Teaching Cybersecurity Using the Cloud

被引:34
作者
Salah, Khaled [1 ]
Hammoud, Mohammad [2 ]
Zeadally, Sherali [3 ]
机构
[1] Khalifa Univ Sci Technol & Res KUSTAR, Dept Elect & Comp Engn, Abu Dhabi, U Arab Emirates
[2] Carnegie Mellon Univ, Sch Comp Sci, Doha, Qatar
[3] Univ Kentucky, Coll Commun & Informat, Lexington, KY 40506 USA
来源
IEEE TRANSACTIONS ON LEARNING TECHNOLOGIES | 2015年 / 8卷 / 04期
关键词
Cybersecurity; network security; computer security; education; cloud computing; Amazon AWS;
D O I
10.1109/TLT.2015.2424692
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Cloud computing platforms can be highly attractive to conduct course assignments and empower students with valuable and indispensable hands-on experience. In particular, the cloud can offer teaching staff and students (whether local or remote) on-demand, elastic, dedicated, isolated, (virtually) unlimited, and easily configurable virtual machines. As such, employing cloud-based laboratories can have clear advantages over using classical ones, which impose major hindrances against fulfilling pedagogical objectives and do not scale well when the number of students and distant university campuses grows up. We show how the cloud paradigm can be leveraged to teach a cybersecurity course. Specifically, we share our experience when using cloud computing to teach a senior course on cybersecurity across two campuses via a virtual classroom equipped with live audio and video. Furthermore, based on this teaching experience, we propose guidelines that can be applied to teach similar computer science and engineering courses. We demonstrate how cloud-based laboratory exercises can greatly help students in acquiring crucial cybersecurity skills as well as cloud computing ones, which are in high demand nowadays. The cloud we used for this course was the Amazon Web Services (AWS) public cloud. However, our presented use cases and approaches are equally applicable to other available cloud platforms such as Rackspace and Google Compute Engine, among others.
引用
收藏
页码:383 / 392
页数:10
相关论文
共 30 条
[1]   Georgia tech information security center hands-on network security laboratory [J].
Abler, RT ;
Contis, D ;
Grizzard, JB ;
Owen, HL .
IEEE TRANSACTIONS ON EDUCATION, 2006, 49 (01) :82-87
[2]  
Alshuwaier FA, 2012, 2012 8TH INTERNATIONAL CONFERENCE ON COMPUTING AND NETWORKING TECHNOLOGY (ICCNT, INC, ICCIS AND ICMIC), P26
[3]  
[Anonymous], 2010, Cryptography and Network Security: Principles and Practice
[4]  
[Anonymous], 2013, J COMPUT SCI COLL
[5]  
[Anonymous], 2004, Journal of Computing Sciences in Colleges
[6]  
Bo Wang, 2011, 2011 International Conference on Computer Science and Service System (CSSS), P2673
[7]   Meeting learners' needs inside the educational cloud [J].
Boyatt, Russell ;
Sinclair, Jane .
INTERNATIONAL JOURNAL OF LEARNING TECHNOLOGY, 2013, 8 (01) :61-85
[8]  
Brustoloni J.C., 2006, J ED RESOURCES COMPU, V6, P5
[9]   GENI Laboratory Exercises Development for a Cloud Computing Course [J].
Calyam, Prasad ;
Seetharam, Sripriya ;
Antequera, Ronny Bazan .
2014 THIRD GENI RESEARCH AND EDUCATIONAL EXPERIMENT WORKSHOP (GREE), 2014, :19-24
[10]  
HM UK Government, 2013, STRONG BRIT AG UNC N