Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/2676723.2691862acmconferencesArticle/Chapter ViewAbstractPublication PagessigcseConference Proceedingsconference-collections
abstract

Teaching Security Using Hands-on Exercises in 2015 (Abstract Only)

Published: 24 February 2015 Publication History

Abstract

We see teaching cybersecurity through hands-on, interactive exercises as a way to engage students. Some of the exercises that we have seen require significant preparation on the part of the instructor. Having a community makes it easier to share exercises, knowing what works and what problems students and instructors have encountered. The purpose of this BOF is to bring together instructors who have developed hands-on exercises, those who have used them and those who would like to. We recognize that few CS programs can afford new required courses, so we will discuss ways to integrate security-related exercises into existing ones. This could include networking, OS, computer architecture, programming languages, software engineering, algorithms and programming. The questions we will ask are, "What exercises have you tried? What are your experiences? What are you looking for?"
Recent hiring forecasts indicate that there is still a tremendous need for skilled information security experts. Security is one of the core areas in the ACM/IEEE COMPUTER SCIENCE 2013 Curricula. It is particularly important to share stories from the classroom (what worked and what didn't), discuss ethical hacking, and discuss how to teach analytical skills. We plan to share experiences, practices and ongoing efforts, including our own (e.g., our teaching experiences, the SISMAT program, Security Injections, the Seattle Platform, the Security Knitting Kit project, EDURange and the dissemination of infosec interactive exercises).

Cited By

View all
  • (2019)Integrating Ethics within Machine Learning CoursesACM Transactions on Computing Education10.1145/334116419:4(1-26)Online publication date: 2-Aug-2019

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
SIGCSE '15: Proceedings of the 46th ACM Technical Symposium on Computer Science Education
February 2015
766 pages
ISBN:9781450329668
DOI:10.1145/2676723
Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for third-party components of this work must be honored. For all other uses, contact the Owner/Author.

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 24 February 2015

Check for updates

Author Tags

  1. hacker curriculum
  2. laboratory exercises
  3. secure coding
  4. security

Qualifiers

  • Abstract

Funding Sources

  • National Science Foundation

Conference

SIGCSE '15
Sponsor:

Acceptance Rates

SIGCSE '15 Paper Acceptance Rate 105 of 289 submissions, 36%;
Overall Acceptance Rate 1,595 of 4,542 submissions, 35%

Upcoming Conference

SIGCSE TS 2025
The 56th ACM Technical Symposium on Computer Science Education
February 26 - March 1, 2025
Pittsburgh , PA , USA

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 25 Dec 2024

Other Metrics

Citations

Cited By

View all
  • (2019)Integrating Ethics within Machine Learning CoursesACM Transactions on Computing Education10.1145/334116419:4(1-26)Online publication date: 2-Aug-2019

View Options

View options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media