Developing and implementing an institution-wide introductory cyber-security course in record time
Abstract
References
Index Terms
- Developing and implementing an institution-wide introductory cyber-security course in record time
Recommendations
Network reconnaissance, attack, and defense laboratories for an introductory cyber-security course
ACMSE '13: Proceedings of the 51st annual ACM Southeast ConferenceCyber security is an area where much curriculum development is taking place, and it is important that such efforts be shared. In this work we describe three lab exercises developed at the United States Naval Academy for use in our fundamentals of cyber-...
Anatomy, dissection, and mechanics of an introductory cyber-security course's curriculum at the United States naval academy
ITiCSE '12: Proceedings of the 17th ACM annual conference on Innovation and technology in computer science educationDue to the high priority of cyber-security education, the United States Naval Academy rapidly developed and implemented a new cyber-security course that is required for all of its first-year students. During the fall semester in 2011, half of the ...
Network reconnaissance, attack, and defense laboratories for an introductory cyber-security course
Cyber-security is an area in which much curriculum development is taking place; it is important that such efforts be evaluated and shared. We describe three laboratories developed at the United States Naval Academy (USNA) for use in its fundamentals of ...
Comments
Information & Contributors
Information
Published In

- Conference Chair:
- Randy K. Smith,
- Program Chair:
- Susan V. Vrbsky
Sponsors
Publisher
Association for Computing Machinery
New York, NY, United States
Publication History
Check for updates
Author Tags
Qualifiers
- Research-article
Conference
Acceptance Rates
Contributors
Other Metrics
Bibliometrics & Citations
Bibliometrics
Article Metrics
- 0Total Citations
- 209Total Downloads
- Downloads (Last 12 months)2
- Downloads (Last 6 weeks)0
Other Metrics
Citations
View Options
Login options
Check if you have access through your login credentials or your institution to get full access on this article.
Sign in