Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Review Help
Search
Network reconnaissance, attack, and defense laboratories for an introductory cyber-security course
Greenlaw R., Phillips A., Schultz J., Stahl D., Standard S.  ACMSE 2013 (Proceedings of the 51st ACM Southeast Conference, Savannah, GA, Apr 4-6, 2013)1-6.2013.Type:Proceedings
Date Reviewed: Nov 3 2014

Anyone setting up a hands-on cybersecurity training course should read this paper. Greenlaw and associates describe a clear set of learning objectives, and the steps they took. While there are several components missing from their description, they provide an excellent starting point. As a computer security professional, I was excited to learn that all first-year students at the US Naval Academy are required to take an introductory course in cybersecurity with a hands-on component. This should have substantial impact as they move into leadership roles.

The authors describe both the physical and logical environment in which hands-on training was provided. This provides a baseline for the contemporary reader. They then describe the order in which they introduce computing and networking concepts and tools, followed by basic information security theory. The most interesting part of the paper was their description of how they taught their students to visualize how network vulnerabilities could be used to mount a successful network attack and a sample of student documentation (a useful artifact for someone learning basic penetration testing). In the final section, they provided quantitative performance assessments of the students, along with the students’ own ranking of the usefulness of the labs. I would be equally interested in hearing a qualitative assessment of the labs from the students.

The only disappointment I felt was that half of the citations were no longer current, so interested readers were unable to follow the references provided. I was especially interested in the notes they developed for their class. Sadly, the link to those notes didn’t work. All in all, though, I found it an interesting read, and have already recommended it to colleagues who have information security training responsibilities.

Reviewer:  Lee Imrey Review #: CR142885 (1502-0190)
Bookmark and Share
  Reviewer Selected
Featured Reviewer
 
 
Curriculum (K.3.2 ... )
 
 
Information Systems Education (K.3.2 ... )
 
 
Literacy (K.3.2 ... )
 
 
Software Selection (K.6.3 ... )
 
 
Software Management (K.6.3 )
 
Would you recommend this review?
yes
no
Other reviews under "Curriculum": Date
Teaching calculation and discrimination
Gries D. Communications of the ACM 34(3): 44-55, 1991. Type: Article
Dec 1 1991
A mathematically focused curriculum for computer science
Berztiss A. Communications of the ACM 30(5): 356-365, 1987. Type: Article
Nov 1 1987
Computer science in secondary schools: curriculum and teacher certification
Turner A. Communications of the ACM 28(3): 269-279, 1985. Type: Article
Jun 1 1986
more...

E-Mail This Printer-Friendly
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy