A real-time information warfare exercise on a virtual network
Proceedings of the 36th SIGCSE technical symposium on Computer science education
A laboratory based capstone course in computer security for undergraduates
Proceedings of the 37th SIGCSE technical symposium on Computer science education
Is attack better than defense?: teaching information security the right way
InfoSecCD '06 Proceedings of the 3rd annual conference on Information security curriculum development
Guide for designing cyber security exercises
E-ACTIVITIES'09/ISP'09 Proceedings of the 8th WSEAS International Conference on E-Activities and information security and privacy
Dependability metrics
Organizing large scale hacking competitions
DIMVA'10 Proceedings of the 7th international conference on Detection of intrusions and malware, and vulnerability assessment
Hands-on lab exercises implementation of DoS and MiM attacks using ARP cache poisoning
Proceedings of the 2011 Information Security Curriculum Development Conference
Hit 'em where it hurts: a live security exercise on cyber situational awareness
Proceedings of the 27th Annual Computer Security Applications Conference
Disturbed playing: another kind of educational security games
CSET'12 Proceedings of the 5th USENIX conference on Cyber Security Experimentation and Test
Hi-index | 0.00 |
Live exercises represent a valuable tool to teach the practical aspects of security and the dynamics of network-based attack and defense techniques. However, these exercises are very difficult to organize and execute. For this reason, there are very few courses that offer live exercise as an integral part of the class work. This paper describes a series of live exercises that have been used in a graduate-level Computer Science course on network security. For each exercise, the setup, execution, and lessons learned are discussed The intended audience of this paper is represented by instructors - especially in colleges and universities - who want to start using this type of instructional tools but have no experience and are unsure of the possible pitfalls in their implementation.