A Dataset of Cybersecurity Study Program and Courses Detail Description in Europe including the ENISA Skill Roles Description for Analyzing the Alignment between the Courses and Skill in Cybersecurity Area
Description
1. Course Detail Description This dataset provides detailed information about various courses, including: Course ID: A unique identifier for each course. Course Title: The name of the course. Course Description: A detailed description of what the course covers, including its objectives and the key topics it addresses. This dataset also maps each course ID to the corresponding University Name and Study Program through other related datasets. The study programs have been abbreviated to simplify visualization and analysis. 2. ENISA Skill Set This dataset, based on the ENISA framework, outlines a comprehensive set of skills relevant to cybersecurity professionals. It includes: Skill Categories: Broad categories representing areas such as cybersecurity operations, compliance, auditing, and threat intelligence. Skill Descriptions: Detailed phrases describing specific skills and expertise required in the field of cybersecurity. These may include technical skills like "penetration testing" and "vulnerability assessment," as well as more strategic skills like "risk management strategies" and "cybersecurity standards." 3. Extracted Skills The extracted_skill file contains of the result of extracted skill from the profiles and courses description. It include Commons_Skill and Spesialized_Skill. 4. final combined the final_combined file contains of a concatenated original description with extracted skill, the original description only and the extracted skill which already finishes a process of preprocessing. 5. Skill Phrases The skill_phrases.txt file contains a list of manually extracted phrases representing various skills needed in cybersecurity. These phrases were derived from the ENISA Skill Set dataset and serve as annotations to both the Course Detail Description and the Skill Set. They cover a wide range of competencies, including: Technical Skills: Such as "malware analysis," "penetration testing," and "cybersecurity simulations." Strategic Skills: Such as "cybersecurity strategy," "risk management," and "compliance auditing." These skills provide a granular understanding of the expertise required for different cybersecurity roles. 6. Task Phrases The task_phrases.txt file includes manually extracted phrases that describe specific tasks or responsibilities in the field of cybersecurity. Like the Skill Phrases, these were derived from the ENISA Skill Set and serve as annotations for both the Course Detail Description and the Skill Set. These tasks include: Operational Tasks: Such as "monitor effectiveness," "conduct ethical hacking," and "implement controls." Strategic Tasks: Like "develop risk management strategies," "evaluate vulnerabilities," and "organize test plans." These phrases offer insight into the actions and activities that professionals are expected to carry out in their cybersecurity roles