References: [1] Criteria for Accrediting Engineering Programs, 2021-2022. https://www.abet.org/accreditation/accreditation-criteria/criteriafor- accrediting-engineering-programs-2021-2022/ [2] Criteria for Accrediting Computing Programs, 2021-2022. https://www.abet.org/accreditation/accreditation-criteria/criteriafor- accrediting-computing-programs-2021-2022/ [3] Mike Meyers, CompTIA Network+ Certification All-in-One Exam Guide, Seventh Edition, 2018 McGraw-Hill Education [4] Vyacheslav Fadyushin and Andrey Popov, Building a Pentesting Lab for Wireless Networks, 2016 Packt [5] Kevin Cardwell, Building Virtual Pentesting Labs for Advanced Penetration Testing, Second Edition, August 2016, Packt [6] Georgia Weidman, Penetration Testing – A Hands-on Introduction to Hacking, 2014, William Pollock [7] Wenliang Du, Computer Security – A Hands-on Approach, second Edition, 2019, SEED labs, Syracuse University [8] Wenliang Du, Internet Security – A Hands-on Approach, second Edition, 2019, SEED labs, Syracuse University [9] GENI, information available at https://www.geni.net/about-geni/what-is-geni/ [10] Wenling Du, SEED Labs - Instructor Manual, 2018, Syracuse University [11] CLARK, R. T. (). The Cybersecurity Labs and Resource Knowledge-base, information available at https://clark.center/home [12] Abler, R., Contis, T. D., Grizzard, J. B., Owen, H. L. (2006). Georgia Tech Information Security Center hands-on network security laboratory, IEEE Transactions on Education, 49 (1) 82-87, Feb. 2006. [13] Xu, L., Huang, D., Tsai, W. (2014). Cloud-based virtual laboratory for network security education, IEEE Transactions on Education, 57 (3) 145-150, August 2014. [14] Mateti, P. (2003). A laboratory-Based course on Internet security,” in Proc. 34th SIGCSE Tech. Symp. Computer Science Education, Reno, NV, Feburary, 252–256. [15] Micco, M., Rossman, H. (2022). Building a cyberwar lab: Lessons learned teaching cybersecurity principles to undergraduates, In: Proceedings 33rd SIGCSE Tech. Symp. Computer Science Education, Northern Kentucky Convention Center, Feburary 2002, 18–22. [16] Frank, C., Wells, G. (2002). Laboratory exercises for a computer security course,” J. Comput. Sci. Colleges, vol. 17, no. 4, pp. 51–54, March. [17] Wenliang, Du. (2011). SEED: Hands-on lab exercises for computer security education,” IEEE Computer and Reliability Societies, September/October. [18] Kwon, M., Kwak, G., Jun, S., Lee, H. (2017). Enriching security education hands-on labs with practical exercises,” International Conference on Software Security and Assurance. [19] Wiggins, Grant., McTighe, Jay. (2005). Understanding by Design, 2nd Edition. Alexandria, VA: Association for Supervision and Curriculum Development. [20] Hansen, Edmund. (2011). Idea-Based Learning – A Course Design Process to Promote Conceptual Understanding, 2011, Sterling, VA: Stylus Publishing. [21] Estell, John., Yoder, John., Morrison, Briana., Mak, Fong. (2012). Improving Upon Best Practices: FCAR 2.0,” American Society for Engineering Education. [22] Craig Zacker. (2018). CompTIA Network+ Practice Tests, 2018, John Willey & Sons. [23] Cybersecurity Curricular Guidelines, CSEC 2017, available at: https://cybered.acm.org/ [24] EvalTools, a comprehensive online tool for learning management and outcomes assessment, information available at https:/ /www.makteam.com [25] Fong Mak, Steve Frezza, Process to Identify Minimum Passing Criteria and Objective Evidence In Support of ABET EC2000 Criteria Fulfillment, In: Proceedings of the 2004 American Society for Engineering Education Conference & Exposition, Salt Lake City, UT, June. [26] Mak, Fong., Kelly, Jessica. (2010). Systematic Means for Identifying and Justifying Key Assignments for Effective Rules- Based Program Evaluation, 40th ASEE/IEEE Frontiers in Education Conference, Washington, DC, October 2010. [27] Fong Mak, Ramakrishnna Sundaram. (2016). Integrated FCAR model with Traditional Rubric-Based Model to Enhance Automation of Student Outcomes Evaluation Process, In: Proceedings of the 2016 American Society for Engineering Education Conference & Exposition, New Orleans, LA, June. [28] PC Part Picker, an online tool for integrating PC parts, info available at https://www.pcpartpicker.com [29] WireShark, a network protocol analyzer, info available at https://www.wireshark.org/ [30] WireShark videos, https://www.youtube.com/watch?v=flDzURAm8wQ&list=PL6gx4Cwl9DGBI2ZFuyZOl5Q7sptR7PwYN [31] VirtualBox, An virtualization tool, info available at https://www.virtualbox.org/ [32] Ubuntu server, instant Ubuntu VMs, info available at https://ubuntu.com/download. [33] PuTTy, an SSH and telnet client, info available at https://www.chiark.greenend.org.uk/~sgtatham/putty/latest.html [34] VirtualBox guide, info available at https://www.nakivo.com/blog/virtualbox-network-setting-guide/ [35] FileZilla, an FTP client, info available at https://filezilla-project.org/download.php [36] Packet Tracer, a network simulator, info available at https://www.netacad.com/zh-hant/courses/packet-tracer. [37] Benjamin Bloom. (1989). Taxonomy of Educational Objectives, Handbook 1: Cognitive Domain, Allyn & Bacon, Incorporated, January. |