Using an isolated network laboratory to teach advanced networks and security
Proceedings of the thirty-second SIGCSE technical symposium on Computer Science Education
Information system security curricula development
CITC4 '03 Proceedings of the 4th conference on Information technology curriculum
Educating Students to Create Trustworthy Systems
IEEE Security and Privacy
How the Cyber Defense Exercise Shaped an Information-Assurance Curriculum
IEEE Security and Privacy
SP 800-16. Information Technology Security Training Requirements: a Role- and Performance-Based Model
Towards information assurance (IA) curricular guidelines
Proceedings of the 2010 ITiCSE working group reports
A method for incorporating usable security into computer security courses
Proceeding of the 44th ACM technical symposium on Computer science education
Hi-index | 0.00 |
To authorize and initiate necessary investments and enforce appropriate policies and procedures, decision-makers need to have at least a fair understanding of computer security fundamentals. This paper presents the course design and the laboratory settings that have been developed for, and used within, the high rank officer curriculum at the Swedish National Defence College. The developed course looks at computer security from an attack versus defend viewpoint, meaning that computer attacks are studied to learn about prevention and self-defense. The paper discusses the pedagogical challenges related to education of high rank officers and similar personnel in light of recently-held courses and contrasts the course relative to similar undertakings. A standpoint taken is that computer security is best taught using hands-on laboratory experiments focusing on problem solving assignments. This is not undisputed since, e.g., high rank officers are busy people who are not fond of getting stuck learning about the peripherals.