{"id":10576,"date":"2015-10-12T13:00:41","date_gmt":"2015-10-12T20:00:41","guid":{"rendered":"https:\/\/www.paloaltonetworks.com\/blog\/?p=10576"},"modified":"2016-12-09T11:11:13","modified_gmt":"2016-12-09T19:11:13","slug":"a-degree-in-cybersecurity","status":"publish","type":"post","link":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/2015\/10\/a-degree-in-cybersecurity\/","title":{"rendered":"A Degree in Cybersecurity"},"content":{"rendered":"<p>As security vendors, we talk a lot about how technology can help maintain our way of life in the digital age by providing the mechanisms to prevent attacks. The other two pieces of that prevention story, however, rely on people and processes.<\/p>\n<p>In the past there was a real shortage of people skilled in the basics of cybersecurity, which meant that cybersecurity roles weren\u2019t filled anywhere near as quickly as they were needed, or inexperienced people were hired and forced to learn on the job, both of which posed huge risks to organizations. I think this is still somewhat true today \u2014 there are more cybersecurity roles needed than there are seasoned cybersecurity professionals \u2014 but we\u2019ve made progress in solving this problem.<\/p>\n<p>A growing number of universities in the U.S. have added cybersecurity-related degree programs to their educational offerings.<!--more--><\/p>\n<ul>\n<li><a href=\"https:\/\/gapp.usc.edu\/cyber\" rel=\"nofollow,noopener\"  target=\"_blank\">University of Southern California<\/a><\/li>\n<li><a href=\"http:\/\/engineering.cmu.edu\/companies\/strategic_initiatives\/cybersecurity.html\" rel=\"nofollow,noopener\"  target=\"_blank\">Carnegie Mellon University<\/a><\/li>\n<li><a href=\"http:\/\/www.worldcampus.psu.edu\/degrees-and-certificates\/information-sciences-masters\/overview\" rel=\"nofollow,noopener\"  target=\"_blank\">Pennsylvania State University<\/a><\/li>\n<li><a href=\"https:\/\/ep.jhu.edu\/programs-and-courses\/programs\/cybersecurity\" rel=\"nofollow,noopener\"  target=\"_blank\">Johns Hopkins<\/a><\/li>\n<li><a href=\"http:\/\/www.umuc.edu\/academic-programs\/cybersecurity.cfm\" rel=\"nofollow,noopener\"  target=\"_blank\">University of Maryland University College<\/a><\/li>\n<li><a href=\"http:\/\/www.ll.mit.edu\/mission\/cybersec\/cybersec.html\" rel=\"nofollow,noopener\"  target=\"_blank\">Massachusetts Institute of Technology<\/a><\/li>\n<li><a href=\"http:\/\/universitycollege.du.edu\/smgt\/degree\/masters\/information-security-online\/degreeid\/431\" rel=\"nofollow,noopener\"  target=\"_blank\">University of Denver<\/a><\/li>\n<li><a href=\"http:\/\/www.northeastern.edu\/online\/degrees\/masters-information-assurance\/\" rel=\"nofollow,noopener\"  target=\"_blank\">Northeastern University<\/a><\/li>\n<li><a href=\"http:\/\/dsu.edu\/graduate-students\/msia\" rel=\"nofollow,noopener\"  target=\"_blank\">Dakota State University<\/a><\/li>\n<li><a href=\"http:\/\/www.sjsu.edu\/pdp\/programs\/cybersecurity\/index.html\" rel=\"nofollow,noopener\"  target=\"_blank\">San Jose State University<\/a><\/li>\n<li><a href=\"http:\/\/programs.online.utica.edu\/programs\/online-cyber-security-degree.asp\" rel=\"nofollow,noopener\"  target=\"_blank\">Utica College<\/a><\/li>\n<li><a href=\"http:\/\/online.maryville.edu\/cyber-security\/masters\" rel=\"nofollow,noopener\"  target=\"_blank\">Maryville University<\/a><\/li>\n<\/ul>\n<p>Most of these programs offer online courses, including virtual lab environments and an array of different security technologies. A few offer both bachelor\u2019s and master\u2019s programs.<\/p>\n<p>Courses offered teach network management and security, web security, data privacy and regulations, forensics and gathering data from multiple sensors, applied cryptography, and offensive security (pen-testing), to name a few.<\/p>\n<p>The eventual impact of formalized cybersecurity education, despite <a href=\"http:\/\/www.computerworld.com\/article\/2498608\/security0\/let-s-scuttle-cybersecurity-bachelor-s-degree-programs.html\" rel=\"nofollow,noopener\"  target=\"_blank\">concerns<\/a>, should be positive in the following ways:<\/p>\n<ol>\n<li>At a minimum, formalized cybersecurity courses should raise the general public\u2019s awareness level around how to more safely use the Internet. I don\u2019t expect that the average person will be able to describe the OSI layers or know what SQL injection is, and I\u2019m certain that this increase in general knowledge will be slow, but I do expect that the layman will at least think twice before sticking with default passwords, for example. This should also decrease the amount of insider negligence.<\/li>\n<li>It will become less difficult to hire and retain expert staff. Though technical training within different cybersecurity degree programs may differ, the very fact that it\u2019s now an option for students means that it\u2019s more accessible to a broader audience. Students who may not have otherwise known cybersecurity was a career they could choose may find out that they\u2019re interested in pursuing it. MBA candidates whose goal might be to attain a C-level title can get the education they\u2019ll need to become effective CIOs and CISOs.<\/li>\n<\/ol>\n<p>If Stan Lee has taught me anything, I know that with great power (that is, knowledge) comes great responsibility, and ultimately a choice must be made: do I use this knowledge for good or evil? Cybersecurity graduates will be faced with several job prospects, including working for cybercriminal organizations. The very fact that we\u2019ll have a larger pool of security experts means that we also risk a larger number turning to the \u201cdark side\u201d and putting on black hats. However, better access to cybersecurity education should also mean more resources for law enforcement to crack down on cyber crime and the individuals perpetrating it.<\/p>\n<p>I prefer to think positively.<\/p>\n<p>It\u2019s certainly a sign of progress when, in the span of 15 years, we\u2019ve come from a time when information security wasn\u2019t really taken seriously, to an age when cybersecurity is so ubiquitous as to warrant its own major within several universities. We now have so many educational institutions offering cybersecurity-related degrees that we can make a <a href=\"http:\/\/www.securitydegreehub.com\/top-10-online-cyber-security-degree-programs-for-2015\/\" rel=\"nofollow,noopener\"  target=\"_blank\">Top 10<\/a> list for online degree programs alone.<\/p>\n<p>If you haven\u2019t already, think about enhancing your formal skills and enrolling in one of these programs, or ask your company if they\u2019ll sponsor you. Better yet, contribute to our future by letting your kids know that they can now go to college to learn how to hack.<\/p>\n<p>Check out the Ponemon Institute\u2019s 2014 review of the <a href=\"http:\/\/www.ponemon.org\/local\/upload\/file\/2014%20Best%20Schools%20Report%20FINAL%202.pdf\" rel=\"nofollow,noopener\"  target=\"_blank\">best schools for cybersecurity<\/a>.<\/p>\n<p>Degree Programs \u2013 Cybersecurity<br \/>\n<a href=\"https:\/\/niccs.us-cert.gov\/education\/degree-programs\" rel=\"nofollow,noopener\"  target=\"_blank\">https:\/\/niccs.us-cert.gov\/education\/degree-programs<\/a><\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>As security vendors, we talk a lot about how technology can help maintain our way of life in the digital age by providing the mechanisms to prevent attacks. The other two pieces &hellip;<\/p>\n","protected":false},"author":40,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[155],"tags":[423,1493],"coauthors":[716],"class_list":["post-10576","post","type-post","status-publish","format-standard","hentry","category-cybersecurity-2","tag-education","tag-ponemon-institute"],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/10576","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/users\/40"}],"replies":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/comments?post=10576"}],"version-history":[{"count":2,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/10576\/revisions"}],"predecessor-version":[{"id":16639,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/10576\/revisions\/16639"}],"wp:attachment":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media?parent=10576"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/categories?post=10576"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/tags?post=10576"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/coauthors?post=10576"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}