Proceedings of the 37th SIGCSE Technical Symposium on Computer Science Education 2006
DOI: 10.1145/1121341.1121346
|View full text |Cite
|
Sign up to set email alerts
|

A laboratory based capstone course in computer security for undergraduates

Abstract: We describe a laboratory based capstone course in computer security for undergraduates. The course is based on a sequence of hands-on laboratory exercises for four teams of students. It emphasizes defensive tools and techniques at the expense of attacks; it also takes a network centered view where student teams set up and configure entire networks. In this paper, we describe the course, how it fits into the curriculum, and the laboratory facilities we have developed. We then present the details of some of our … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
7
0
1

Year Published

2009
2009
2019
2019

Publication Types

Select...
5
4
1

Relationship

0
10

Authors

Journals

citations
Cited by 21 publications
(9 citation statements)
references
References 22 publications
(21 reference statements)
0
7
0
1
Order By: Relevance
“…What is more, no laboratory infrastructure design alone appears to propose a model to address the system resource challenges. Resolving the system resource issues is particularly important when engaging learners in core cybersecurity exercises (Chatmon et al, 2010;Krishna et al, 2005;O'Leary, 2006). The inability to address the limitations resulting from utilization is compelling.…”
Section: Resultsmentioning
confidence: 99%
“…What is more, no laboratory infrastructure design alone appears to propose a model to address the system resource challenges. Resolving the system resource issues is particularly important when engaging learners in core cybersecurity exercises (Chatmon et al, 2010;Krishna et al, 2005;O'Leary, 2006). The inability to address the limitations resulting from utilization is compelling.…”
Section: Resultsmentioning
confidence: 99%
“…In [14], the students were presented with various handson exercises that included the use of defensive tools and techniques, as well as gaining practical experience on network set-up and configuration, such as password management, password cracking, reconnaissance techniques, logging and auditing, packet sniffers, intrusion detection, security analysis tools and so on.…”
Section: Organising the Trainingmentioning
confidence: 99%
“…Pirmiausia apibrėžiamos specialistų pareigybės, vaidmenys ir reikiamų žinių sritys, nustatomi tarpusavio ryšiai ir tada parengiama mokymo programa (Whitman, Mattord, 2004). Bakalauro studijų programose taikomas praktinis savarankiško darbo metodas (O'Leary, 2006;Gutierrez, 2006). Siekiant pagilinti konkrečių dalykų, pvz., duomenų bazių, informacijos saugos žinias rengiami siauresnės srities moduliai (George, Valeva, 2006;Jones, Romney, 2004).…”
Section: Kompiuterių Saugos Dalykų Dėstymas Užsienio Universitetuoseunclassified