Teaching Computer Security with a Hands-On Component
- 1.4k Downloads
To address national needs for computer security education, many universities have incorporated computer and security courses into their undergraduate and graduate curricula. Our department has introduced computer security courses at both the undergraduate and the graduate level. This paper describes our approach, our experiences, and lessons learned in teaching a Computer Security Overview course.
There are two key elements in the course: Studying computer security topics from a current textbook and online and experimenting with security tools. While the textbook and online material expose students to current security topics, projects that involve experimenting with security tools motivate students to explore computer-security techniques, providing a framework for a better understanding of the security topics and strengthening students’ ability to put what they learnt in the classroom into practice in their organizations tomorrow.
KeywordsInformation Security Computer Security Academic Excellence Information Assurance National Security Agency
- 1.Jeff, B., Schweitzer, D.: A Hands-on Approach to Information Operations Education and Training. In: 14th Colloquium for Information Systems Security Education. Baltimore, MD, June 7-9 (2010)Google Scholar
- 2.Centers of Academic Excellence—Institutions. National Security Agency (February 3, 2011), http://www.nsa.gov/ia/academic_outreach/nat_cae/institutions.shtml
- 3.Chen, L.-C., Lin, C.: Combining Theory with Practice in Information Security Education. In: 11th Colloquium for Information Systems Security Education, June 4-7. Boston University, Boston (2007)Google Scholar
- 4.Lin, C., Chen, L.-C.: Development of an Interdisciplinary Information Technology Auditing Program. In: 13th Colloquium for Information Systems Security Education, Seattle, WA, June 1-3 (2009)Google Scholar
- 5.National Centers of Academic Excellence. National Security Agency (February 3, 2011), http://www.nsa.gov/ia/academic_outreach/nat_cae/index.shtml
- 6.Riabov, V.V., Higgs, B.J.: Running a Computer Security Course: Challenges, Tools and Projects. River Academic Journal 6(1) (2010)Google Scholar
- 8.Trend Micro Threat Predictions for 2011 (February 3, 2011), http://affinitypartner.trendmicro.com/announcements/trend-micro-threat-predictions-for-2011.aspx
- 9.Verizon Business. Anatomy of a Data Breach (February 3, 2011) , http://www.govinfosecurity.com/external/rp_2009-data-breach-investigations-supplemental-report_en_xg.pdf