Towards a Digital Forensics Competency-Based Program: Making Assessment Count

Rose Shumba

Abstract


This paper describes an approach that UMUC has initiated to revise its graduate programs to a Competency-Based Education (CBE) curriculum. The approach, which is Learning Demonstration (LD) centric, includes the identification of learning goals and competences, identification and description of the LDs, mapping of the LDs to the competences, scripting the LDs, placing the LDs into the respective courses, validating the developed materials, and the development of the open learning resources. Programs in the Cybersecurity and Information Assurance Department, including the Digital Forensics and Cyber Investigations program, are being revised. An LD centric approach to curriculum development helps align programs to the needs of employers, and standards of accreditation bodies. The rationale behind this paper is twofold: to support course development through providing reusable competency inventory, LD inventory, and open resources and to provide assessment by defining competences of an individual as a function of knowledge and skills. This is a work in progress.

Keywords


learning goal, digital forensics, competences, competency-based education, learning demonstration

Full Text:

XML

References


Endicott-Popovsky B, Frincke D (2006). Embedding forensic capabilities into networks: addressing inefficiencies in digital forensics investigations. In: Proceedings of the IEEE workshop on information assurance: computer forensics. West Point, NY: United States Military Academy; June 2006.

Nelson B, Phillips A, Enfinger F, Steuart C, (2008), Guide to Computer Forensics and Investigations, 4th Edition, Course Technology, .

UMUC (2014). Cybersecurity Technical Program. Retrieved from: http://www.umuc.edu/academic-programs/masters-degrees/cybersecurity.cfm.

UMUC(2014). Cybersecurity Policy Program. Retrieved from: http://www.umuc.edu/academic-programs/masters-degrees/cybersecurity-policy.cfm.

UMUC (2014). Digital Forensics and Cyber Investigation Program. Retrieved from: http://www.umuc.edu/academic-programs/masters-degrees/digital-forensics-and-cyber-investigations.cfm.

UMUC (2014),. Information Technology with Information Assurance Specialization Program..Retrieved from: http://www.umuc.edu/academic-programs/masters-degrees/information-technology-with-information-assurance-specialization.cfm.

Mendenhall, R (2012). What Is Competency-Based Education? Retrieved from: http://www.huffingtonpost.com/dr-robert-mendenhall/competency-based-learning-b_1855374.html.

Western Governors University (2014). Why WGU — Competency-Based Learning. Retrieved from: http://www.wgu.edu/why_WGU/competency_based_approach.

University of Wisconsin. University of Wisconsin Flexible Option FAQs. Retrieved from: http://www.wisconsin.edu/news/2012/11-2012/FAQ_FlexOption.pdf.

Krathwohl, D(2002). A Revision of Bloom's Taxonomy.Theory into Practice, 2002.

National Initiative of Cybersecurity Education (NICE). National Cybersecurity Workforce Framework. Retrieved from: http://csrc.nist.gov/nice/framework/national_cybersecurity_workforce_framework_03_2013_version1_0_for_printing.pdf.

NSA (2012). Centers of Excellence in Information Assurance and Cyber Defense Education. Retrieved from: https://www.nsa.gov/ia/academic_outreach/nat_cae..

CDFAE, (2012), Special Investigations Defense Crime Center, Air Force. The National Centers of Digital Forensics Academic Excellence (CDFAE) Program. Retrieved from: http://www.dc3.mil/cyber-training/cdfae.

DoD. (2010)DoD 8570, Information Assurance Support Environment. Retrieved from: http://iase.disa.mil/Pages/index.aspx

Klein-Collins R(2013), National Institute for Learning Outcomes Assessment. Retrieved from: http://www.learningoutcomeassessment.org/documents/Occasional%20Paper%2020.pdf

Learning in the News, (2014). Designing Competency-based Training with Bloom’s Taxonomy. Retrieved from: http://mbmtraining.wordpress.com/2010/12/03/designing-competency-based-training-with-blooms-taxonomy/

The Colloquium (2008). Retrieved from http://www.thecolloquium.com/Page5CoreModel.htm

Wax, D (2014), When Assessment of Learning Counts: Competency-based Degree Programs in the USA. A presentation at UMUC.

National Postsecondary Education Cooperative (NPEC),(2002), Defining and Assessing Learning: Exploring Competency-Based Initiatives. Retrieved from: http://nces.ed.gov/pubs2002/2002159.pdf

Global Media Center, (2014). UMUC to Receive World Affairs Council’s “Educator of the Year” Award. Retrieved from: http://www.umuc.edu/globalmedia/recognition-of-global-education.cfm Responders, 2nd Edition.

Withycombe, C (2014), Deschutes’s Digital Forensics Lab Stretched, The Bulletin. Retrieved from http://www.bendbulletin.com/localstate/2731689-151/digital-detectives#

Gannett, A (2012), Want CSI Without the Blood? Investigate Computer Forensics. USA Today Retrieved from : http://usatoday30.usatoday.com/money/jobcenter/workplace/bruzzese/story/2012-01-31/profession-that-hunts-cybercriminals/52909566/1

Chacko, T, (2014), Moving toward competency-based education: Challenges and the way forward, Archives of Medicine and health Science, Volume 2, Issue 2.


Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 4.0 International License.

Creative Commons License
This work is licensed under a Creative Commons Attribution 4.0 International License.

(c) 2006-2015 Association of Digital Forensics, Security and Law