Security Magazine logo
  • Sign In
  • Create Account
  • Sign Out
  • My Account
  • NEWS
  • MANAGEMENT
  • PHYSICAL
  • CYBER
  • BLOG
  • COLUMNS
  • EXCLUSIVES
  • SECTORS
  • EVENTS
  • MEDIA
  • MORE
  • EMAG
  • SIGN UP!
cart
facebook twitter linkedin youtube
  • NEWS
  • Security Newswire
  • Technologies & Solutions
  • MANAGEMENT
  • Leadership Management
  • Enterprise Services
  • Security Education & Training
  • Logical Security
  • Security & Business Resilience
  • Profiles in Excellence
  • PHYSICAL
  • Access Management
  • Fire & Life Safety
  • Identity Management
  • Physical Security
  • Video Surveillance
  • Case Studies (Physical)
  • CYBER
  • Cybersecurity News
  • More
  • COLUMNS
  • Cyber Tactics
  • Leadership & Management
  • Security Talk
  • Career Intelligence
  • Leader to Leader
  • Cybersecurity Education & Training
  • EXCLUSIVES
  • Annual Guarding Report
  • Most Influential People in Security
  • The Security Benchmark Report
  • The Security Leadership Issue
  • Top Guard and Security Officer Companies
  • Top Cybersecurity Leaders
  • Women in Security
  • SECTORS
  • Arenas / Stadiums / Leagues / Entertainment
  • Banking/Finance/Insurance
  • Construction, Real Estate, Property Management
  • Education: K-12
  • Education: University
  • Government: Federal, State and Local
  • Hospitality & Casinos
  • Hospitals & Medical Centers
  • Infrastructure:Electric,Gas & Water
  • Ports: Sea, Land, & Air
  • Retail/Restaurants/Convenience
  • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
  • Industry Events
  • Webinars
  • Solutions by Sector
  • Security 500 Conference
  • MEDIA
  • Videos
  • Podcasts
  • Polls
  • Photo Galleries
  • Videos
  • Cybersecurity & Geopolitical Discussion
  • Ask Me Anything (AMA) Series
  • MORE
  • Call for Entries
  • Classifieds & Job Listings
  • Continuing Education
  • Newsletter
  • Sponsor Insights
  • Store
  • White Papers
  • EMAG
  • eMagazine
  • This Month's Content
  • Advertise
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityManagementSecurity Enterprise ServicesSecurity Leadership and ManagementLogical SecuritySecurity & Business ResilienceSecurity Education & TrainingCybersecurity News

Creation of a customized college student cybersecurity awareness online learning solution

By Stanley J. Mierzwa, Brian Lau, Cary Harr, Garvin Tam, Iassen Christov, Bruno Soares Lima
cybersecurity-data-protection freepik
July 22, 2021

Many businesses, agencies, for-profit and non-profit organizations have implemented cybersecurity awareness training programs for their staff.  This makes perfect sense given the importance of the last line of cyber defense existing with a person.  Although businesses have been wise to administer cyber awareness training, it is equally essential for such a practice to occur for students in higher education.  As students enter the realm of pursuing their said and interested degrees, they will most definitely be using technology in both the academic setting and in their private or personal lives. Students are often very busy with their studies, perhaps also working to supplement their education, involved in sporting and other extracurricular activities, and with this time constraint can make them vulnerable to cyber threats. This short write-up will outline a short case study of a developed cybersecurity defense and awareness training system for students at Kean University.  The created and ultimate technical solution was engineered by D2 Cybersecurity, a firm that partners with educators and government agencies to create industry environment-appropriate and comprehensive training solutions.

Although cybersecurity awareness training can be valuable to all students, a survey on the topic found that it can be particularly effective among non-Computer Science or Information Technology majors. The reasons are many, but the reliance on technology as students for their coursework and their personal affairs can be valuable to share with family and friends.

 

Kean University Student Cybersecurity Awareness Training Solution

All incoming Freshman, as well as transfer students to Kean University, are presented with a cybersecurity awareness training module as part of their transition to the university. This timing is appropriate as students begin their journey and will most certainly rely on technology in their learning. Additional cybersecurity awareness resources are made available to the campus community and the external community on the Center for Cybersecurity resources website.

The particular modules in the training can be adjusted and have recently been modified to reflect the following five key or core foundational and relevant cybersecurity awareness or hygiene topics:

  • Phishing and Ransomware
  • Web Browsing and Social Media
  • Passwords
  • Mobile Security
  • Public Wi-Fi and Home Networks

Selection on the current key learning modules were selected based on the most prevalent variety of malicious attacks and threats that can be experienced by students.

In addition to educating and bringing awareness to understand the variety of threats that exist in cyber, the developed training solution provides recommendations for students to consider should they end up a victim. For example, if a student became the victim of a Phishing attempt, suggestions for the next immediate steps are provided to help the student with approachable guidance. This same Phishing exploitation could involve immediately changing passwords of compromised accounts; updating security settings, contacting the institution and Information Technology administrator, and possibly notifying a major credit bureau.

The customized solution is presented to students for approximately 45 minutes, depending on the length of time required to complete the interactive assessments peppered through the training. The solution is engaging in providing videos, cartoons, photos, and bright graphics that are both culturally appropriate for a diverse population but specific to the needs of college students. In one study, it was suggested that using well-thought-out exercises relevant to the students’ experiences and appropriate with their level of cybersecurity knowledge can make a positive difference in their awareness.

 

Overarching Benefits of Student Cybersecurity Awareness

There are many benefits to students and all those around them regarding understanding cyber threats through awareness and employing proper cyber hygiene.  Bringing a focused set of content topics on cyber defense and awareness strategies will help students to be well prepared while engaged in coursework and other college-related activities.  In turn, with student’s better cybersecurity prepared and aware, the schools and colleges of the students will be in a better frame than if the students were not put through awareness training. Additionally, as the students embark on their desired careers, they will most certainly include the use of technology, and it is expected that they understand the importance of data protection and cyber defense.

 

Cybersecurity Training Technical Implementation

The current web-based training system is hosted on a Windows-based server utilizing the Open-source Moodle Learning Management System.  Updated training modules were created and available using HTML5 to permit use on a variety of browsers and devices (tablets, smartphones, desktops, and laptops) and exclude the need for such add-ons as Flash. The system is administered with staff in the Center for Cybersecurity at Kean University. Tasks often associated with the training provisioning are ensuring all incoming freshman, as well as transferring students, are configured to receive automated emails with instructions for logging into the site and gaining access to the training modules.

The inclusion of interactive screens will contribute towards a mixture of learning content and keep the student engaged. In Figure 1 below, the created solution encourages students to click on a segment to gain further knowledge surrounding Ransomware prevention.

Figure 1. Ransomware prevention interactive screen.

ransomware prevention

In another interactive example, Figure 2 demonstrates a suspicious email and challenges the student to click on four elements that are considered suspicious and represent a potential threat.

Figure 2. Scam email identification of elements.

scam identification

 

Given the incredibly fast pivot to taking courses from home or away from the classroom as a result of the COVID-19 pandemic, threat content related to technologies more often used at home, such as Wi-Fi, routers, smart devices, and mobile devices, is included in the solution.

Figure 3. Protecting and awareness of smart device threats.

smart device protections

 

Relevance of Student Cybersecurity Training Outside of Awareness

Having in place a cybersecurity awareness outreach training program in place can add value in areas outside of protecting the students and university. For those institutions pursuing the National Security Agency Center for Academic Excellence in Cyber Defense designation, there exists a requirement to demonstrate evidence of a sound cybersecurity posture and plan. A suggestion for such evidence is to reveal the institution’s plans and practices for employing awareness training. Providing staff and students with the necessary resources and easily available will provide towards this need. In other potential examples, any organization going through an internal or external assessment on cybersecurity or information security will undoubtedly include the topic of staff, employee, and possibly third-party cyber awareness training and will only add positive value for those reviewing the practices of the audited firm.

 

Conclusion

The current cybersecurity education and awareness market include many different vendor products from which to choose. Such solutions can meet a variety of organizational needs. Regardless of the solutions selected by educational institutions, it will be important to keep the content updated, relevant, and engaging for the student population. Having the ability to customize a solution for college students is important, and will resonate with this population if aligned with technologies the students may be using. For example, current students have become familiar with cryptocurrency, and thus, having cybersecurity awareness training that includes at least some content on the topic will add value.

Taking cybersecurity awareness further, formal academic programs in cybersecurity exist in the Kean University Criminal Justice programs in the College of Business and Public Management as well as the Information Technology and Computer Science programs in the College of Natural, Applied and Health Sciences. Calls have been made to promote universities and, specifically, business schools to mandate core cybersecurity training and privacy protection in their programs and not just computer science. Over the past several semesters, one common observation made by the author is the trend of students taking introductory courses in Cybersecurity from many disciplines, including Psychology, Communications, STEM, and Computational Science and Engineering. This is a valuable addition to a student’s background, regardless of their chosen academic and career aspirations.

KEYWORDS: cyber awareness cyber security higher education cybersecurity risk management

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Stanley Mierzwa is Director and Lecturer at the Center for Cybersecurity at Kean University.

Brian Lau is Vice President at D2 Cybersecurity.

Cary Harr is Chief Learning Strategist at D2 Cybersecurity.

Garvin Tam is the Cybersecurity Training Program Administrator at D2 Cybersecurity.
Iassen Christov is an Academic Specialist at the Center for Cybersecurity at Kean University.
Bruno Soares Lima is a Graduate Assistant at the Center for Cybersecurity at Kean University.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Cybersecurity
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Cyber Tactics Column
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Cybersecurity
    By: Charles Denyer
Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

Security’s Top 5 – 2024 Year in Review

Security’s Top 5 – 2024 Year in Review

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

White post office truck

Department of Labor Sues USPS Over Texas Whistleblower Termination

Internal computer parts

Critical Software Vulnerabilities Rose 37% in 2024

Coding

AI Emerges as the Top Concern for Security Leaders

Person working on laptop

Governance in the Age of Citizen Developers and AI

patient at healthcare reception desk

Almost Half of Healthcare Breaches Involved Microsoft 365

2025 Security Benchmark banner

Events

June 24, 2025

Inside a Modern GSOC: How Anthropic Benchmarks Risk Detection Tools for Speed and Accuracy

For today's security teams, making informed decisions in the first moments of a crisis is critical.

September 29, 2025

Global Security Exchange (GSX)

 

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • healthcare

    Bringing greater attention and awareness to cybersecurity practices in the global public health sector

    See More
  • NECO Main Building

    New England College of Optometry implements contact-tracing wearables to boost COVID-response and enable in-person learning

    See More
  • education k-12 responsive default security

    How educators can secure their online learning environments

    See More
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing

Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!