Using an isolated network laboratory to teach advanced networks and security
Proceedings of the thirty-second SIGCSE technical symposium on Computer Science Education
Designing and implementing a cyberwar laboratory exercise for a computer security course
Proceedings of the 35th SIGCSE technical symposium on Computer science education
A laboratory based capstone course in computer security for undergraduates
Proceedings of the 37th SIGCSE technical symposium on Computer science education
A portable computer security workshop
Journal on Educational Resources in Computing (JERIC)
Laboratory experiments for network security instruction
Journal on Educational Resources in Computing (JERIC)
Journal of Computer Systems, Networks, and Communications
Hi-index | 0.00 |
There has been an increased awareness on the importance of a hands-on laboratory component in information security education in recent years. We developed a series of laboratory exercises for wireless network security. These laboratory exercises introduce to the students the following wireless network attacks: Wardriving, Eavesdropping, WEP Key Cracking/Decryption, Man in the Middle, MAC Spoofing, ARP Cache Poisoning, and ARP Request Replay. Open source tools such as Aircrack-ng, Cain and Abel, and Mac Makeup are used in these laboratory exercises to demonstrate how these attacks are conducted. The laboratory exercises were presented to two information security related courses at this university. The student feedback was very positive. Future work will include refining the laboratory design, conducting evaluation of the exercises extensively, developing more laboratory exercises for wireless network security and developing laboratory exercises for the Linux platform.