Codify — Article

DoD to set up collaborative cybersecurity education program for colleges

The bill directs the Secretary of Defense to partner with academic institutions to shape curriculum, set standards, and measure outcomes—without authorizing new funding.

The Brief

The Establishing Cyber Security Educational Programs at Academic Institutions Act requires the Secretary of Defense to create a program that works with U.S. academic institutions to strengthen cybersecurity education and training. The program’s aims include curriculum development, promotion of community participation, and the integration of best practices to better prepare students for cyber roles.

This matters because it places the Department of Defense in a coordinating role over cyber education standards and practice, which can influence how colleges train future cyber personnel and how employers—including government and industry—identify qualified candidates. The bill emphasizes alignment with existing workforce frameworks while explicitly not authorizing additional appropriations.

At a Glance

What It Does

The bill directs the Secretary of Defense to establish and run a collaborative program with academic institutions to develop cybersecurity curricula, competencies, community outreach, and shared best practices. It requires the Secretary to designate qualifying institutions in categories such as cyber defense, cyber operations, and cyber research, and to work with other federal cyber agencies to identify metrics and produce an annual benefits-versus-costs report.

Who It Affects

Affected parties include U.S. institutions of higher education that conduct Department of Defense–sponsored research and senior military colleges, the Department of Defense and the federal cybersecurity agencies it must consult, students and faculty in cyber programs, and public- and private-sector employers who hire cyber graduates.

Why It Matters

The bill centralizes DoD influence over curriculum and workforce definitions by linking designations to recognized workforce frameworks and regional accreditation, which could shift educational priorities and encourage institutions to align programs with defense and broader national cyber needs. Because the bill contains no appropriation authorization, it signals expectant reliance on existing budgets and institutional contributions.

More articles like this one.

A weekly email with all the latest developments on this topic.

Unsubscribe anytime.

What This Bill Actually Does

Section 2 drives the substance: DoD will create a program to work closely with colleges to shape cybersecurity education. The statute requires the Secretary to develop curriculum standards and competencies that reflect workforce frameworks recognized by federal cyber actors.

To avoid duplicative federal efforts, the Secretary must consult a specified set of agencies—NSA, CISA, NIST, FBI, and NSF—and may consult other agencies and private-sector representatives as needed.

The bill instructs the Secretary to identify and formally designate academic institutions that meet the program’s standards in one or more categories—cyber defense, cyber operations, and cyber research. The designation criteria are tied to established frameworks (including the Defense Cyber Workforce Framework and NIST’s workforce framework), regional accreditation, demonstrated outreach to surrounding communities, leadership in workforce development and faculty cultivation, multidisciplinary adoption of cyber best practices, and efforts to address federal, state, local, territorial, and Tribal needs.On measurement, the Secretary must coordinate with the consulted agencies to choose metrics and annual reporting requirements that quantify how well the program meets its objectives and to compare benefits to costs.

The statute sets an explicit reporting cadence: the Secretary must deliver a report to Congress not later than one year after enactment and annually thereafter showing benefits to participants and to the Department against costs borne by participating institutions and program sponsors.Two statutory limits matter for implementation. First, the rule of construction preserves other agencies’ statutory authorities and says the new program cannot be read to supersede them.

Second, the law does not authorize additional appropriations for the program; in practice, that means DoD must use existing resources or rely on institutions and sponsors to bear costs. Finally, the bill defines “academic institution” narrowly: it covers institutions of higher education that conduct DoD‑sponsored research and senior military colleges, which focuses the program on research-active campuses and service academies or similar colleges.

The Five Things You Need to Know

1

The bill requires the Secretary of Defense to consult specifically with the NSA, CISA, NIST, FBI, and NSF when designing and coordinating the program.

2

Designations are to be made in one or more categories—cyber defense, cyber operations, and cyber research—using criteria tied to workforce frameworks such as the Defense Cyber Workforce Framework and NIST SP 800‑181 (Revision 5) or its successors.

3

The Secretary must identify metrics in coordination with the consulted agencies and submit a report to Congress no later than one year after enactment and annually thereafter comparing benefits to participants and to the Department against costs borne by participating institutions and program sponsors.

4

The statute explicitly disclaims authority to authorize additional appropriations for the program, shifting the financial burden to existing DoD resources, participating academic institutions, or sponsors.

5

The bill limits eligible ‘academic institutions’ to U.S. institutions of higher education that conduct Department of Defense–sponsored research and senior military colleges.

Section-by-Section Breakdown

Every bill we cover gets an analysis of its key sections. Expand all ↓

Section 1

Short title

Gives the Act its name: the Establishing Cyber Security Educational Programs at Academic Institutions Act. This is purely a stylistic provision but is the reference name to use in legal and administrative materials.

Section 2(a)

Program establishment and objectives

Directs the Secretary of Defense to establish and carry out a collaborative program with academic institutions to develop cybersecurity educational programs. The provision lists program tasks—establishing curriculum standards, developing competencies, promoting community outreach, integrating best practices, and advancing solutions to education challenges—making clear the program’s scope covers both curricular design and broader institutional practices.

Section 2(b)

Consultation and coordination

Requires the Secretary to consult with five named federal entities (NSA, CISA, NIST, FBI, and NSF) to prevent duplication or conflict among federal cyber education efforts. It also authorizes broader consultation with other agencies, private-sector representatives, and academic organizations. Practically, this creates a required interagency and public‑private coordination layer to align standards and avoid competing programs.

3 more sections
Section 2(c)

Designation criteria for academic institutions

Directs DoD to designate eligible institutions that meet program standards in cyber defense, operations, or research. The bill ties criteria to national workforce frameworks, emphasizes community outreach and leadership in workforce development, requires regional accreditation, and prioritizes collaboration with government and private employers. These mechanics set both qualitative expectations (leadership, outreach) and formal anchors (accreditation, framework alignment).

Section 2(d)

Metrics and annual reporting

Obligates the Secretary to work with consulted agencies to develop metrics and annual data reporting that assess program effectiveness, and to make data and best practices available to those agencies. It requires a benefits-versus-costs report to Congress beginning within one year of enactment and each year after, comparing program benefits to participants and to the Department against costs paid by participating institutions and sponsors—an unusual statutory demand for a formal cost‑benefit accounting.

Section 2(e)–(f)

Limits and definitions

Contains two operational limits: the rule of construction preserving other agencies’ statutory authorities and an explicit statement that the Act does not authorize new appropriations. It also defines ‘academic institution’ narrowly to include only institutions of higher education that conduct DoD‑sponsored research and senior military colleges—both of which shape who can receive designation and who will likely shoulder program costs.

At scale

This bill is one of many.

Codify tracks hundreds of bills on Education across all five countries.

Explore Education in Codify Search →

Who Benefits and Who Bears the Cost

Every bill creates winners and losers. Here's who stands to gain and who bears the cost.

Who Benefits

  • Students in designated programs — They gain curricula aligned to nationally recognized cyber workforce frameworks, which can improve job readiness and signal competency to employers in government and industry.
  • Designated academic institutions — Designation can enhance reputation, attract research partners and students, and deepen relationships with federal agencies and private employers seeking cyber talent.
  • Department of Defense — The Department gains a coordinated pipeline of graduates trained to match defense workforce frameworks and can influence standards that meet operational needs.
  • State, local, Tribal governments and communities — The bill’s outreach and community emphasis can expand local training opportunities and help fill public-sector cyber staffing gaps where participating institutions engage regionally.
  • Private-sector employers and government hiring managers — They benefit from clearer signals about graduate competencies and a larger pool of candidates whose training maps to recognized frameworks.

Who Bears the Cost

  • Participating academic institutions — Because the bill does not authorize new funding, colleges will likely need to cover program compliance, curriculum development, accreditation upkeep, and outreach costs from existing budgets or outside sponsorships.
  • Department of Defense — DoD will need to allocate personnel time and existing resources for program management, interagency coordination, and reporting requirements without fresh appropriations.
  • Other federal agencies and interagency staff — Agencies named for consultation must commit staff time and data to coordination and metric development, increasing workload without guaranteed funding.
  • Non‑designated institutions and minority-serving colleges — Institutions that do not meet the narrow eligibility or designation criteria may lose competitive positioning for partnerships and may struggle to compete for students and sponsors.
  • Program sponsors and private partners — Firms or donors may face expectations to underwrite curriculum development or internships if institutions and DoD lack appropriated funds.

Key Issues

The Core Tension

The central tension is between accelerating a coordinated, defense‑aligned cyber workforce and preserving equitable, academically grounded education across diverse institutions: the bill promises standardization and closer alignment with national security needs, but it does so without new funding and with eligibility rules that favor research‑active and military colleges, risking concentration of benefits and growing disparities in who can participate and lead cyber education.

The statute creates a powerful coordination role for DoD while simultaneously refusing to authorize new funds. That combination forces a reliance on internal reprogramming, institutional cost‑sharing, and external sponsorships—an implementation path that could skew participation toward better‑resourced institutions and leave smaller or resource‑constrained colleges behind.

The designation mechanism amplifies this risk: designations tied to accreditation and research activity favor established, research‑intensive campuses and senior military colleges rather than community colleges or purely teaching institutions that nevertheless educate many cyber practitioners.

Interagency coordination is a design strength but also a practical complication. The bill requires consultation with five specific federal entities and permits broader engagement; aligning workforce frameworks across agencies that have different missions and hiring needs is administratively heavy and could slow rollout.

The requirement for an annual benefits‑versus‑costs report introduces another difficulty: defining and measuring “benefit” to participants and to the Department (versus direct or indirect costs) depends on long‑term placement, retention, and performance data that colleges and DoD may not collect consistently. Finally, the statute stops short of specifying how designations will be used—whether as a grant qualification, a hiring preference signal, or merely a recognition—leaving significant discretion to DoD and uncertainty for institutions considering investment.

Try it yourself.

Ask a question in plain English, or pick a topic below. Results in seconds.