Advertisement

Teaching Computer Security with a Hands-On Component

  • Narayan Murthy
Conference paper
  • 1.4k Downloads
Part of the IFIP Advances in Information and Communication Technology book series (IFIPAICT, volume 406)

Abstract

To address national needs for computer security education, many universities have incorporated computer and security courses into their undergraduate and graduate curricula. Our department has introduced computer security courses at both the undergraduate and the graduate level. This paper describes our approach, our experiences, and lessons learned in teaching a Computer Security Overview course.

There are two key elements in the course: Studying computer security topics from a current textbook and online and experimenting with security tools. While the textbook and online material expose students to current security topics, projects that involve experimenting with security tools motivate students to explore computer-security techniques, providing a framework for a better understanding of the security topics and strengthening students’ ability to put what they learnt in the classroom into practice in their organizations tomorrow.

Keywords

Information Security Computer Security Academic Excellence Information Assurance National Security Agency 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

References

  1. 1.
    Jeff, B., Schweitzer, D.: A Hands-on Approach to Information Operations Education and Training. In: 14th Colloquium for Information Systems Security Education. Baltimore, MD, June 7-9 (2010)Google Scholar
  2. 2.
    Centers of Academic Excellence—Institutions. National Security Agency (February 3, 2011), http://www.nsa.gov/ia/academic_outreach/nat_cae/institutions.shtml
  3. 3.
    Chen, L.-C., Lin, C.: Combining Theory with Practice in Information Security Education. In: 11th Colloquium for Information Systems Security Education, June 4-7. Boston University, Boston (2007)Google Scholar
  4. 4.
    Lin, C., Chen, L.-C.: Development of an Interdisciplinary Information Technology Auditing Program. In: 13th Colloquium for Information Systems Security Education, Seattle, WA, June 1-3 (2009)Google Scholar
  5. 5.
    National Centers of Academic Excellence. National Security Agency (February 3, 2011), http://www.nsa.gov/ia/academic_outreach/nat_cae/index.shtml
  6. 6.
    Riabov, V.V., Higgs, B.J.: Running a Computer Security Course: Challenges, Tools and Projects. River Academic Journal 6(1) (2010)Google Scholar
  7. 7.
    Sharma, S.K., Sefchek, J.: Teaching Information Systems Security Courses: A Hands-On Approach. Computers & Security 26, 290–299 (2007)CrossRefGoogle Scholar
  8. 8.
  9. 9.

Copyright information

© IFIP International Federation for Information Processing 2013

Authors and Affiliations

  • Narayan Murthy
    • 1
  1. 1.Pace UniversityNew YorkUSA

Personalised recommendations