Enhancing Cyber Security Education Using Guided Inquiry Collaborative Learning (GICL)
Cybersecurity programs in universities and colleges need to produce cybersecurity professionals who not only have in-depth technical knowledge in cybersecurity, but also have “soft skills” including communication, enthusiasm and attitude, team work, networking, problem solving and critical thinking, and professionalism.
Cybersecurity Topics
Cryptography
Topic 1: Symmetric encryption
Topic 2: Public key encryption
Topic 3: Key Management
Access control
Topic 4: Discretionary access control (DAC)
Topic 5: Mandatory access control (MAC)
Network Security
Topic 6: Secure Network Protocols – IPSec 1, IPSec 2
Topic 7: Secure Network Protocols – SSL
Topic 8: Firewall
Topic 9: Intrusion Detection Systems (IDSs)
Risk Management
Topic 10: Risk Analysis Part I and Part II
Web Security
Topic 11: Cross-Site Scripting & Defense
Topic 12: SQL Injection and Mitigation
Secure Coding
Topic 13: Buffer overflow
Topic 14: Input Validation
Topic 15: Integer Vulnerability
Surveys
- Cryptography pre-survey
- Cryptography post-survey
- Using Integer pre-survey
- Using Integer post-survey
- Input validation pre-survey
- Input validation post-survey
- Cross site scripting pre-survey
- Cross site scripting post-survey
- Intrusion detection pre-survey
- Intrusion detection post-survey
- DCA pre-survey
- DCA post-survey
- Team work survey
Summer Faculty Workshop (@North Carolina A&T SU) Schedule
Monday, May 17 | |
1:00pm – 1:45pm | Welcome and Workshop Participant Introduction |
1:45pm – 1:50pm | Break |
1:50pm – 2:50pm | Project Introduction, POGIL Introduction, Evaluation (Yuan, Yang, He, Ellis) |
2:50pm – 3:00pm | Break |
3:00pm – 4:00pm | GICL Activity 1: Symmetric Encryption (Yang) |
Tuesday, May 18 | |
1:00pm – 1:50pm | GICL Activity 2: Firewall (Xu) |
1:50pm – 2:00pm | Break |
2:00pm – 2:30pm | Invited Speakers |
2:30pm – 3:00pm | Participants Sharing Cybersecurity Education Pedagogies/Resources II |
3:00pm – 3:10pm | Break |
3:10pm – 4:00pm | GICL Activity 3: Secure Coding (He) |
Wednesday, May 19 | |
1:00pm – 1:50pm | GICL Activity 4: SQL Injection (Yang) |
1:50pm – 2:00pm | Break |
2:00pm – 2:30pm | Participants Sharing Cybersecurity Education Pedagogies/Resources II |
2:30pm – 2:35:00pm | Break |
2:35pm – 3:25pm | Birds of a Feather Discussion |
3:25pm – 3:30pm | Break |
3:30pm – 4:00pm | Group Photo and Workshop Evaluation (Liu, Ellis) & Focus Group Interview |
Participating Institutions
North Carolina A&T State Univ
Tuskegee University
Prairie View A&M University
Guilford Technical Community College
Virginia State University
Kennesaw State University
Alamance Community College
Winston-Salem State University
North Carolina Central University
Norfolk State University
University of Texas at Arlington
The Citadel, Military College at Charleston, South Carolina
Johns Hopkins University
Cal Poly Pomona
Clemson University
Fayetteville State University
University of North Carolina at Greensboro
Michigan Tech University
Oakland University
Old Dominion Univeristy
University of Tennessee at Chattanooga