Why more schools across the U.S. need to implement a cybersecurity curriculum Credit: Thinkstock If they want to continue to protect our nation’s most valuable data from cyber-attacks, leading security practitioners need to look to the future of the security industry and develop ways to grow the talent needed to fill the looming jobs gap.That’s why Jim Treinen, vice president of security research at ProtectWise, was happy to help J.B. Holston, dean at the University of Denver’s Daniel Felix Ritchie School of Engineering and Computer Science, when they ventured into designing their Master’s in cybersecurity curriculum.Having earned both his Masters and PhD at Denver University (DU), Treinen was thrilled at the opportunity to give back to his Alma Marta given his long history of involvement with DU. A couple highlights of the course work that Treinen is most excited about include working on lab activities and classic computer systems. He said, “There are some lab activities mostly focused around how vulnerabilities are being exploited, current ransomware and how to exploit with crypto systems, and how they can be turned around and used against unsuspecting users.” In addition, students will learn how operating systems work. “Understanding how modern OS have built in security, understanding at a deep level of how the underlying networking works, and the theory of OS and why it matters, is important, as are secure software engineering practices,” said Treinen.Knowing that when academic and industry work in partnership, good things happen, Treinen said he values and appreciates that DU is so very forward looking. “They recognized the gap in prospects and moved to add specialties to their computer science program, which is a great recruiting tool for institutions, and I expect to see more universities roll out forward looking programs,” he continued. In designing the course work and deciding on the different levels of depth and breadth that ought to be offered, Holston credited Protectwise for having been incredibly helpful in co-creating this program.Holston also spoke with a cybersecurity company on the West Coast and said, “They have 500 job openings right now. They happen to be a very mature company, but if you extend that beyond cyber security companies and include those organizations that actually need to be better at cyber security, there is a huge gap.”[ ALSO: Top U.S. universities failing at cybersecurity education ]So they used a broader brush in designing this intensive one-year program. “If you don’t have any kind of background in computer science, there are bridge courses. Prospects can take a pre test online to determine whether they need bridge courses. There is an intensive period focused on the basics of computer science,” Holston said.In addition to building a strong core in computer science, the degree program also offers a number of electives, so there will be folks that take a number of different paths. “One primary goal,” said Holston, “is to help students structure relationships with companies. We have structured everything from the capstone all the way to the individual working on an internship from the first day.”Those enrolled in the year long program will be required to commit one work day of interning, and the program leaders will work with students to help them decide which company, which capstone, and which internship is best suited for their professional goals. “I think we will get a lot of folks who have been out of school for a year or two working for a think tank, likely holding a generic undergrad degree. Those who like what they are doing but realize that they are not on a path toward a career that is really interesting. That’s our highest probability target,” said Holston.So, for those who can take a year full-time to do it, (though part-time classes are available online) DU is ready to help you kick-start a career in cybersecurity. Related content news analysis Searching for unicorns: Managing expectations to find cybersecurity talent Finding the cybersecurity leaders of tomorrow means being realistic about job descriptions and providing training and mentoring for non-traditional tech people. By Kacy Zurkus Sep 29, 2017 4 mins IT Skills Careers IT Leadership feature Vulnerability vs. risk: Knowing the difference improves security Conflating security terms evokes fear but doesn't help security newbs understand the difference between vulnerabilities and actual risks. By Kacy Zurkus Sep 26, 2017 3 mins Risk Management Vulnerabilities IT Leadership opinion What the Equifax breach means to me — an end user perspective Recovery and resiliency or apathy. Which will prevail now that most everyone's PII has been exposed in another massive breach? By Kacy Zurkus Sep 15, 2017 4 mins Cyberattacks DLP Software Internet Security opinion Abandoned mobile apps, domain names raise information security risks When app creators abandon domains for bigger, better deals, what happens to all the app-specific data? By Kacy Zurkus Sep 08, 2017 3 mins Access Control Data and Information Security Vulnerabilities Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe