A SWOT Analysis of Virtual Laboratories for Security Education

  title={A SWOT Analysis of Virtual Laboratories for Security Education},
  author={Alan Davidson and Javier de La Puente Martinez and Markus Huber},
  booktitle={World Conference on Information Security Education},
Work is active in many institutes of higher education on utilising virtual computer environments for creating laboratories for practical course-work. Computer Security education is one area where virtual environments are proving to be useful, and where several schools have reported their own schemes for implementing environments for practical exercises. In this study we attempt to take a somewhat broader look at what the use of virtualisation technology can imply terms of a number of factors, i… 
2 Citations

Lightweight Brick Or M-Panel? Surabaya Expert View

This paper is to assist a new project manager who has a dilemma when has to determine material partition. In this research, we advantage two material between lightweight brick and M-panel. We conduct

Webseclab Security Education Workbench

A virtual-machine-based web-application security student laboratory, Webseclab, comprising a LAMP (Linux, Apache, MySQL, PHP) stack, a variety of development tools, and the three most popular browsers for the Linux platform is developed and tested.



A Virtual Laboratory for IT Security Education

Experience within the TeleLab “IT-Security” project successfully proves that the concept of virtual laboratories effectively eliminates geographical and financial limitations in traditional IT Security education.

A Collaborative Virtual Computer Security Lab

  • J. KellerRalf Naues
  • Computer Science
    2006 Second IEEE International Conference on e-Science and Grid Computing (e-Science'06)
  • 2006
The types of tasks the students are to perform, and the approach to check immediately whether students have completed a task are sketched, which calls for collaborative tasks.

Tele-lab IT security: a means to build security laboratories on the Web

  • Ji HuC. Meinel
  • Computer Science
    18th International Conference on Advanced Information Networking and Applications, 2004. AINA 2004.
  • 2004
Tele-Lab IT security, a Web-based training system that attempts to integrate a security laboratory on the Internet using well-managed virtual machines which allow students to gain experiences of security technologies and tools in a reliable and secure way is developed at the University of Trier.

Using Virtualization to Create and Deploy Computer Security Lab Exercises

This paper provides a justification for using virtualization to create and deploy computer security lab exercises by presenting and discussing examples of applied lab exercises that have been successfully used at two leading computer security programs.

Practical Assignments in IT Security for Contemporary Higher Education

This work suggests and test ideas for providing sufficient motivation and structure for student activity while minimising the need and cost for staff intervention.

VELNET (Virtual Environment for Learning Networking)

This paper describes Velnet the authors' virtual environment for learning networking and the virtual reality overlay under development, which allows students to build virtual networking topologies in a virtual lab.

Virtual machines - an idea whose time has returned: application to network, security, and database courses

Experiences teaching three advanced courses in system and network administration, information security and assurance, and database administration using VMware workstation in a shared student laboratory are described.

A computer network laboratory based on the concept of virtual machines

Virtual machines are an ideal solution in distance education, as well as for universities and colleges with limited financial recourses, because complex experiments can be implemented on a single computer without the need for the usual hardware components.

Detecting System Emulators

A number of possibilities to detect system emulators are analyzed and it is shown that emulation can be successfully detected, mainly because the task of perfectly emulating real hardware is complex.

Modeling and Virtualization for Secure Computing Environments

This invited talk describes the approaches and experiences that takes advantage of both modeling and virtualization to develop efficient security enhancement techniques.