The rapid evolution of cyber threats has intensified the need for advanced educational frameworks that equip future professionals with the skills to tackle emerging challenges. Artificial Intelligence (AI) has become a transformative force in cybersecurity, offering enhanced threat detection, automated response mechanisms, and predictive analytics. However, integrating AI into cybersecurity higher education remains a challenge due to curriculum gaps, faculty expertise limitations, and resource constraints. This paper proposes a multi-dimensional framework to incorporate AI into cybersecurity education through hands-on training, faculty development, and curriculum restructuring. By leveraging AI-driven methodologies and industry collaborations, the framework aims to bridge the skills gap and prepare students for real-world cybersecurity challenges. The study highlights key strategies for improving workforce readiness and ensuring that graduates possess the competencies required to navigate the dynamic threat landscape effectively.
References
[1]
George, A.S. and George, A.H. (2024) Riding the Wave: An Exploration of Emerging Technologies Reshaping Modern Industry. PartnersUniversalInternationalInnovationJournal, 2, 15-38.
[2]
Kalinaki, K. (2024) Ransomware Threat Mitigation Strategies for Protecting Critical Infrastructure Assets. In: Kalinaki, K., Ed., RansomwareEvolution, CRC Press, 120-143. https://doi.org/10.1201/9781003469506-10
[3]
Ghaffar, A., Arshad, A., Abbas, S. and Tahir, M. (2024) Artificial Intelligence in In-formation Technology: Enhancing Efficiency, Security, and Innovation: A Descriptive Review. SpectrumofEngineeringSciences, 2, 289-309.
[4]
Sarker, I.H. (2024) Introduction to Ai-Driven Cybersecurity and Threat Intelligence. In: Sarker, I.H., Ed., AI-DrivenCybersecurityandThreatIntelligence, Springer Nature Switzerland, 3-19. https://doi.org/10.1007/978-3-031-54497-2_1
[5]
Belhadi, A., Mani, V., Kamble, S.S., Khan, S.A.R. and Verma, S. (2021) Artificial Intelligence-Driven Innovation for Enhancing Supply Chain Resilience and Performance under the Effect of Supply Chain Dynamism: An Empirical Investigation. AnnalsofOperationsResearch, 333, 627-652. https://doi.org/10.1007/s10479-021-03956-x
[6]
Sağlam, R.B., Miller, V. and Franqueira, V.N.L. (2023) A Systematic Literature Review on Cyber Security Education for Children. IEEETransactionsonEducation, 66, 274-286. https://doi.org/10.1109/te.2022.3231019
[7]
Schmitt, M. and Flechais, I. (2024) Digital Deception: Generative Artificial Intelligence in Social Engineering and Phishing. ArtificialIntelligenceReview, 57, Article No. 324. https://doi.org/10.1007/s10462-024-10973-2
[8]
Khan, A., Jhanjhi, N., Hamid, D.H.H., Omar, H.A.H.B.H., Amsaad, F. and Wassan, S. (2025) Future Trends and Challenges in Cybersecurity and Generative AI. Reshaping CyberSecurity with Generative AI Techniques, 491-522. https://doi.org/10.4018/979-8-3693-5415-5.ch014
[9]
Ali, J., Singh, S.K., Jiang, W., Alenezi, A.M., Islam, M., Daradkeh, Y.I. and Mehmood, A. (2025) A Deep Dive into Cybersecurity Solutions for AI-Driven IoT-Enabled Smart Cities in Advanced Communication Networks. Computer Communications, 229, Article ID: 108000. https://doi.org/10.1016/j.comcom.2024.108000
[10]
Alam, A. and Mohanty, A. (2023) Educational Technology: Exploring the Convergence of Technology and Pedagogy through Mobility, Interactivity, AI, and Learning Tools. CogentEngineering, 10, Article ID: 2283282. https://doi.org/10.1080/23311916.2023.2283282
[11]
Uspenskyi, S. (2025) How Many AI Companies Will There Be in 2025 (Latest AI statistics). Springs. https://springsapps.com/knowledge/how-many-ai-companies-will-there-be-in-2024-latest-ai-statistics
[12]
Gartner (2025) Gartner Forecasts Worldwide IT Spending to Grow 9.8% in 2025. Gartner Newsroom. https://www.gartner.com/en/newsroom/press-releases/2025-01-21-gartner-forecasts-worldwide-it-spending-to-grow-9-point-8-percent-in-2025
[13]
Berger, G., Dawson, N. AND Yuan, A. (2024) AI’s Expanding Reach: Mapping the Spread of AI Skills across America. https://static1.squarespace.com/static/6197797102be715f55c0e0a1/t/672cceeb32cb4a7a5c8d0b38/1730989803141/AI+Bulletin+OCT2024+-+Final2.pdf
[14]
Weiner, S., Lake, R. AND Rosner, J. (2024) AI Is Evolving, but Teacher Prep Is Lagging: A First Look at Teacher Preparation Program Responses to AI. Center on Reinventing Public Education. https://crpe.org/
[15]
Elkhatat, A.M., Elsaid, K. and Almeer, S. (2023) Evaluating the Efficacy of AI Content Detection Tools in Differentiating between Human and AI-Generated Text. InternationalJournalforEducationalIntegrity, 19, Article No. 17. https://doi.org/10.1007/s40979-023-00140-5
[16]
Palmer, K. (2024) Most Campus Tech Leaders Say Higher Ed Is Unprepared for AI’s Rise. Inside Higher Ed. https://www.insidehighered.com/news/tech-innovation/artificial-intelligence/2024/10/16/campus-tech-leaders-say-higher-ed
[17]
Morgan, S. (2021) Cybersecurity Jobs Report: 3.5 Million Unfilled Positions in 2025. Cybersecurity Ventures. https://cybersecurityventures.com/jobs-report-2021/
[18]
Lascaze, E., Corduneanu, R., Kreit, B., Cantrell, S., Kulkarni, A. and Rifkin, D. (2024) AI in the Workplace. Deloitte Insights. Deloitte Center for Integrated Research. https://www2.deloitte.com/us/en/insights/topics/talent/ai-in-the-workplace.html
[19]
Law, M. (2024) O’Reilly: Bridging the Cybersecurity Skills Gap. Cyber Magazine. https://cybermagazine.com/articles/global-survey-reveals-critical-ai-security-skills-shortage
[20]
Sniderman, B., Kearns-Manolatos, D. and Thomas, C. (2024) Gen AI Investment Opportunities Center on Data, Cybersecurity, and Cloud, Deloitte Survey Finds. Deloitte Insights. https://www2.deloitte.com/us/en/insights/topics/emerging-technologies/ai-investment-opportunities-tech-ecosystem.html
[21]
Inside Higher Ed (2024) 2024 Survey of Campus Chief Technology/Information Officers. https://www.insidehighered.com/reports/2024/10/14/2024-survey-campus-chief-technologyinformation-officers
[22]
Ponemon Institute (2024) State of AI in Cybersecurity 2024. https://mixmode.ai/state-of-ai-in-cybersecurity-2024-download/
[23]
Lakshman Havish, K. (2024) Cybersecurity in Higher Education: A Roadmap for Universities to Prepare for the AI Era. CXOtoday. https://cxotoday.com/story/cybersecurity-in-higher-education-a-roadmap-for-universities-to-prepare-for-the-ai-era/
[24]
Lu, M. (2024) AI Is Much More of an Opportunity than a Threat to Universities. Times Higher Education. https://www.timeshighereducation.com/blog/ai-much-more-opportunity-threat-universities
[25]
Roessler, A. (2024) Universities Prepare Students for Life and Work in an AI World. MinnPost. https://www.minnpost.com/education/2024/11/universities-prepare-students-for-life-and-work-in-an-ai-world/
[26]
Southworth, J., Migliaccio, K., Glover, J., Glover, J., Reed, D., McCarty, C., et al. (2023) Developing a Model for AI across the Curriculum: Transforming the Higher Education Landscape via Innovation in AI Literacy. Computers and Education: ArtificialIntelligence, 4, Article ID: 100127. https://doi.org/10.1016/j.caeai.2023.100127
Camacho, N.G. (2024) The Role of AI in Cybersecurity: Addressing Threats in the Digital Age. JournalofArtificialIntelligenceGeneralScience, 3, 143-154. https://doi.org/10.60087/jaigs.v3i1.75
[29]
CICIDS2017 Dataset (2017) Canadian Institute for Cybersecurity Intrusion Detection System Dataset 2017. https://www.unb.ca/cic/datasets/ids-2017.html
[30]
Zoghi, Z. and Serpen, G. (2023) unsw‐nb15 Computer Security Dataset: Analysis through Visualization. Security and Privacy, 7, e331. https://doi.org/10.1002/spy2.331
[31]
Dube, R. (2023) Faulty Use of the CIC-IDS 2017 Dataset in Information Security Research. JournalofComputerVirologyandHackingTechniques, 20, 203-211. https://doi.org/10.1007/s11416-023-00509-7
[32]
Ansel, J., Yang, E., He, H., Gimelshein, N., Jain, A., Voznesensky, M., etal. (2024) PyTorch 2: Faster Machine Learning through Dynamic Python Bytecode Transformation and Graph Compilation. Proceedingsofthe 29thACMInternationalConferenceonArchitecturalSupportforProgrammingLanguagesandOperatingSystems, La Jolla, 27 April 27-1 May 2024., 929-947. https://doi.org/10.1145/3620665.3640366
[33]
Detection, A., Mehta, T., Kachhoria, R., Jaiswal, S., Kale, S., Kannan, R. and Mahajan, R.A. (2024) 17 Emails Classification. Data-Centric Artificial Intelligence for Multidisciplinary Applications, 271.
[34]
Liu, F. and Panagiotakos, D. (2022) Real-World Data: A Brief Review of the Methods, Applications, Challenges and Opportunities. BMCMedicalResearchMethodology, 22, Article No. 287. https://doi.org/10.1186/s12874-022-01768-6
[35]
Regulwar, G.B., Mahalle, A., Pawar, R., Shamkuwar, S.K., Kakde, P.R. and Tiwari, S. (2024) Big Data Collection, Filtering, and Extraction of Features. In: Darwish, D., Ed., Big Data Analytics Techniques for Market Intelligence, IGI Global, 136-158. https://doi.org/10.4018/979-8-3693-0413-6.ch005
[36]
Mujahid, M., Rustam, F., Shafique, R., Chunduri, V., Villar, M.G., etal. (2023) Analyzing Sentiments Regarding ChatGPT Using Novel BERT: A Machine Learning Approach. Information, 14, Article 474. https://doi.org/10.3390/info14090474
[37]
Jáñez-Martino, F., Alaiz-Rodríguez, R., González-Castro, V., Fidalgo, E. and Alegre, E. (2022) A Review of Spam Email Detection: Analysis of Spammer Strategies and the Dataset Shift Problem. ArtificialIntelligenceReview, 56, 1145-1173. https://doi.org/10.1007/s10462-022-10195-4
[38]
Altwaijry, N., Al-Turaiki, I., Alotaibi, R. and Alakeel, F. (2024) Advancing Phishing Email Detection: A Comparative Study of Deep Learning Models. Sensors, 24, Article 2077. https://doi.org/10.3390/s24072077
[39]
Arazzi, M., Arikkat, D.R., Nicolazzo, S., Nocera, A. and Conti, M. (2023) NLP-Based Techniques for Cyber Threat Intelligence. arXiv: 2311.08807.
[40]
Kamalov, F., Santandreu Calonge, D. and Gurrib, I. (2023) New Era of Artificial Intelligence in Education: Towards a Sustainable Multifaceted Revolution. Sustainability, 15, Article 12451. https://doi.org/10.3390/su151612451
[41]
Xia, J., Li, M. and Li, J. (2024) Comparative Analysis Vision of Worldwide AI Courses. arXiv: 2407.16881. https://doi.org/10.48550/arXiv.2407.16881
[42]
University of New South Wales. AI Guidelines and Framework. UNSW Teaching Gateway. https://www.teaching.unsw.edu.au/ai/guidelines
[43]
ADAPT (2024) AI Transforms Australian Education with Enhanced Security and Privacy. https://adapt.com.au/resources/articles/digital-transformation/ai-transforms-australian-education-with-enhanced-security-and-privacy/
[44]
Rouleau, N. and Murugan, N.J. (2024) The Risks and Rewards of Embodying Artificial Intelligence with Cloud‐based Laboratories. AdvancedIntelligentSystems, 7, Article ID: 2400193. https://doi.org/10.1002/aisy.202400193
[45]
Awiszus, K., Bell, Y., Lüttringhaus, J., Svindland, G., Voß, A. and Weber, S. (2023) Building Resilience in Cybersecurity: An Artificial Lab Approach. JournalofRiskandInsurance, 91, 753-800. https://doi.org/10.1111/jori.12450
[46]
Wang, T., Zhou, N. and Chen, Z. (2025) CyberMentor: AI Powered Learning Tool Platform to Address Diverse Student Needs in Cybersecurity Education. arXiv: 2501.09709.
[47]
UNSW Sydney (2024) Educational Technology Roadmap 2024-2028. https://www.education.unsw.edu.au/news-events/news/educational-technology-roadmap-2024-2028
[48]
Alaryani,, M., Alremeithi, S., Al Ali, F. and Ikuesan, R. (2024) Penthack: Ai-Enabled Penetration Testing Platform for Knowledge Development. EuropeanConferenceonCyberWarfareandSecurity, 23, 27-36. https://doi.org/10.34190/eccws.23.1.2493
[49]
Kaur, R., Gabrijelčič, D. and Klobučar, T. (2023) Artificial Intelligence for Cybersecurity: Literature Review and Future Research Directions. Information Fusion, 97, Article ID: 101945.
[50]
Alazmi, S. (2023) Enhancing the Performance of Web Application Security Testing: An In-Depth Analysis and Optimization of Web Vulnerability Scanners. Master’s Thesis, University of Idaho.
[51]
Altulaihan, E.A., Alismail, A. and Frikha, M. (2023) A Survey on Web Application Penetration Testing. Electronics, 12, Article 1229. https://doi.org/10.3390/electronics12051229
Chaudhary, P.S., Khurana, M.R. and Ayalasomayajula, M. (2024) Real-World Applications of Data Analytics, Big Data, and Machine Learning. In: Singh, P., Mishra, A.R. and Garg, P., Eds., Data Analytics and Machine Learning, Springer, 237-263. https://doi.org/10.1007/978-981-97-0448-4_12
[54]
Nguyen, A., Kremantzis, M., Essien, A., Petrounias, I. and Hosseini, S. (2024) Editorial: Enhancing Student Engagement through Artificial Intelligence (AI): Understanding the Basics, Opportunities, and Challenges. JournalofUniversityTeachingandLearningPractice, 21. https://doi.org/10.53761/caraaq92
[55]
Aslan, Ö., Aktuğ, S.S., Ozkan-Okay, M., Yilmaz, A.A. and Akin, E. (2023) A Comprehensive Review of Cyber Security Vulnerabilities, Threats, Attacks, and Solutions. Electronics, 12, Article 1333. https://doi.org/10.3390/electronics12061333
[56]
Pokala, P. (2025) The Integration and Impact of Artificial Intelligence in Modern Enterprise Resource Planning Systems: A Comprehensive Review. SSRN Electronic Journal. https://doi.org/10.2139/ssrn.5069295
[57]
Stamp, M. (2022) Introduction to Machine Learning with Applications in Information Security. 2nd Edition, Chapman and Hall/CRC. https://doi.org/10.1201/9781003264873
[58]
Rana, S. and Chicone, R. (2025) Fortifying the future: Harnessing AI for Transformative Cybersecurity Training. Springer. https://doi.org/10.1007/978-3-031-81780-9
[59]
Olabanji, S.O., Marquis, Y.A., Adigwe, C.S., Ajayi, S.A., Oladoyinbo, T.O. and Olaniyi, O.O. (2024) AI-Driven Cloud Security: Examining the Impact of User Behavior Analysis on Threat Detection. AsianJournalofResearchinComputerScience, 17, 57-74. https://doi.org/10.9734/ajrcos/2024/v17i3424
[60]
Hassan, S.K. and Ibrahim, A. (2023) The Role of Artificial Intelligence in Cyber Security and Incident Response. InternationalJournalforElectronicCrimeInvestigation, 7, 49-72. https://doi.org/10.54692/ijeci.2023.0702154
[61]
Nelson, C.D. (2024) Hacking the Learning Curve: Effective Cybersecurity Education at Scale. Arizona State University.
[62]
Familoni, B.T. (2024) Cybersecurity Challenges in the Age of AI: Theoretical Approaches and Practical Solutions. ComputerScience&ITResearchJournal, 5, 703-724. https://doi.org/10.51594/csitrj.v5i3.930
[63]
He, K., Kim, D.D. and Asghar, M.R. (2023) Adversarial Machine Learning for Network Intrusion Detection Systems: A Comprehensive Survey. IEEECommunicationsSurveys&Tutorials, 25, 538-566. https://doi.org/10.1109/comst.2022.3233793
[64]
González-Pérez, L.I. and Ramírez-Montoya, M.S. (2022) Components of Education 4.0 in 21st Century Skills Frameworks: Systematic Review. Sustainability, 14, Article 1493. https://doi.org/10.3390/su14031493
[65]
Law, L. (2024) Application of Generative Artificial Intelligence (GenAI) in Language Teaching and Learning: A Scoping Literature Review. ComputersandEducationOpen, 6, Article ID: 100174. https://doi.org/10.1016/j.caeo.2024.100174
[66]
Zheng, Z., Xie, S., Dai, H.N., Chen, X. and Wang, H. (2018) Blockchain Challenges and Opportunities: A Survey. InternationalJournalofWebandGridServices, 14, 352-375. https://doi.org/10.1504/ijwgs.2018.095647
[67]
IBM (2024) IBM Report: Escalating Data Breach Disruption Pushes Costs to New Highs. IBM Newsroom. https://newsroom.ibm.com/2024-07-30-ibm-report-escalating-data-breach-disruption-pushes-costs-to-new-highs
[68]
CompTIA (2024) State of Cybersecurity 2025: Developing Strategy Using Enterprise Architecture. CompTIA. https://www.comptia.org/content/research/cybersecurity-trends-research
[69]
AlDaajeh, S., Saleous, H., Alrabaee, S., Barka, E., Breitinger, F. and Raymond Choo, K. (2022) The Role of National Cybersecurity Strategies on the Improvement of Cybersecurity Education. Computers&Security, 119, Article ID: 102754. https://doi.org/10.1016/j.cose.2022.102754
[70]
Webb, D. (2024) Top 9 Trends in Cybersecurity Careers for 2025. eSecurity Planet. https://www.esecurityplanet.com/trends/cybersecurity-careers/
[71]
Creese, S. and Joshi, A. (2025) Securing Innovation: A Leader’s Guide to Managing Cyber Risks from AI Adoption. World Economic Forum. https://www.weforum.org/stories/2025/01/a-leaders-guide-to-managing-cyber-risks-from-ai-adoption/
[72]
Institute of Data (2024) Careers in Cybersecurity: Transitioning in 2025. Institute of Data. https://www.institutedata.com/us/blog/careers-in-cybersecurity-transitioning-in-2025/
[73]
International Information System Security Certification Consortium (ISC2) (2024) Global Cybersecurity Workforce Prepares for an AI-Driven World: 2024 ISC2 Cybersecurity Workforce Study. ISC2. https://www.isc2.org/Insights/2024/10/ISC2-2024-Cybersecurity-Workforce-Study
[74]
International Information System Security Certification Consortium (2024) Employers Must Act as Cybersecurity Workforce Growth Stalls and Skills Gaps Widen. ISC2. https://www.isc2.org/Insights/2024/09/Employers-Must-Act-Cybersecurity-Workforce-Growth-Stalls-as-Skills-Gaps-Widen
[75]
Creese, S. and Jurgens, J. (2025) Artificial Intelligence and Cybersecurity: Balancing Risks and Rewards. World Economic Forum. https://reports.weforum.org/docs/WEF_Artificial_Intelligence_and_Cybersecurity_Balancing_Risks_and_Rewards_2025.pdf
[76]
Wu, M. (2024) Introducing the Cyber Jobs Dataset. Center for Security and Emerging Technology. https://cset.georgetown.edu/publication/introducing-the-cyber-jobs-dataset/
[77]
Wong, H., Chang, A. and Pugh, B. (2024) The Transformative Role of AI in Cybersecurity: Anticipating and Preparing for Future Applications and Benefits. R Street Institute. https://www.rstreet.org/commentary/the-transformative-role-of-ai-in-cybersecurity-anticipating-and-preparing-for-future-applications-and-benefits/
[78]
Jurgens, J. and Dal Cin, P. (2025) Global Cybersecurity Outlook 2025. World Eco-nomic Forum. https://www.weforum.org/publications/global-cybersecurity-outlook-2025/