STEMM Institute Press
Science, Technology, Engineering, Management and Medicine
Exploration and Practice of a Research-Driven Teaching Model for Cyberspace Security Majors in Engineering Universities
DOI: https://doi.org/10.62517/jnse.202517507
Author(s)
Gonghao Duan*
Affiliation(s)
School of Computer Science and Engineering, Wuhan Institute of Technology, Wuhan, Hubei, China *Corresponding Author
Abstract
China faces a shortage of over 3.2 million cybersecurity professionals, with a supply rate of less than 15% possessing both research experience and practical skills. However, cybersecurity education in engineering universities suffers from a disconnect between theory and cutting-edge technologies, and limited practical scenarios. This research focuses on addressing these challenges and leveraging these advantages. Its goal is to establish a comprehensive, integrated research model covering the entire freshman to senior year of university, adapting to the dynamic offensive and defensive nature of cybersecurity. The "focus" approach involves integrating individual research projects with individual courses, while the "comprehensive" approach involves integrating the entire curriculum with research resources. The research utilizes a literature analysis and case study methodology. Core achievements include: first, a phased system of "freshman enlightenment - sophomore integration - junior year practical application - senior year innovation," which reduces the research threshold by 80%; second, a three-dimensional mechanism of "laboratory openness - school-enterprise collaboration - faculty collaboration"; and third, a five-dimensional evaluation system of "student ability - teaching quality - research application - employment competitiveness + practical contribution." This model has proven effective: the winning rate of student CTF competitions has increased by 45%, the rate of matching employment has increased by 35%, the proportion of students employed by leading companies has increased by 22%, and the job adaptation period has been shortened to 1-2 months. Student research findings have been fed back into the course case library, with over 150 materials updated, forming a closed "research-teaching" loop and providing a replicable solution for cultivating cybersecurity professionals in engineering universities.
Keywords
Universities; Cyberspace Security; Scientific Research Feedback; Practice
References
[1]China Cybersecurity Industry Alliance. China Cybersecurity Talent Development White Paper (2024). Beijing: China Cybersecurity Industry Alliance, 2024. [2]Wang Jian, Li Na. Exploration of Research Feedback Teaching Path for Cyberspace Security Majors in Engineering Colleges. Computer Education, 2023, (8): 45-50. [3]Zhang Wei, Liu Min. Research on the Lagging Problem of Cybersecurity Course Content Update. Research on Higher Engineering Education, 2022, (5): 132-137. [4]Keinonen M. Using Military Cyber Operations as a Deterrent. International Conference on Cyber Warfare and Security, 2023. [5]Tang R, Zhang W. Comparative Legal Perspectives on Cyberspace Security Governance: A Review of Frameworks and Implication. Journal of Computer Science Research, 2025, 7(1): 1-10. [6]Guangdong Polytechnic Normal University. Intellectual Property Big Data Key Laboratory Research and Education Report (2023). Guangzhou: Guangdong Polytechnic Normal University, 2023. [7]Crawley E F, Malmqvist J, Östlund S, et al. Rethinking Engineering Education: The CDIO Approach. New York: Springer, 2007. [8]Thomas J W. A Review of Research on Project-Based Learning. The Journal of Engineering Education, 2000, 89(3): 205-215. [9]Qi'anxin Technology Group. White Paper on Collaborative Cybersecurity Talent Training between Schools and Enterprises. Beijing: Qi'anxin Technology Group, 2023. [10]Hurk N V D, Treur J, Roelofsma P H M P. Organizational Learning for Safety and Security Through Cyberspace: Adaptive Modelling of the Implementation of Environment Health and Safety Standards. Studies in Systems, Decision and Control, 2024:351-372. [11]Imperial College London. Quantum Communication Security Teaching Practice. IEEE Transactions on Education, 2022, 65(3): 312-318. [12]Lave J, Wenger E. Situated Learning: Legitimate Peripheral Participation. Cambridge: Cambridge University Press, 1991. [13]Song Xiaolu. Research on industrial data enhancement technology and deep latent variable modeling method based on machine learning. Beijing University of Chemical Technology, 2025. [14]Xu Yuanyuan. Research on the application of open courses in cloud computing environment. East China Normal University, 2013. [15]Karimi A. Reflections on the development of problem-based history teaching in the context of cyberspace Journal of Social Studies Education Research, 2021, 2(4):1-32. [16]Wang Shenglan, Peng Shuang. The impact of technology-enhanced learning environment on student development. China Education Informatization, 2025, 31(03): 107-117.
Copyright @ 2020-2035 STEMM Institute Press All Rights Reserved