{"title":"Teaching a computer forensics course","authors":"F. Ali","doi":"10.1145/3409334.3452069","DOIUrl":null,"url":null,"abstract":"Recent research points to a severe shortage of cybersecurity professionals right now and in the near future. Universities are introducing cybersecurity programs to fill the gap between cybersecurity professionals' supply and demand. Although cybersecurity concepts/courses are being taught in many undergraduate programs for quite some time, but with the recent surge for cybersecurity professionals' demand, educators have realized the need to offer cybersecurity degree programs. Despite having a plethora of unstructured cybersecurity information available, faculty are struggling to find structured content for cybersecurity major courses. In this paper, we discuss our efforts of teaching a computer forensics course. We present our teaching modules and associated hands-on activities with the hope that our peers might find our course content or teaching methodology helpful in preparing similar courses.","PeriodicalId":148741,"journal":{"name":"Proceedings of the 2021 ACM Southeast Conference","volume":"2 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-04-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings of the 2021 ACM Southeast Conference","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/3409334.3452069","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
Recent research points to a severe shortage of cybersecurity professionals right now and in the near future. Universities are introducing cybersecurity programs to fill the gap between cybersecurity professionals' supply and demand. Although cybersecurity concepts/courses are being taught in many undergraduate programs for quite some time, but with the recent surge for cybersecurity professionals' demand, educators have realized the need to offer cybersecurity degree programs. Despite having a plethora of unstructured cybersecurity information available, faculty are struggling to find structured content for cybersecurity major courses. In this paper, we discuss our efforts of teaching a computer forensics course. We present our teaching modules and associated hands-on activities with the hope that our peers might find our course content or teaching methodology helpful in preparing similar courses.