Educational modules and research surveys on critical cybersecurity topics

Cybersecurity comprised all the technologies and practices that protect data as well as computer and network systems. In this article, we develop four course modules on critical cybersecurity topics that can be adopted in college-level cybersecurity courses in which these topics are covered. Our goal for developing these course modules with the hands-on labs is to increase students’ understanding and hands-on experiences on these critical topics that support cyber skills development for college students. The hands-on labs are designed to enhance students’ engagement and provide them hands-on experiences with real-world cyber activities to augment their cyber education of both foundational and advanced skills. We also conduct research surveys on the most-recent significant research in these critical cybersecurity fields. These cybersecurity course modules with the labs are also designed to help college/university professors enhance and update their cybersecurity course content, activities, hands-on lab exercises, and pedagogical methods, as well as emphasize the cyber skills to meet today’s pressing cybersecurity education needs for college students. Our proposed cybersecurity modules with hands-on labs will also help building the nation’s cybersecurity workforce.

[1]  Naren Ramakrishnan,et al.  Causality-based Sensemaking of Network Traffic for Android Application Security , 2016, AISec@CCS.

[2]  Erkang Zheng,et al.  Building a virtually air-gapped secure environment in AWS: with principles of devops security program and secure software delivery , 2018, HoTSoS '18.

[3]  Avishai Wool,et al.  Trends in Firewall Configuration Errors: Measuring the Holes in Swiss Cheese , 2010, IEEE Internet Computing.

[4]  Michael Backes,et al.  Stack Overflow Considered Harmful? The Impact of Copy&Paste on Android Application Security , 2017, 2017 IEEE Symposium on Security and Privacy (SP).

[5]  Shiuh-Pyng Shieh,et al.  Web Application Security: Threats, Countermeasures, and Pitfalls , 2017, Computer.

[6]  Patricia Y. Logan,et al.  Teaching students to hack: curriculum issues in information security , 2005 .

[7]  Steve R. White,et al.  An Undetectable Computer Virus , 2000 .

[8]  Qingqing Wu,et al.  Safeguarding Wireless Network with UAVs: A Physical Layer Security Perspective , 2019, IEEE Wireless Communications.

[9]  Xiuzhen Cheng,et al.  Secure Communications in Tiered 5G Wireless Networks With Cooperative Jamming , 2019, IEEE Transactions on Wireless Communications.

[10]  Andrei Gurtov,et al.  Security for 5G and Beyond , 2019, IEEE Communications Surveys & Tutorials.

[11]  Hiroshi Esaki,et al.  Probing Firewalls of Malware-Infected Networks with Honeypot , 2019, CFI.

[12]  Md. Saeed Siddik,et al.  Analyzing Web Application Vulnerabilities: An Empirical Study on E-Commerce Sector in Bangladesh , 2020, ICCA.

[13]  Charles P. Pfleeger,et al.  Security in computing , 1988 .

[14]  William Stallings Zhu,et al.  Network Security Essentials : Applications and Standards , 2007 .

[15]  Zarul Fitri Zaaba,et al.  Web Security: Detection of Cross Site Scripting in PHP Web Application using Genetic Algorithm , 2017 .

[16]  Luying Zhou,et al.  SCADAWall: A CPI-enabled firewall model for SCADA security , 2019, Comput. Secur..