Brief
Compare and contrast small cyber-range technologies we might host versus external cloud-based cyber-range technologies we might pay for to increase iSchool student access to other modalities of learning technical basics of cybersecurity.
Option 1: “Rent”
...
Product
...
Pros
...
Cons
...
fun
low cognitive barrier to playing
fits well with our IoT theme
nice breakdown of learning outcomes in gamified form
View file | ||
---|---|---|
|
license fees are currently exorbitant for large numbers of students; not worth imposing a lab fee unless we make a whole mini-course out of it
would need to negotiate a different “price per hours of use” model
View file | ||
---|---|---|
|
Option 2: “Build” with “Free”
Under Evaluation
(PDF) Cyber Ranges and TestBeds for Education, Training, and Research
Build Your Own Cyber Range with VirtualBox
The Cyber Range - A Guide (NIST-NICE) (Draft) - 062420_1315
What is a cyber range and how do you build one on AWS? | Amazon Web Services
10 Free Courses to learn Cloud Computing For Beginners in 2022
10 Free Great Online Courses in Cloud Computing
Google Cloud Courses and Training | Google Cloud Training
Learn AWS with Training and Certification | Cloud Skills Courses and Programs | AWS
Cyber Awareness Challenge 2022 – DoD Cyber Exchange
CyberCIEGE - Center for Cybersecurity and Cyber Operations - Naval Postgraduate School
5 Ways to Make Cybersecurity Fun
Best Cybersecurity Lessons and Activities for K-12 Education
Cybersecurity Game Aims to Train 25K Specialists by 2025
Free and Low Cost Online Cybersecurity Learning Content
Cybersecurity | NOVA Labs | PBS
HACK - Fabricademy Student Website
Fall 2022 - Spring 2023 | Division of Academic Affairs
understand the technical aspects, especially around the stack and its vulnerabilities; hands-on ….
prereq: 346 …. ask Ron if this possible ….. 1 credit Linux …. (know CLI ….. 1 units during winter and summer)
Charles Harry. Ben from UMBC. Donal’s friend. adjuncting rules. curriculum consultants ….
Ethical HackingGoal is to re-invigorate INST 365, Ethical Hacking, with the following characteristics:
Physical, Hands-On based - probably Raspberry Pi, Personal Laptop with VM Ware VMs, Kali Linux, Wireshark.
Based in Tinkerspace in College Park; building out a comparable capability in Shady Grove.
Aligned with existing courses and pedagogy
of INST 346 (Technologies, Infrastructure, and Architecture, includes RaPi and networking gear) as prerequisite
INST 347 (Cloud Computing for Information Science, includes VMWare, Kali, and Arduino Cloud) as compatible elective
INST 388X (Internet of Things, includes Arduino Cloud) as compatible elective
Cybersecurity and Privacy Cognate Sequence
INST 364 Human-Centered Cybersecurity
INST 366 Privacy, Security, and Ethics for Big Data
INST 464 Decision-Making for Cybersecurity
INST 466 Technology, Culture, and Society
INST 467 Practical Hacking for Policy Making
Aligned with some external Certification Process like CEH (not necessarily earning the Certification in class)
Add a dimension to the Infosci Cybersecurity cognate that Dennis Frezzo, Donal Heidenblad, Charlie Harry, and many semesters of informal student feedback agree is missing.
Low or no cost to students
Example Course offered at UMD
Ethical Hacking (Circa 2021, not sure why this wasn’t offered as 365, not sure who offered it)
INST 408C
Course description:
...
Proposed course schedule
Week/Topic
1 Ethics Ethics and hacking
2 Hacking Hacking as creativity
3 Command Command line tools
4 History History of hacking
5 Hacking Hacking information search
6 Malicious Malicious hacking
7 Computer Computer networks
8 Security Security threats
9 Network Network scanning
10 Sociotechnical Sociotechnical networks
11 Vulnerability Vulnerability research
12 Hacking Hacking for social good
13 Penetration Penetration testing
14 StudentStudent-chosen topics15
StudentStudent-chosen topics
final Demo day
Activities Discussion 1 Sprint 1 Sprint 1 Discussion 2 Sprint 2 Sprint 2 Discussion 3 Sprint 3 Sprint 3 Discussion 4 Sprint 4 Sprint 4 Discussion 5 Sprint 5 Sprint 5
Other Ethical Hacking Courses
Great Learning Ethical Hacking
Udacity Ethical Hacking NanoDegree
Cannot find any record of INST 365 having been taught and now it’s removed from almost all catalog references!
Possible Cyberrange Options
Compare and contrast small cyber-range technologies we might host versus external cloud-based cyber-range technologies we might pay for to increase iSchool student access to other modalities of learning technical basics of cybersecurity.
Option 1: “Rent”
Product | Pros | Cons | ||||||||
---|---|---|---|---|---|---|---|---|---|---|
fun low cognitive barrier to playing fits well with our IoT theme nice breakdown of learning outcomes in gamified form
| license fees are currently exorbitant for large numbers of students; not worth imposing a lab fee unless we make a whole mini-course out of it would need to negotiate a different “price per hours of use” model
| |||||||||
Option 2: “Build” with “Free”
Unlikely that we have time to do this, but we do have a server we can partially dedicate.
Under Evaluation
(PDF) Cyber Ranges and TestBeds for Education, Training, and Research
Build Your Own Cyber Range with VirtualBox
The Cyber Range - A Guide (NIST-NICE) (Draft) - 062420_1315
What is a cyber range and how do you build one on AWS? | Amazon Web Services
10 Free Courses to learn Cloud Computing For Beginners in 2022
10 Free Great Online Courses in Cloud Computing
Google Cloud Courses and Training | Google Cloud Training
Learn AWS with Training and Certification | Cloud Skills Courses and Programs | AWS
Cyber Awareness Challenge 2022 – DoD Cyber Exchange
CyberCIEGE - Center for Cybersecurity and Cyber Operations - Naval Postgraduate School
5 Ways to Make Cybersecurity Fun
Best Cybersecurity Lessons and Activities for K-12 Education
Cybersecurity Game Aims to Train 25K Specialists by 2025
Free and Low Cost Online Cybersecurity Learning Content
Cybersecurity | NOVA Labs | PBS
HACK - Fabricademy Student Website
Fall 2022 - Spring 2023 | Division of Academic Affairs
Random notes
understand the technical aspects, especially around the stack and its vulnerabilities; hands-on ….
maybe offer 1 credit Linux course