Using an isolated network laboratory to teach advanced networks and security
Proceedings of the thirty-second SIGCSE technical symposium on Computer Science Education
The IWAR range: a laboratory for undergraduate information assurance education
CCSC '01 Proceedings of the sixth annual CCSC northeastern conference on The journal of computing in small colleges
Building secure software: how to avoid security problems the right way
Building secure software: how to avoid security problems the right way
Building a cyberwar lab: lessons learned: teaching cybersecurity principles to undergraduates
SIGCSE '02 Proceedings of the 33rd SIGCSE technical symposium on Computer science education
Network Security Essentials: Applications and Standards
Network Security Essentials: Applications and Standards
A laboratory-based course on internet security
SIGCSE '03 Proceedings of the 34th SIGCSE technical symposium on Computer science education
The challenges of designing lab exercises for a curriculum in computer security
Journal of Computing Sciences in Colleges
Teaching network security through live exercises
Security education and critical infrastructures
Information warfare in the trenches
Security education and critical infrastructures
A dedicated undergraduate track in computer security education
Security education and critical infrastructures
An undergraduate track in computer security
Proceedings of the 8th annual conference on Innovation and technology in computer science education
Designing and implementing a cyberwar laboratory exercise for a computer security course
Proceedings of the 35th SIGCSE technical symposium on Computer science education
ACM SIGCSE Bulletin
An isolated, multi-platform network sandbox for teaching IT security system engineers
CITC5 '04 Proceedings of the 5th conference on Information technology education
A real-time information warfare exercise on a virtual network
Proceedings of the 36th SIGCSE technical symposium on Computer science education
Planning, building and operating the information security and assurance laboratory
Proceedings of the 1st annual conference on Information security curriculum development
Maintaining ethical standards for a computer security curriculum
Proceedings of the 1st annual conference on Information security curriculum development
Information security curriculum creation: a case study
Proceedings of the 1st annual conference on Information security curriculum development
Cyberattacks: a lab-based introduction to computer security
Proceedings of the 7th conference on Information technology education
SEED: A Suite of Instructional Laboratories for Computer Security Education
Journal on Educational Resources in Computing (JERIC)
Redesign of the computer science capstone course by integrating the major field test (MFT)
Journal of Computing Sciences in Colleges
Laboratory design for wireless network attacks
Proceedings of the 5th annual conference on Information security curriculum development
The blunderdome: an offensive exercise for building network, systems, and web security awareness
CSET'10 Proceedings of the 3rd international conference on Cyber security experimentation and test
Experiences in cyber security education: the MIT Lincoln laboratory capture-the-flag exercise
CSET'11 Proceedings of the 4th conference on Cyber security experimentation and test
A distributed virtual computer security lab with central authority
Computer Science Education Research Conference
Organizing and implementing the internship component of undergraduate programs in IS Security
Education and Information Technologies
An affordable virtual laboratory infrastructure to complement a variety of computing classes
Journal of Computing Sciences in Colleges
Pre-Service Teachers' Perceptions of Information Assurance and Cyber Security
International Journal of Information and Communication Technology Education
Hi-index | 0.00 |
We describe a laboratory based capstone course in computer security for undergraduates. The course is based on a sequence of hands-on laboratory exercises for four teams of students. It emphasizes defensive tools and techniques at the expense of attacks; it also takes a network centered view where student teams set up and configure entire networks. In this paper, we describe the course, how it fits into the curriculum, and the laboratory facilities we have developed. We then present the details of some of our lab exercises, and discuss the lessons that we have learned.