Practical Cyber Security Training Exercises

被引:6
|
作者
Wahsheh, Luay A. [1 ]
Mekonnen, Biruk [1 ]
机构
[1] Arkansas Tech Univ, Dept Comp & Informat Sci, Russellville, AR 72801 USA
关键词
Hands-on exercises; virtualization; cyber attacks; ethical hacking; digital forensics;
D O I
10.1109/CSCI49370.2019.00015
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
There is a shortage of skilled cyber security professionals. Hands-on learning engages students and provides them with an opportunity to gain knowledge and improve their problem-solving skills. We developed hands-on training laboratory exercises that help students to better understand topics in the cyber security field by applying them in controlled virtual environments. The traimngs are designed to be practiced in a consistent virtual environment and modularized in a way that allows students to practice specific parts of the exercises based on their level of educational background. The material that is presented in each training exercise focuses more on the methodologies to put cyber security concepts into practice including tools and best practices for better success rate. By performing digital forensics, penefration testing, social engineering, and other ethical hacking attacks, students can have a good perspective into the mind of attackers.
引用
收藏
页码:48 / 53
页数:6
相关论文
共 50 条
  • [1] Log Analysis of Cyber Security Training Exercises
    Abbott, Robert G.
    McClain, Jonathan
    Anderson, Benjamin
    Nauer, Kevin
    Silva, Austin
    Forsythe, Chris
    6TH INTERNATIONAL CONFERENCE ON APPLIED HUMAN FACTORS AND ERGONOMICS (AHFE 2015) AND THE AFFILIATED CONFERENCES, AHFE 2015, 2015, 3 : 5088 - 5094
  • [2] AIT Cyber Range: Flexible Cyber Security Environment for Exercises, Training and Research
    Leitner, Maria
    Frank, Maximilian
    Hotwagner, Wolfgang
    Langner, Gregor
    Maurhart, Oliver
    Pahi, Timea
    Reuter, Lenhard
    Skopik, Florian
    Smith, Paul
    Warum, Manuel
    EUROPEAN INTERDISCIPLINARY CYBERSECURITY - EICC 2020, 2020,
  • [3] Enabling Practical Experimentation in Cyber-Security Training
    Mao, Jian
    Chua, Zheng Leong
    Liang, Zhenkai
    2017 IEEE CONFERENCE ON DEPENDABLE AND SECURE COMPUTING, 2017, : 516 - 517
  • [4] Pedagogical Aspects of Cyber Security Exercises
    Karjalainen, Mika
    Kokkonen, Tero
    Puuska, Samir
    2019 4TH IEEE EUROPEAN SYMPOSIUM ON SECURITY AND PRIVACY WORKSHOPS (EUROS&PW), 2019, : 103 - 108
  • [5] Guide for Designing Cyber Security Exercises
    Patriciu, Victor-Valeriu
    Furtuna, Adrian Constantin
    RECENT ADVANCES IN E-ACTIVITIES, INFORMATION SECURITY AND PRIVACY, 2009, : 172 - +
  • [6] A Scalable Model for Implementing Cyber Security Exercises
    Gurnani, Rahul
    Pandey, Kaushik
    Rai, Shashi Kant
    2014 INTERNATIONAL CONFERENCE ON COMPUTING FOR SUSTAINABLE GLOBAL DEVELOPMENT (INDIACOM), 2014, : 680 - 684
  • [7] A Structured Approach for Implementing Cyber Security Exercises
    Furtuna, Adrian
    Patriciu, Victor-Valeriu
    Bica, Ion
    PROCEEDINGS OF THE 2010 8TH INTERNATIONAL CONFERENCE ON COMMUNICATIONS (COMM), 2010, : 415 - 418
  • [8] Cyber Security Training A Survey of Serious Games in Cyber Security
    Tioh, Jin-Ning
    Mina, Mani
    Jacobson, Douglas W.
    2017 IEEE FRONTIERS IN EDUCATION CONFERENCE (FIE), 2017,
  • [9] Game Based Cyber Security Training: are Serious Games suitable for cyber security training?
    Hendrix, Maurice
    Al-Sherbaz, Ali
    Bloom, Victoria
    INTERNATIONAL JOURNAL OF SERIOUS GAMES, 2016, 3 (01): : 53 - 61
  • [10] USING AN EMULATION TESTBED FOR OPERATIONAL CYBER SECURITY EXERCISES
    Siaterlis, Christos
    Perez-Garcia, Andres
    Masera, Marcelo
    CRITICAL INFRASTRUCTURE PROTECTION V, 2011, 367 : 185 - 199