Using virtual machines for teaching system administration
Journal of Computing Sciences in Colleges
Technology Education at the US Military Academy
IEEE Security and Privacy
The use of a collegiate cyber defense competition in information security education
InfoSecCD '05 Proceedings of the 2nd annual conference on Information security curriculum development
Laboratory experiments for network security instruction
Journal on Educational Resources in Computing (JERIC)
Two approaches to an information security laboratory
Communications of the ACM - Surviving the data deluge
Hi-index | 0.00 |
Our duty as educators is to develop students who have the mental tools to make the right choices. We must teach ethics like we teach any other topic using the best educational techniques and assessing and evaluating student learning. We can match wits with an adversary only with an understanding of the way that adversary thinks. Disseminating attack knowledge widely does present some risk, but not nearly as much as leaving attack knowledge to the bad guys.