University of South Florida offers accredited online
cyber security programs. Throughout such online
programs, remote students have the opportunity to
gain knowledge through an interdisciplinary set of
core courses and then take a deep dive into the field
of cyber security.
Therefore, in order to fulfil the industrial needs
of cyber security and while considering the afore-
mentioned challenges, in this paper, we have pre-
sented our great efforts in facilitating the learning pro-
cess of the online cyber security learning. Specif-
ically, we have presented our methodology for the
design of our modules and then given the detail of
our pre-built Linux-based portable virtual environ-
ment. Those learning and experimental modules have
been developed at different levels to meet the need of
students with different academic and industrial back-
grounds. Moreover, we provided an evaluation of
our teaching experience as well as students perfor-
mance in Applied Cryptography, the online cyber se-
curity course we have been teaching for the last few
years. Finally, in our future work, we will bring the
Global Environment for Network Innovations (GENI)
testbed in classroom and integrate it with this teach-
ing design and even conduct advanced computer net-
working and security laboratories.
ACKNOWLEDGEMENTS
We would like to acknowledge the National Sci-
ence Foundation (NSF) who partially sponsored the
work under grants #1620868, #1620871, #1620862,
#1651280, and BBN/GPO project #1936 through
NSF/CNS grant. The views and conclusions con-
tained herein are those of the authors and should not
be interpreted as necessarily representing the official
policies, either expressed or implied of NSF.
REFERENCES
Baleni, Z. G. (2015). Online formative assessment in higher
education: Its pros and cons. Electronic Journal of e-
Learning, 13(4):228–236.
Bauer, M., Br
¨
auer, C., Schuldt, J., and Kr
¨
omker, H. (2018).
Adaptive e-learning technologies for sustained learn-
ing motivation in engineering science. In Proceed-
ings of the 10th International Conference on Com-
puter Supported Education, volume 1. CSEDU 2018.
Berman, M., Chase, J. S., Landweber, L., Nakao, A., Ott,
M., Raychaudhuri, D., Ricci, R., and Seskar, I. (2014).
Geni: A federated testbed for innovative network ex-
periments. Computer Networks, 61:5–23.
Cheung, R. S., Cohen, J. P., Lo, H. Z., and Elia, F. (2011).
Challenge based learning in cybersecurity education.
In Proceedings of the International Conference on Se-
curity and Management (SAM), page 1. The Steering
Committee of The World Congress in Computer Sci-
ence, Computer . . . .
Chin, T., Rahouti, M., and Xiong, K. (2018). Applying
software-defined networking to minimize the end-to-
end delay of network services. ACM SIGAPP Applied
Computing Review, 18(1):30–40.
Chin, T., Xiong, K., and Rahouti, M. (2017). Sdn-based ker-
nel modular countermeasure for intrusion detection.
In International Conference on Security and Privacy
in Communication Systems, pages 270–290. Springer.
Cook, D. A. (2007). Web-based learning: pros, cons and
controversies. Clinical Medicine, 7(1):37–42.
Du, W. (2011). Seed: hands-on lab exercises for com-
puter security education. IEEE Security & Privacy,
9(5):70–73.
Fedynich, L. V. (2013). Teaching beyond the classroom
walls: The pros and cons of cyber learning. Journal
of Instructional Pedagogies, 13.
Kinnunen, P. and Eriksson, T. (2018). Teachers’ viewpoint
on online courses. In Proceedings of the 10th Interna-
tional Conference on Computer Supported Education,
volume 1. CSEDU 2018.
Mirkovic, J. and Benzel, T. (2012). Teaching cybersecurity
with deterlab. IEEE Security & Privacy, 10(1):73–76.
Riga, N., Edwards, S., and Thomas, V. (2016). The Ex-
perimenter’s View of GENI, pages 349–379. Springer
International Publishing, Cham.
Sharma, S. K. and Sefchek, J. (2007). Teaching informa-
tion systems security courses: A hands-on approach.
Computers & Security, 26(4):290–299.
Thomas, V., Riga, N., Edwards, S., Fund, F., and Korakis,
T. (2016). Geni in the classroom. In The GENI Book,
pages 433–449. Springer.
Topham, L., Kifayat, K., Younis, Y. A., Shi, Q., and
Askwith, B. (2016). Cyber security teaching and
learning laboratories: A survey. Information & Se-
curity, 35(1):51.
Willems, C. and Meinel, C. (2012). Online assess-
ment for hands-on cyber security training in a vir-
tual lab. In Global Engineering Education Conference
(EDUCON), 2012 IEEE, pages 1–10. IEEE.
Xiong, K. and Pan, Y. (2013). Understanding protogeni
in networking courses for research and education.
In Research and Educational Experiment Workshop
(GREE), 2013 Second GENI, pages 119–123. IEEE.
A Customized Educational Booster for Online Students in Cybersecurity Education
541