Proceedings of the 43rd ACM Technical Symposium on Computer Science Education 2012
DOI: 10.1145/2157136.2157421
|View full text |Cite
|
Sign up to set email alerts
|

Design of a computer security teaching and research laboratory (abstract only)

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
2
0

Year Published

2013
2013
2020
2020

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(2 citation statements)
references
References 0 publications
0
2
0
Order By: Relevance
“…A common difficulty in this direction is the integration of "real-world" labs into the academic courses. Without efficient hands-on real-world activities, it is not possible for the students to integrate the acquired security theoretical knowledge with up-todate security technologies [9], [10].…”
Section: Motivationsmentioning
confidence: 99%
“…A common difficulty in this direction is the integration of "real-world" labs into the academic courses. Without efficient hands-on real-world activities, it is not possible for the students to integrate the acquired security theoretical knowledge with up-todate security technologies [9], [10].…”
Section: Motivationsmentioning
confidence: 99%
“…Likewise, Harmon (2011) indicated that the need for knowledgeable security professionals would continue into the near future. Such commentary from academia aligns with the overarching call from both the president as well as the federal workplace.One prominent method academia uses to provide practical, hands-on security education is laboratory exercises (Duffany & Cruz, 2012;Mattord & Whitman, 2004). Anantapadmanabhan, Memon, Frankl, and Naumovich, (2003) stated that cybersecurity laboratory exercises are a prominent means for learners to acquire a meaningful cybersecurity higher education.…”
mentioning
confidence: 99%