An Analysis of Australian Cybersecurity Postgraduate Degrees
Authors: Michael James, Michael Bewong, Yeslam Al-Saggaf, Jason Howarth
Abstract:
The shortage of cybersecurity professionals is a widely recognised and documented issue. However, the role of higher education institutions in addressing this challenge is less understood. While universities are key contributors to workforce development, a notable gap in the literature is the lack of emphasis on soft skills, essential for effective collaboration on complex problems. This study used a qualitative document analysis approach, examining current and past postgraduate cybersecurity program curricula from Australian university handbooks. Postgraduate education plays a vital role in professional development, offering pathways to advanced capabilities and specialised knowledge. Our analysis reviewed 41 programs across 27 Australian universities, with the findings consolidated into a map of commonly offered courses and core technical and soft skills contained within them. Our findings show that most programs lack opportunities for industry-based projects, a critical component for easing students' transition into the workforce. Additionally, some programs do not offer elective courses, limiting students' ability to address specific skill gaps in their learning. These shortcomings highlight the need for curricula that better integrate industry engagement and provide more flexible learning pathways.
Keywords: Australia, cybersecurity, cybersecurity qualifications, postgraduate.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 17References:
[1] Hentea, M., H.S. Dhillon, and M. Dhillon, Towards Changes in Information Security Education. Journal of Information Technology Education, 2006. 5.
[2] Ramezanian, S. and V. Niemi, Cybersecurity Education in Universities: A Comprehensive Guide to Curriculum Development. IEEE access, 2024. 12: p. 61741-61766.
[3] Meineke, M., The cybersecurity industry has an urgent talent shortage. Here’s how to plug the gap, in Emerging Technologies, W.E. Forum, Editor. 2024.
[4] Crabb, J., C. Hundhausen, and A. Gebremedhin. A Critical Review of Cybersecurity Education in the United States. 2024.
[5] Uni_Melb. Academic Centre of Cyber Security Excellence (ACCSE). 2024; Available from: https://cis.unimelb.edu.au/cyber-security-excellence.
[6] McGettrick, A., Toward curricular guidelines for cybersecurity: report of a workshop on cybersecurity education and training. Association of Computing Machines, 2013.
[7] Porter, K., The benefits of postgraduate study, in Impact. n.d., Australian Catholic University.
[8] Bridgestock, L. The Benefits of Studying a Postgraduate Degree. Top Universities 2022; Available from: https://www.topuniversities.com/student-info/careers-advice/benefits-studying-postgraduate-degree.
[9] Jones, K.S., A.S. Namin, and M.E. Armstrong, The Core Cyber-Defense Knowledge, Skills, and Abilities That Cybersecurity Students Should Learn in School: Results from Interviews with Cybersecurity Professionals. ACM Transactions Computer Education, 2018. 18 (3).
[10] AlDaajeh, S., et al., The role of national cybersecurity strategies on the improvement of cybersecurity education. Computers & security, 2022. 119.
[11] Cabaj, K., et al., Cybersecurity education: Evolution of the discipline and analysis of master programs. Computers and Security, 2018. 75: p. 24-35.
[12] La Fleur, C., et al., Team performance in a series of regional and national US cybersecurity defense competitions: Generalizable effects of training and functional role specialization. Computers & security, 2021. 104: p. 102229.
[13] Shadbolt, N., Shadbolt Review of Computer Sciences Degree Accreditation and Graduate Employability, I.a.S. Department for Business, Editor. 2016, UK Government: Great Britain.
[14] McQuaid, P., et al., University and Government Unite to Address Homeland Cybersecurity Issues. Software Quality Professional, 2019. 12: p. 26-32.
[15] Johnson, C., University of South Wales national cyber security academy – creating cyber graduates who can ‘hit the ground running’: an innovative project based approach. Higher Education Pedagogies, 2019. 4:1: p. 300-303.
[16] SFIA. About SFIA. 2023; Available from: https://sfia-online.org/en/about-sfia.
[17] Consultia. Standardizing on SFIA: How Countries Are Defining Digital Skills for the Future. 2024 11 May 2024.
[18] APSC, Skills Framework for the Information Age, A.P.S. Commission, Editor. 2021, Australian Government: Canberra, Australia.
[19] ACS. ACS accreditation of higher education. 2024; Available from: https://www.acs.org.au/cpd-education/acs-accreditation-program.html.
[20] Deakin, Master of Cyber Security: 2023 Deakin University Handbook. 2023, Deakin University.
[21] Case, A. and G.G. Richard, Memory forensics: The path forward. Digital investigation, 2017. 20: p. 23-33.
[22] EduRank. Best Universities for Cyber Security in the World. 2024 29 February 2024; Available from: https://edurank.org/cs/cybersecurity/.
[23] THE. World University Rankings 2024 by Subject: Computer Science. 2024.
[24] Uni_Melb. Find a Course - Cyber Security. 2024.
[25] Movchan, L. and I. Zarishniak, The Role of Elective Courses in Students′ Professional Development: Foreign Experience. Comparative Professional Pedagogy, 2017. 7.
[26] Sandeen, C., High-Impact Educational Practices: What We Can Learn from the Traditional Undergraduate Setting. Continuing Higher Education Review, 2012. 76: p. 81-89.
[27] Hossamel-deen, Y.H. and M.A. Sadek. University — Industry networking for training, research, and employment- HTI experience. in 9th France-Japan & 7th Europe-Asia Congress on Mechatronics (MECATRONICS) / 13th Int'l Workshop on Research and Education in Mechatronics (REM). 2012. Paris, France.
[28] Sohime, F.H., et al. Exploration Study of Skillsets Needed in Cyber Security Field. in 8th International Conference on Information Technology and Multimedia. 2020. IEEE.
[29] Ho, L., S. Rebiel, and D. White, University of California: New Report - A Comparative Study of Interdisciplinary Cybersecurity Education, in Targeted News Service. 2023: Washington, D.C.
[30] Bernard, L., et al. Minimizing Cognitive Overload in Cybersecurity Learning Materials: An Experimental Study Using Eye-Tracking. Cham: Springer International Publishing.
[31] Frezza, S., et al. Modelling competencies for computing education beyond 2020: a research based approach to defining competencies in the computing disciplines. New York, NY, USA: ACM.
[32] Årnes, A., Digital forensics. 2018, Hoboken, NJ: John Wiley & Sons Inc.
[33] Dept_Education, Academic Centres of Cyber Security Excellence Program Guidelines, E.a. Training, Editor. 2017, Federal Government: Canberra Australia. p. 12.
[34] SFIA, SFIA version 8: All skills A-Z. 2023, The SFIA Foundation: London UK.
[35] Patel, N., 17 Reasons Why Your Website Should Have a Clean and Simple Design, in NP Digital. n.d.