Certified Ethical Hacker v.10 Online Course - a Case Study

10/17/2018
by   Tam N. Nguyen, et al.
0

CEH v.10 Certification Self-study Course is an online course preparing learners for one of the most prestige cyber security certifications in the world - the Certified Ethical Hacker (CEH) v.10 Certification. Due to a pay wall and the practical rather than theoretical nature, most researchers have limited exposure to this course. For the first time, this paper will analyze the course's instructional design based on the highest national standards and related peer-reviewed published research works. The sole intention is to push the course to a higher ground, making it the best online course for cyber security. More importantly, the paper's instructional design evaluation strategy can well be extended and applied to any other online course' instructional design review and/or evaluation process.

READ FULL TEXT
research
07/14/2023

Want to Raise Cybersecurity Awareness? Start with Future IT Professionals

As cyber threats endanger everyone, from regular users to computing prof...
research
11/05/2020

Knowledge-Base Practicality for Cybersecurity Research Ethics Evaluation

Research ethics in Information and Communications Technology has seen a ...
research
06/15/2023

The pop song generator: designing an online course to teach collaborative, creative AI

This article describes and evaluates a new online AI-creativity course. ...
research
01/23/2018

Modelling and Using Response Times in Online Courses

Each time a learner in a self-paced online course is trying to answer an...
research
01/21/2014

Harmony Search Algorithm for Curriculum-Based Course Timetabling Problem

In this paper, harmony search algorithm is applied to curriculum-based c...
research
04/06/2022

Co-constructing Shared Values and Ethical Practice for the Next Generation: Lessons Learned from a Curriculum on Information Ethics

We present the motivation, design, outline, and lessons learned from an ...
research
04/13/2023

Murder by design: Design thinking approach for pre-emptive cybernetic security design

In an ever more connected world, awareness has grown towards the hazards...

Please sign up or login with your details

Forgot password? Click here to reset