Certificate Programs in Computer Networks, Security, and Cloud Computing in the USA - A Review
Andrzej J. Gapinski
Abstract
The objective of the article is to review certificate programs in computer networks and computer security which are currently offered by many educational institutions and various organizations in the USA. Due to an increased role played by computer networks and cybersecurity, the certificate programs contents and scopes are being augmented to incorporate new area of interest such as cloud computing and its services to meet market expectations and demands. The article describes new cyber- security threats posed by the growing use of cloud computing services and the related cloud computing certification programs. An analysis of the certifications held by U.S. workforce including STEM occupations is provided. The article presents an analysis of the certificate programs offerings and their contents that are offered by various public as well as private organizations and institutions including higher education. The article, in addition, describes the authors activities while developing the certificate program in the area of computer networks, cybersecurity, and cloud computing currently under consideration at The Pennsylvania State University Fayette Campus.
References
- Amazon, http://www.amazon.com.
- Balakrishnan, V. (2010). Trust Enhanced Security Framework For Mobile Ad Hoc Wireless Networks. Sydney: Ph.D. Thesis. Dept. of Computing. Macquarie University.
- Beasley, J., & Nilkaew, P. (2012). Networking Essentials. 3rd ed. Indianapolis: Pearson Education.
- Boyd, R. & Proudfoot, J. (2014). Applied Information Security, a Hands-on Guide to Information Security Software. New York: Prentice-Hall.
- Cisco, http://www.cisco.com.
- Clark, D. (2016). MOOCs: Course Completion is the Wrong Measure of Course Success. Retrieved from https://www.class-central.com/report/moocs-course-completion-wrong-measure/).
- Claycomb, W.R. (2012). Tutorial: Cloud Computing Security, Retrieved from https://resources.sei.cmu.edu/asset_files/Presentation/2012_017_001_52439.pdf.
- CompTIA, https://certification.comptia.org.
- Coursera, https://www.coursera.org.
- Cyberdegrees, http://www.cyberdegrees.org.
- Dickson, B. (2016). 10 Hot Cyber Security Certifications for 2017. IT Career Finder. Retrieved from https://www.itcareerfinder.com/brain-food/blog/entry/10-hot-cyber-security-certifications-for-2017.html.
- edX, https://www.edx.org.
- EITCI European Information Technologies Certification Institute, http://eitci.org.
- EXIN, https://www.exin.com.
- Florentine, S. (2017). The most valuable cloud computing certifications today. Retrieved from https://www.cio.com/article/3207553/certifications/the-most-valuable-cloud-computing-certifications-today.html.
- Fortinet (2017). Mapping the Ransomware Landscape. Retrieved from https://www.fortinet.com/demand/gated/mapping-ransomware-landscape.html.
- Gapinski, A. (2003). A Note on LAN, ATM Technologies, and Priority Queuing. Proceedings of International Conference on Industry, Engineering & Management Systems (IEMS). Florida. 515-519.
- Gapinski, A. (2005). A Note on Teaching Cisco Routers. Proceedings of IEMS'2005. Florida. 137-141.
- Gapinski, A. (2014). Strategies for Computer Networks' Security. Business Administration Quarterly, 32(3), 59-65. Retrieved from https://przedsiebiorstwo.waw.pl/resources/html/article/details?id=59512.
- Gapinski, A. (2015). Cloud Computing: Information Security Standards, Compliance and Attestation. Proceedings of International Conference on Engineering and Technologies (LACCEI). Santo Domingo. Retrieved from www.laccei.org.
- Gapinski, A. (2016a). Cloud Computing Services: Status and Trends. e-mentor, 64(2), 70-78. http://dx.doi.org/10.15219/em64.1241
- Gapinski, A. (2016b). Developing a Certificate Program in Computer Networks Technologies, Security, and Cloud Computing Services. Proceedings of World Engineering Education Forum (WEEF) Conference. Seoul.
- Gapinski, A. (2017). Automation and its Effect on STEM Occupations. Economic and Ethical Impact. Research in Logistics and Production. 7(5), 391-407. http://dx.doi.org/10.21008/j.2083-4950.2017.7.5.1
- Georgetown University School of Continuing Studies, https://scs.georgetown.edu/.
- Global Information Assurance Certification (GIAC), http://www.giac.org.
- Grobauer, B, Walloschek, T., and Stöcker, E. (2011). Understanding Cloud Computing Vulnerabilities. IEEE Computer and Reliability. IEEE Security & Privacy, March/April 2011; http://doi.ieeecomputersociety.org/10.1109/MSP.2010.115.
- Half, R. (2017). Which IT certification are most valuable? Retrieved from https://www.roberthalf.com/blog/salaries-and-skills/which-it-certifications-are-most-valuable.
- Harfoushi, O., Alfawwaz, B., Ghatasheh, N., Obiedat, R., Abu-Faraj, M., & Faris, H. (2014). Data Security Issues and Challenges in Cloud Computing: A Conceptual Analysis and Review. Communications and Network, 6(1), 15-21. http://dx.doi.org/10.4236/cn.2014.61003.
- Homeland Security (2017). Cybersecurity Questions for CEOs. Retrieved from https://www.us-cert.gov/sites/default/files/publications/DHS-Cybersecurity-Questions-for-CEOs.pdf.
- https://education.emc.com/content/emc/en-us/home.html.
- IACIS International Association for Computer Information Systems, http://www.iacis.org.
- IEEE Computer Society, http://www.computer.org.
- Information Systems Audit and Control Association (ISACA), https://www.isaca.org.
- Kizza, J.M. (2013). Guide to Computer Network Security. Springer-Verlag. London.
- Lindros, K. (2016, December 28). 5 Great 'Starter' Cybersecurity Certifications. Business News Daily. Retrieved from http://www.businessnewsdaily.com/9661-cybersecurity-certifications.html.
- Massive Open Online Courses, http://www.cyberdegrees.org/resources/free-online-courses/.
- Merriam-Webster, https://www.merriam-webster.com/dictionary/ransomware.
- Microsoft, https://www.microsoft.com/en-us/learning/mcse-cloud-platform-infrastructure.aspx.
- National Infocomm Competency Framework NICF, https://www.imda.gov.sg/industry-development/programmes-and-grants/individuals/national-infocomm-competency-framework-nicf.
- Pak, Ch. (2017). Cloud Security. IEEE Computer Society. Webinar.
- Palmer, M. (2008). Hands-On Microsoft Windows Server 2008. Boston: Course Technology, Cengage Learning.
- Penn State College of Information Sciences and Technology, https://ist.psu.edu/students/undergrad/majors/cybersecurity.
- Penn State World Campus, http://www.worldcampus.psu.edu/degrees-and-certificates/security-risk-analysis-certificate/overview.
- PMI, https://www.pmi.org.
- Ristenpart, T., Tromer, E., Shacham, H., and Savage, S. (2009) Hey, you, get off of my cloud: exploring information leakage in third-party compute clouds. Proceedings of the 16 ACM Conference (CCS'09). Chicago. 199-212.
- Rivard, R. (2013). Measuring the MOOC Dropout Rates. Inside Higher Education. March 8. https://www.insidehighered.com/news/2013/03/08/researchers-explore-who-taking-moocs-and-why-so-many-drop-out.
- Schou, C., & Shoemaker, D. (2007). Information Assurance for the Enterprise. A Roadmap to Information Security. McGraw-Hill. New York.
- SCRUM, https://www.scrumalliance.org/certifications/practitioners/certified-scrummaster-csm.
- Software Engineering Institute, https://www.sei.cmu.edu/certification/.
- Sokol, J. and Gapinski, A. (2002). Creating a Course In Computer Networking: Electrical Engineering Technology Versus Information Science and Technology. Proceedings of International Conference on Industry, Engineering & Management Systems (IEMS). Florida. 7-11.
- Solomon, M.G. & Chapple, M. (2005). Information Security Illuminated., Sudbury, Massachusetts: Jones & Bartlett Publishers.
- Stanford University, https://computersecurity.stanford.edu.
- Stolfo, S.J., Bellovin, S.M., Hershkop, S., Keromytis, A.D., Sinclair, S., and Smith, S.W. (Eds). (2008). Insider Attack and Cyber Security: Beyond the Hacker. Springer-Verlag, Advances in Information Security 39.
- Syracuse University of Engineering and Computer Science. https://engineeringonline.syr.edu/graduate-programs/cybersecurity/.
- Techopedia, https://www.techopedia.com/definition/24747/cybersecurity.
- The Convergence of Operational Risk and Cyber Security (2016). Retrieved from https://www.accenture.com/t20170803T055319Z__w__/us-en/_acnmedia/PDF-7/Accenture-Cyber-Risk-Convergence-Of-Operational-Risk-And-Cyber-Security.pdf.
- The International Council of Electronic Commerce Consultants (EC-Council), https://www.eccouncil.org.
- The International Information System Security Certification Consortium (ISC), http://isc2.org.
- Tittel, E. (2016). Best Information Security Certifications For 2017. Tom's IT PRO. Retrieved from http://www.tomsitpro.com/articles/information-security-certifications,2-205.html.
- Tittel, E., & Kyle, M. (2017). Best Cloud Certifications. Tom's IT PRO. Retrieved from http://www.tomsitpro.com/articles/cloud-it-certifications,2-537.html.
- Umass Lowell, http://www.uml.edu.
- University of Maryland University College, http://www.umuc.edu.
- U.S. Dept. of Labor. Bureau of Labor Statistics, https://www.bls.gov.
- Velte, T. and Velte. A. (2013). Cisco: A Beginner's Guide. 5th ed. New York: McGraw-Hill.
- Weidman, G. (2014). Penetration Testing: A Hands-On Introduction to Hacking. 2nd ed. San Francisco: No Starch Press.
- White, S.K., & Hein, R. (2017). The 13 most valuable IT certifications today. Retrieved from https://www.cio.com/article/2392856/it-skills-training/careers-staffing-12-it-certifications-that-deliver-career-advancement.html.
- Wikipedia, https://en.wikipedia.org/wiki/List_of_computer_security_certifications.
- Wikipedia, https://en.wikipedia.org/wiki/Udacity.
Add to: Del.icio.us Facebook Wykop Twitter.com Blip.pl Digg.com
AUTHOR |
About the article
DOI: https://doi.org/10.15219/em71.1313
The article is in the printed version on pages 64-78.
How to cite
Table of contents