Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 0 |
Since 2016 (last 10 years) | 0 |
Since 2006 (last 20 years) | 5 |
Descriptor
Computer Security | 5 |
Laboratories | 3 |
Computer Networks | 2 |
Computer Science | 2 |
Computers | 2 |
Information Technology | 2 |
Access to Computers | 1 |
Advanced Courses | 1 |
Assignments | 1 |
Barriers | 1 |
Classrooms | 1 |
More ▼ |
Source
Journal on Educational… | 5 |
Author
Bhagyavati | 1 |
Du, Wenliang | 1 |
Harrison, Warren | 1 |
Hoffman, Lance J. | 1 |
Phillips, Andrew T. | 1 |
Rosenberg, Timothy | 1 |
Wagner, Paul J. | 1 |
Wang, Ronghua | 1 |
Publication Type
Journal Articles | 5 |
Reports - Descriptive | 5 |
Education Level
Higher Education | 5 |
Audience
Location
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Du, Wenliang; Wang, Ronghua – Journal on Educational Resources in Computing, 2008
The security and assurance of our computing infrastructure has become a national priority. To address this priority, higher education has gradually incorporated the principles of computer and information security into the mainstream undergraduate and graduate computer science curricula. To achieve effective education, learning security principles…
Descriptors: Computer Security, Laboratories, Computers, Computer Science
Wagner, Paul J.; Phillips, Andrew T. – Journal on Educational Resources in Computing, 2006
We have developed a computer security workshop designed to instruct post-secondary instructors who want to start a course or laboratory exercise sequence in computer security. This workshop has also been used to provide computer security education to IT professionals and students. It is effective in communicating basic computer security principles…
Descriptors: Computer Security, Workshops, Information Technology, College Faculty
Harrison, Warren – Journal on Educational Resources in Computing, 2006
The typical approach to creating an examination disk for exercises and projects in a course on computer forensics is for the instructor to populate a piece of media with evidence to be retrieved. While such an approach supports the simple use of forensic tools, in many cases the use of an instructor-developed examination disk avoids utilizing some…
Descriptors: Computer Security, Computer System Design, Evidence, Crime
Rosenberg, Timothy; Hoffman, Lance J. – Journal on Educational Resources in Computing, 2006
Educational institutions that wish to implement a specialized teaching laboratory often have a variety of obstacles to overcome. Some of these obstacles are related to adapting existing classroom infrastructure, building the laboratory, and meeting the demands for multiple-use classrooms to maximize the return on investment. In some cases, such as…
Descriptors: Higher Education, Professional Education, Computers, Specialization
Bhagyavati – Journal on Educational Resources in Computing, 2006
Information assurance courses delivered in an online environment pose challenges to the development of meaningful hands-on exercises for students. This article presents techniques on furnishing laboratory exercises to online students and presents examples of assignments drawn from the author's experiences in teaching online courses for over three…
Descriptors: Assignments, Advanced Courses, Distance Education, Online Courses