A computer security course in the undergraduate computer science curriculum
Collegiate Microcomputer
Computer security training and education: a needs analysis
SP '96 Proceedings of the 1996 IEEE Symposium on Security and Privacy
An introductory course in network administration
SIGCSE '03 Proceedings of the 34th SIGCSE technical symposium on Computer science education
A network project course based on network processors
SIGCSE '03 Proceedings of the 34th SIGCSE technical symposium on Computer science education
A remotely accessible networking laboratory
Journal of Computing Sciences in Colleges
Protocol creation as a pedagogical tool in a computer networks course
Journal of Computing Sciences in Colleges
Design of a laboratory for information security education
Security education and critical infrastructures
Designing and implementing a cyberwar laboratory exercise for a computer security course
Proceedings of the 35th SIGCSE technical symposium on Computer science education
Cryptography and security protocols course for undergraduate IT students
ACM SIGCSE Bulletin
An isolated, multi-platform network sandbox for teaching IT security system engineers
CITC5 '04 Proceedings of the 5th conference on Information technology education
Honeynets: an educational resource for IT security
CITC5 '04 Proceedings of the 5th conference on Information technology education
Design of a distributed computer security lab
Journal of Computing Sciences in Colleges
A real-time information warfare exercise on a virtual network
Proceedings of the 36th SIGCSE technical symposium on Computer science education
Configuring a multi-course lab for system-level projects
Proceedings of the 36th SIGCSE technical symposium on Computer science education
Embedding information security curricula in existing programmes
Proceedings of the 1st annual conference on Information security curriculum development
A laboratory based capstone course in computer security for undergraduates
Proceedings of the 37th SIGCSE technical symposium on Computer science education
Proceedings of the 37th SIGCSE technical symposium on Computer science education
TinkerNet: a low-cost and ready-to-deploy networking laboratory platform
ACE '06 Proceedings of the 8th Australasian Conference on Computing Education - Volume 52
Stingray: a hands-on approach to learning information security
Proceedings of the 7th conference on Information technology education
Black Hat/White Hat: an aggressive approach to the graduate computer security course
Journal of Computing Sciences in Colleges
SEED: a suite of instructional laboratories for computer SEcurity EDucation
Proceedings of the 38th SIGCSE technical symposium on Computer science education
Taking the network on the road: Portable network solutions for computer security educators
Journal on Educational Resources in Computing (JERIC)
Laboratory experiments for network security instruction
Journal on Educational Resources in Computing (JERIC)
A student-managed networking laboratory
Proceedings of the 8th ACM SIGITE conference on Information technology education
SEED: A Suite of Instructional Laboratories for Computer Security Education
Journal on Educational Resources in Computing (JERIC)
Building a network testbed for internet security research
Journal of Computing Sciences in Colleges
An internet role-game for the laboratory of network security course
Proceedings of the 13th annual conference on Innovation and technology in computer science education
Two approaches to an information security laboratory
Communications of the ACM - Surviving the data deluge
An experimental environment for teaching Java security
Proceedings of the 6th international symposium on Principles and practice of programming in Java
Developing a reconfigurable network lab
SIGITE '08 Proceedings of the 9th ACM SIGITE conference on Information technology education
Laboratory design for wireless network attacks
Proceedings of the 5th annual conference on Information security curriculum development
An information assurance curriculum for commanding officers using hands-on experiments
Proceedings of the 40th ACM technical symposium on Computer science education
SpringSim '09 Proceedings of the 2009 Spring Simulation Multiconference
Design of a virtual computer lab environment for hands-on information security exercises
Journal of Computing Sciences in Colleges
Proceedings of the 2010 ACM conference on Information technology education
Journal of Computer Systems, Networks, and Communications
Hands-on lab exercises implementation of DoS and MiM attacks using ARP cache poisoning
Proceedings of the 2011 Information Security Curriculum Development Conference
Switch's CAM table poisoning attack: hands-on lab exercises for network security education
ACE '12 Proceedings of the Fourteenth Australasian Computing Education Conference - Volume 123
Training cyber-defense and securing information assets using student blue teams
Proceedings of the 14th annual ACM SIGITE conference on Information technology education
Hi-index | 0.00 |
This paper discusses the use of an isolated network laboratory to teach computer security using persistent cooperative groups and an active learning approach. Computer security and computer security education are areas of increasing importance as computer systems become more interconnected. When offered, undergraduate and graduate computer security courses are routinely taught using a traditional lecture format. If the course includes a class project, the class project is limited in scope and constitutes a relatively small portion of the student's grade. This paper examines a different approach in which the class project is the dominant factor in the student's grade. The students work in persistent cooperative teams as either a black or gold team. Black teams attempt to break into other black team computers or attack the gold team. The gold team operates Windows NT, LINUX, and Solaris-based servers and attempts to defend their servers and role-play system administrators. The entire exercise takes place in an isolated lab so as to separate student class activities from the rest of the departmental intranet. Four years of experience running the class with this format suggests that the use of persistent cooperative groups and active learning are effective approaches for teaching network security and are preferred over a lecture-based course.