Home| Contact Us| New Journals| Browse Journals| Journal Prices| For Authors|

Print ISSN: 2349-8161
Online ISSN: 2349-817X


  About ISEJ
  Home
Aims & Scope
Editorial Board
Current Issue
Next Issue
Previous Issue
Self-archiving policy
Alert Services
Be a Reviewer
Publisher
Paper Submission
Contact us
 
  For Authors
  Guidelines for Contributors
Online Submission
Statement of Ethics and Responsibilities
Review Policies
Transfer of Copyright
Archiving Policy
Call for Papers
 
 
RELATED JOURNALS
Journal of Digital Information Management (JDIM)
Journal of Multimedia Processing and Technologies (JMPT)
International Journal of Web Application (IJWA)

 

 
Information Security Education Journal (ISEJ)
 

First Laboratory Experience for Cyber Engineering and Cybersecurity Students
Fong Mak
Gannon University. Erie Pennsylvania USA
Abstract: This paper outlines the lab exercises designed as the first hands-on experiences for Cyber Engineering and Cybersecurity students. The lab exercises allow students to gain hands-on experience to support their understanding of networking technologies with security concerns in using network components and software applications. This one-credit lab experience course effectively covers the additional topics in the first-year course in Introduction to Networks to fully cover the foundational knowledge units needed to prepare students in other cyber courses in the curriculum. The designed hands-on exercises aim to enhance students’ experience in PC technologies, FTP, Telnet, SSH, network building, switches, routers, VLAN, and network traffic analysis.
Keywords: Cybersecurity, Cyber Engineering, Network Security Laboratory, Cyber Lab, Fcar, Evaltools First Laboratory Experience for Cyber Engineering and Cybersecurity Students
DOI:https://doi.org/10.6025/isej/2021/8/2/39-64
Full_Text   PDF 2.76 MB   Download:   164  times
References:

[1] Criteria for Accrediting Engineering Programs, 2021-2022. https://www.abet.org/accreditation/accreditation-criteria/criteriafor- accrediting-engineering-programs-2021-2022/
[2] Criteria for Accrediting Computing Programs, 2021-2022. https://www.abet.org/accreditation/accreditation-criteria/criteriafor- accrediting-computing-programs-2021-2022/
[3] Mike Meyers, CompTIA Network+ Certification All-in-One Exam Guide, Seventh Edition, 2018 McGraw-Hill Education
[4] Vyacheslav Fadyushin and Andrey Popov, Building a Pentesting Lab for Wireless Networks, 2016 Packt
[5] Kevin Cardwell, Building Virtual Pentesting Labs for Advanced Penetration Testing, Second Edition, August 2016, Packt
[6] Georgia Weidman, Penetration Testing – A Hands-on Introduction to Hacking, 2014, William Pollock
[7] Wenliang Du, Computer Security – A Hands-on Approach, second Edition, 2019, SEED labs, Syracuse University
[8] Wenliang Du, Internet Security – A Hands-on Approach, second Edition, 2019, SEED labs, Syracuse University
[9] GENI, information available at https://www.geni.net/about-geni/what-is-geni/
[10] Wenling Du, SEED Labs - Instructor Manual, 2018, Syracuse University
[11] CLARK, R. T. (). The Cybersecurity Labs and Resource Knowledge-base, information available at https://clark.center/home
[12] Abler, R., Contis, T. D., Grizzard, J. B., Owen, H. L. (2006). Georgia Tech Information Security Center hands-on network security laboratory, IEEE Transactions on Education, 49 (1) 82-87, Feb. 2006.
[13] Xu, L., Huang, D., Tsai, W. (2014). Cloud-based virtual laboratory for network security education, IEEE Transactions on Education, 57 (3) 145-150, August 2014.
[14] Mateti, P. (2003). A laboratory-Based course on Internet security,” in Proc. 34th SIGCSE Tech. Symp. Computer Science Education, Reno, NV, Feburary, 252–256.
[15] Micco, M., Rossman, H. (2022). Building a cyberwar lab: Lessons learned teaching cybersecurity principles to undergraduates, In: Proceedings 33rd SIGCSE Tech. Symp. Computer Science Education, Northern Kentucky Convention Center, Feburary 2002, 18–22.
[16] Frank, C., Wells, G. (2002). Laboratory exercises for a computer security course,” J. Comput. Sci. Colleges, vol. 17, no. 4, pp. 51–54, March.
[17] Wenliang, Du. (2011). SEED: Hands-on lab exercises for computer security education,” IEEE Computer and Reliability Societies, September/October.
[18] Kwon, M., Kwak, G., Jun, S., Lee, H. (2017). Enriching security education hands-on labs with practical exercises,” International Conference on Software Security and Assurance.
[19] Wiggins, Grant., McTighe, Jay. (2005). Understanding by Design, 2nd Edition. Alexandria, VA: Association for Supervision and Curriculum Development.
[20] Hansen, Edmund. (2011). Idea-Based Learning – A Course Design Process to Promote Conceptual Understanding, 2011, Sterling, VA: Stylus Publishing.
[21] Estell, John., Yoder, John., Morrison, Briana., Mak, Fong. (2012). Improving Upon Best Practices: FCAR 2.0,” American Society for Engineering Education.
[22] Craig Zacker. (2018). CompTIA Network+ Practice Tests, 2018, John Willey & Sons.
[23] Cybersecurity Curricular Guidelines, CSEC 2017, available at: https://cybered.acm.org/
[24] EvalTools, a comprehensive online tool for learning management and outcomes assessment, information available at https:/ /www.makteam.com
[25] Fong Mak, Steve Frezza, Process to Identify Minimum Passing Criteria and Objective Evidence In Support of ABET EC2000 Criteria Fulfillment, In: Proceedings of the 2004 American Society for Engineering Education Conference & Exposition, Salt Lake City, UT, June.
[26] Mak, Fong., Kelly, Jessica. (2010). Systematic Means for Identifying and Justifying Key Assignments for Effective Rules- Based Program Evaluation, 40th ASEE/IEEE Frontiers in Education Conference, Washington, DC, October 2010.
[27] Fong Mak, Ramakrishnna Sundaram. (2016). Integrated FCAR model with Traditional Rubric-Based Model to Enhance Automation of Student Outcomes Evaluation Process, In: Proceedings of the 2016 American Society for Engineering Education Conference & Exposition, New Orleans, LA, June.
[28] PC Part Picker, an online tool for integrating PC parts, info available at https://www.pcpartpicker.com
[29] WireShark, a network protocol analyzer, info available at https://www.wireshark.org/
[30] WireShark videos, https://www.youtube.com/watch?v=flDzURAm8wQ&list=PL6gx4Cwl9DGBI2ZFuyZOl5Q7sptR7PwYN
[31] VirtualBox, An virtualization tool, info available at https://www.virtualbox.org/
[32] Ubuntu server, instant Ubuntu VMs, info available at https://ubuntu.com/download.
[33] PuTTy, an SSH and telnet client, info available at https://www.chiark.greenend.org.uk/~sgtatham/putty/latest.html
[34] VirtualBox guide, info available at https://www.nakivo.com/blog/virtualbox-network-setting-guide/
[35] FileZilla, an FTP client, info available at https://filezilla-project.org/download.php
[36] Packet Tracer, a network simulator, info available at https://www.netacad.com/zh-hant/courses/packet-tracer.
[37] Benjamin Bloom. (1989). Taxonomy of Educational Objectives, Handbook 1: Cognitive Domain, Allyn & Bacon, Incorporated, January.


Copyright 2013 socio.org.uk