Abstract

Cybersecurity comprised all the technologies and practices that protect data as well as computer and network systems. In this article, we develop four course modules on critical cybersecurity topics that can be adopted in college-level cybersecurity courses in which these topics are covered. Our goal for developing these course modules with the hands-on labs is to increase students’ understanding and hands-on experiences on these critical topics that support cyber skills development for college students. The hands-on labs are designed to enhance students’ engagement and provide them hands-on experiences with real-world cyber activities to augment their cyber education of both foundational and advanced skills. We also conduct research surveys on the most-recent significant research in these critical cybersecurity fields. These cybersecurity course modules with the labs are also designed to help college/university professors enhance and update their cybersecurity course content, activities, hands-on lab exercises, and pedagogical methods, as well as emphasize the cyber skills to meet today’s pressing cybersecurity education needs for college students. Our proposed cybersecurity modules with hands-on labs will also help building the nation’s cybersecurity workforce.

Highlights

  • Cybersecurity comprised all the technologies and practices that protect data as well as computer and network systems

  • If your systems are compromised by malicious attacks, it is a direct vulnerability to the confidential data your company has, but it could destroy your relationships with your clients

  • We develop four course modules on critical cybersecurity topics that can be adopted in any cybersecurity course in which these topics are covered

Read more

Summary

Introduction

Cybersecurity comprised all the technologies and practices that protect data as well as computer and network systems. The critical cybersecurity topics selected for the course modules include (1) application security, (2) web security, (3) firewall configurations, and (4) wireless networking security. We presented in detail the following two commonly used types of application attacks: (1) attackers may use buffer overflows to launch attacks by injecting malicious code into a running application and making arbitrary code execution on a remote server, and (2) attackers may use code injection attacks to inject malicious code into running applications In this module, we develop a course module on web security. There are malicious sources of security threats in wireless networks This type of integrity violations is the malicious attacks with the purpose of revising the payload data of intercepted wireless packets. NETLAB + , load the network topology for the Network Security Lab Series

22. Select the File menu option and navigate to Export Objects HTTP
14. Click the Add button located underneath all of the listed services
Conclusion
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call