Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 2 |
Since 2016 (last 10 years) | 3 |
Since 2006 (last 20 years) | 7 |
Descriptor
Computer Security | 8 |
Laboratory Experiments | 8 |
Computer Networks | 4 |
Computer Science Education | 4 |
Information Security | 4 |
Teaching Methods | 3 |
Computer Software | 2 |
Course Descriptions | 2 |
Electronic Learning | 2 |
Experiential Learning | 2 |
Graduate Students | 2 |
More ▼ |
Source
Author
Bhunia, Swarup | 1 |
Brustoloni, Jose Carlos | 1 |
Chen, Charlie C. | 1 |
Chou, Te-Shun | 1 |
Copeland, J. A. | 1 |
Fairbanks, K. D. | 1 |
Guynes, Carl S. | 1 |
Harris, Albert L. | 1 |
Hempenius, Nicholas | 1 |
Huang, Hui-Jou | 1 |
Jensen, Bradley K. | 1 |
More ▼ |
Publication Type
Journal Articles | 6 |
Reports - Evaluative | 3 |
Reports - Descriptive | 2 |
Collected Works - Serial | 1 |
Dissertations/Theses -… | 1 |
Reports - Research | 1 |
Education Level
Higher Education | 6 |
Postsecondary Education | 4 |
Audience
Administrators | 1 |
Teachers | 1 |
Location
Arizona | 2 |
Florida | 2 |
California | 1 |
Russia | 1 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Yuli Deng – ProQuest LLC, 2021
Personalized learning is gaining popularity in online computer science education due to its characteristics of pacing the learning progress and adapting the instructional approach to each individual learner from a diverse background. Among various instructional methods in computer science education, hands-on labs have unique requirements of…
Descriptors: Individualized Instruction, Experiential Learning, Computer Science Education, Electronic Learning
Chou, Te-Shun; Hempenius, Nicholas – Journal of Cybersecurity Education, Research and Practice, 2020
With the advancement in technology over the past decades, networks have become increasingly large and complex. In the meantime, cyberattacks have become highly sophisticated making them difficult to detect. These changes make securing a network more challenging than ever before. Hence, it is critical to prepare a comprehensive guide of network…
Descriptors: Computer Networks, Computer Security, Information Security, Computer Science Education
Yang, Shuo; Paul, Shubhra Deb; Bhunia, Swarup – Advances in Engineering Education, 2021
Hardware security is one of the most researched areas in the field of security. It focuses on discovering and understanding attacks and countermeasures for electronic hardware that provides the "root-of-trust" for modern computing systems upon which the software stack is built. The increasing reliance on electronic devices in our…
Descriptors: Engineering Education, Computer Science Education, Computer Security, Information Security
Lee, C. P.; Uluagac, A. S.; Fairbanks, K. D.; Copeland, J. A. – IEEE Transactions on Education, 2011
This paper describes a competition-style of exercise to teach system and network security and to reinforce themes taught in class. The exercise, called NetSecLab, is conducted on a closed network with student-formed teams, each with their own Linux system to defend and from which to launch attacks. Students are expected to learn how to: 1) install…
Descriptors: Computer Security, Teaching Methods, Computer Networks, Computer Science Education
Shaw, R. S.; Chen, Charlie C.; Harris, Albert L.; Huang, Hui-Jou – Computers & Education, 2009
In recent years, rapid progress in the use of the internet has resulted in huge losses in many organizations due to lax security. As a result, information security awareness is becoming an important issue to anyone using the Internet. To reduce losses, organizations have made information security awareness a top priority. The three main barriers…
Descriptors: Online Courses, Multimedia Materials, Computer Security, Educational Technology
Jensen, Bradley K.; Guynes, Carl S.; Nyaboga, Andrew – American Journal of Business Education, 2009
Given the magnitude of real and potential losses, both private and public employers increasingly expect graduates of management information systems (MIS) programs to understand information security concepts. The infrastructure requirements for the course includes setting up a secure laboratory environment to accommodate the development of viruses…
Descriptors: Graduate Students, Management Information Systems, Information Security, Concept Teaching
Brustoloni, Jose Carlos – Journal on Educational Resources in Computing, 2006
We describe a sequence of five experiments on network security that cast students successively in the roles of computer user, programmer, and system administrator. Unlike experiments described in several previous papers, these experiments avoid placing students in the role of attacker. Each experiment starts with an in-class demonstration of an…
Descriptors: Confidentiality, Integrity, Internet, Laboratory Experiments
Chronicle of Higher Education, 2004
"Chronicle of Higher Education" presents an abundant source of news and information for college and university faculty members and administrators. This October 8, 2004 issue of "Chronicle of Higher Education" includes the following articles: (1) "Game for Anything" (Ruggill, Judd Ethan; Neelakantan, Shailaja); (2)…
Descriptors: Part Time Faculty, Teacher Employment Benefits, Drinking, Standardized Tests