2 research outputs found

    A Hands-On Approach to Computing Security Education: Metasploit Module Development

    Get PDF
    As the demand for skilled computer security professionals continues to increase, curricula at colleges and universities must continually evolve to meet current industry needs. Incorporating Metasploit module development into these curricula increases the value of the education received by the graduate and makes them a more attractive candidate to potential employers. The flexibility of the Metasploit framework, especially for targeting mobile device platforms, proves to be a valuable tool in evaluating the security of many different devices. This paper discusses the importance of incorporating Metasploit module development into computing security curricula to better prepare graduates for the constantly changing environment they will encounter. Hands-on lab outline, module development experiences, and related work are also discussed in the paper

    Hands-on exercises for IT security education

    No full text
    © 2015 ACM. We have developed a collection of instructional hands-on lab assignments that can be used to help teach security courses or courses with a security component in information technology (IT). Our labs cover a wide spectrum of principles, ideas and technologies along with well-developed open source tools. Lab descriptions are publicly accessible from our web page. All of the labs have been tested in a virtual environment and utilized in our security courses. Feedback from the students has been positive. In this paper, we will present the lab design, topics covered in our labs, lab environments and student evaluation results. We will share our experience in transferring advanced technology to IT security education and lessons learned from this practice
    corecore