• Computer Science
  • Published in EMISA 2004

A Virtual Laboratory for IT Security Education

@inproceedings{Hu2004AVL,
  title={A Virtual Laboratory for IT Security Education},
  author={Ji Hu and Dirk Cordel and Christoph Meinel},
  booktitle={EMISA},
  year={2004}
}
Success of IT security not only depends on the evolution of technologies, but also relies on the knowledge of IT-Personnel and the level of their IT-security education. In order to deliver IT students and professionals hands-on experience of security technologies and tools by electronic means, this paper proposes the concept of a virtual laboratory and discusses its application in practical IT security education. Providing security experience in traditional ways is difficult because it needs… CONTINUE READING

Figures and Topics from this paper.

Citations

Publications citing this paper.
SHOWING 1-10 OF 17 CITATIONS

STEALing Lab Support in Digital Forensics Education

  • Proceedings of the 41st Annual Hawaii International Conference on System Sciences (HICSS 2008)
  • 2008
VIEW 10 EXCERPTS
CITES BACKGROUND
HIGHLY INFLUENCED

Development of Hands-on IP Network Practice System with Automatic Scoring Function

  • 2013 Seventh International Conference on Complex, Intelligent, and Software Intensive Systems
  • 2013
VIEW 1 EXCERPT
CITES BACKGROUND

Development of Hands-On IP Network Construction Practice System Used in Campus Cloud Computing

  • 2012 Sixth International Conference on Complex, Intelligent, and Software Intensive Systems
  • 2012
VIEW 1 EXCERPT
CITES BACKGROUND

IP network construction learning system utilizing virtual router

  • Proceedings of 2011 IEEE Pacific Rim Conference on Communications, Computers and Signal Processing
  • 2011
VIEW 1 EXCERPT
CITES BACKGROUND

Experiences from a Time-Condensed Computer Security Class

  • 2010 Seventh International Conference on Information Technology: New Generations
  • 2010
VIEW 1 EXCERPT
CITES BACKGROUND

The application of virtual machine technology in experimental teaching and experimental environment constructing

  • 2010 2nd International Conference on Education Technology and Computer
  • 2010
VIEW 1 EXCERPT
CITES BACKGROUND

References

Publications referenced by this paper.