA/DHS Center for Academic Excellence (CAE) in Information Assurance/Cyber Defense (IA/CD) Knowledge Units (2014) - www.cisse.info/pdf/2014/2014%20CAE%20Knowledge%20Units.pdf NICE National Cybersecurity Workforce Framework version 2 (2014) - niccs.us-cert.gov/research/draft-nationalcybersecurity-workforce-framework-version-20 Department of Labor Cybersecurity Industry Model (2014) - www.careeronestop.org/competencymodel/competencymodels/cybersecurity.aspx Military Academy CYBER Education Working Group, Draft Body of Knowledge and Draft Outcomes, unpublished, 2014. Other Cyber Curriculum Development Work cont’d ACM ITiCSE Working Group Papers (2009-2011) An Exploration of the Current State of Information Assurance Education (2009) - dl.acm.org/citation.cfm?id=1709457 Towards Information Assurance (IA) Curricular Guidelines (2010) - dl.acm.org/citation.cfm?id=1971686 Information Assurance Education in Two- and Four-Year Institutions (2011) - dl.acm.org/citation.cfm?id=2078860 ACM/IEEE-CS Curriculum Guidelines for Undergraduate Degree Programs in Computer Science: IAS KA (2013, p. 99) – cs2013.org ACM Toward Curricular Guidelines for Cybersecurity: Report of a Workshop on Cybersecurity Education and Training (2013) – www.acm.org/education/TowardCurricularGuidelinesCybersec.pdf Other Cyber Curriculum Development Work cont’d CERT Software Assurance Curricula All Volumes www.cert.org/curricula/software-assurance-curriculum.cfm CERT Software Assurance Curriculum Project Volume II: Undergraduate Course Outlines (2010) resources.sei.cmu.edu/library/asset-view.cfm?assetID=9543 CERT Software Assurance Curriculum Project Volume IV: Community College Education (2011) resources.sei.cmu.edu/library/asset-view.cfm?assetID=10009 Other Cyber Curriculum Development Work cont’d U.S. Department of Energy Essential Body of Knowledge (EBK): A Competency and Functional Framework For Cyber Security Workforce Development (2010) energy.gov/sites/prod/files/cioprod/documents/DOE_EBK_June_201 0_Revision_clean_v01public.pdf DHS IT Security Essential Body of Knowledge (EBK): A Competency and Functional Framework for IT Security Workforce Development (2007) www.amcleod.com/mcleod9.pdf (ISC)2 Common Body of Knowledge - www.isc2.org/cbk/ Why the Learning Outcomes Approach? Focus is on student achievement rather than on existing disciplines and courses (minimizes turf wars concerning who is in and who is out) Supports inclusive approach (it is easier to add many outcomes than many whole courses of study) Supports development of new courses in a new and evolving discipline Avoids traditional body of knowledge focus on topics and contact hours that can grow unbounded as new technologies emerge What topics are eliminated to make room for the new? Why the Learning Outcomes Approach? LOs: statements describe what students will be able to do as a result of learning LOs: students understand expectations and faculty can focus on student achievement LOs: specific measurement of student achievement having a specific minimum acceptable standard to pass (a threshold level) Why the Learning Outcomes Approach? LOs are Active action verbs describe what students should be able to do LOs can be Aligned aligned with the rest of the curriculum; so LOs contribute to achievement of course outcomes, which in turn contribute to program outcomes LOs are Achievable written at the threshold level for a pass, not aspirational LOs can be Assessed possible to assess several learning outcomes with one assignment and can also be assessed informally, based on classroom tasks or discussions Example Learning Outcomes Bloom’s Revised Taxonomy – acmccecc.org/BloomsTaxonomy/ CS2013 – Information Assurance and Security Knowledge Area (IAS KA) Foundational Concepts in Security Knowledge Unit LOs Analyze the tradeoffs of balancing key security properties (Confidentiality, Integrity, and Availability) Describe the concepts of risk, threats, vulnerabilities and attack vectors (including the fact that there is no such thing as perfect security). Example Learning Outcomes cont’d CS2013 IAS KA cont’d Defensive Programming KU LOs Explain why input validation and data sanitization is necessary in the face of adversarial control of the input channel. Demonstrate using a high-level programming language how to prevent a race condition from occurring and how to handle an exception. Network Security KU LOs Describe the architecture for public and private key cryptography and how public key infrastructure (PKI) supports network security. Describe virtues and limitations of security technologies at each layer of the network stack. Example Learning Outcomes cont’d CS2013 IAS KA cont’d Security Policy and Governance KU LOs Describe how privacy protection policies run in conflict with security mechanisms Identify the risks and benefits of outsourcing to the cloud Digital Forensics KU LOs Describe the legal requirements for use of seized data. Conduct data collection on a hard drive. Activity What should students learn in cyber science? What common categories have emerged? The following slides show the technical and nontechnical categories of answers placed on sticky notes. “Technical Sticky Clumps” In no particular order Attack Math Cryptography Mobile Data Analysis Networks Database Operating Systems Defense Programming Ethical Hacking Reverse Engineering Forensics Secure Software Hardware Telecom ICS/SCADA “Non-Technical Sticky Clumps” In no particular order Basic Principles Education Ethics Human Factors Lifecycle Organizations Policy, Governance and Law Privacy & Confidentiality Recovery Risk Management Strategy Additional topics from follow-up meeting Threat landscape Psychological Intelligence Embedded systems operations Business continuity, recovery Risk management Governance (triad with policy and law) International standards, policy, and law Resilience Economics Systems design System safety Supply chain Artificial intelligence Linguistics History Follow-on Questions How should cyber science outcomes differ from computer science outcomes? What is the best technical and non-technical mix? Who are the subject matter experts? What other questions should we ask? Do you currently have a program in “cyber” or are you considering developing one? What makes your cyber program different from other computing-based programs? Learning Outcomes Development Timeline Early Dec 2014 – on-line organizational meeting Define roles of committee members and topic area leads Establish learning outcome format and repository Establish dates and locations for future meetings Jan-Feb 2015 – on-line meetings Discuss development of cyber science learning outcomes March 2014 – Face-to-face meeting (2 days) Draft cyber science learning outcomes document June 2015 – Present work at CEP Workshop Fall 2015 – Broad review and comment on outcomes Spring 2016 – Publish learning outcomes report Getting Involved in Outcome Development Sign-up at: www.cybereducationproject.org Or contact Committee Co-chairs Beth or Hoot: Beth Hawthorne: hawthorne@ucc.edu David “Hoot” Gibson: david.gibson@usafa.edu