Skip to main content

Teaching Cyber Security Through Distance Learning with International Students

  • Chapter
  • First Online:
Innovations in Cybersecurity Education

Abstract

Cyber security is one of the most relevant parts of modern information and communications technology (ICT) deployments and it will further grow in importance in the future. Therefore it is necessary to develop proper courses and educational tools to train students with the required sets of skill. From the educational point of view, due to the international perspective of cyber security, encouraging collaboration among students from different nations is desirable. To address these challenges, we present the International Virtual Lab on Information Security, which uses and extends a revamped earlier lab infrastructure. The main goal of the lab is to enrich the student experience not only related to cyber security but also address cultural aspects which in distance education are seldom possible. To evaluate the effectiveness of the proposed platform, we performed tests with students from three different nations.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 159.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. E. Csanyi, How Stuxnet (PLC virus) spreads. https://electrical-engineering-portal.com/how-stuxnet-plc-virus-spreads-part-1. Accessed 17 May 2019

  2. R.M. Lee, M.J. Assante, T. Conway, German steel mill cyber attack. https://ics.sans.org/media/ICS-CPPE-case-Study-2-German-Steelworks_Facility.pdf. Accessed 27 Jan 2020

  3. R.M. Lee, M.J. Assante, T. Conway, Analysis of the cyber attack on the Ukrainian power grid. https://ics.sans.org/media/E-ISAC_SANS_Ukraine_DUC_5.pdf. Accessed 17 May 2019

  4. S. Manca, L. Caviglione, J. Raffaghelli, Big data for social media learning analytics: potentials and challenges. J. e-Learn. Knowl. Soc. 12(2), 27 (2016)

    Google Scholar 

  5. M.D. Koretsky, D. Amatore, C. Barnes, S. Kimura, Enhancement of student learning in experimental design using a virtual laboratory. IEEE Trans. Educ. 51(1), 76–85 (2008)

    Article  Google Scholar 

  6. L. Caviglione, L. Veltri, A p2p framework for distributed and cooperative laboratories, in Distributed Cooperative Laboratories: Networking, Instrumentation, and Measurements (Springer, Boston, 2006), pp. 309–319

    Book  Google Scholar 

  7. K. Cabaj, D. Domingos, Z. Kotulski, A. Respício, Cybersecurity education: evolution of the discipline and analysis of master programs. Comput. Secur. 75, 24–35 (2018) [Online]. https://doi.org/10.1016/j.cose.2018.01.015

  8. L. Gonzalez-Manzano, J.M. de Fuentes, Design recommendations for online cybersecurity courses. Comput. Secur. 80, 238–256 (2019)

    Article  Google Scholar 

  9. http://mydecamp.eu. Accessed 6 Jan 2020

  10. C. Willems, C. Meinel, Tele-lab it-security: an architecture for an online virtual it security lab. Int. J. Online Biomed. Eng. 4(2), 31–37 (2008)

    Google Scholar 

  11. C. Willems, T. Klingbeil, L. Radvilavicius, A. Cenys, C. Meinel, A distributed virtual laboratory architecture for cybersecurity training, in 2011 International Conference for Internet Technology and Secured Transactions (2011), pp. 408–415

    Google Scholar 

  12. K. Salah, M. Hammoud, S. Zeadally, Teaching cybersecurity using the cloud. IEEE Trans. Learn. Technol. 8(4), 383–392 (2015)

    Article  Google Scholar 

  13. H.P.E. Vranken, J. Haag, T. Horsmann, S. Karsch, A distributed virtual computer security lab, in CSEDU 2011 – Proceedings of the 3rd International Conference on Computer Supported Education, Volume 1, Noordwijkerhout, 6–8 May (2011), pp. 110–119

    Google Scholar 

  14. J. Keller, R. Naues, Design of a virtual computer security lab, in Proceedings of the Third IASTED International Conference on Communication, Network, and Information Security, October 9–11, 2006, Cambridge, MA (2006), pp. 211–215

    Google Scholar 

  15. B. Kneale, I. Box, A virtual learning environment for real-world networking, in InSITE (2003)

    Google Scholar 

  16. J. Haag, T. Horsmann, S. Karsch, H. Vranken, A distributed virtual computer security lab with central authority, in Computer Science Education Research Conference, ser. CSERC ’11 (Open Universiteit, Heerlen, 2011), pp. 89–95 [Online]. Available http://dl.acm.org/citation.cfm?id=2043594.2043602

  17. J. Haag, H. Vranken, M. van Eekelen, A virtual classroom for cybersecurity education, in Transactions on Edutainment XV, ed. by Z. Pan, A.D. Cheok, W. Müller, M. Zhang, A. El Rhalibi, K. Kifayat (Springer, Berlin, 2019), pp. 173–208 [Online]. https://doi.org/10.1007/978-3-662-59351-6_13

  18. P. Li, Centralized and decentralized lab approaches based on different virtualization models. J. Comput. Sci. Coll. 26(2), 263–269 (2010)

    Google Scholar 

  19. J. Chamberlin, J. Hussey, B. Klimkowski, W. Moody, C. Morrell, The impact of virtualized technology on undergraduate computer networking education, in Proceedings of the 18th Annual Conference on Information Technology, ser. SIGITE ’17 (2017), pp. 109–114

    Google Scholar 

  20. Containers and virtual machines together. https://www.docker.com/resources/what-container. Accessed 23 Mar 2019

  21. P. Georgi, Migration of a virtual computer laboratory to a different migration platform (in German: Migration eines virtuellen Computerlabors auf eine andere Migrationsplattform). Bachelor Thesis, FernUniversität in Hagen, 2009

    Google Scholar 

  22. P. Georgi, Container-based virtual laboratory for information science. Master Thesis, FernUniversität in Hagen, forthcoming

    Google Scholar 

  23. Manual page grep. https://linux.die.net/man/1/grep. Accessed 23 Mar 2019

  24. Manual page awk. https://linux.die.net/man/1/awk. Accessed 23 Mar 2019

  25. J. Haag, S. Karsch, H.P.E. Vranken, M.C.J.D. van Eekelen, An exercise assistant for practical networking and IT security courses in higher education, in Computer Supported Education – 6th International Conference, CSEDU 2014 Barcelona, April 1–3, 2014, Revised Selected Papers (2014), pp. 84–98

    Google Scholar 

  26. G. Bonofiglio, V. Iovinella, G. Lospoto, G. Di Battista, Kathará: a container-based framework for implementing network function virtualization and software defined networks, in NOMS 2018 – 2018 IEEE/IFIP Network Operations and Management Symposium, April (2018), pp. 1–9

    Google Scholar 

Download references

Acknowledgements

This research was supported through the IVLIS project in FernUniversität’s Fileh Programme from November 2017 to May 2019.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Wojciech Mazurczyk .

Editor information

Editors and Affiliations

Appendices

10 Appendix 1: Questionnaire Spring 2018

  1. 1.

    Have the topics of the lab tasks been interesting and insightful for you?

  2. 2.

    Do you think that your skills have improved due to the course of the lab?

  3. 3.

    Were the provided labs materials (e.g. instructions, formulation of tasks) sufficient for you?

  4. 4.

    How could the provided lab materials be improved? (free text)

  5. 5.

    Was the feedback that you received on the performed labs tasks sufficient for you?

  6. 6.

    Would you like to comment on issues related to the lab course that have not been considered within the provided questions? (free text)

10 Appendix 2: Questionnaire Fall 2018

  1. 1.

    The time frame of the laboratory was adequate (start and duration).

  2. 2.

    The organization of the lab course corresponded to my ideas and wishes.

  3. 3.

    I made contact with students from other universities during the lab course.

  4. 4.

    Rate the difficulty of each Module.

  5. 5.

    Evaluate the sufficiency of the provided lab materials of each Module. (free text if no or partially)

  6. 6.

    The targets of the tasks were clearly formulated?

  7. 7.

    Have the topics of the lab tasks been interesting and insightful for you?

  8. 8.

    How many minutes did you invest to solve each module?

  9. 9.

    I used the forum to exchange ideas/approaches for solutions.

  10. 10.

    I had e-mail contact with a mentor to get help on a task.

  11. 11.

    The feedback of the mentors helped me to solve the tasks? (free text if no or partially)

  12. 12.

    Would you recommend the lab to a fellow student? (free text if no or partially)

  13. 13.

    Do you think that your skills have improved due to the course of the lab?

  14. 14.

    Would you like to comment on issues related to the lab course that have not been considered within the provided questions? (free text)

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Switzerland AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Cabaj, K., Caviglione, L., Georgi, P., Keller, J., Mazurczyk, W., Schaffhauser, A. (2020). Teaching Cyber Security Through Distance Learning with International Students. In: Daimi, K., Francia III, G. (eds) Innovations in Cybersecurity Education. Springer, Cham. https://doi.org/10.1007/978-3-030-50244-7_15

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-50244-7_15

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-50243-0

  • Online ISBN: 978-3-030-50244-7

  • eBook Packages: EducationEducation (R0)

Publish with us

Policies and ethics