Using an isolated network laboratory to teach advanced networks and security
Proceedings of the thirty-second SIGCSE technical symposium on Computer Science Education
Counter hack: a step-by-step guide to computer attacks and effective defenses
Counter hack: a step-by-step guide to computer attacks and effective defenses
Implementing a minimal lab for an undergraduate network security course
Journal of Computing Sciences in Colleges
Open Source Security Tools: Pratical Guide to Security Applications, A
Open Source Security Tools: Pratical Guide to Security Applications, A
An isolated, multi-platform network sandbox for teaching IT security system engineers
CITC5 '04 Proceedings of the 5th conference on Information technology education
Proceedings of the 36th SIGCSE technical symposium on Computer science education
Teaching students to hack: curriculum issues in information security
Proceedings of the 36th SIGCSE technical symposium on Computer science education
A capstone exercise for a cybersecurity course
Journal of Computing Sciences in Colleges
Hi-index | 0.00 |
A graduate applied computer science course in security is described. Laboratory exercises using both Linux and Windows preceded the real-time audit of a client as a culminating exercise. The course's scope and content are offered here as one alternative for departments creating security courses in their curricula. Reactions of the students, client, administration, and instructor are noted. A description of the environment in which the course exists is included, because that factor cannot be disregarded in evaluating the efficacy of this aggressive approach in another institution.