Collaborative Paradigm of Teaching Penetration Testing using Real-World University Applications

Sufatrio, Jan Vykopal, E. Chang
{"title":"Collaborative Paradigm of Teaching Penetration Testing using Real-World University Applications","authors":"Sufatrio, Jan Vykopal, E. Chang","doi":"10.1145/3511861.3511874","DOIUrl":null,"url":null,"abstract":"This paper shares our three years of experience in conducting collaborative-based cybersecurity teaching involving industrial-expertise sharing and an authentic-learning environment. Penetration testing (pen-testing) is widely adopted in the cybersecurity industry. It requires a wide range of skillsets, including non-technical aspects, which are not easy to be acquired in a standard lecture-style setting. While the fundamentals of the skillsets could be taught separately in different modules, an integrated pen-testing module using real-world target applications will provide students with a bird’s-eye view of security assessment in an authentic learning setting. There exist, however, challenges in providing a sustainable structured pen-testing module. These include the evolving industrial best practices and availability of authentic target environments. In this paper, we share our experience as well as best practices in designing and teaching a pen-testing module in our Bachelor of Computing degree program. The module unconventionally adopts a fruitful win-win collaborative paradigm. The students, guided along by professional pen-testers from the industry and academic instructors, pen-test our University’s operational applications selected by the University IT Department. With the completed six semesters to date, our students have tested various applications, including our University’s learning management system, student registration system, and student-hall dining system, which all manage sensitive data. We have received very positive feedback from the parties involved. This paper describes our module’s rationale, involved parties and roles, class arrangements and activities, as well as grading considerations. The paper also discusses encountered issues and our adopted solutions related to University application selection, student contribution assessment, and activity arrangements during the COVID-19 outbreak. Some notes are additionally given for others who are keen to offer similar modules using the same teaching pedagogy. Our experience thus demonstrates that, while provisioning industrial collaboration and authentic learning in education needs to address several technical and administrative issues, a collaborative based teaching paradigm can work well in a sustainable manner.","PeriodicalId":175694,"journal":{"name":"Proceedings of the 24th Australasian Computing Education Conference","volume":"58 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-02-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings of the 24th Australasian Computing Education Conference","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/3511861.3511874","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1

Abstract

This paper shares our three years of experience in conducting collaborative-based cybersecurity teaching involving industrial-expertise sharing and an authentic-learning environment. Penetration testing (pen-testing) is widely adopted in the cybersecurity industry. It requires a wide range of skillsets, including non-technical aspects, which are not easy to be acquired in a standard lecture-style setting. While the fundamentals of the skillsets could be taught separately in different modules, an integrated pen-testing module using real-world target applications will provide students with a bird’s-eye view of security assessment in an authentic learning setting. There exist, however, challenges in providing a sustainable structured pen-testing module. These include the evolving industrial best practices and availability of authentic target environments. In this paper, we share our experience as well as best practices in designing and teaching a pen-testing module in our Bachelor of Computing degree program. The module unconventionally adopts a fruitful win-win collaborative paradigm. The students, guided along by professional pen-testers from the industry and academic instructors, pen-test our University’s operational applications selected by the University IT Department. With the completed six semesters to date, our students have tested various applications, including our University’s learning management system, student registration system, and student-hall dining system, which all manage sensitive data. We have received very positive feedback from the parties involved. This paper describes our module’s rationale, involved parties and roles, class arrangements and activities, as well as grading considerations. The paper also discusses encountered issues and our adopted solutions related to University application selection, student contribution assessment, and activity arrangements during the COVID-19 outbreak. Some notes are additionally given for others who are keen to offer similar modules using the same teaching pedagogy. Our experience thus demonstrates that, while provisioning industrial collaboration and authentic learning in education needs to address several technical and administrative issues, a collaborative based teaching paradigm can work well in a sustainable manner.
使用真实世界大学应用的渗透测试教学协作范式
本文分享了我们在开展基于协作的网络安全教学方面的三年经验,包括工业专业知识共享和真实的学习环境。渗透测试(pen-testing)在网络安全行业被广泛采用。它需要广泛的技能组合,包括非技术方面,这些在标准的讲座式设置中不容易获得。虽然这些基本技能可以在不同的模块中单独教授,但使用真实目标应用程序的集成渗透测试模块将为学生提供真实学习环境中安全评估的鸟瞰图。然而,在提供可持续的结构化渗透测试模块方面存在挑战。其中包括不断发展的工业最佳实践和真实目标环境的可用性。在本文中,我们分享了我们在计算机学士学位课程中设计和教授渗透测试模块的经验和最佳实践。该模块非传统地采用了富有成效的双赢合作模式。学生们在来自行业和学术导师的专业渗透测试人员的指导下,对由大学信息技术部挑选的大学运营应用程序进行渗透测试。到目前为止的六个学期,我们的学生已经测试了各种应用程序,包括我们大学的学习管理系统,学生注册系统和学生宿舍餐饮系统,这些系统都管理敏感数据。我们从有关各方收到了非常积极的反馈。本文描述了我们的模块的基本原理,涉及的各方和角色,课程安排和活动,以及评分考虑。本文还讨论了在新冠肺炎疫情期间,我们在大学申请选择、学生贡献评估、活动安排等方面遇到的问题和采取的解决方案。另外,对于那些热衷于使用相同教学方法提供类似模块的人,也会给出一些注释。因此,我们的经验表明,虽然在教育中提供工业协作和真正的学习需要解决几个技术和管理问题,但基于协作的教学模式可以以可持续的方式运作良好。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信