NATIONAL CENTERS OF ACADEMIC EXCELLENCE IN CYBERSECURITY
Orientation to Program of Study Requirements
National Centers of Academic Excellence in Cybersecurity
Step One: Academic Validation
Step Two: Institution Designation
Add another PoS
OR
PoS only,
re-validate every 5 years
National Centers of Academic Excellence in Cybersecurity
KU Development Process & Timeline
Virtual/Email/Google docs (PMO)
In Person (Towson/MITRE)
NCAE-C Designated Schools & Government Partners
Academic & Technical Experts from Academia & Gov
NCAE-C Designation Requirements
NICE Cybersecurity Workforce Framework & Defense Cyber Workforce Framework
Academic Outcomes ALIGNED to KU Learning Outcomes
Associates
Bachelors
Masters
Doctoral
3 Cybersecurity Foundational KUs
Cybersecurity Foundations, Cybersecurity Principles, and IT Systems Components
5 Technical Core KUs
Basic Scripting and Programming; Basic Networking; Network Defense; Basic Cryptography;
Operating Systems Concepts
3
Optional
KUs
14
Optional KUs
7
Optional KUs +Thesis
3 Optional KUs + Dissertation
Center of Academic Excellence in Cyber Defense
Bachelors
Masters
Doctoral
10 Cybersecurity Foundational KUs
Cyber Policy, Law and Ethics; Cyberspace Foundations; Operating Systems; Computer Networks; Systems Programming; Cybersecurity Foundations; Applied Cryptography; Software Security and Analysis; Defensive Cyber Operations; Offensive Cyber Operations
4 Optional KUs
Center of Academic Excellence in Cyber Operations
NCAE-C Research designation does not have KU requirements
Bachelors/Masters
Associates
Academic Core and/or Foundational KUs
Cybersecurity Fundamentals, IT Systems Components, Basic Scripting, Math, AI Governance, Laws, and Ethics, AI Fundamentals, ML Fundamentals
Core and Optional KUs
AI Security
Core and Optional KUs
AI for Cybersecurity
ALIGNED to Outcomes
Artificial Intelligence in Cybersecurity Work Role Definitions
Questions/Discussion
Questions for April 15 Workshop at Louisville:
440 Unique Designated Institutions
41 Validated Programs of Study* (PoS)
153 Cyber Defense (Associates)
248 Cyber Defense (BA-PhD)
80 Research
20 Cyber Operations (BA-PhD)
*These schools hold Validation only, have not yet received designation
As of 17 Jan 2024
OR
2
KY- 2
�
AZ - 9
NM - 3
TX - 27
OK - 4
KS - 6
CO - 16
NE - 4
UT - 4
SD - 2
MN - 8
IA - 3
MO - 10
AR - 3
LA- 5
WY
MT - 3
ND - 4
WI - 8
NV - 3
MS
4
AL - 14
GA - 13
FL –
24
IL 15
SC - 7
NC - 24
TN - 8
OH 17
VA - 26
KY - 6
WV
4
WA - 10
OR - 5
CA - 21
IN
8
PA - 22
MI - 18
NY
22
VT - 2
ID - 5
ME
3
NH - 3
MA - 9
RI - 5
CT - 6
NJ – 11
DE - 2
MD – 21
HI - 6
PR - 4
DC - 4
AK
CAE National Resource Centers
CAE Community National Center (CCNC)
California State University San Bernardino
CAE Candidates and Review National Center (CRNC)
Whatcom Community College
Careers Preparation National Center (CPNC)
Norwich University
Education Pathways National Center (EPNC)
Moraine Valley Community College
NCAE-C Designated Institutions Distribution Nationwide
440 Unique Designated Institutions
41 Validated Programs of Study* (PoS)
153 Cyber Defense (Associates)
248 Cyber Defense (BA-PhD)
80 Research
20 Cyber Operations (BA-PhD)
*These schools hold Validation only, have not yet received designation
As of 17 Jan 2024
CAE National Resource Centers
CAE Community National Center (CCNC)
California State University San Bernardino
CAE Candidates and Review National Center (CRNC)
Whatcom Community College
Careers Preparation National Center (CPNC)
Norwich University
Education Pathways National Center (EPNC)
Moraine Valley Community College
NCAE-C Designated Institutions Distribution Nationwide
Most of the 41 Validated-only programs will become designated; this is just the first step
Collectively, schools hold 501 discreet designations; many hold multiple designations
Course 1
Course 2
Course 3
Course 4
Course 5
Course 6
Course 7
Course 8
Course 9
Course 10
Program of Study
Cybersecurity Foundations
Cybersecurity Foundational KU
Cybersecurity Principles
Cybersecurity Foundational KU
IT Systems Components
Cybersecurity Foundational KU
Cyber Threats
Non-Technical Core KU
Policy, Legal, Ethics & Compliance
Non-Technical Core KU
Security Program Management
Non-Technical Core KU
Security Risk Analysis
Non-Technical Core KU
CS Planning & Management
Non-Technical Core KU
Required for each validated PoS
Course outcomes align with Knowledge Unit outcomes
Optional KUs
Optional KUs
Optional KUs
Optional KUs
Optional KUs
Optional KUs
Optional KUs
Optional KUs
Optional KUs
Optional KUs
Optional KUs
Optional KUs
Optional KUs
Candidate’s choice (depends on degree)
Optional KUs
Consolidated KU Outcomes
PoS Outcomes
NCWF/DCWF
Work Roles
Knowledge & Tasks
Learning Outcomes
Align
Align
NCAE-CD/CO KUs - Work Roles & Competencies
All-Source Analyst
Target Network Analyst
Cyber Policy and Strategy Planner
Information Sys Security Manager
Security Control Assessor
Systems Requirements Planner
Documented Competencies
Evidence of ability to perform a task in the context of a work role
Student can use online tools to identify jobs
Knowledge and tasks matching PoS
Knowledge and tasks matching PoS
Knolwedge and tasks matching PoS
NCAE-C Knowledge Units
Knowledge Unit Template
Title
The intent of this KU is to provide students …..
KU Learning Outcomes
Students will be able to:
1.
2.
3.
Topics
1.
2.
3.
Notes/Prerequisites
Special instructions or explanations
KU student outcomes outline the core attributes of PoS graduates
No fixed requirements for the number of core hours or semester weeks needed to cover content; defined by learning outcomes
Topics are deliberately broad to allow schools to apply discretion and expertise to make unique programs
A KU may be covered by one or more courses
PoS must include hands-on activities such as configuring/deploying tools, writing/executing programs and scripts, conducting tasks associated with associated work roles
KUs may require prerequisites not included in the PoS (math, computer science, data structure and management, etc)
NCAE-C Knowledge Units, CAE-CD
Foundational CD Knowledge Units
Cybersecurity Foundations
Cybersecurity Principles
IT Systems Components
Core Technical CD Knowledge Units
Basic Cryptography
Basic Networking
Basic Scripting and Programming
Network Defense
Operating Systems Concepts
Core Non-Tech CD Knowledge Units
Cyber Threats
Cybersecurity Planning & Management
Policy, Legal, Ethics and Compliance
Security Program Management
Security Risk Analysis
Optional CD Knowledge Units
Advanced Algorithms
Advanced Cryptography
Advanced Network Tech & Protocols
Algorithms
Analog Telecommunications
Basic Cyber Operations
Cloud Computing
Cyber Crime
Cybersecurity Ethics
Data Administration
Data Structures
Database Management Systems
Databases
Device forensics
Digital Communications
Digital Forensics
Embedded Systems
Forensic Accounting
Formal Methods
Fraud Prevention & Management
Hardware Reverse Engineering
Host Forensics
IA Architectures
IA Coompliance
IA Standards
Independent Directed Study/Research
Industrial Control Systems
Introduction to Theory of Computation
Intrusion Detection/Prevention Systems
Life-Cycle Security
Low Level programming
Media Forensics
Mobile Technologies
Network Forensics
Network Security Administration
Network Technology and Protocols
Operating Systems Administration
+18