全部 标题 作者
关键词 摘要

OALib Journal期刊
ISSN: 2333-9721
费用:99美元

查看量下载量

相关文章

更多...

Integrating AI in Cybersecurity Higher Education: A Path to Workforce Readiness

DOI: 10.4236/jilsa.2025.172005, PP. 45-67

Keywords: Cybersecurity, Artificial Intelligence, Higher Education, Workforce Development

Full-Text   Cite this paper   Add to My Lib

Abstract:

The rapid evolution of cyber threats has intensified the need for advanced educational frameworks that equip future professionals with the skills to tackle emerging challenges. Artificial Intelligence (AI) has become a transformative force in cybersecurity, offering enhanced threat detection, automated response mechanisms, and predictive analytics. However, integrating AI into cybersecurity higher education remains a challenge due to curriculum gaps, faculty expertise limitations, and resource constraints. This paper proposes a multi-dimensional framework to incorporate AI into cybersecurity education through hands-on training, faculty development, and curriculum restructuring. By leveraging AI-driven methodologies and industry collaborations, the framework aims to bridge the skills gap and prepare students for real-world cybersecurity challenges. The study highlights key strategies for improving workforce readiness and ensuring that graduates possess the competencies required to navigate the dynamic threat landscape effectively.

References

[1]  George, A.S. and George, A.H. (2024) Riding the Wave: An Exploration of Emerging Technologies Reshaping Modern Industry. Partners Universal International Innovation Journal, 2, 15-38.
[2]  Kalinaki, K. (2024) Ransomware Threat Mitigation Strategies for Protecting Critical Infrastructure Assets. In: Kalinaki, K., Ed., Ransomware Evolution, CRC Press, 120-143.
https://doi.org/10.1201/9781003469506-10
[3]  Ghaffar, A., Arshad, A., Abbas, S. and Tahir, M. (2024) Artificial Intelligence in In-formation Technology: Enhancing Efficiency, Security, and Innovation: A Descriptive Review. Spectrum of Engineering Sciences, 2, 289-309.
[4]  Sarker, I.H. (2024) Introduction to Ai-Driven Cybersecurity and Threat Intelligence. In: Sarker, I.H., Ed., AI-Driven Cybersecurity and Threat Intelligence, Springer Nature Switzerland, 3-19.
https://doi.org/10.1007/978-3-031-54497-2_1
[5]  Belhadi, A., Mani, V., Kamble, S.S., Khan, S.A.R. and Verma, S. (2021) Artificial Intelligence-Driven Innovation for Enhancing Supply Chain Resilience and Performance under the Effect of Supply Chain Dynamism: An Empirical Investigation. Annals of Operations Research, 333, 627-652.
https://doi.org/10.1007/s10479-021-03956-x
[6]  Sağlam, R.B., Miller, V. and Franqueira, V.N.L. (2023) A Systematic Literature Review on Cyber Security Education for Children. IEEE Transactions on Education, 66, 274-286.
https://doi.org/10.1109/te.2022.3231019
[7]  Schmitt, M. and Flechais, I. (2024) Digital Deception: Generative Artificial Intelligence in Social Engineering and Phishing. Artificial Intelligence Review, 57, Article No. 324.
https://doi.org/10.1007/s10462-024-10973-2
[8]  Khan, A., Jhanjhi, N., Hamid, D.H.H., Omar, H.A.H.B.H., Amsaad, F. and Wassan, S. (2025) Future Trends and Challenges in Cybersecurity and Generative AI. Reshaping CyberSecurity with Generative AI Techniques, 491-522.
https://doi.org/10.4018/979-8-3693-5415-5.ch014
[9]  Ali, J., Singh, S.K., Jiang, W., Alenezi, A.M., Islam, M., Daradkeh, Y.I. and Mehmood, A. (2025) A Deep Dive into Cybersecurity Solutions for AI-Driven IoT-Enabled Smart Cities in Advanced Communication Networks. Computer Communications, 229, Article ID: 108000.
https://doi.org/10.1016/j.comcom.2024.108000
[10]  Alam, A. and Mohanty, A. (2023) Educational Technology: Exploring the Convergence of Technology and Pedagogy through Mobility, Interactivity, AI, and Learning Tools. Cogent Engineering, 10, Article ID: 2283282.
https://doi.org/10.1080/23311916.2023.2283282
[11]  Uspenskyi, S. (2025) How Many AI Companies Will There Be in 2025 (Latest AI statistics). Springs.
https://springsapps.com/knowledge/how-many-ai-companies-will-there-be-in-2024-latest-ai-statistics
[12]  Gartner (2025) Gartner Forecasts Worldwide IT Spending to Grow 9.8% in 2025. Gartner Newsroom.
https://www.gartner.com/en/newsroom/press-releases/2025-01-21-gartner-forecasts-worldwide-it-spending-to-grow-9-point-8-percent-in-2025
[13]  Berger, G., Dawson, N. AND Yuan, A. (2024) AI’s Expanding Reach: Mapping the Spread of AI Skills across America.
https://static1.squarespace.com/static/6197797102be715f55c0e0a1/t/672cceeb32cb4a7a5c8d0b38/1730989803141/AI+Bulletin+OCT2024+-+Final2.pdf
[14]  Weiner, S., Lake, R. AND Rosner, J. (2024) AI Is Evolving, but Teacher Prep Is Lagging: A First Look at Teacher Preparation Program Responses to AI. Center on Reinventing Public Education.
https://crpe.org/
[15]  Elkhatat, A.M., Elsaid, K. and Almeer, S. (2023) Evaluating the Efficacy of AI Content Detection Tools in Differentiating between Human and AI-Generated Text. International Journal for Educational Integrity, 19, Article No. 17.
https://doi.org/10.1007/s40979-023-00140-5
[16]  Palmer, K. (2024) Most Campus Tech Leaders Say Higher Ed Is Unprepared for AI’s Rise. Inside Higher Ed.
https://www.insidehighered.com/news/tech-innovation/artificial-intelligence/2024/10/16/campus-tech-leaders-say-higher-ed
[17]  Morgan, S. (2021) Cybersecurity Jobs Report: 3.5 Million Unfilled Positions in 2025. Cybersecurity Ventures.
https://cybersecurityventures.com/jobs-report-2021/
[18]  Lascaze, E., Corduneanu, R., Kreit, B., Cantrell, S., Kulkarni, A. and Rifkin, D. (2024) AI in the Workplace. Deloitte Insights. Deloitte Center for Integrated Research.
https://www2.deloitte.com/us/en/insights/topics/talent/ai-in-the-workplace.html
[19]  Law, M. (2024) O’Reilly: Bridging the Cybersecurity Skills Gap. Cyber Magazine.
https://cybermagazine.com/articles/global-survey-reveals-critical-ai-security-skills-shortage
[20]  Sniderman, B., Kearns-Manolatos, D. and Thomas, C. (2024) Gen AI Investment Opportunities Center on Data, Cybersecurity, and Cloud, Deloitte Survey Finds. Deloitte Insights.
https://www2.deloitte.com/us/en/insights/topics/emerging-technologies/ai-investment-opportunities-tech-ecosystem.html
[21]  Inside Higher Ed (2024) 2024 Survey of Campus Chief Technology/Information Officers.
https://www.insidehighered.com/reports/2024/10/14/2024-survey-campus-chief-technologyinformation-officers
[22]  Ponemon Institute (2024) State of AI in Cybersecurity 2024.
https://mixmode.ai/state-of-ai-in-cybersecurity-2024-download/
[23]  Lakshman Havish, K. (2024) Cybersecurity in Higher Education: A Roadmap for Universities to Prepare for the AI Era. CXOtoday.
https://cxotoday.com/story/cybersecurity-in-higher-education-a-roadmap-for-universities-to-prepare-for-the-ai-era/
[24]  Lu, M. (2024) AI Is Much More of an Opportunity than a Threat to Universities. Times Higher Education.
https://www.timeshighereducation.com/blog/ai-much-more-opportunity-threat-universities
[25]  Roessler, A. (2024) Universities Prepare Students for Life and Work in an AI World. MinnPost.
https://www.minnpost.com/education/2024/11/universities-prepare-students-for-life-and-work-in-an-ai-world/
[26]  Southworth, J., Migliaccio, K., Glover, J., Glover, J., Reed, D., McCarty, C., et al. (2023) Developing a Model for AI across the Curriculum: Transforming the Higher Education Landscape via Innovation in AI Literacy. Computers and Education: Artificial Intelligence, 4, Article ID: 100127.
https://doi.org/10.1016/j.caeai.2023.100127
[27]  Carnegie Mellon University, Heinz College. (n.d.). 95-767: Principles of Computing.
https://www.heinz.cmu.edu/current-students/courses/95-767/
[28]  Camacho, N.G. (2024) The Role of AI in Cybersecurity: Addressing Threats in the Digital Age. Journal of Artificial Intelligence General Science, 3, 143-154.
https://doi.org/10.60087/jaigs.v3i1.75
[29]  CICIDS2017 Dataset (2017) Canadian Institute for Cybersecurity Intrusion Detection System Dataset 2017.
https://www.unb.ca/cic/datasets/ids-2017.html
[30]  Zoghi, Z. and Serpen, G. (2023) unsw‐nb15 Computer Security Dataset: Analysis through Visualization. Security and Privacy, 7, e331.
https://doi.org/10.1002/spy2.331
[31]  Dube, R. (2023) Faulty Use of the CIC-IDS 2017 Dataset in Information Security Research. Journal of Computer Virology and Hacking Techniques, 20, 203-211.
https://doi.org/10.1007/s11416-023-00509-7
[32]  Ansel, J., Yang, E., He, H., Gimelshein, N., Jain, A., Voznesensky, M., et al. (2024) PyTorch 2: Faster Machine Learning through Dynamic Python Bytecode Transformation and Graph Compilation. Proceedings of the 29th ACM International Conference on Architectural Support for Programming Languages and Operating Systems, La Jolla, 27 April 27-1 May 2024., 929-947.
https://doi.org/10.1145/3620665.3640366
[33]  Detection, A., Mehta, T., Kachhoria, R., Jaiswal, S., Kale, S., Kannan, R. and Mahajan, R.A. (2024) 17 Emails Classification. Data-Centric Artificial Intelligence for Multidisciplinary Applications, 271.
[34]  Liu, F. and Panagiotakos, D. (2022) Real-World Data: A Brief Review of the Methods, Applications, Challenges and Opportunities. BMC Medical Research Methodology, 22, Article No. 287.
https://doi.org/10.1186/s12874-022-01768-6
[35]  Regulwar, G.B., Mahalle, A., Pawar, R., Shamkuwar, S.K., Kakde, P.R. and Tiwari, S. (2024) Big Data Collection, Filtering, and Extraction of Features. In: Darwish, D., Ed., Big Data Analytics Techniques for Market Intelligence, IGI Global, 136-158.
https://doi.org/10.4018/979-8-3693-0413-6.ch005
[36]  Mujahid, M., Rustam, F., Shafique, R., Chunduri, V., Villar, M.G., et al. (2023) Analyzing Sentiments Regarding ChatGPT Using Novel BERT: A Machine Learning Approach. Information, 14, Article 474.
https://doi.org/10.3390/info14090474
[37]  Jáñez-Martino, F., Alaiz-Rodríguez, R., González-Castro, V., Fidalgo, E. and Alegre, E. (2022) A Review of Spam Email Detection: Analysis of Spammer Strategies and the Dataset Shift Problem. Artificial Intelligence Review, 56, 1145-1173.
https://doi.org/10.1007/s10462-022-10195-4
[38]  Altwaijry, N., Al-Turaiki, I., Alotaibi, R. and Alakeel, F. (2024) Advancing Phishing Email Detection: A Comparative Study of Deep Learning Models. Sensors, 24, Article 2077.
https://doi.org/10.3390/s24072077
[39]  Arazzi, M., Arikkat, D.R., Nicolazzo, S., Nocera, A. and Conti, M. (2023) NLP-Based Techniques for Cyber Threat Intelligence. arXiv: 2311.08807.
[40]  Kamalov, F., Santandreu Calonge, D. and Gurrib, I. (2023) New Era of Artificial Intelligence in Education: Towards a Sustainable Multifaceted Revolution. Sustainability, 15, Article 12451.
https://doi.org/10.3390/su151612451
[41]  Xia, J., Li, M. and Li, J. (2024) Comparative Analysis Vision of Worldwide AI Courses. arXiv: 2407.16881.
https://doi.org/10.48550/arXiv.2407.16881
[42]  University of New South Wales. AI Guidelines and Framework. UNSW Teaching Gateway.
https://www.teaching.unsw.edu.au/ai/guidelines
[43]  ADAPT (2024) AI Transforms Australian Education with Enhanced Security and Privacy.
https://adapt.com.au/resources/articles/digital-transformation/ai-transforms-australian-education-with-enhanced-security-and-privacy/
[44]  Rouleau, N. and Murugan, N.J. (2024) The Risks and Rewards of Embodying Artificial Intelligence with Cloud‐based Laboratories. Advanced Intelligent Systems, 7, Article ID: 2400193.
https://doi.org/10.1002/aisy.202400193
[45]  Awiszus, K., Bell, Y., Lüttringhaus, J., Svindland, G., Voß, A. and Weber, S. (2023) Building Resilience in Cybersecurity: An Artificial Lab Approach. Journal of Risk and Insurance, 91, 753-800.
https://doi.org/10.1111/jori.12450
[46]  Wang, T., Zhou, N. and Chen, Z. (2025) CyberMentor: AI Powered Learning Tool Platform to Address Diverse Student Needs in Cybersecurity Education. arXiv: 2501.09709.
[47]  UNSW Sydney (2024) Educational Technology Roadmap 2024-2028.
https://www.education.unsw.edu.au/news-events/news/educational-technology-roadmap-2024-2028
[48]  Alaryani,, M., Alremeithi, S., Al Ali, F. and Ikuesan, R. (2024) Penthack: Ai-Enabled Penetration Testing Platform for Knowledge Development. European Conference on Cyber Warfare and Security, 23, 27-36.
https://doi.org/10.34190/eccws.23.1.2493
[49]  Kaur, R., Gabrijelčič, D. and Klobučar, T. (2023) Artificial Intelligence for Cybersecurity: Literature Review and Future Research Directions. Information Fusion, 97, Article ID: 101945.
[50]  Alazmi, S. (2023) Enhancing the Performance of Web Application Security Testing: An In-Depth Analysis and Optimization of Web Vulnerability Scanners. Master’s Thesis, University of Idaho.
[51]  Altulaihan, E.A., Alismail, A. and Frikha, M. (2023) A Survey on Web Application Penetration Testing. Electronics, 12, Article 1229.
https://doi.org/10.3390/electronics12051229
[52]  Jampani, S.K. (2024) Revolutionizing Penetration Testing: Ai-Powered Automation for Enterprise Security. International Journal of Scientific Research in Computer Science, Engineering and Information Technology, 10, 1562-1569.
https://doi.org/10.32628/cseit241061201
[53]  Chaudhary, P.S., Khurana, M.R. and Ayalasomayajula, M. (2024) Real-World Applications of Data Analytics, Big Data, and Machine Learning. In: Singh, P., Mishra, A.R. and Garg, P., Eds., Data Analytics and Machine Learning, Springer, 237-263.
https://doi.org/10.1007/978-981-97-0448-4_12
[54]  Nguyen, A., Kremantzis, M., Essien, A., Petrounias, I. and Hosseini, S. (2024) Editorial: Enhancing Student Engagement through Artificial Intelligence (AI): Understanding the Basics, Opportunities, and Challenges. Journal of University Teaching and Learning Practice, 21.
https://doi.org/10.53761/caraaq92
[55]  Aslan, Ö., Aktuğ, S.S., Ozkan-Okay, M., Yilmaz, A.A. and Akin, E. (2023) A Comprehensive Review of Cyber Security Vulnerabilities, Threats, Attacks, and Solutions. Electronics, 12, Article 1333.
https://doi.org/10.3390/electronics12061333
[56]  Pokala, P. (2025) The Integration and Impact of Artificial Intelligence in Modern Enterprise Resource Planning Systems: A Comprehensive Review. SSRN Electronic Journal.
https://doi.org/10.2139/ssrn.5069295
[57]  Stamp, M. (2022) Introduction to Machine Learning with Applications in Information Security. 2nd Edition, Chapman and Hall/CRC.
https://doi.org/10.1201/9781003264873
[58]  Rana, S. and Chicone, R. (2025) Fortifying the future: Harnessing AI for Transformative Cybersecurity Training. Springer.
https://doi.org/10.1007/978-3-031-81780-9
[59]  Olabanji, S.O., Marquis, Y.A., Adigwe, C.S., Ajayi, S.A., Oladoyinbo, T.O. and Olaniyi, O.O. (2024) AI-Driven Cloud Security: Examining the Impact of User Behavior Analysis on Threat Detection. Asian Journal of Research in Computer Science, 17, 57-74.
https://doi.org/10.9734/ajrcos/2024/v17i3424
[60]  Hassan, S.K. and Ibrahim, A. (2023) The Role of Artificial Intelligence in Cyber Security and Incident Response. International Journal for Electronic Crime Investigation, 7, 49-72.
https://doi.org/10.54692/ijeci.2023.0702154
[61]  Nelson, C.D. (2024) Hacking the Learning Curve: Effective Cybersecurity Education at Scale. Arizona State University.
[62]  Familoni, B.T. (2024) Cybersecurity Challenges in the Age of AI: Theoretical Approaches and Practical Solutions. Computer Science & IT Research Journal, 5, 703-724.
https://doi.org/10.51594/csitrj.v5i3.930
[63]  He, K., Kim, D.D. and Asghar, M.R. (2023) Adversarial Machine Learning for Network Intrusion Detection Systems: A Comprehensive Survey. IEEE Communications Surveys & Tutorials, 25, 538-566.
https://doi.org/10.1109/comst.2022.3233793
[64]  González-Pérez, L.I. and Ramírez-Montoya, M.S. (2022) Components of Education 4.0 in 21st Century Skills Frameworks: Systematic Review. Sustainability, 14, Article 1493.
https://doi.org/10.3390/su14031493
[65]  Law, L. (2024) Application of Generative Artificial Intelligence (GenAI) in Language Teaching and Learning: A Scoping Literature Review. Computers and Education Open, 6, Article ID: 100174.
https://doi.org/10.1016/j.caeo.2024.100174
[66]  Zheng, Z., Xie, S., Dai, H.N., Chen, X. and Wang, H. (2018) Blockchain Challenges and Opportunities: A Survey. International Journal of Web and Grid Services, 14, 352-375.
https://doi.org/10.1504/ijwgs.2018.095647
[67]  IBM (2024) IBM Report: Escalating Data Breach Disruption Pushes Costs to New Highs. IBM Newsroom.
https://newsroom.ibm.com/2024-07-30-ibm-report-escalating-data-breach-disruption-pushes-costs-to-new-highs
[68]  CompTIA (2024) State of Cybersecurity 2025: Developing Strategy Using Enterprise Architecture. CompTIA.
https://www.comptia.org/content/research/cybersecurity-trends-research
[69]  AlDaajeh, S., Saleous, H., Alrabaee, S., Barka, E., Breitinger, F. and Raymond Choo, K. (2022) The Role of National Cybersecurity Strategies on the Improvement of Cybersecurity Education. Computers & Security, 119, Article ID: 102754.
https://doi.org/10.1016/j.cose.2022.102754
[70]  Webb, D. (2024) Top 9 Trends in Cybersecurity Careers for 2025. eSecurity Planet.
https://www.esecurityplanet.com/trends/cybersecurity-careers/
[71]  Creese, S. and Joshi, A. (2025) Securing Innovation: A Leader’s Guide to Managing Cyber Risks from AI Adoption. World Economic Forum.
https://www.weforum.org/stories/2025/01/a-leaders-guide-to-managing-cyber-risks-from-ai-adoption/
[72]  Institute of Data (2024) Careers in Cybersecurity: Transitioning in 2025. Institute of Data.
https://www.institutedata.com/us/blog/careers-in-cybersecurity-transitioning-in-2025/
[73]  International Information System Security Certification Consortium (ISC2) (2024) Global Cybersecurity Workforce Prepares for an AI-Driven World: 2024 ISC2 Cybersecurity Workforce Study. ISC2.
https://www.isc2.org/Insights/2024/10/ISC2-2024-Cybersecurity-Workforce-Study
[74]  International Information System Security Certification Consortium (2024) Employers Must Act as Cybersecurity Workforce Growth Stalls and Skills Gaps Widen. ISC2.
https://www.isc2.org/Insights/2024/09/Employers-Must-Act-Cybersecurity-Workforce-Growth-Stalls-as-Skills-Gaps-Widen
[75]  Creese, S. and Jurgens, J. (2025) Artificial Intelligence and Cybersecurity: Balancing Risks and Rewards. World Economic Forum.
https://reports.weforum.org/docs/WEF_Artificial_Intelligence_and_Cybersecurity_Balancing_Risks_and_Rewards_2025.pdf
[76]  Wu, M. (2024) Introducing the Cyber Jobs Dataset. Center for Security and Emerging Technology.
https://cset.georgetown.edu/publication/introducing-the-cyber-jobs-dataset/
[77]  Wong, H., Chang, A. and Pugh, B. (2024) The Transformative Role of AI in Cybersecurity: Anticipating and Preparing for Future Applications and Benefits. R Street Institute.
https://www.rstreet.org/commentary/the-transformative-role-of-ai-in-cybersecurity-anticipating-and-preparing-for-future-applications-and-benefits/
[78]  Jurgens, J. and Dal Cin, P. (2025) Global Cybersecurity Outlook 2025. World Eco-nomic Forum.
https://www.weforum.org/publications/global-cybersecurity-outlook-2025/

Full-Text

Contact Us

service@oalib.com

QQ:3279437679

WhatsApp +8615387084133