Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

Brief

Compare and contrast small cyber-range technologies we might host versus external cloud-based cyber-range technologies we might pay for to increase iSchool student access to other modalities of learning technical basics of cybersecurity.

Option 1: “Rent”

...

Product

...

Pros

...

Cons

...

ThreatGen Red Vs. Blue

fun

low cognitive barrier to playing

fits well with our IoT theme

nice breakdown of learning outcomes in gamified form

View file
nameThreatGEN Red vs. Blue-Nov-21-2021-10-59-28-94-PM.pdf

license fees are currently exorbitant for large numbers of students; not worth imposing a lab fee unless we make a whole mini-course out of it

would need to negotiate a different “price per hours of use” model

View file
nameThreatGEN Red vs. Blue - Pricing-4.pdf

Option 2: “Build” with “Free”

Under Evaluation

(PDF) Cyber Ranges and TestBeds for Education, Training, and Research

Build Your Own Cyber Range with VirtualBox

The Cyber Range - A Guide (NIST-NICE) (Draft) - 062420_1315

What is a cyber range and how do you build one on AWS? | Amazon Web Services

10 Free Courses to learn Cloud Computing For Beginners in 2022

10 Free Great Online Courses in Cloud Computing

Google Cloud Courses and Training     |  Google Cloud Training

Learn AWS with Training and Certification | Cloud Skills Courses and Programs | AWS

Microsoft Azure Training

Cyber Awareness Challenge 2022 – DoD Cyber Exchange

CyberCIEGE - Center for Cybersecurity and Cyber Operations - Naval Postgraduate School

Cyber Games

Cybersecurity Games

Free Cyber Security Games

CyberStart America

5 Ways to Make Cybersecurity Fun

Best Cybersecurity Lessons and Activities for K-12 Education

Cybersecurity Game Aims to Train 25K Specialists by 2025

Free and Low Cost Online Cybersecurity Learning Content

Cybersecurity | NOVA Labs | PBS

(PDF) Examining Benefits and Challenges of Using Wearable Technologies for K-12 Students: A Review of The Literature

HOW TO GET WHAT YOU WANT

HACK - Fabricademy Student Website

Fall 2022 - Spring 2023 | Division of Academic Affairs

Hack this Site

Blackhat (movie)

Mr. Robot (TV Series)

CSI Cyber (TV Series)

understand the technical aspects, especially around the stack and its vulnerabilities; hands-on ….

prereq: 346 …. ask Ron if this possible ….. 1 credit Linux …. (know CLI ….. 1 units during winter and summer)

Charles Harry. Ben from UMBC. Donal’s friend. adjuncting rules. curriculum consultants ….

Ethical HackingGoal is to re-invigorate INST 365, Ethical Hacking, with the following characteristics:

  1. Physical Hands-On based - probably Raspberry Pi, Laptop with VM Ware VM, and Kali Linux.

  2. Aligned with existing courses and pedagogy

    1. of INST 346 (Technologies, Infrastructure, and Architecture, includes RaPi and networking gear) as prerequisite

    2. INST 347 (Cloud Computing for Information Science, includes VMWare, Kali, and Arduino Cloud) as compatible elective

    3. INST 388X (Internet of Things, includes Arduino Cloud) as compatible elective

  3. Aligned with some external Certification Process (not necessarily earning the Certification in class)

  4. Add a dimension to the Cybersecurity minor that Dennis Frezzo, Donal Heidenblad, Charlie Harry, and many semesters of informal student feedback agree is missing.

  5. Low or no cost to students

Example Course

Ethical Hacking (Circa 2021, not sure why this wasn’t offered as 365)

INST 408C

Course description:

...

Proposed course schedule

Week/Topic

  1. 1  Ethics Ethics and hacking

  2. 2  Hacking Hacking as creativity

  3. 3  Command Command line tools

  4. 4  History History of hacking

  5. 5  Hacking Hacking information search

  6. 6  Malicious Malicious hacking

  7. 7  Computer Computer networks

  8. 8  Security Security threats

  9. 9  Network Network scanning

  10. 10  Sociotechnical Sociotechnical networks

  11. 11  Vulnerability Vulnerability research

  12. 12  Hacking Hacking for social good

  13. 13  Penetration Penetration testing

  14. 14  StudentStudent-chosen topics15

  15.  StudentStudent-chosen topics

final Demo day

Activities Discussion 1 Sprint 1 Sprint 1 Discussion 2 Sprint 2 Sprint 2 Discussion 3 Sprint 3 Sprint 3 Discussion 4 Sprint 4 Sprint 4 Discussion 5 Sprint 5 Sprint 5

Possible Cyberrange Options

Compare and contrast small cyber-range technologies we might host versus external cloud-based cyber-range technologies we might pay for to increase iSchool student access to other modalities of learning technical basics of cybersecurity.

Option 1: “Rent”

Product

Pros

Cons

ThreatGen Red Vs. Blue

fun

low cognitive barrier to playing

fits well with our IoT theme

nice breakdown of learning outcomes in gamified form

View file
nameThreatGEN Red vs. Blue-Nov-21-2021-10-59-28-94-PM.pdf

license fees are currently exorbitant for large numbers of students; not worth imposing a lab fee unless we make a whole mini-course out of it

would need to negotiate a different “price per hours of use” model

View file
nameThreatGEN Red vs. Blue - Pricing-4.pdf

Option 2: “Build” with “Free”

Unlikely that we have time to do this, but we do have a server we can partially dedicate.

Under Evaluation

(PDF) Cyber Ranges and TestBeds for Education, Training, and Research

Build Your Own Cyber Range with VirtualBox

The Cyber Range - A Guide (NIST-NICE) (Draft) - 062420_1315

What is a cyber range and how do you build one on AWS? | Amazon Web Services

10 Free Courses to learn Cloud Computing For Beginners in 2022

10 Free Great Online Courses in Cloud Computing

Google Cloud Courses and Training     |  Google Cloud Training

Learn AWS with Training and Certification | Cloud Skills Courses and Programs | AWS

Microsoft Azure Training

Cyber Awareness Challenge 2022 – DoD Cyber Exchange

CyberCIEGE - Center for Cybersecurity and Cyber Operations - Naval Postgraduate School

Cyber Games

Cybersecurity Games

Free Cyber Security Games

CyberStart America

5 Ways to Make Cybersecurity Fun

Best Cybersecurity Lessons and Activities for K-12 Education

Cybersecurity Game Aims to Train 25K Specialists by 2025

Free and Low Cost Online Cybersecurity Learning Content

Cybersecurity | NOVA Labs | PBS

(PDF) Examining Benefits and Challenges of Using Wearable Technologies for K-12 Students: A Review of The Literature

HOW TO GET WHAT YOU WANT

HACK - Fabricademy Student Website

Fall 2022 - Spring 2023 | Division of Academic Affairs

Hack this Site

Blackhat (movie)

Mr. Robot (TV Series)

CSI Cyber (TV Series)

Random notes

understand the technical aspects, especially around the stack and its vulnerabilities; hands-on ….

prereq: 346 …. ask Ron if this possible ….. 1 credit Linux …. (know CLI ….. 1 units during winter and summer)

Charles Harry. Ben from UMBC. Donal’s friend. adjuncting rules. curriculum consultants ….