Education theories applied to a cyber security bootcamp

dc.contributor.authorPrough, Logan M.
dc.date.accessioned2020-05-07T16:04:40Z
dc.date.available2020-05-07T16:04:40Z
dc.date.graduationmonthMay
dc.date.issued2020-05-01
dc.description.abstractPrior to the ubiquity of information technology, United States military doctrine recognized four warfighting domains: land, sea, air, and space. The creation of the internet and a growing reliance on connected, integrated systems introduced an unfamiliar environment not governed by the same laws as the four physical warfighting domains. The United States Air Force recognized its need for a cyber force to operate in cyberspace. In 2003, the Information Directorate of the Air Force Research Laboratory (AFRL/RI) created a 10-week cyber security bootcamp called the Advanced Course in Engineering (ACE) to educate and train future cyber operators. Despite its record of success, the ACE lacks a formal, proven method to assess its effectiveness and improve the program. A formal assessment method may provide more exact, objective measurements of the effectiveness of the program. This work provides a case study in the use of learning theories (informed by and complementing participant feedback and staff observations) to assess ACE and provides recommendations to improve the ACE. We analyze available data from the 2019 ACE class and use relevant education theories to reveal insights regarding what the ACE program does well, ways it could improve, and future work that could further improve the program and other cyber security bootcamps.
dc.description.advisorJoshua L. Weese
dc.description.degreeMaster of Science
dc.description.departmentDepartment of Computer Science
dc.description.levelMasters
dc.identifier.urihttps://hdl.handle.net/2097/40605
dc.language.isoen_US
dc.publisherKansas State University
dc.rights© the author. This Item is protected by copyright and/or related rights. You are free to use this Item in any way that is permitted by the copyright and related rights legislation that applies to your use. For other uses you need to obtain permission from the rights-holder(s).
dc.rights.urihttp://rightsstatements.org/vocab/InC/1.0/
dc.subjectComputer science
dc.subjectAdult education
dc.titleEducation theories applied to a cyber security bootcamp
dc.typeThesis

Files

Original bundle

Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
LoganPrough2020.pdf
Size:
1.25 MB
Format:
Adobe Portable Document Format
Description:
Thesis

License bundle

Now showing 1 - 1 of 1
No Thumbnail Available
Name:
license.txt
Size:
1.62 KB
Format:
Item-specific license agreed upon to submission
Description: