skip to main content
10.1145/3017680.3017720acmconferencesArticle/Chapter ViewAbstractPublication PagessigcseConference Proceedingsconference-collections
research-article

Innovative Pedagogical Approaches to a Capstone Laboratory Course in Cyber Operations

Published: 08 March 2017 Publication History

Abstract

This paper provides pedagogical lessons drawn from a capstone hands-on laboratory course in cyber operations. It is taught as a flipped class, where the center piece is a collection of exercises that require teams of students to set up, defend, and attack complex networks. Project designs are presented, including balancing offense and defense to improve course learning outcomes. Lessons on the recruiting and managing of an external "red team" are provided. Grading issues are addressed, as are techniques to manage students of different skills and motivations.

References

[1]
List of centers of academic excellence in cyber operations. https://www.nsa.gov/resources/educators/centers-academic-excellence/cyber-operations/centers.shtml. Accessed: 2016-08--16.
[2]
ACM/IEEE-CS Joint Task Force on Computing Curricula. Computer science curricula 2013, https://www.acm.org/education/CS2013-final-report.pdf. Technical report, ACM Press and IEEE Computer Society Press, December 2013.
[3]
J. R. Aman, J. E. Conway, and C. Harr. A capstone exercise for a cybersecurity course. J. Comput. Sci. Coll., 25(5):207--212, May 2010.
[4]
S. Azadegan and M. O'Leary. An undergraduate cyber operations curriculum in the making: A 10+ year report. In Proceedings of IEEEISI2016. IEEE, 2016.
[5]
Y. Bai and C. Taylor. Cyber defense competition: Enhancing student competency in information security. In Proceedings of the 2011 Conference on Information Technology Education, SIGITE '11, pages 305--306, New York, NY, USA, 2011. ACM.
[6]
A. G. Bardas and X. Ou. Setting up and using a cyber security lab for education purposes. J. Comput. Sci. Coll., 28(5):191--197, May 2013.
[7]
Y. Bei, R. Kesterson, K. Gwinnup, and C. Taylor. Cyber defense competition: A tale of two teams. J. Comput. Sci. Coll., 27(1):171--177, Oct. 2011.
[8]
J. L. Bishop and M. A. Verleger. The flipped classroom: A survey of the research. In ASEE National Conference Proceedings, Atlanta, GA, volume 30, 2013.
[9]
Brainsmoke. Nyanmbr. https://github.com/brainsmoke/nyanmbr, 2013.
[10]
W. Du and R. Wang. Seed: A suite of instructional laboratories for computer security education. J. Educ. Resour. Comput., 8(1):3:1--3:24, Mar. 2008.
[11]
L. Fife and A. Jordan. The development of an academic cyber security lab: From bare walls to functional lab. J. Comput. Sci. Coll., 31(4):49--55, Apr. 2016.
[12]
C. F. Herreid and N. A. Schiller. Case studies and the flipped classroom. Journal of College Science Teaching, 42(5):62--66, 2013.
[13]
A. M. Holland-Minkley. Cyberattacks: A lab-based introduction to computer security. In Proceedings of the 7th Conference on Information Technology Education, SIGITE '06, pages 39--46, New York, NY, USA, 2006. ACM.
[14]
J. Livermore, K. Baker, V. Krolczyk, and A. Saurbier. Capstone, thesis, or practicum?: The state of the practice in ia education. In Proceedings of the 2011 Information Security Curriculum Development Conference, InfoSecCD '11, pages 69--73, New York, NY, USA, 2011. ACM.
[15]
J. A. Livermore. Designing a graduate capstone course for an online information assurance program. In 2010 Information Security Curriculum Development Conference, InfoSecCD '10, pages 58--61, New York, NY, USA, 2010. ACM.
[16]
D. Manson, P. Pusey, M. J. Hufe, J. Jones, D. Likarish, J. Pittman, and D. Tobey. The cybersecurity competition federation. In Proceedings of the 2015 ACM SIGMIS Conference on Computers and People Research, SIGMIS-CPR '15, pages 109--112, New York, NY, USA, 2015. ACM.
[17]
P. Marwedel and M. Engel. Flipped classroom teaching for a cyber-physical system course-an adequate presence-based learning approach in the internet age. In Microelectronics Education (EWME), 10th European Workshop on, pages 11--15. IEEE, 2014.
[18]
H. N. Mok. Teaching tip: The flipped classroom. Journal of Information Systems Education, 25(1):7, 2014.
[19]
M. O'Leary. Cyber Operations. APress, 2015.
[20]
Rapid7. Windows escalate task scheduler xml privilege escalation. https://www.rapid7.com/db/modules/exploit/windows/local/ms10_092_schelevator, 2013. Accessed: 2016-08--16.
[21]
A. Robbins, R. Vazarkar, and W. Schroeder. Six degrees of domain admin: Using graph theory to accelerate red team operations. DefCon 24. Accessed: 2016-08--16.
[22]
J. Schafer, D. J. Ragsdale, J. R. Surdu, and C. A. Carver. The IWAR range: a laboratory for undergraduate information assurance education. In CCSC '01: Proceedings of the sixth annual CCSC northeastern conference on The journal of computing in small colleges, pages 223--232, USA, 2001. Consortium for Computing Sciences in Colleges.
[23]
D. H. Tobey. A vignette-based method for improving cybersecurity talent management through cyber defense competition design. In Proceedings of the 2015 ACM SIGMIS Conference on Computers and People Research, SIGMIS-CPR '15, pages 31--39, New York, NY, USA, 2015. ACM.
[24]
B. Tucker. The flipped classroom. Education next, 12(1), 2012.
[25]
X. Wang, Y. Bai, and G. C. Hembroff. Hands-on exercises for it security education. In Proceedings of the 16th Annual Conference on Information Technology Education, SIGITE '15, pages 161--166, New York, NY, USA, 2015. ACM.
[26]
J. Werther, M. Zhivich, T. Leek, and N. Zeldovich. Experiences in cyber security education: The MIT Lincoln Laboratory capture-the-flag exercise. In Proceedings of the 4th Conference on Cyber Security Experimentation and Test, CSET'11, pages 12--12, Berkeley, CA, USA, 2011. USENIX Association.
[27]
Y. A. Wu. Benefits of virtualization in security lab design. ACM Inroads, 1(4):38--42, Dec. 2010.

Cited By

View all
  • (2024)Enhancing Student Engagement in Large-Scale Capstone Courses: An Experience ReportProceedings of the 2024 on Innovation and Technology in Computer Science Education V. 110.1145/3649217.3653580(722-728)Online publication date: 3-Jul-2024
  • (2024)PWN The Learning Curve: Education-First CTF ChallengesProceedings of the 55th ACM Technical Symposium on Computer Science Education V. 110.1145/3626252.3630912(937-943)Online publication date: 7-Mar-2024
  • (2024)DOJO: Applied Cybersecurity Education in the BrowserProceedings of the 55th ACM Technical Symposium on Computer Science Education V. 110.1145/3626252.3630836(930-936)Online publication date: 7-Mar-2024
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
SIGCSE '17: Proceedings of the 2017 ACM SIGCSE Technical Symposium on Computer Science Education
March 2017
838 pages
ISBN:9781450346986
DOI:10.1145/3017680
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 08 March 2017

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. capstone course
  2. computer security
  3. cyber operations
  4. pedagogy

Qualifiers

  • Research-article

Conference

SIGCSE '17
Sponsor:

Acceptance Rates

SIGCSE '17 Paper Acceptance Rate 105 of 348 submissions, 30%;
Overall Acceptance Rate 1,595 of 4,542 submissions, 35%

Upcoming Conference

SIGCSE TS 2025
The 56th ACM Technical Symposium on Computer Science Education
February 26 - March 1, 2025
Pittsburgh , PA , USA

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)17
  • Downloads (Last 6 weeks)2
Reflects downloads up to 24 Jan 2025

Other Metrics

Citations

Cited By

View all
  • (2024)Enhancing Student Engagement in Large-Scale Capstone Courses: An Experience ReportProceedings of the 2024 on Innovation and Technology in Computer Science Education V. 110.1145/3649217.3653580(722-728)Online publication date: 3-Jul-2024
  • (2024)PWN The Learning Curve: Education-First CTF ChallengesProceedings of the 55th ACM Technical Symposium on Computer Science Education V. 110.1145/3626252.3630912(937-943)Online publication date: 7-Mar-2024
  • (2024)DOJO: Applied Cybersecurity Education in the BrowserProceedings of the 55th ACM Technical Symposium on Computer Science Education V. 110.1145/3626252.3630836(930-936)Online publication date: 7-Mar-2024
  • (2021)Toolset for Collecting Shell Commands and Its Application in Hands-on Cybersecurity Training2021 IEEE Frontiers in Education Conference (FIE)10.1109/FIE49875.2021.9637052(1-9)Online publication date: 13-Oct-2021
  • (2018)Capstones and Large Projects in Computing EducationACM Transactions on Computing Education10.1145/322988218:2(1-4)Online publication date: 11-Jul-2018
  • (2018)Enhancing cybersecurity skills by creating serious gamesProceedings of the 23rd Annual ACM Conference on Innovation and Technology in Computer Science Education10.1145/3197091.3197123(194-199)Online publication date: 2-Jul-2018
  • (2018)Flipping Unplugged: An Experience Report2018 IEEE Frontiers in Education Conference (FIE)10.1109/FIE.2018.8658820(1-4)Online publication date: Oct-2018

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media