Abstract
To address national needs for computer security education, many universities have incorporated computer and security courses into their undergraduate and graduate curricula. Our department has introduced computer security courses at both the undergraduate and the graduate level. This paper describes our approach, our experiences, and lessons learned in teaching a Computer Security Overview course.
There are two key elements in the course: Studying computer security topics from a current textbook and online and experimenting with security tools. While the textbook and online material expose students to current security topics, projects that involve experimenting with security tools motivate students to explore computer-security techniques, providing a framework for a better understanding of the security topics and strengthening students’ ability to put what they learnt in the classroom into practice in their organizations tomorrow.
Chapter PDF
Similar content being viewed by others
Keywords
- Information Security
- Computer Security
- Academic Excellence
- Information Assurance
- National Security Agency
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
References
Jeff, B., Schweitzer, D.: A Hands-on Approach to Information Operations Education and Training. In: 14th Colloquium for Information Systems Security Education. Baltimore, MD, June 7-9 (2010)
Centers of Academic Excellence—Institutions. National Security Agency (February 3, 2011), http://www.nsa.gov/ia/academic_outreach/nat_cae/institutions.shtml
Chen, L.-C., Lin, C.: Combining Theory with Practice in Information Security Education. In: 11th Colloquium for Information Systems Security Education, June 4-7. Boston University, Boston (2007)
Lin, C., Chen, L.-C.: Development of an Interdisciplinary Information Technology Auditing Program. In: 13th Colloquium for Information Systems Security Education, Seattle, WA, June 1-3 (2009)
National Centers of Academic Excellence. National Security Agency (February 3, 2011), http://www.nsa.gov/ia/academic_outreach/nat_cae/index.shtml
Riabov, V.V., Higgs, B.J.: Running a Computer Security Course: Challenges, Tools and Projects. River Academic Journal 6(1) (2010)
Sharma, S.K., Sefchek, J.: Teaching Information Systems Security Courses: A Hands-On Approach. Computers & Security 26, 290–299 (2007)
Trend Micro Threat Predictions for 2011 (February 3, 2011), http://affinitypartner.trendmicro.com/announcements/trend-micro-threat-predictions-for-2011.aspx
Verizon Business. Anatomy of a Data Breach (February 3, 2011) , http://www.govinfosecurity.com/external/rp_2009-data-breach-investigations-supplemental-report_en_xg.pdf
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2013 IFIP International Federation for Information Processing
About this paper
Cite this paper
Murthy, N. (2013). Teaching Computer Security with a Hands-On Component. In: Dodge, R.C., Futcher, L. (eds) Information Assurance and Security Education and Training. WISE WISE WISE 2013 2011 2009. IFIP Advances in Information and Communication Technology, vol 406. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-39377-8_23
Download citation
DOI: https://doi.org/10.1007/978-3-642-39377-8_23
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-39376-1
Online ISBN: 978-3-642-39377-8
eBook Packages: Computer ScienceComputer Science (R0)