Teaching security using hands-on exercises (abstract only)
Abstract
Index Terms
- Teaching security using hands-on exercises (abstract only)
Recommendations
Teaching security using hands-on exercises (abstract only)
SIGCSE '13: Proceeding of the 44th ACM technical symposium on Computer science educationWe see teaching cybersecurity through hands-on, interactive exercises as a way to engage students. Some of the exercises that we have seen require significant preparation on the part of the instructor. Having a community makes it easier to share ...
Teaching Security Using Hands-on Exercises in 2015 (Abstract Only)
SIGCSE '15: Proceedings of the 46th ACM Technical Symposium on Computer Science EducationWe see teaching cybersecurity through hands-on, interactive exercises as a way to engage students. Some of the exercises that we have seen require significant preparation on the part of the instructor. Having a community makes it easier to share ...
Hands-on cybersecurity exercises in the EDURange framework (abstract only)
SIGCSE '14: Proceedings of the 45th ACM technical symposium on Computer science educationCybersecurity is a topic of growing interest for CS educators. The goal of this workshop is to provide faculty with tools and interactive exercises that would facilitate adding this topic to their curriculum. We will introduce the EDURange framework for ...
Comments
Please enable JavaScript to view thecomments powered by Disqus.Information & Contributors
Information
Published In
- Conference Chairs:
- J. D. Dougherty,
- Kris Nagel,
- Program Chairs:
- Adrienne Decker,
- Kurt Eiselt
Sponsors
Publisher
Association for Computing Machinery
New York, NY, United States
Publication History
Check for updates
Author Tags
Qualifiers
- Abstract
Conference
Acceptance Rates
Upcoming Conference
- Sponsor:
- sigcse
Contributors
Other Metrics
Bibliometrics & Citations
Bibliometrics
Article Metrics
- 0Total Citations
- 0Total Downloads
- Downloads (Last 12 months)0
- Downloads (Last 6 weeks)0
Other Metrics
Citations
View Options
Login options
Check if you have access through your login credentials or your institution to get full access on this article.
Sign in