{"title":"资讯科技保安教育实务练习","authors":"Xinli Wang, Yan Bai, G. Hembroff","doi":"10.1145/2808006.2808023","DOIUrl":null,"url":null,"abstract":"We have developed a collection of instructional hands-on lab assignments that can be used to help teach security courses or courses with a security component in information technology (IT). Our labs cover a wide spectrum of principles, ideas and technologies along with well-developed open source tools. Lab descriptions are publicly accessible from our web page. All of the labs have been tested in a virtual environment and utilized in our security courses. Feedback from the students has been positive. In this paper, we will present the lab design, topics covered in our labs, lab environments and student evaluation results. We will share our experience in transferring advanced technology to IT security education and lessons learned from this practice.","PeriodicalId":431742,"journal":{"name":"Proceedings of the 16th Annual Conference on Information Technology Education","volume":"19 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2015-09-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"11","resultStr":"{\"title\":\"Hands-on Exercises for IT Security Education\",\"authors\":\"Xinli Wang, Yan Bai, G. Hembroff\",\"doi\":\"10.1145/2808006.2808023\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"We have developed a collection of instructional hands-on lab assignments that can be used to help teach security courses or courses with a security component in information technology (IT). Our labs cover a wide spectrum of principles, ideas and technologies along with well-developed open source tools. Lab descriptions are publicly accessible from our web page. All of the labs have been tested in a virtual environment and utilized in our security courses. Feedback from the students has been positive. In this paper, we will present the lab design, topics covered in our labs, lab environments and student evaluation results. We will share our experience in transferring advanced technology to IT security education and lessons learned from this practice.\",\"PeriodicalId\":431742,\"journal\":{\"name\":\"Proceedings of the 16th Annual Conference on Information Technology Education\",\"volume\":\"19 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2015-09-29\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"11\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Proceedings of the 16th Annual Conference on Information Technology Education\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1145/2808006.2808023\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings of the 16th Annual Conference on Information Technology Education","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/2808006.2808023","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
We have developed a collection of instructional hands-on lab assignments that can be used to help teach security courses or courses with a security component in information technology (IT). Our labs cover a wide spectrum of principles, ideas and technologies along with well-developed open source tools. Lab descriptions are publicly accessible from our web page. All of the labs have been tested in a virtual environment and utilized in our security courses. Feedback from the students has been positive. In this paper, we will present the lab design, topics covered in our labs, lab environments and student evaluation results. We will share our experience in transferring advanced technology to IT security education and lessons learned from this practice.