Teaching Cyber Security Course in the Classrooms of NMIMS University

Full Text (PDF, 449KB), PP.1-15

Views: 0 Downloads: 0

Author(s)

Prathamesh Churi 1,* N. T. Rao 2

1. Department of Computer Engineering, School of Technology Management and Engineering, NMIMS University, Mumbai, India

2. Vice-Chancellor, MIT World Peace University, Pune, India

* Corresponding author.

DOI: https://doi.org/10.5815/ijmecs.2021.04.01

Received: 22 May 2020 / Revised: 23 Jun. 2020 / Accepted: 28 Jul. 2020 / Published: 8 Aug. 2021

Index Terms

Cyber Security, Pedagogy, Course Outcomes

Abstract

The paper aims at implementing new pedagogy and assessment practices from rigorous literature survey perusing quality papers and articles. The appropriate pedagogy and relevant assessment always go hand in hand. One cannot achieve effective teaching by compromising the other component. In engineering, pedagogy and assessment play extremely important roles. In recent years, engineering education has lost track of the big picture of what the curriculum has to be. In Computer Science Engineering, the course contents often change according to the demands for new technology in the market. Adhering to this fact, the courses must be designed either practical-based or case study based. Rote teaching-learning methods are not as effective as far as the curriculum design in the computing field is concerned. Cyber Security is one such course where students are expected to learn how to create a protective environment for computing and computing resources. The course must be designed in such a way that, students must learn how to identify the vulnerabilities in computing resources and methodologies to mitigate them. This course aims such that students must learn some popular attacks which help them to identify what are the possible ways from where the attacks could happen. The paper makes use of strategic assessment tools for the Cyber Security course (Taught to post-graduation students) and discusses outcomes through course outcome attainment analysis as per the threshold value of attainment set by the Computer Engineering Department to adhere to the accreditation standards. Through course attainment analysis it is observed that, Viva voce assessment tool is not suitable for evaluation of the course as it does not impose the technical details and working of Cyber Security concepts. The overall attainment was 55.55% which is 15% less than the threshold set by Computer Engineering Department.

Cite This Paper

Prathamesh Churi, N. T. Rao, "Teaching Cyber Security Course in the Classrooms of NMIMS University ", International Journal of Modern Education and Computer Science(IJMECS), Vol.13, No.4, pp. 1-15, 2021. DOI:10.5815/ijmecs.2021.04.01

Reference

[1] Prof. Prathamesh Churi. "TECHNOLOGY IN TEACHING: INDIA‘S PERSPECTIVE." International Education and Research Journal [Online], 3.7 (2017): n. pag. Web. 22 May. 2019

[2] Klein, H. J., Noe, R. A., & Wang, C. (2006). Motivation to learn and course outcomes: The impact of delivery mode, learning goal orientation, and perceived barriers and enablers. Personnel Psychology, 59(3), 665-702.

[3] KriCyber Securityfalusy, V., George, C., & Reed, M. G. (2018). Integrating problem-and project-based learning opportunities: Assessing outcomes of a field course in environment and sustainability. Environmental Education Research, 24(4), 593-610.

[4] Nolan, V. T., & Swart, A. J. (2015). Undergraduate Student Perceptions Regarding the Use of Educational Technology–A Case Study in a StatistiCyber Security Service Course.

[5] Wilk, A. (2016, June). Cyber Security education and law. In 2016 IEEE International Conference on Software Science, Technology and Engineering (SWSTE) (pp. 94-103). IEEE.

[6] Hagenauer, G., Hascher, T., & Volet, S. E. (2015). Teacher emotions in the classroom: associations with students' engagement, classroom discipline, and the interpersonal teacher-student relationship. European Journal of Psychology of Education, 30(4), 385-403.

[7] Geng, G., Midford, R., Buckworth, J., & Kersten, T. (2017). Tapping into the teaching experiences of final year education students to increase support for students in their first year. Student Success, 8(1), 13-23.

[8] DeLozier, S. J., & Rhodes, M. G. (2017). Flipped classrooms: a review of key ideas and recommendations for practice. Educational Psychology Review, 29(1), 141-151.

[9] Kemmerer, R. A. (2003, May). Cybersecurity. In Proceedings of the 25th international conference on Software engineering(pp. 705-715). IEEE Computer Society.

[10] Sun, W. (2010, April). Experiences from a Time-Condensed Computer Security Class. In 2010 Seventh International Conference on Information Technology: New Generations (pp. 482-487). IEEE.

[11] Micco, M., & Rossman, H. (2002, February). Building a cyberwar lab: lessons learned: teaching cybersecurity principles to undergraduates. In ACM SIGCYBER SECURITYE Bulletin (Vol. 34, No. 1, pp. 23-27). ACM.

[12] Sharma, S. K., & Sefchek, J. (2007). Teaching information systems security courses: A hands-on approach. Computers & Security, 26(4), 290-299.

[13] Schneider, F. B. (2013). Cybersecurity education in universities. IEEE Security & Privacy, 11(4), 3-4.

[14] Nagarajan, A., Allbeck, J. M., Sood, A., & Janssen, T. L. (2012, May). Exploring game design for cybersecurity training. In 2012 IEEE International Conference on Cyber Technology in Automation, Control, and Intelligent Systems (CYBER) (pp. 256-262). IEEE.

[15] Joshi, A., Ramani, V., Murali, H., Krishnan, R., Mithra, Z., & Pavithran, V. (2012, January). Student-centric design for Cyber Security knowledge empowerment. In 2012 IEEE International Conference on Technology Enhanced Education (ICTEE) (pp. 1-4). IEEE.

[16] Thompson, D. R., Di, J., & Daugherty, M. K. (2013). Teaching RFID information systems security. IEEE Transactions on Education, 57(1), 42-47.

[17] Jacobson, D., Rursch, J., & Idziorek, J. (2012, October). Workshop: Teaching computer security literacy to the masses: A practical approach. In 2012 Frontiers in Education Conference Proceedings (pp. 1-2). IEEE.

[18] Weiss, R. S., Boesen, S., Sullivan, J. F., Locasto, M. E., Mache, J., & Nilsen, E. (2015, February). Teaching cybersecurity analysis skills in the cloud. In Proceedings of the 46th ACM Technical Symposium on Computer Science Education (pp. 332-337). ACM.

[19] Tunc, C., Hariri, S., Montero, F. D. L. P., Fargo, F., Satam, P., & Al-Nashif, Y. (2015, September). Teaching and Training Cybersecurity as a Cloud Service. In 2015 International Conference on Cloud and Autonomic Computing (pp. 302-308). IEEE.

[20] Mirkovic, J., & Benzel, T. (2012). Teaching cybersecurity with DeterLab. IEEE Security & Privacy, 10(1), 73-76.

[21] Pan, Y., Schwartz, D., & Mishra, S. (2015, March). Gamified digital forensiCyber Security course modules for undergraduates. In 2015 IEEE Integrated STEM Education Conference (pp. 100-105). IEEE.

[22] Yuan, X., Williams, K., McCrickard, S., Hardnett, C., Lineberry, L. H., Bryant, K., ... & Rutledge, R. (2016, October). Teaching mobile computing and mobile security. In 2016 IEEE Frontiers in Education Conference (FIE) (pp. 1-6). IEEE.

[23] Shashidhar, N., & Cooper, P. (2016, April). Teaching malware analysis: The design philosophy of a model curriculum. In 2016 4th International Symposium on Digital Forensic and Security (ISDFS) (pp. 119-125). IEEE.

[24] Xu, J., Yuan, X., Yu, A., Kim, J. H., Kim, T., & Zhang, J. (2016, October). Developing and evaluating a hands-on lab for teaching local area network vulnerabilities. In 2016 IEEE Frontiers in Education Conference (FIE) (pp. 1-4). IEEE.

[25] Andreatos, A. S. (2017, April). Designing educational scenarios to teach network security. In 2017 IEEE Global Engineering Education Conference (EDUCON) (pp. 1606-1610). IEEE.

[26] Calhoun, C. D. (2017). Incorporating Blended Format Cybersecurity Education into a Community College Information Technology Program. Community College Journal of Research and Practice, 41(6), 344-347.

[27] Sharma, B., Steward, B., Ong, S. K., & Miguez, F. E. (2017). Evaluation of teaching approach and student learning in a multidisciplinary sustainable engineering course. Journal of cleaner production, 142, 4032-4040.

[28] Qian, K., Shi, Y., Tao, L., & Qian, Y. (2017, July). Hands-on learning for computer network security with mobile devices. In the 2017 26th International Conference on Computer Communication and Networks (ICCCN) (pp. 1-6). IEEE.

[29] Weiss, R., O'Brien, C. W., Mountrouidou, X., & Mache, J. (2017, March). The Passion, Beauty, and Joy of Teaching and Learning Cybersecurity. In Proceedings of the 2017 ACM SIGCYBER SECURITYE Technical Symposium on Computer Science Education (pp. 673-674). ACM.

[30] Ahmed, I., & Roussev, V. (2018). Peer instruction teaching methodology for cybersecurity education. IEEE Security & Privacy, 16(4), 88-91.

[31] Arora, B. (2018). Teaching Cyber Security to non-tech students. PolitiCyber Security, 0263395718760960.

[32] Asghar, M. R., & Luxton-Reilly, A. (2018, February). Teaching Cyber Security Using Competitive Software Obfuscation and Reverse Engineering Activities. In Proceedings of the 49th ACM Technical Symposium on Computer Science Education(pp. 179-184). ACM.

[33] Engel, G., Chakkaravarthy, A. S., & Schweiger, G. (2017, July). A General Method to Compare Different Co-simulation Interfaces: Demonstration on a Case Study. In International Conference on Simulation and Modeling Methodologies, Technologies and Applications (pp. 351-365). Springer, Cham.

[34] Krathwohl, D. R. (2002). A revision of Bloom's taxonomy: An overview. Theory into Practice, 41(4), 212-218.

[35] Huitt, W. (2004). Bloom et al.'s taxonomy of the cognitive domain. Educational psychology interactive, 22.

[36] Philip, T., & Garcia, A. (2013). The importance of still teaching the iGeneration: New technologies and the centrality of pedagogy. Harvard Educational Review, 83(2), 300-319.

[37] Loughran, J. (2013). Pedagogy: Making sense of the complex relationship between teaching and learning. Curriculum Inquiry, 43(1), 118-141.

[38] Besterfield‐Sacre, M., Atman, C. J., & Shuman, L. J. (1998). Engineering student attitudes assessment. Journal of Engineering Education, 87(2), 133-141.

[39] Schneider, S. C., & Niederjohn, R. J. (1995, November). Assessing student learning outcomes using graduating senior exit surveys and alumni surveys. In Proceedings Frontiers in Education 1995 25th Annual Conference. Engineering Education for the 21st Century (Vol. 1, pp. 2c1-1). IEEE.

[40] Ramchandra, S., Maitra, S., & MallikarjunaBabu, K. (2014, December). Method for estimation of attainment of program outcome through course outcome for outcome based education. In 2014 IEEE International Conference on MOOC, Innovation and Technology in Education (MITE) (pp. 7-12). IEEE.

[41] Abidin, I. Z., Anuar, A., & Shuaib, N. H. (2009). Assessing the attainment of course outcomes (CO) for an engineering course. In International Conference of Teaching and Learning (ICTL 2009) INTI University College, Malaysia.

[42] Mistry, K., & Churi, P. Development of Innovative Course Outcomes: using SMART Goals.

[43] Vichare, A. and Churi, P. (2019). Experiences of Teaching Computer Network Course through Lesson Outcomes. International Journal of Innovative Technology and Exploring Engineering, [online] 8(9S4), pp.117-124.