{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,13]],"date-time":"2025-11-13T06:36:09Z","timestamp":1763015769398,"version":"3.40.5"},"reference-count":15,"publisher":"SAGE Publications","issue":"9","license":[{"start":{"date-parts":[[2020,9,1]],"date-time":"2020-09-01T00:00:00Z","timestamp":1598918400000},"content-version":"unspecified","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":["journals.sagepub.com"],"crossmark-restriction":true},"short-container-title":["International Journal of Distributed Sensor Networks"],"published-print":{"date-parts":[[2020,9]]},"abstract":"<jats:p> Cybersecurity comprised all the technologies and practices that protect data as well as computer and network systems. In this article, we develop four course modules on critical cybersecurity topics that can be adopted in college-level cybersecurity courses in which these topics are covered. Our goal for developing these course modules with the hands-on labs is to increase students\u2019 understanding and hands-on experiences on these critical topics that support cyber skills development for college students. The hands-on labs are designed to enhance students\u2019 engagement and provide them hands-on experiences with real-world cyber activities to augment their cyber education of both foundational and advanced skills. We also conduct research surveys on the most-recent significant research in these critical cybersecurity fields. These cybersecurity course modules with the labs are also designed to help college\/university professors enhance and update their cybersecurity course content, activities, hands-on lab exercises, and pedagogical methods, as well as emphasize the cyber skills to meet today\u2019s pressing cybersecurity education needs for college students. Our proposed cybersecurity modules with hands-on labs will also help building the nation\u2019s cybersecurity workforce. <\/jats:p>","DOI":"10.1177\/1550147720954678","type":"journal-article","created":{"date-parts":[[2020,9,4]],"date-time":"2020-09-04T05:21:25Z","timestamp":1599196885000},"page":"155014772095467","update-policy":"https:\/\/doi.org\/10.1177\/sage-journals-update-policy","source":"Crossref","is-referenced-by-count":7,"title":["Educational modules and research surveys on critical cybersecurity topics"],"prefix":"10.1177","volume":"16","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-4965-5510","authenticated-orcid":false,"given":"Lixin","family":"Wang","sequence":"first","affiliation":[{"name":"TSYS School of Computer Science, Columbus State University, Columbus, GA, USA"}]},{"given":"Jianhua","family":"Yang","sequence":"additional","affiliation":[{"name":"TSYS School of Computer Science, Columbus State University, Columbus, GA, USA"}]},{"given":"Peng-Jun","family":"Wan","sequence":"additional","affiliation":[{"name":"Department of Computer Science, Illinois Institute of Technology, Chicago IL, USA"}]}],"member":"179","published-online":{"date-parts":[[2020,9,3]]},"reference":[{"volume-title":"Proceedings of the 5th annual symposium and bootcamp on hot topics in the science of security","author":"Zheng E","key":"bibr2-1550147720954678"},{"volume-title":"IEEE symposium on security and privacy (SP)","author":"Fischer F","key":"bibr3-1550147720954678"},{"key":"bibr5-1550147720954678","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2017.183"},{"issue":"5","key":"bibr6-1550147720954678","first-page":"080509","volume":"8","author":"Marashdih AW","year":"2017","journal-title":"Int J Adv Comput Sci Appli"},{"first-page":"1","volume-title":"Proceedings of the international conference on computing advancements","author":"Rahman MA","key":"bibr7-1550147720954678"},{"key":"bibr8-1550147720954678","doi-asserted-by":"publisher","DOI":"10.1109\/MIC.2010.29"},{"key":"bibr9-1550147720954678","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2018.10.002"},{"first-page":"1","volume-title":"Proceedings of the 14th international conference on future internet technologies","author":"Kobayashi H","key":"bibr10-1550147720954678"},{"key":"bibr11-1550147720954678","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2019.2916180"},{"key":"bibr12-1550147720954678","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.001.1900050"},{"key":"bibr13-1550147720954678","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2019.2912611"},{"key":"bibr15-1550147720954678","volume-title":"Network security essentials: application and standards","author":"Stallings W","year":"2011","edition":"4"},{"volume-title":"Special interest group on computer science education symposium","author":"Logan P","key":"bibr16-1550147720954678"},{"volume-title":"An undetectable computer virus","year":"1987","author":"Cohen F","key":"bibr17-1550147720954678"},{"volume-title":"Security in computing","year":"2015","author":"Pfleeger CP","key":"bibr19-1550147720954678"}],"container-title":["International Journal of Distributed Sensor Networks"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/journals.sagepub.com\/doi\/pdf\/10.1177\/1550147720954678","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/journals.sagepub.com\/doi\/full-xml\/10.1177\/1550147720954678","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/journals.sagepub.com\/doi\/pdf\/10.1177\/1550147720954678","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,9,4]],"date-time":"2020-09-04T05:21:31Z","timestamp":1599196891000},"score":1,"resource":{"primary":{"URL":"http:\/\/journals.sagepub.com\/doi\/10.1177\/1550147720954678"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,9]]},"references-count":15,"journal-issue":{"issue":"9","published-print":{"date-parts":[[2020,9]]}},"alternative-id":["10.1177\/1550147720954678"],"URL":"https:\/\/doi.org\/10.1177\/1550147720954678","relation":{},"ISSN":["1550-1477","1550-1477"],"issn-type":[{"type":"print","value":"1550-1477"},{"type":"electronic","value":"1550-1477"}],"subject":[],"published":{"date-parts":[[2020,9]]}}}