Research Proposal

Cybersecurity Bootcamps for Career Changing Professionals

If you want to read the PDF, try requesting it from the authors.

Abstract

This paper highlights the growth of Bootcamps as an educational alternative to acquiring technical skills. There is little quantitative data on students' learning process pursuing cybersecurity education, which questions the competency level developed during training. The known data does not provide sufficient knowledge of how effective boot camps address the skills gap.

No full-text available

Request Full-text Paper PDF

To read the full-text of this research,
you can request a copy directly from the author.

ResearchGate has not been able to resolve any citations for this publication.
Article
Full-text available
In this paper we argue for a human-in-the-loop approach to the study of situation awareness in computer defence analysis (CDA). The cognitive phenomenon of situation awareness (SA) has received significant attention in cybersecurity/CDA research. Yet little of this work has attended to the cognitive aspects of situation awareness in the CDA context; instead, the human operator has been treated as an abstraction within the larger human-technology system. A more human-centric approach that seeks to understand the socio-cognitive work of human operators as they perform CDA will yield greater insights into the design of tools and interfaces for CDA. As support for this argument, we present our own work employing the Living Lab Framework through which we ground our experimental findings in contextual knowledge of real-world practice.
Book
This textbook is for courses in cyber security education that follow National Initiative for Cybersecurity Education (NICE) KSAs work roles and framework, that adopt the Competency-Based Education (CBE) method. The book follows the CBT (KSA) general framework, meaning each chapter contains three sections, knowledge and questions, and skills/labs for Skills and Abilities. The author makes an explicit balance between knowledge and skills material in information security, giving readers immediate applicable skills. The book is divided into seven parts: Securely Provision; Operate and Maintain; Oversee and Govern; Protect and Defend; Analysis; Operate and Collect; Investigate. All classroom materials (in the book an ancillary) adhere to the NICE framework. • Mirrors classes set up by the National Initiative for Cybersecurity Education (NICE) • Adopts the Competency-Based Education (CBE) method of teaching, used by universities, corporations, and in government training • Includes content and ancillaries that provide skill-based instruction on compliance laws, information security standards, risk response and recovery, and more
Article
Purpose – The purpose of this paper is to investigate the relationship between the strategic positioning of firms and the sustainability of firm performance. The paper argues that pursuing a differentiation strategy leads to more sustainable financial performance compared to following a cost leadership strategy. However, a differentiation strategy may also be associated with greater risk. Design/methodology/approach – To investigate the research questions, the authors utilize publicly available archival data consisting of 12,849 firm-year observations for the period 1989-2003. In the first stage of the analysis, factor analysis is used to determine firms’ strategic positioning. The resulting factor scores are subsequently used in regression analysis to investigate the sustainability of performance based on the strategic positioning of firms. Findings – The results indicate that both cost leadership and differentiation strategies have a positive impact on contemporaneous performance. However, the differentiation strategy allows a firm to sustain its current performance in the future to a greater extent than a cost leadership strategy. The differentiation strategy, though, is also associated with greater systematic risk and more unstable performance. Originality/value – Sustainability of performance refers to how much a firm's current profitability can be sustained in future periods. The main contribution of this study is the comparison of generic strategies based on the sustainability of firm performance. This aspect of the strategy-performance link has not been considered in prior work. Another contribution of the study is that it considers multiple dimensions of firm performance in order to evaluate the trade-offs involved with pursuing different strategies. In particular, the authors contribute to the literature by documenting that while differentiation leads to more sustainable earnings, it also leads to riskier and more unstable earnings.
Instructional strategies for developing problem-solving skills: The worked-example effect using ill-structured visual pattern recognition problems (Order No. 3378407)
  • J V Anastasiade
Anastasiade, J. V. (2009). Instructional strategies for developing problem-solving skills: The worked-example effect using ill-structured visual pattern recognition problems (Order No. 3378407). Available from ProQuest Dissertations & Theses Global. (305164381). Retrieved from https://franklin.captechu.edu:2074/docview/305164381?accountid=44888
The problem with bootcamps: Research uncovers transparency issues. The EvoLLLution
  • C Arbeit
  • E F Cataldi
Arbeit, C. & Cataldi, E. F. (2019, June 18). The problem with bootcamps: Research uncovers transparency issues. The EvoLLLution. Retrieved from https://evolllution.com/revenuestreams/market_opportunities/the-problem-with-bootcamps-research-uncoverstransparency-issues/
Alternative and independent: The universe of technology-related "bootcamps
  • C Arbeit
  • A Bentz
  • E Forrest Cataldi
  • H Sanders
Arbeit, C., Bentz, A., Forrest Cataldi, E., & Sanders, H. (2019). Alternative and independent: The universe of technology-related "bootcamps" (Report No. RR-0033-1902) Retrieved from https://doi.org/10.3768/rtipress.2019.rr.0033.1902
Coding bootcamp vs traditional education
  • L Eggleston
Eggleston, L. (Producer). (2018, September 6). Coding bootcamp vs traditional education [Audio podcast]. Retrieved from https://www.coursereport.com/blog/coding-bootcamps-vstraditional-education
Scientific practices for student-centered inquiry: The impact of a focus on student proficiency in data analysis and scientific argumentation on inquiry-based practices in a first-grade classroom (Order No. 10838772)
  • W Grant
Grant, W. (2018). Scientific practices for student-centered inquiry: The impact of a focus on student proficiency in data analysis and scientific argumentation on inquiry-based practices in a first-grade classroom (Order No. 10838772). Available from ProQuest Dissertations & Theses Global. (2128214715). Retrieved from https://franklin.captechu.edu:2074/docview/2128214715?accountid=44888
Towards a holistic interdisciplinary education in cybersecurity (Master's thesis)
  • J Jacob
Jacob, J. (2018). Towards a holistic interdisciplinary education in cybersecurity (Master's thesis). Retrieved from ProQuest Dissertations & Theses Global. (Order No. 13856131)
RACI Charts for Process and Procedure Management
  • R Keenan
Keenan, R. (2015). RACI Charts for Process and Procedure Management. The International Journal of Metrology, 22(3), pp. 24-32. Retrieved from https://www.callabmag.com/wpcontent/uploads/2015/09/jul15_web.pdf#page=26
A Unified Framework for Knowledge-Lean and Knowledge-Rich Planning
  • P Langley
  • S Court
  • D Choi
Langley, P., Court, S., & Choi, D. (2015). A Unified Framework for Knowledge-Lean and Knowledge-Rich Planning. Proceedings of the Third Annual Conference on Advances in Cognitive Systems. Retrieved from http://www.cogsys.org/papers/ACS2015/article20.pdf
CODING BOOTCAMP -What is it, is it worth it?
  • Matt Upham
Matt Upham. (2019, August 1). CODING BOOTCAMP -What is it, is it worth it? [Video].
Why business model matters
  • J Margretta
Margretta, J. (2002). Why business model matters. Received from https://hbr.org/2002/05/whybusiness-models-matter
Presidential Executive Order on Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure
  • The White House
The White House. (2017, May 11). Presidential Executive Order on Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure. Retrieved from https://www.whitehouse.gov/presidential-actions/presidential-executive-orderstrengthening-cybersecurity-federal-networks-critical-infrastructure/
Executive Order on Modernizing and Reforming the Assessment and Hiring of Federal Job Candidates
  • The White House
The White House. (2020, June 26). Executive Order on Modernizing and Reforming the Assessment and Hiring of Federal Job Candidates. Retrieved from https://www.whitehouse.gov/presidential-actions/executive-order-modernizingreforming-assessment-hiring-federal-job-candidates/