Short Report: Proposal for New Course on Cybersecurity Strategies

Short Report: Proposal for New Course on Cybersecurity Strategies
Moesha Moncrieffe
University of Maryland Global Campus
April 23, 2024 Comment by Jack Downs: Nice title page!
Short Report: Proposal for New Course on Cybersecurity Strategies
Date: March 23, 2023
To: Program Director
From: Moesha Moncrieffe
Subject: Proposal for New Course on Cybersecurity Strategies
Dear Program Director,
I am forwarding this proposal of adding a new course to the Cybersecurity Strategies training that remediates the current curriculum. I am pleased to submit this report, which provides a comprehensive justification for this suggestion. I believe that implementing this training is the key to improving the capacity of our students to successfully deal with the various changing problems in their career line. Comment by Jack Downs: I would say “submitting.” Forwarding implies it’s coming from someone besides you, via you. Comment by Jack Downs: In this memo, I would at least include a working title for the class, as well as whether you see is it as an elective, or a mandatory.
Thank you.
Moesha Moncrieffe
Executive Summary Comment by Jack Downs: Begin your ES—which is the first section of the report itself—on its own page. The other sections can be started mid-page, except for the References section, which is also its own page.
The primary purpose of the course is to review the inadequate situation as well as to promote advanced cyber-techniques such as countermeasures and solutions of spear phishing, phishing, and whaling attacks, which are becoming a widespread and complex type of cyber-assaults. After realizing that the majority of the existing cybersecurity curriculum lacks the training for combating unconventional email threats like phishing attacks, learners become vulnerable to the upcoming developments in that area of expertise. Throughout this class, students will receive practical tools to help them identify, suppress, and provide a spot-on solution to highly professional email fraud scams. Through active sessions in the form of exercises and real-world case studies from the industry, students will not only be able to transfer theoretical knowledge to practical situations but also build efficient crisis-management skills, which will distinguish them from cybersecurity professionals. Comment by Jack Downs: This is really confusing. Which inadequate situation? The lack of the course itself, which you’re describing here? Or the lack of coverage of cyber countermeasures? Comment by Jack Downs: I would italicize these terms. Comment by Jack Downs: …assault Comment by Jack Downs: This is an odd word choice. Do you mean “open to” here? That’s something different. Comment by Jack Downs: Good place for a paragraph break. Comment by Jack Downs: comma
The Problem
Cyber threats, ranging from spear phishing to whaling, are one of the most serious risks faced by organizations across the globe. Such unlawful activities correspond to a distortion of human nature based on illusions among the masses, allowing them to penetrate secrets and harm simultaneously. However, although the cyber threat environment is gradually gaining pace, existing cyber security education regimens still need to be more effective in resolving these targeted dangers (Prem & Reddy, 2019). Although subjects like cybersecurity are highlighted as pillars of some courses, there is lacking concentration on email threats that are explicitly developed for earmarking attacks. Comment by Jack Downs: This is so zen as to be incomprehensible. I would strike. Comment by Jack Downs: Not sure what this term adds here. Do you mean “targeting”?
Therefore, the educational program becomes incomplete and an obstacle to creating educated cybersecurity specialists. At the same time, it presents the organizations with a potential cyber offense hazard. Research demonstrates an urgent need to implement a more thorough analysis of cyber threat goals for graduates in computer science classes to better deal with this problem. Prem and Reddy (2019) state that educational institutions could be considered the most important in curbing this situation, providing focused courses in spear phishing, phishing, and whaling attacks. Using hands-on activities allows the students to acquire the tools required to manage the difficulties of contemporary cybersecurity while being confident and competent to embrace momentary change by combining existing cases, industry issues, and the views of the experts. Comment by Jack Downs: I think this is unnecessarily provocative. Comment by Jack Downs: By “it” do you mean the course itself? That’s a bit of a stretch. Comment by Jack Downs: This is a great place for a paragraph break. Comment by Jack Downs: This also doesn’t seem to serve a purpose in the context.
Reinforcing the academic program by stressing email threats of phishing and others will produce graduates who are watchful and discreet and can lessen the possibility of cyber-attacks in the future. Instance, practical skills among students are possible by providing a learning environment involving a hands-on approach to counter-breaching threats, incident response, and risk management. In conjunction with these programs, the industry expert sessions that are held in a classroom where students interact while they explore options for their possible career paths will reinforce their ability to apply theory in a practical environment. Besides that, educational organizations with a thorough understanding of such spear phishing, phishing, and whaling attacks foster a stable desired firm framework that is unable to be penetrated by cyber-attacks. Students equipped with the expertise of cyber security of the latest technology are different from the rest as they are the ones who can defend vital information, keep the systems free of online privacy issues, and utilize digital resources (Pienta et al., 2020). Lastly, cybersecurity training that omits details on technical aspects of some emails will educate staff and help organizations have a good cyber stand against hackers from all over the world. Comment by Jack Downs: ? Comment by Jack Downs: I would italicize these terms too. Comment by Jack Downs: This is a great place for a paragraph break. Comment by Jack Downs: It sounds like you’re claiming in this sentence that UMGC is protecting itself by offering the class. Do you really want to offer this as a reason for the class? Comment by Jack Downs: This is a great place for a paragraph break. Comment by Jack Downs: Not sure what you’re referring to here, but how does eliminating technical details educate staff and help organizations?
The Solution: A New Class
The course will thoroughly cover the latest attacks, such as spear phishing, phishing, and whaling, and will be equipped with the most recent defensive cybersecurity tactics to fight the attacks. The combination of theory teaching enriched with a practical application of what students will experience firsthand is certain to stimulate engagement in the fine details of email cyber-threats. Mishra et al. (2018) say that by means of interactive assignments, such as mimicking phishing attackers and confronting real-life cases of management of cyber risk, the students will acquire the experience to understand and combat cyber risk. On top of that, an organization that will invite leaders in different fields to present lectures briefing students on the recent cybersecurity trends and practices will be provided. Most importantly, this will give students a taste of real-world issues, which, in turn, will supplement the theoretical knowledge of current cybersecurity challenges. Comment by Jack Downs: I would strike. Comment by Jack Downs: …an organization…will be provided…” Is this referring to UMGC itself? Comment by Jack Downs: Strike comma
By explicitly focusing on hacking email, this educational course attempts to tackle a severe weakness in students’ cybersecurity curriculum. Students will gain problem-solving, pattern recognition, and critical thinking skills that will aid them in targeting, preventing, and managing email-based cybercrimes through individual instruction and practical sessions. However, as students pass the course, they will not only join but also be able to actively participate in implementing phishing, spear phishing, and whaling attack protection strategies. Thus, the students will be responsible for ensuring that the organization they are part of is secure by employing appropriate measures against the evolving cyber threats. Through training on targeted email threats, classes seek to close the gap in the cybersecurity curricula by enabling students with the required skills and knowledge to confront the ever-evolving cybersecurity threat landscape. An accumulation of appropriate training as well as practical learning activities will be an ideal method for students to acquire a comprehensive set of skills to identify, combat, and counter this kind of advanced email-based cyberattack (Alkhalil et al., 2021). Through the hands-on implementation of exercises and simulations, students will reinforce the idea of cyber attackers’ tactical and technical methods, thereby improving their detection and dealing with the problems effectively. Comment by Jack Downs: This is a great place for a paragraph break. Comment by Jack Downs: This is a great place for a paragraph break.
Training, including literary attacks such as phishing, whale phishing, and spear phishing, gives the learner key competencies that he may use to build a career in information security (Prem & Reddy, 2019). With cybersecurity technology equipment and knowledge about the latest cyberattack patterns, graduates will be essential to making the cyber landscape more immune to cyber threats. This course will facilitate the fusion of power and knowledge needed to create cyber defenses that are fully capable of mitigating cyber risks. This will ultimately nurture the firm’s overall resilience to possible security threats and, as a result, will contribute to the creation of a strong cyber-secured environment for all parties involved. Comment by Jack Downs: Literary?
Courses on combating spear phishing, phishing, and whaling attacks should be compulsorily integrated into the cybersecurity curriculum. Embracing such a strategy guarantees students the training to identify, counter, and manage advanced email-based cyber-attacks. Through this class, the information gap in the syllabus is filled as the students will receive the skill and intellect needed to become professionals in the cybersecurity field capable of securing their organizations with cyber threat dynamics. Comment by Jack Downs: So you are saying this should be a mandatory semester-long class? Comment by Jack Downs: This seems like an odd word choice. The course will increase a student’s intellect?
Alkhalil, Z., Hewage, C., Nawaf, L., & Khan, I. (2021). Phishing attacks: A recent comprehensive study and a new anatomy.  Frontiers in Computer Science,  3, 563060.
Pienta, D., Thatcher, J. B., & Johnston, A. (2020). Protecting a whale in a sea of phish.  Journal of information technology,  35(3), 214-231.
Prem, S. P., & Reddy, B. I. (2019). Phishing and anti-phishing techniques.  International Research Journal of Engineering and Technology,  6(7), 1446-1452.
Mishra, A. K., Tripathy, A. K., & Swain, S. (2018, December). Analysis and prevention of phishing attacks in cyberspace. In  2018 First International Conference on Secure Cyber Computing and Communication (ICSCCC) (pp. 430-434). IEEE.
Moesha – I’m not sure you’ve made a case that the contents of this course justify a full semester. Good work overall on the draft.
Your final short report is due seven days from the date of this file. If you have any questions about my comments, please let me know. 174.8 / 230


(USA, AUS, UK & CA PhD. Writers)


The Best Custom Essay Writing Service

About Our Service

We are an online academic writing company that connects talented freelance writers with students in need of their services. Unlike other writing companies, our team is made up of native English speakers from countries such as the USA, UK, Canada, Australia, Ireland, and New Zealand.

Qualified Writers

  • At, most of our writers are degree-holding native speakers of English who are familiar with various writing styles. Our writers are proficient in many fields, including Economics, Business, Accounting, Finance, Medicine, Chemistry, Literature, Mathematics, Statistics, and many others.
  • Making our customers happy is an important part of our service. So do not be surprised if you get your paper well before the deadline!
  • We pay a lot of attention to ensuring that you get excellent customer service. You can contact our Customer Support Representatives 24/7. When you order from us, you can even track the progress of your paper as it is being written!
  • We are attentive to the needs of our customers. Therefore, we follow all your instructions carefully so that you can get the best paper possible.
  • It matters to us who writes for you, and we are serious about selecting the best candidates.
  • Our writers are always learning something new, so they are familiar with the latest developments in the scientific world and can write papers with updated information and the latest findings.

Our Guarantees:

  • Quality original papers that follow your instructions carefully.
  • On time delivery – you get the paper before the specified deadline.
  • Attentive Customer Support Representatives available 24/7.
  • Complete confidentiality – we do not share you details or papers with anybody else.