Information Technology Based Proceedings of the FIfth International Conference onHigher Education and Training, 2004. ITHET 200
DOI: 10.1109/ithet.2004.1358254
|View full text |Cite
|
Sign up to set email alerts
|

A teaching prototype for educating IT security' engineers in emerging environments

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0

Publication Types

Select...
6

Relationship

0
6

Authors

Journals

citations
Cited by 9 publications
(6 citation statements)
references
References 6 publications
0
6
0
Order By: Relevance
“…For the past ten years, the authors have been implementing operating system virtualization in engineering laboratory exercises at both semester-based universities as well as NU [2][3][4][5][6][7][8]. Virtual Labs (VL), as these exercises have been called, have been especially important in the one-month-course modality.…”
Section: National University Teaching Uniquenessmentioning
confidence: 99%
See 1 more Smart Citation
“…For the past ten years, the authors have been implementing operating system virtualization in engineering laboratory exercises at both semester-based universities as well as NU [2][3][4][5][6][7][8]. Virtual Labs (VL), as these exercises have been called, have been especially important in the one-month-course modality.…”
Section: National University Teaching Uniquenessmentioning
confidence: 99%
“…In the case of NU, efficiencies were gained in four areas: 1) infrastructure operation, 2) lab administration, 3) student access to current technology, and 4) instructor teaching. Regarding infrastructure operation server utilization is normally under 10% so it makes sense to share the resource with concurrent VM users [7]. Now, with ISLE over 700 VMs are serviced by four physical DELL servers.…”
Section: Virtualizationmentioning
confidence: 99%
“…However, specific information regarding courses with similar prerequisites as the one described herein, i.e., a short course especially tailored towards military officers with limited computer knowledge, has not been published widely. In part, this is probably due to that academia traditionally "teaches the why and the what but gives little attention to the how" [4,10]. Of course, comparable short term security classes given to working professionals exist albeit they have not been reported on in the literature.…”
Section: Related Workmentioning
confidence: 99%
“…The need to build an isolated computer lab where the students are able to use the lab as a playground for trying out various security related tools in a secure fashion have been discussed, and endorsed, widely, and many examples exist, see, e.g., [6,8,10]. For the most part, however, development of suitable computer laboratories has been performed by enthusiastic computer science teachers who have focused on the technical issues rather than the educational aspects.…”
Section: Related Workmentioning
confidence: 99%
“…Industry has referred to IT security-focused practitioners both as Security Engineers [13] and Security System Engineers [14]. In our environment we will refer to our students' preparation to become Security System Engineers.…”
Section: Security System Engineermentioning
confidence: 99%