Welcome to Francis Academic Press

Frontiers in Educational Research, 2024, 7(9); doi: 10.25236/FER.2024.070911.

Design and research of information security professional platform

Author(s)

Xiaomei Xiong

Corresponding Author:
Xiaomei Xiong
Affiliation(s)

Jiangxi Police Institute, Nanchang, China

Abstract

The new era of the global Internet poses new challenges for the training of information security professionals. Traditional curriculum teaching methods lack the development of students' comprehensive analytical and application skills. To address this problem, an online and face to face combination of case-modular mixed learning based on a curriculum information system platform has been proposed. We have improved the course teaching plan by adjusting the structure of traditional course teaching modules, innovating the curriculum system, and employing various teaching methods in course implementation, such as online and blended face-to-face teaching, project-driven teaching, and modular case teaching. To meet the teaching needs of multidisciplinary information security courses through the introduction of different teaching cases, project-driven teaching, etc, it can provide reference for the reform of traditional engineering curricula such as information security, computer science and technology.

Keywords

systems security; mixed methods; undergraduate universities; information security specialties

Cite This Paper

Xiaomei Xiong. Design and research of information security professional platform. Frontiers in Educational Research (2024) Vol. 7, Issue 9: 66-71. https://doi.org/10.25236/FER.2024.070911.

References

[1] China Internet Network Information Centre. (2023). 52nd Statistical Report on the State of Internet Development in China [EB/OL]. Retrieved from [URL].

[2] Data Quality Campaign. (2015, May). Student Data Privacy Legislation: What Happened in 2015, and What Is Next? Retrieved from Data Quality Campaign website: http://www.dataquality campaign.org/ resource/student-data-privacy-legislation-happened-2015-next/

[3] ExcelinEd.org. (2016, May). Model Legislation. Retrieved from ExcelinEd website: http://www.excelined.org/wp-content/uploads/Student-Data-Privacy-Accessibility-and-Transparency-Act-Model-Legislation-03.2015.pdf

[4] McCrea, B. (2016). How Hackers Held a District Hostage for Almost $10,000. Retrieved from eSchool News website: http://www.eschoolnews.com/2016/06/08/ how-hackers-held-a-district- hostage- ransomware/

[5] National Conference of State Legislators. (2016, June). Security Breach Notification Laws. Retrieved from NCSL website: http://www.ncsl.org/research/telecommunications-and-information- technology/security-breach-notification-laws.aspx

[6] Privacy Rights Clearinghouse. (2016, June). Chronological Database of Data Security Breaches. Retrieved from Privacy Rights Clearinghouse website: http://www.privacyrights.org/data-breach

[7] Zhu, J. (2023). Public security education. Chongqing Public Security Education, (09), 53-56.

[8] Nongu, Z., & Zhu, Y. (2018). Cultivation goals: Value leadership of talent development modeling reform—Based on the enlightenment of Stanford University’s “Ring University” programme. Modern University Education, (04), 103-111.

[9] Li, J. (2015). National standards of teaching quality for the training of cybersecurity and law enforcement professional talent training programme. Sichuan Police Academy Study Report, 27(06), 91-96.