A Course on Computer and Network Security: Teaching Online Versus Face-to-Face

  • Suresh Kalathur
  • Lubomir T. Chitkushev
  • Stuart Jacobs
  • Tanya Zlateva
  • Anatoly Temkin
Conference paper
Part of the IFIP Advances in Information and Communication Technology book series (IFIPAICT, volume 237)


The paper presents an overview of the Computer and Network Security course offered through distance education division as part of the online degree program. Topics presented in the online format are compared with those presented in a traditional curriculum in the face-to-face format. The pros and cons of each of the formats are discussed. Unique to the online course are weekly discussion topics that require each student’s participation and the follow-ups to postings of other students. A distinguishing aspect of the online course is a three week based case study assignment exploring a practical security framework encountered in real companies.


Computer security network security software security distance education 


  1. 1.
    Allen, E.; Seaman, J.: Entering the Mainstream: The Quality and Extent of Online Education in the United States, 2003–2004. Sloan Center for Online Education at Olin and Babson College, Needham, MA 2004.Google Scholar
  2. 2.
    Allen, E.; Seaman, J.: Making the Grade: Online Education in the United States 2006. Sloan Center for Online Education at Olin and Babson College, Needham, MA 2006.Google Scholar
  3. 3.
    Hiltz, S.R.; Turoff, M.: The Evolution of Online Learning and the Revolution in Higher Education. Communication of the ACM, October 2005, vol. 48, No. 10.Google Scholar
  4. 4.
    Hiltz, S.R.; Goldman, R. (Eds): Learning Together Online: Research on Asynchronous Learning Networks. Erlbaum, Mahwah, NJ, 2005.Google Scholar
  5. 5.
    Zlateva, S.; Kanabar, V.; Temkin, A., Citkusev, L.T.; Kalathur, S: Integrated Curricula for Computer and Network Security Education, Proceedings of the Colloquium for Information Systems Security Education, Society for Advancing Information Assurance and Infrastructure Protection, Washington, D.C., June 3–5, 2003.Google Scholar
  6. 6.
    Zlateva, T.; J. Burstein: “A Web-Based Graduate Certificate for IT Professionals–Design Choices and First Evaluation Results”. Proceedings of the 2001 Annual Conference of the American Society for Engineering Education(ASEE), June 24–27, Albuquerque, New Mexico.Google Scholar
  7. 7.
    Anderson, R.: Security Engineering: A Guide to Building Dependable Distributed Systems. Wiley, 2001.Google Scholar
  8. 8.
    Gollmann, D.: Computer Security, 2nd edition. Wiley, 2006.Google Scholar
  9. 9.
    Howard, M. and LeBlanc, D.: Writing Secure Code, 2nd edition. Microsoft Press, 2002.Google Scholar
  10. 10.
    Stallings, W.: Network Security Essentials: Applications and Standards, 3rd edition. Prentice-Hall, 2007.Google Scholar
  11. 11.
    Charlie Kaufman, Radia Perlman and Mike Speciner, Network Security — Private Communication in a Public World, 2nd Edition, Prentice-Hall, 2002.Google Scholar

Copyright information

© International Federation for Information Processing 2007

Authors and Affiliations

  • Suresh Kalathur
    • 1
  • Lubomir T. Chitkushev
    • 1
  • Stuart Jacobs
    • 1
  • Tanya Zlateva
    • 1
  • Anatoly Temkin
    • 1
  1. 1.Department of Computer Science, Metropolitan CollegeBoston UniversityBostonUSA

Personalised recommendations