Proceedings of the 16th Annual Conference on Information Technology Education 2015
DOI: 10.1145/2808006.2808034
|View full text |Cite
|
Sign up to set email alerts
|

Lab on a Stick

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2016
2016
2021
2021

Publication Types

Select...
3
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(1 citation statement)
references
References 8 publications
0
1
0
Order By: Relevance
“…There are extensive literature works on the lab design for the broad field of Cybersecurity Education. Depending on the employed technologies or methodologies, these lab designs can be categorized into three major groups: virtualization-based lab design (e.g., [3,4,12,13,19]), Web-based lab design (e.g., [8,10,27]), and USB-drivebased lab design (e.g., [20]). The target of the design is either a general security course (e.g., [22]), a singular security issue (e.g., EH for Web security [26]) or security of one particular system (e.g., mobile device security in [28], and NoSQL database security in [11]).…”
Section: Introductionmentioning
confidence: 99%
“…There are extensive literature works on the lab design for the broad field of Cybersecurity Education. Depending on the employed technologies or methodologies, these lab designs can be categorized into three major groups: virtualization-based lab design (e.g., [3,4,12,13,19]), Web-based lab design (e.g., [8,10,27]), and USB-drivebased lab design (e.g., [20]). The target of the design is either a general security course (e.g., [22]), a singular security issue (e.g., EH for Web security [26]) or security of one particular system (e.g., mobile device security in [28], and NoSQL database security in [11]).…”
Section: Introductionmentioning
confidence: 99%