[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1145/3511861.3511874acmotherconferencesArticle/Chapter ViewAbstractPublication Pagesaus-ceConference Proceedingsconference-collections
research-article
Open access

Collaborative Paradigm of Teaching Penetration Testing using Real-World University Applications

Published: 14 February 2022 Publication History

Abstract

This paper shares our three years of experience in conducting collaborative-based cybersecurity teaching involving industrial-expertise sharing and an authentic-learning environment. Penetration testing (pen-testing) is widely adopted in the cybersecurity industry. It requires a wide range of skillsets, including non-technical aspects, which are not easy to be acquired in a standard lecture-style setting. While the fundamentals of the skillsets could be taught separately in different modules, an integrated pen-testing module using real-world target applications will provide students with a bird’s-eye view of security assessment in an authentic learning setting. There exist, however, challenges in providing a sustainable structured pen-testing module. These include the evolving industrial best practices and availability of authentic target environments. In this paper, we share our experience as well as best practices in designing and teaching a pen-testing module in our Bachelor of Computing degree program. The module unconventionally adopts a fruitful win-win collaborative paradigm. The students, guided along by professional pen-testers from the industry and academic instructors, pen-test our University’s operational applications selected by the University IT Department. With the completed six semesters to date, our students have tested various applications, including our University’s learning management system, student registration system, and student-hall dining system, which all manage sensitive data. We have received very positive feedback from the parties involved. This paper describes our module’s rationale, involved parties and roles, class arrangements and activities, as well as grading considerations. The paper also discusses encountered issues and our adopted solutions related to University application selection, student contribution assessment, and activity arrangements during the COVID-19 outbreak. Some notes are additionally given for others who are keen to offer similar modules using the same teaching pedagogy. Our experience thus demonstrates that, while provisioning industrial collaboration and authentic learning in education needs to address several technical and administrative issues, a collaborative based teaching paradigm can work well in a sustainable manner.

References

[1]
[n.d.]. TEAMMATES. Retrieved Dec 10, 2021 from http://teammatesv4.appspot.com
[2]
Sergey Bratus, Anna Shubina, and Michael E. Locasto. 2010. Teaching the Principles of the Hacker Curriculum to Undergraduates. In Proceedings of the 41st ACM Technical Symposium on Computer Science Education (Milwaukee, Wisconsin, USA) (SIGCSE ’10). Association for Computing Machinery, New York, NY, USA, 122–126. https://doi.org/10.1145/1734263.1734303
[3]
Tony Clear, Michael Goldweber, Frank H. Young, Paul M. Leidig, and Kirk Scott. 2001. Resources for Instructors of Capstone Courses in Computing. In Working Group Reports from ITiCSE on Innovation and Technology in Computer Science Education (Canterbury, UK) (ITiCSE-WGR ’01). Association for Computing Machinery, New York, NY, USA, 93–113. https://doi.org/10.1145/572133.572135
[4]
Trajce Dimkov, Wolter Pieters, and Pieter Hartel. 2011. Training Students to Steal. In Proceedings of the 42nd ACM Technical Symposium on Computer Science Education - SIGCSE ’11. ACM Press, New York, New York, USA, 21. https://doi.org/10.1145/1953163.1953175
[5]
EC-Council. [n.d.]. What is Penetration Testing?Retrieved Dec 10, 2021 from https://www.eccouncil.org/what-is-penetration-testing/
[6]
CC2020 Task Force. 2020. Computing Curricula 2020: Paradigms for Global Computing Education. Association for Computing Machinery, New York, NY, USA.
[7]
Regina Hartley, Dawn Medlin, and Zach Houlik. 2017. Ethical Hacking: Educating Future Cybersecurity Professionals. Proceedings of the EDSIG Conference(2017). Issue October. http://proc.iscap.info/2017/pdf/4341.pdf
[8]
Regina D Hartley. 2006. Ethical Hacking: Teaching Students to Hack. INFOSEC Writers, November 5 (2006).
[9]
Nicole Herbert. 2018. Reflections on 17 Years of ICT Capstone Project Coordination: Effective Strategies for Managing Clients, Teams and Assessment. In Proceedings of the 49th ACM Technical Symposium on Computer Science Education (Baltimore, Maryland, USA) (SIGCSE ’18). Association for Computing Machinery, New York, NY, USA, 215–220. https://doi.org/10.1145/3159450.3159584
[10]
IT Governance. 2019. Penetration Testing and ISO 27001 – Securing Your ISMS, Green Paper. https://www.itgovernance.co.uk/green-papers/penetration-testing-and-iso-27001
[11]
Phillip James, Lauren Powell, Liam O’reilly, and Faron Moller. 2020. Hands-on Security Testing in a University Lab Environment. In Annual Conference on Innovation and Technology in Computer Science Education, ITiCSE. https://doi.org/10.1145/3341525.3387366
[12]
Joint Task Force on Cybersecurity Education. 2017. Cybersecurity Curricular Guideline. http://cybered.acm.org
[13]
Keith S. Jones, Akbar Siami Namin, and Miriam E. Armstrong. 2018. The Core Cyber-Defense Knowledge, Skills, and Abilities That Cybersecurity Students Should Learn in School. ACM Transactions on Computing Education 18, 3 (Sep 2018), 1–12. https://doi.org/10.1145/3152893
[14]
Amanpreet Kapoor and Christina Gardner-McCune. 2020. Exploring the Participation of CS Undergraduate Students in Industry Internships. In Proceedings of the 51st ACM Technical Symposium on Computer Science Education. ACM, New York, NY, USA, 1103–1109. https://doi.org/10.1145/3328778.3366844
[15]
National Cyber Security Centre. 2017. Penetration Testing. https://www.ncsc.gov.uk/guidance/penetration-testing
[16]
National Initiative for Cybersecurity Education (NICE). [n.d.]. NICE Framework Specialty Areas and Work Role. Retrieved Dec 10, 2021 from https://www.nist.gov/document/supplementnicespecialtyareasandworkroleksasandtasksxlsx
[17]
Meg Ormiston. 2010. Creating a Digital-Rich Classroom, Teaching & Learning in a Web 2.0 World. Solution Tree.
[18]
OWASP. 2014. OWASP Testing Guide 4.0. https://owasp.org/www-project-web-security-testing-guide/assets/archive/OWASP_Testing_Guide_v4.pdf
[19]
OWASP. 2017. OWASP Top Ten. Retrieved Dec 10, 2021 from https://owasp.org/www-project-top-ten
[20]
OWASP. 2019. OWASP Application Security Verification Standard 4.0. https://owasp.org/www-project-application-security-verification-standard
[21]
Penetration Test Guidance, Special Interest Group, PCI Security Standards Council. 2015. PCI Data Security Standard (PCI DSS) v1.0. https://www.pcisecuritystandards.org/documents/Penetration_Testing_Guidance_March_2015.pdf
[22]
Penetration Testing Execution Standard. [n.d.]. PTES Technical Guidelines. Retrieved Dec 10, 2021 from http://www.pentest-standard.org/index.php/PTES_Technical_Guidelines
[23]
PortSwigger. [n.d.]. Burp Suite Professional. Retrieved Dec 10, 2021 from https://portswigger.net/burp/pro
[24]
John R. Savery. 2006. Overview of Problem-based Learning: Definitions and Distinctions. Interdisciplinary Journal of Problem-Based Learning 1, 1 (May 2006). https://doi.org/10.7771/1541-5015.1002
[25]
School of Education, SUNY Oswego. 2011. Conceptual Framework – Weaving a Transformative School Fabric. https://www.oswego.edu/education/sites/www.oswego.edu.education/files/soe_cf_2011.pdf
[26]
Edward Skoudis and Tom Liston. 2005. Counter Hack Reloaded: A Step-by-Step Guide to Computer Attacks and Effective Defenses (2nd. ed.). Pearson.
[27]
The Great Schools Partnership, Glossary of Education Reform. 2013. Authentic Learning. Retrieved Dec 10, 2021 from https://www.edglossary.org/authentic-learning/
[28]
Georgia Weidman. 2014. Penetration Testing: A Hands-On Introduction to Hacking. No Starch Press.
[29]
Wikipedia. [n.d.]. Penetration Test. Retrieved Dec 10, 2021 from https://en.wikipedia.org/wiki/Penetration_test

Cited By

View all
  • (2024)Cybersecurity activities for education and curriculum design: A surveyComputers in Human Behavior Reports10.1016/j.chbr.2024.10050116(100501)Online publication date: Dec-2024
  • (2024)HackMySelf: Decrypting Cookies to Show the Theft of Personal Data in University StudentsProceedings of the Third International Conference on Innovations in Computing Research (ICR’24)10.1007/978-3-031-65522-7_41(464-477)Online publication date: 1-Aug-2024
  • (2023)Penetration Testing and Ethical Hacking: Risk Assessments and Student Learning2023 IEEE Frontiers in Education Conference (FIE)10.1109/FIE58773.2023.10342914(1-6)Online publication date: 18-Oct-2023

Index Terms

  1. Collaborative Paradigm of Teaching Penetration Testing using Real-World University Applications
        Index terms have been assigned to the content through auto-classification.

        Recommendations

        Comments

        Please enable JavaScript to view thecomments powered by Disqus.

        Information & Contributors

        Information

        Published In

        cover image ACM Other conferences
        ACE '22: Proceedings of the 24th Australasian Computing Education Conference
        February 2022
        200 pages
        ISBN:9781450396431
        DOI:10.1145/3511861
        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        Published: 14 February 2022

        Permissions

        Request permissions for this article.

        Check for updates

        Author Tags

        1. Collaborative teaching pedagogy
        2. active learning
        3. cybersecurity education

        Qualifiers

        • Research-article
        • Research
        • Refereed limited

        Conference

        ACE '22
        ACE '22: Australasian Computing Education Conference
        February 14 - 18, 2022
        Virtual Event, Australia

        Acceptance Rates

        Overall Acceptance Rate 161 of 359 submissions, 45%

        Contributors

        Other Metrics

        Bibliometrics & Citations

        Bibliometrics

        Article Metrics

        • Downloads (Last 12 months)244
        • Downloads (Last 6 weeks)42
        Reflects downloads up to 03 Jan 2025

        Other Metrics

        Citations

        Cited By

        View all
        • (2024)Cybersecurity activities for education and curriculum design: A surveyComputers in Human Behavior Reports10.1016/j.chbr.2024.10050116(100501)Online publication date: Dec-2024
        • (2024)HackMySelf: Decrypting Cookies to Show the Theft of Personal Data in University StudentsProceedings of the Third International Conference on Innovations in Computing Research (ICR’24)10.1007/978-3-031-65522-7_41(464-477)Online publication date: 1-Aug-2024
        • (2023)Penetration Testing and Ethical Hacking: Risk Assessments and Student Learning2023 IEEE Frontiers in Education Conference (FIE)10.1109/FIE58773.2023.10342914(1-6)Online publication date: 18-Oct-2023

        View Options

        View options

        PDF

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader

        HTML Format

        View this article in HTML Format.

        HTML Format

        Login options

        Media

        Figures

        Other

        Tables

        Share

        Share

        Share this Publication link

        Share on social media