2001
DOI: 10.1145/366413.364533
|View full text |Cite
|
Sign up to set email alerts
|

Using an isolated network laboratory to teach advanced networks and security

Abstract: This paper discusses the use of an isolated network laboratory to teach computer security using persistent cooperative groups and an active learning approach. Computer security and computer security education are areas of increasing importance as computer systems become more interconnected. When offered, undergraduate and graduate computer security courses are routinely taught using a traditional lecture format. If the course includes a class project, the class project is limited in scope and constitutes a rel… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
34
0

Year Published

2005
2005
2019
2019

Publication Types

Select...
6
2
1

Relationship

0
9

Authors

Journals

citations
Cited by 46 publications
(34 citation statements)
references
References 0 publications
0
34
0
Order By: Relevance
“…by setting up and configuring real world networking scenarios or by analysing network traffic. These kinds of assignments require a safe playground, which is generally known as a computer lab (Bishop and Heberlein, 1996;Hill et al, 2001;Wagner and Wudi, 2004). This lab is usually a room at the university, containing computer systems connected to a network which is completely isolated from the outside world.…”
Section: Course Designmentioning
confidence: 99%
“…by setting up and configuring real world networking scenarios or by analysing network traffic. These kinds of assignments require a safe playground, which is generally known as a computer lab (Bishop and Heberlein, 1996;Hill et al, 2001;Wagner and Wudi, 2004). This lab is usually a room at the university, containing computer systems connected to a network which is completely isolated from the outside world.…”
Section: Course Designmentioning
confidence: 99%
“…A common complaint from students who have taken theoretical network security classes was that no apparent way to obtain practical experience, legally and ethically, with network security exists. A large amount of network security course activity was found in literature and Web searches [2]- [11]; however, readily reusable lecture materials or laboratory assignments and laboratory setups that met the goals and objectives of a realistic, hands-on-type learning experience were not found. The existing laboratory infrastructures in the literature consisted of only a few machines and did not approach a "realistic" network topology [4], [6], [7], [10].…”
Section: Introductionmentioning
confidence: 99%
“…The pedagogical issues related to designing and implementing a cyber warfare laboratory for a computer security course have already been put into exercise 3 on virtual machines. 4,5 In this paper the proposed teaching laboratory model builds on the previously discussed methods of teaching and also adds unique elements that help build a teaching environment that approaches a real world laboratory that is both fun and inspiring students. In order to strengthen laboratory design, it is important to understand the industry's best practices and latest developments.…”
Section: Introductionmentioning
confidence: 99%