1 of 11

NATIONAL CENTERS OF ACADEMIC EXCELLENCE IN CYBERSECURITY

Orientation to Program of Study Requirements

2 of 11

National Centers of Academic Excellence in Cybersecurity

  • Academic Program of Study: a defined series of elements that leads to the completion of a degree, a certificate or other defined set of outcomes by the institution.
  • Curriculum: Courses and education elements aligned to NCAE-C Knowledge Units & NCWF/DCWF
  • Students: enrollment & completion of PoS, examples of work, extracurricular activity
  • Faculty: Full and part-time, adjunct qualifications, research, publication, etc
  • Continuous Improvement: evaluation plan & process

Step One: Academic Validation

Step Two: Institution Designation

  • Must be a U.S. institution of higher education and hold current regional accreditation
  • Institutional Commitment: President’s letter
  • Cybersecurity Center: support to the institution
  • Sound cybersecurity posture and plan
  • Sustainability (resources, capacity for success)
  • Faculty professional development
  • Outreach to the community
  • Credit transfer/Articulation agreements

Add another PoS

OR

PoS only,

re-validate every 5 years

3 of 11

  • A Knowledge Area (KA) is a broad topic area that may have multiple KUs developed
  • A Knowledge Unit (KU) is a thematic grouping that encompass multiple related learning outcomes and learning topics.
  • A Knowledge Unit (KU) outcome is a specific assessment of a concept associated with a particular KU.
  • Course outcomes are the expectations that the academic institution is anticipating students will be able to demonstrate when completing a course in the context of the Program of Study (PoS).
  • KU Alignment: the process of documenting how the KUs and KU outcomes are aligned to the relevant courses in the PoS and/or associated work roles.

National Centers of Academic Excellence in Cybersecurity

4 of 11

KU Development Process & Timeline

  • Feb email to NCAE-C schools
  • Written input before Workshop 1
  • Virtual Workshop 1 after in-person Workshop 1
  • Distribute updates after each workshop, ask for input
  • Virtual workshop after Workshop 2
  • Virtual workshop after Workshop 3
  • Schools have input through July

  • March Workshop 1
  • Condense and refine
  • April Workshop 2: CAE Program focus
  • Condense and refine
  • June Workshop 3
  • Condense and refine
  • Produce final draft in June
  • Coordinate through July
  • Finalize & publish in August

Virtual/Email/Google docs (PMO)

In Person (Towson/MITRE)

NCAE-C Designated Schools & Government Partners

Academic & Technical Experts from Academia & Gov

5 of 11

NCAE-C Designation Requirements

NICE Cybersecurity Workforce Framework & Defense Cyber Workforce Framework

Academic Outcomes ALIGNED to KU Learning Outcomes

Associates

Bachelors

Masters

Doctoral

3 Cybersecurity Foundational KUs

Cybersecurity Foundations, Cybersecurity Principles, and IT Systems Components

5 Technical Core KUs

Basic Scripting and Programming; Basic Networking; Network Defense; Basic Cryptography;

Operating Systems Concepts

3

Optional

KUs

14

Optional KUs

7

Optional KUs +Thesis

3 Optional KUs + Dissertation

Center of Academic Excellence in Cyber Defense

Bachelors

Masters

Doctoral

10 Cybersecurity Foundational KUs

Cyber Policy, Law and Ethics; Cyberspace Foundations; Operating Systems; Computer Networks; Systems Programming; Cybersecurity Foundations; Applied Cryptography; Software Security and Analysis; Defensive Cyber Operations; Offensive Cyber Operations

4 Optional KUs

Center of Academic Excellence in Cyber Operations

NCAE-C Research designation does not have KU requirements

Bachelors/Masters

Associates

Academic Core and/or Foundational KUs

Cybersecurity Fundamentals, IT Systems Components, Basic Scripting, Math, AI Governance, Laws, and Ethics, AI Fundamentals, ML Fundamentals

Core and Optional KUs

AI Security

Core and Optional KUs

AI for Cybersecurity

ALIGNED to Outcomes

Artificial Intelligence in Cybersecurity Work Role Definitions

6 of 11

Questions/Discussion

Questions for April 15 Workshop at Louisville:

  • Use NCAE-C Cybersecurity Foundational and Core requirements for AI PoS? CD or CO? Do both count? Non-Technical Core?
  • CAE-R participation?
  • Do we need specific KUs for Security of AI and AI for Cybersecurity?
  • Foundational KUs for all AI in Cybersecurity with Core for each of those functions (Security of AI and AI for Cybersecurity) ?
  • How many optional KUs?
  • Degree requirements?

7 of 11

440 Unique Designated Institutions 

41 Validated Programs of Study* (PoS)

153 Cyber Defense (Associates)

248 Cyber Defense (BA-PhD)

80 Research

20 Cyber Operations (BA-PhD)

*These schools hold Validation only, have not yet received designation

As of 17 Jan 2024

OR

2

KY- 2

AZ - 9

NM - 3

TX - 27

OK - 4

KS - 6

CO - 16

NE - 4

UT - 4

SD - 2

MN - 8

IA - 3

MO - 10

AR - 3 

LA- 5

WY

MT - 3

ND - 4

WI - 8

NV - 3

MS 

  4

AL - 14

GA - 13

FL –

24

IL  15

SC - 7

NC - 24

TN - 8

OH 17

VA - 26

KY - 6

WV

4

WA - 10

OR - 5

CA - 21

IN

8

PA - 22

MI - 18

NY 

22

VT - 2

ID - 5

ME

3

NH - 3

MA - 9

RI - 5

CT - 6

NJ – 11

DE - 2

MD – 21

HI - 6

PR - 4

DC - 4 

AK

CAE National Resource Centers

CAE Community National Center (CCNC)

California State University San Bernardino

CAE Candidates and Review National Center (CRNC)

Whatcom Community College

Careers Preparation National Center (CPNC)

Norwich University

Education Pathways National Center (EPNC)

Moraine Valley Community College

NCAE-C Designated Institutions Distribution Nationwide

8 of 11

440 Unique Designated Institutions 

41 Validated Programs of Study* (PoS)

153 Cyber Defense (Associates)

248 Cyber Defense (BA-PhD)

80 Research

20 Cyber Operations (BA-PhD)

*These schools hold Validation only, have not yet received designation

As of 17 Jan 2024

CAE National Resource Centers

CAE Community National Center (CCNC)

California State University San Bernardino

CAE Candidates and Review National Center (CRNC)

Whatcom Community College

Careers Preparation National Center (CPNC)

Norwich University

Education Pathways National Center (EPNC)

Moraine Valley Community College

NCAE-C Designated Institutions Distribution Nationwide

Most of the 41 Validated-only programs will become designated; this is just the first step

Collectively, schools hold 501 discreet designations; many hold multiple designations

9 of 11

Course 1

Course 2

Course 3

Course 4

Course 5

Course 6

Course 7

Course 8

Course 9

Course 10

Program of Study

Cybersecurity Foundations

Cybersecurity Foundational KU

Cybersecurity Principles

Cybersecurity Foundational KU

IT Systems Components

Cybersecurity Foundational KU

Cyber Threats

Non-Technical Core KU

Policy, Legal, Ethics & Compliance

Non-Technical Core KU

Security Program Management

Non-Technical Core KU

Security Risk Analysis

Non-Technical Core KU

CS Planning & Management

Non-Technical Core KU

Required for each validated PoS

Course outcomes align with Knowledge Unit outcomes

Optional KUs

Optional KUs

Optional KUs

Optional KUs

Optional KUs

Optional KUs

Optional KUs

Optional KUs

Optional KUs

Optional KUs

Optional KUs

Optional KUs

Optional KUs

Candidate’s choice (depends on degree)

Optional KUs

Consolidated KU Outcomes

PoS Outcomes

NCWF/DCWF

Work Roles

Knowledge & Tasks

Learning Outcomes

Align

Align

NCAE-CD/CO KUs - Work Roles & Competencies

All-Source Analyst

Target Network Analyst

Cyber Policy and Strategy Planner

Information Sys Security Manager

Security Control Assessor

Systems Requirements Planner

Documented Competencies

Evidence of ability to perform a task in the context of a work role

Student can use online tools to identify jobs

Knowledge and tasks matching PoS

Knowledge and tasks matching PoS

Knolwedge and tasks matching PoS

10 of 11

NCAE-C Knowledge Units

Knowledge Unit Template

Title

The intent of this KU is to provide students …..

KU Learning Outcomes

Students will be able to:

1.

2.

3.

Topics

1.

2.

3.

Notes/Prerequisites

Special instructions or explanations

KU student outcomes outline the core attributes of PoS graduates

No fixed requirements for the number of core hours or semester weeks needed to cover content; defined by learning outcomes

Topics are deliberately broad to allow schools to apply discretion and expertise to make unique programs

A KU may be covered by one or more courses

PoS must include hands-on activities such as configuring/deploying tools, writing/executing programs and scripts, conducting tasks associated with associated work roles

KUs may require prerequisites not included in the PoS (math, computer science, data structure and management, etc)

11 of 11

NCAE-C Knowledge Units, CAE-CD

Foundational CD Knowledge Units

Cybersecurity Foundations

Cybersecurity Principles

IT Systems Components

Core Technical CD Knowledge Units

Basic Cryptography

Basic Networking

Basic Scripting and Programming

Network Defense

Operating Systems Concepts

Core Non-Tech CD Knowledge Units

Cyber Threats

Cybersecurity Planning & Management

Policy, Legal, Ethics and Compliance

Security Program Management

Security Risk Analysis

Optional CD Knowledge Units

Advanced Algorithms

Advanced Cryptography

Advanced Network Tech & Protocols

Algorithms

Analog Telecommunications

Basic Cyber Operations

Cloud Computing

Cyber Crime

Cybersecurity Ethics

Data Administration

Data Structures

Database Management Systems

Databases

Device forensics

Digital Communications

Digital Forensics

Embedded Systems

Forensic Accounting

Formal Methods

Fraud Prevention & Management

Hardware Reverse Engineering

Host Forensics

IA Architectures

IA Coompliance

IA Standards

Independent Directed Study/Research

Industrial Control Systems

Introduction to Theory of Computation

Intrusion Detection/Prevention Systems

Life-Cycle Security

Low Level programming

Media Forensics

Mobile Technologies

Network Forensics

Network Security Administration

Network Technology and Protocols

Operating Systems Administration

+18