IBM Systems Journal - End-to-end security
A model for summer undergraduate research experiences in emerging technologies
Proceedings of the 37th SIGCSE technical symposium on Computer science education
Black Hat/White Hat: an aggressive approach to the graduate computer security course
Journal of Computing Sciences in Colleges
Network security auditing as a community-based learning project
Proceedings of the 38th SIGCSE technical symposium on Computer science education
InfoSecCD '06 Proceedings of the 3rd annual conference on Information security curriculum development
Teaching students to hack: ethical implications in teaching students to hack at the university level
InfoSecCD '06 Proceedings of the 3rd annual conference on Information security curriculum development
Laboratory experiments for network security instruction
Journal on Educational Resources in Computing (JERIC)
Proceedings of the 39th SIGCSE technical symposium on Computer science education
Teaching the principles of the hacker curriculum to undergraduates
Proceedings of the 41st ACM technical symposium on Computer science education
A capstone exercise for a cybersecurity course
Journal of Computing Sciences in Colleges
The blunderdome: an offensive exercise for building network, systems, and web security awareness
CSET'10 Proceedings of the 3rd international conference on Cyber security experimentation and test
Training students to steal: a practical assignment in computer security education
Proceedings of the 42nd ACM technical symposium on Computer science education
Teaching security labs with web applications, buffer overflows and firewall configurations
Journal of Computing Sciences in Colleges
The human element in cyber security: a study on student motivation to act
Proceedings of the 2012 Information Security Curriculum Development Conference
Using network packet generators and snort rules for teaching denial of service attacks
Proceedings of the 18th ACM conference on Innovation and technology in computer science education
Top 10 hands-on cybersecurity exercises
Journal of Computing Sciences in Colleges
Hi-index | 0.00 |
Teaching "hacking" as a legitimate means of training students in how to protect a future employer's data assets has been introduced into courses with increasing frequency. The introduction of "red teaming" and attack-based exercises into information security courses presents a potential ethical problem. This paper explores the issues involved in designing an information security course with lab components that involve destructive actions.