Practical Cybersecurity Education: A Course Model Using Experiential Learning Theory

被引:0
作者
Narain, Sashank [1 ]
Rayavaram, Pranathi [1 ]
Morales-Gonzalez, Christopher [1 ]
Harper, Matthew [1 ]
Abbasalizadeh, Maryam [1 ]
Vellamchety, Krishna [1 ]
Fu, Xinwen [1 ]
机构
[1] Univ Massachusetts Lowell, Lowell, MA 01854 USA
来源
PROCEEDINGS OF THE 56TH ACM TECHNICAL SYMPOSIUM ON COMPUTER SCIENCE EDUCATION, SIGCSE TS 2025, VOL 2 | 2025年
关键词
Cybersecurity Education; Cyber Defense; Hands-on Learning; Experiential Learning Theory;
D O I
暂无
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
The increasing sophistication of cybersecurity threats necessitates an educational approach that blends theoretical knowledge with practical experience. Many courses focus primarily on theoretical concepts, leaving students with limited hands-on experience with real-world challenges. This paper introduces a cybersecurity course model that integrates Experiential Learning Theory to provide a comprehensive hands-on learning environment. The course covers important cybersecurity topics, including SSH, VPNs, TLS, MFA, OpenID Connect, OAuth2, web server security, high availability, replication, distributed file systems, and orchestration with Docker and Kubernetes. These topics are explored through a mix of lectures, peer presentations, and weekly hands-on team practices. Over three years, the course has been offered at our large public university with 72 students enrolled, consistently receiving high course ratings between 4.8 and 5.0. This paper discusses the course design, methodology, and outcomes, offering insights for educators to replicate and adapt the model for their own institutions.
引用
收藏
页码:819 / 825
页数:7
相关论文
共 40 条
[1]  
Al-Janabi SF, 2012, 2012 INT C ADV COMP
[2]  
[Anonymous], 47. "torch_geometric.nn.conv.SAGEConv-pytorch_geometric documentation," pytorch-geometric.readthedocs.io. https://pytorch-geometric.readthedocs.io/en/latest/generated/torch_geometric.nn.conv.SAGEConv.html#torch_geometric.nn.conv.SAGEConv (accessed Jan. 10, 2024).
[3]  
[Anonymous], [10] "https://en.wikipedia.org/wiki/GSM." [Online]. Available: https://en.wikipedia.org/wiki/GSM. [Accessed: 15-Aug-2017]
[4]  
[Anonymous], SNORT NETWORK INTRUS
[5]  
[Anonymous], [12] Khronos Group, . URL https://www.khronos.org/. last accessed: February 27 2024.
[6]  
[Anonymous], [2] https://ec.europa.eu/eurostat/databrowser/view/ILC_LVHO02__custom_698592/default/table?langen. [Accessed 30 December 2021].
[7]  
Arfaoui Ghada, 2019, Proceedings on Privacy Enhancing Technologies, V2019, P190, DOI 10.2478/popets-2019-0065
[8]  
Bene Fruzsina, 2023, P 2023 IEEE 17 INT S, DOI [10.1109/SACI58269.putationalIntelligenceandInformatics(2023.10158562, DOI 10.1109/SACI58269.PUTATIONALINTELLIGENCEANDINFORMATICS(2023.10158562]
[9]  
Boggu Anita, 2016, International Journal of English Language Teaching, V4
[10]  
Braganza R., 2006, Network Security, V2006, P17, DOI 10.1016/S1353-4858(06)70425-1