Halting the hacker: a practical guide to computer security
Halting the hacker: a practical guide to computer security
Hacking Exposed: Network Security Secrets and Solutions,Third Edition
Hacking Exposed: Network Security Secrets and Solutions,Third Edition
Web Hacking: Attacks and Defense
Web Hacking: Attacks and Defense
Managing Information Security Risks: The Octave Approach
Managing Information Security Risks: The Octave Approach
Intrusion Detection with SNORT (Bruce Perens' Open Source Series): Advanced IDS Techniques Using Snort, Apache, MySQL, PHP, and ACID
Counter Hack Reloaded: A Step-by-Step Guide to Computer Attacks and Effective Defenses (2nd Edition)
Counter Hack Reloaded: A Step-by-Step Guide to Computer Attacks and Effective Defenses (2nd Edition)
Preventing Web Attacks with Apache
Preventing Web Attacks with Apache
How to Break Web Software: Functional and Security Testing of Web Applications and Web Services
How to Break Web Software: Functional and Security Testing of Web Applications and Web Services
Web Security for Network and System Administrators
Web Security for Network and System Administrators
Implementing Database Security and Auditing: Includes Examples for Oracle, SQL Server, DB2 UDB, Sybase
Incident response: a strategic guide to handling system and network security breaches
Incident response: a strategic guide to handling system and network security breaches
Journal of Computing Sciences in Colleges
Developing a multifunctional network laboratory for teaching and research
Proceedings of the 10th ACM conference on SIG-information technology education
Hi-index | 0.00 |
As people increasingly depend on computers and network systems, security auditing has become one of the most effective security practices to achieve defense-in-depth in organizations. It follows an effective process to measure policies, procedures and controls in identifying and managing risks associated with networks and various operating systems. This has raised the need to develop specialists in the cyber security auditing field. This paper presents the author's experience in developing an undergraduate course on security auditing. It discusses the course design, procedures, and a series of innovative laboratory projects that are aimed to simulate real-world security concerns. This course is one of the core courses of the newly established B. S. in security program in the Department of Network, Security, and Systems Administration at RIT. This paper also reports experiences learned by both the students and instructors when the course was first offered. The course was well received by students, albeit there are areas for improvement.