Thursday, July 8
1:15 PM-2:15 PM
EDT
Room 4

Virtual Workshop on the Guided Inquiry Collaborative Learning (GICL) in Cyber Security

Roundtable 20: Live Presentation ID: 59073
  1. aaa
    Xiaohong Yuan
    North Carolina Agricultural and Technical State University
  2. Li Yang
    University of Tennessee at Chattanooga
  3. aaa
    Wu He
    Old Dominion University
  4. aaa
    Jennifer Ellis
    The University of Tennessee at Chattanooga

Abstract: To meet the demand for a workforce that can address the cybersecurity challenges confronting our society and our nation, cybersecurity programs in universities and colleges need to produce cybersecurity professionals who not only have in-depth technical knowledge in cybersecurity, but also have “soft skills” including communication, enthusiasm and attitude, team work, networking, problem solving and critical thinking, and professionalism. Guided Inquiry Collaborative Learning (GICL) has been proved effective in improving student learning and key skills including “soft skills”. Through a project funded by NSF, we have developed GICL materials for teaching a number of topics in cyber security. We will share GICL materials we have developed in this workshop, demonstrate how the GICL in cybersecurity will help to teach both cybersecurity domain knowledge and soft skills. The topics include cryptography, access control, network security, risk management, web security and secure coding. We will also share lessons we have learned through developing, using, and evaluating effectiveness of GICL materials and teaching methods. The workshop is highly interactive and the attendants will experience the GICL teaching and learning method. The workshop is intended for instructors who teach cybersecurity courses or who have interest in teaching these topics. The workshop provides an excellent opportunity to develop instructional excellence and to network with peers.

Objectives

We will share GICL materials we have developed for teaching cybersecurity, and demonstrate how the GICL in cybersecurity will help to teach both cybersecurity domain knowledge and soft skills.

Topical Outline

- Collaborative Learning Background - Why Guided Inquiry Collaborative Learning (GICL) - GICL activity development and implementation - A hands-on GICL activity - Assessment

Prerequisites

The audience are instructors who teach cybersecurity courses or who have interest in teaching these topics.

Experience Level

Beginner

Qualifications

Dr. Xiaohong Yuan is a professor and chair in the Department of Computer Science at North Carolina Agricultural and Technical State University. Her research interests include software engineering, cyber security education, intrusion detection and machine learning. Dr. Yuan has published more than 100 research and education papers in peer-reviewed journals and referred conference proceedings. Dr. Li Yang is a professor from the University of Tennessee at Chattanooga (UTC) and the Director of the UTC InfoSec Center. She was one of the major forces in establishing BS- and MS-level concentrations in Information Security and Assurance (ISA) at UTC. She has developed and published a number of pedagogical materials in cybersecurity including cryptography, biometrics and database security. Dr. Wu He is an associate professor of Information Technology at Old Dominion University (ODU). His research areas include cybersecurity, social media, computing education, and data mining. Dr. He is an affiliated faculty member of ODU’s Center for Cybersecurity Education and Research (CCSER). Dr. He has published over 70 journal articles in significant peer-reviewed journals. Dr. Jennifer Ellis is an Associate Professor in the School of Education and the Director of STEM Education at UTC. Her research interests include effective integration of educational technology to enhance STEM teaching and learning as well as in accessible cyber learning via iterative instructional design.
No presider for this session.

Topic

Conference attendees are able to comment on papers, view the full text and slides, and attend live presentations. If you are an attendee, please login to get full access.
x