• Title/Summary/Keyword: Security Courses

Search Result 116, Processing Time 0.021 seconds

The Research of the Development of Security Industrial and Proffessional Certificate in the Private Security (민간경호${\cdot}$경비 산업의 발전을 위한 전문교육 및 인증제도의 필요성 제고)

  • Gong, Bae-Wan
    • Korean Security Journal
    • /
    • no.9
    • /
    • pp.1-25
    • /
    • 2005
  • Recently the demand for civil bodyguards and security guards shows rapid growth. However the supply and training system have some limitations. Educational and training systems for civil body and security guards are in the basic level and private organizations trained the professional work force. University level training started recently. To protect individual life and property, body and security guards have to be trained professionally. For it the role of professional training organizations is emphasized. The purpose of this article is to analyse current situation of civil body and security guard training industry and to seek an educational model. For it, the following questions will be examined. ${\cdot}$ Do the professional training organizations meet social demand for the body and security guards? ${\cdot}$ What kind of training has to be provided for the body and security guards? ${\cdot}$ What tare the qualifications of the trainers? ${\cdot}$ What are the differences in training courses between private organizations and universities? ${\cdot}$ Is there any differences in the job placement among the trainees of private organizations and universities? In summary to meet the social demand common curriculum for the body and security guard will be drawn from the analyses of diverse training organizations with different training courses in contents, training periods, educational value, and social aim.

  • PDF

A Study on the Institutional Improvement Arrangement of the Private Security in Korea (한국 민간경비 교육${\cdot}$제도의 문제점과 발전방안)

  • Gong, Bae-Wan
    • Korean Security Journal
    • /
    • no.12
    • /
    • pp.51-72
    • /
    • 2006
  • Recently the demand for civil bodyguards and security guards shows rapid growth. However the supply and training system have some limitations. Educational and training systems for civil body and security guards are on the basic level and private organizations trained in the professional work force. University level training started recently. To protect individual life and property, body and security guards have to be trained professionally. For it the role of professional training organizations is emphasized. The purpose of this article is to analyse current situation of civil body and security guard training industry and to seek and educational model. For it, the following questions will be examined. ${\cdot}$ Do the professional training organizations meet social demand for the body and security guards? ${\cdot}$ What kind of training has to be provided for the body and security guards? ${\cdot}$ What are the qualifications of the trainers? ${\cdot}$ What are the differences in training courses between private organizations and universities? ${\cdot}$ Is there any differences in the job placement among the trainees of private organizations and universities? In summary to meet the social demand common curriculum for the body and security guard will be drawn from the analyses of diverse training organizations with different training courses in contents, training periods, educational value, and social aim.

  • PDF

A Study on the Development of a Training Course for Ship Cyber Security Officers (선박 사이버보안 책임자를 위한 교육과정 개발에 관한 연구)

  • Lee, Eunsu;Ahn, Young-Joong;Park, Sung-ho
    • Journal of the Korean Society of Marine Environment & Safety
    • /
    • v.26 no.7
    • /
    • pp.830-837
    • /
    • 2020
  • With the rapid development of information and communication technology, information exchange between ships and shore has become faster and more convenient, However, accessing ship information has also become easier and concerns about cyber security attacks are growing. When a ship suffers a cyber-attack, it may cause considerable damage and incurs enormous costs and time to repair. In response to this threat, the maritime industry now demands that a cyber security officer be assigned to each ship to take charge of cyber security management onboard. In order to reduce the damage cause by an attack and to respond effectively, a specialized training course for the ship's cyber security officer is required. The purpose of this study was to present a training course for the position of the ship's cyber security officer, and to highlight the necessity of amending current legislation, To this end, domestic and foreign trends, ship cyber security incident cases, and cyber security training courses were investigated, and based on the results a standard training course for a ship's cyber security of icer was developed. Additionally, recommendations on the related amendments to legislation ware established. The results of the study can be used as basic data to establish future training courses for cyber security officers.

A Development of Curriculum for Information Security Professional Manpower Training (정보보안 전문인력 양성을 위한 교육과정 개발)

  • Lee, Moongoo
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.54 no.1
    • /
    • pp.46-52
    • /
    • 2017
  • Social attention to information security field is inspired, and manpower demand forecast of this area is getting high. This study surveyed information security knowledge of practitioners who work in a field of information security such as computer and network system. We analyzed a connection between survey data, information protection job system that was suggested by NICE, IT skills that NCS and KISA classified and security field classification system. Base on data that analyzed, this study suggests a curriculum that trains professional manpower who perform duties in the field of information security. Suggested curriculum can be applied to 2 year college, 3 year college and 4 year college. Suggested curriculum provides courses that students who want to work in a field of information security must learn during the college. Suggested courses are closely connected to a related field and detailed guideline is indicated to each course to educate. Suggested curriculum is required, and it combines a theoretical education that become basis and a practical education so that it is not weighted to learn theory and is not only focusing on learning simple commands. This curriculum is established to educate students countermeasures of hacking and security defend that based on scenario that connected to executive ability. This curriculum helps to achieve certificates related to a field more than paper qualification. Also, we expect this curriculum helps to train convergent information security manpower for next generation.

A Study on Development of Evaluation Indicators for the Human Competency and Management In Managed Security Service (MSS) (보안관제 업무의 인적 역량 및 관리에 대한 평가지표 개발 연구)

  • Yang, Sung Ho;Lee, Sang Jin
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.5 no.6
    • /
    • pp.143-152
    • /
    • 2016
  • Currently many central administrative agencies, municipalities and public and private institutions operate Managed security services to cope with cyber security incidents. These entities exert efforts in operating efficiencies rather than introduction of services as they used to. Accordingly, quite a few policies, directions and guidelines have been established for stable operation of Managed security services. Still, Managed security is operated by individuals, whose competencies influence the quality of Managed security services to a great extent. In this respect, the present article examines Managed security technology and methods and describes evaluation methods and examples relevant to human competencies, so as to seek for some potential courses for further development as well as more efficient approaches to human resource management in terms of institutional Managed security services.

Effects of Interactive Video on Mind Mapping Skills of Common First Year Students' at Umm Al-Qura University

  • Almalki, Mohammad Eidah Messfer
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.12spc
    • /
    • pp.365-374
    • /
    • 2021
  • This study set off to explore the effect of interactive videos on developing mind mappings skills required for the common first-joint year students at Umm Al-Qura University. Towards this end, the experimental research design of a quasi-experimental of two experimental groups was adopted. The research tools consisted of an achievement test of the cognitive aspects of mind mapping skills and a product evaluation form of mind mapping skills. Results showed statistically significant differences at the significance level (α 0.05) between the mean scores of the two experimental groups who studied the educational video regardless of the type of video in the pre-post cognitive test of the mind mapping skills and the form of product evaluation. Besides, there are statistically significant differences at the significance level (0.05≥α) between the mean scores of the first experimental group who studied the conventional educational video and the mean scores of the second experimental group who studied the interactive educational video. This significant difference was in the posttest of mind mapping skills and in favor of the group who studied the interactive educational video. Nevertheless, there were no statistically significant differences at the significance level (0.05≥α) between the mean scores of the first and second experimental groups in the post-application of the product evaluation form of mind mapping skills. The researcher recommended using the interactive video in teaching courses to common first-year students. It also recommends organizing courses for the faculty members to train them on using interactive videos in their teaching.

New Trends and Strategies For the Integration of Information and Communication Technologies in Educational Activities

  • Vasіutina, Tеtіana;Cherednyk, Lidiia;Klymenko, Oksana;Sokur, Olena;Shevchuk, Anatolii;Zatserkivna, Maryna
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.9
    • /
    • pp.169-172
    • /
    • 2021
  • The article discusses the results of a quantitative analysis of open educational resources in the field of information technology. Study is based on a study of the content of ten platforms that provide access to open resources (OPs). To achieve this goal, we used the following methods: theoretical analysis and generalization of Internet sources to determine the popularity of educational platforms and resources on them; quantitative data analysis to determine the relative proportion of IT courses in various parameters: the relative weight of courses in the IT field in general and on each platform in particular, the language of instruction, the quantitative content by thematic areas. The following platforms providing access to open educational resources were subjected to quantitative analysis: Coursera, Edx, Udemy, MIT OpenCourseWare, OpenLearn, Intuit, Prometheus, UoPeople, Open Learning Initiative, Maidan Open University.

Towards a UTAUT Model for Acceptance of MOOCs

  • Sara Jeza Alotaibi
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.11
    • /
    • pp.117-127
    • /
    • 2023
  • In many training institutions, the major advancement of Information Technology is having a profound impact on the way in which instructors teach and students learn, as well as how the two interact. The training process is continuing with the goal of enhancing the calibre of instruction and engagement. Top colleges and institutions have more recently developed a variety of Massive Open Online Courses (MOOC) systems centred on the development of new educational offering ways. These have not only captured the interest of students and scholars in the field of higher education, but also that of staff members in the private and public sectors. This study uses a Unified Theory of Acceptance and Use of Technology (UTAUT) model to assess the top MOOC providers and pinpoint the key elements influencing learner acceptance of MOOCs in Saudi Arabian training. A total of 382 government trainees in Saudi Arabia participated in an online survey, the results of which underwent analysis using structural equation modelling. This study identifies the key elements influencing Saudi government employee trainees' intentions to use MOOCs, with the findings indicating that the suggested model can account for 86.2% of user behaviour and 88.5% of user intentions.

Development of Environmental Security Engineering Through Delphi Survey (델파이 조사를 통한 환경보안공학 개발)

  • Heon-Wook Lim
    • Convergence Security Journal
    • /
    • v.22 no.4
    • /
    • pp.135-140
    • /
    • 2022
  • The purpose of this study is to develop security subjects that require engineering security knowledge. In particular, Engineering knowledge is required to perform security tasks such as smart factory security. However, although there are similar specialties such as mechanical security instructors, industrial security managers, and industrial security specialists(CPP), they are not based on engineering knowledge. Accordingly, Delphi analysis through expert interviews was used to derive a job analysis of security engineering. And I was able to sort out the necessary knowledge. Research Results 1-Line Security for Perimeter Security Architectural Structure, Architectural Dynamics, Including Septed, Control instrumentation including smart factory security for building security with 2-Line security, With 3-Line security, it was divided into ergonomics and mechanical expenses for indoor security. As a result of the survey, by age, those in their 30s showed the highest response with 75.8%, and by job, industrial security officers with 76.4%. This could be seen as a desire for a environmental security engineering certificate by practitioners in the industrial security field.

Development of a Standardized Framework for Domestic Information Security Education; Focusing on a Two-Track Curriculum Customized by Age and Job (국내 정보보호 교육 표준 프레임워크 개발; 연령 및 직무 맞춤의 이원화(Two-track) 교육과정을 중심으로)

  • Park, Minjung;Lee, GI Hyouk;Chai, Sangmi
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.31 no.5
    • /
    • pp.1083-1095
    • /
    • 2021
  • With the recent increase in users' dependence on the Internet and the spread of various IT devices, the influence of information security on the users' has expanded compared to the past. Therefore, it is expected to have an increased influence on information security in personal life. In addition, as the intrusion factors that threaten security continue to become more advanced and diversified (eg., fake news, cyberbullying, identity theft), the need for nurturing information security experts is increasing. Furthermore, not only corporate information security workers, but also all individuals, cannot be free from the threat of information security. Therefore, it is necessary to prepare various information security education to improve information security awareness and induce proactive information security behaviors. In this study, characteristics of domestic and foreign information security education courses are analyzed and provide a standardized framework for information security education applicable to the domestic environment.