1 Creating a Virtual Laboratory to Teach Information Assurance Courses Online Dr. Wayne Summers & Dr. Bhagyavati Columbus State University Columbus, Georgia.

Slides:



Advertisements
Similar presentations
Educating System Testers in Vulnerability Analysis: Laboratory Development and Deployment Leonardo A. Martucci, Hans Hedbom, Stefan Lindskog, and Simone.
Advertisements

An Isolated Network in Support of an Advanced Networks and Security Course LTC Curtis A. Carver Jr. LTC John M.D. Hill Dr. Udo W. Pooch.
Computer Security set of slides 10 Dr Alexei Vernitski.
Mark Clements Program Leader Computer Networking Why Engineering at Medway?
Cybersecurity Training in a Virtual Environment By Chinedum Irrechukwu.
B B asic I I nexpensive G G rid for N N etworking and O O perating S E S ystems E xperiments Timothy R. Brown Suny Oneonta.
1 © NOKIA Presentation_Name.PPT / DD-MM-YYYY / Initials Company Confidential The Internet offers no inherent security services to its users; the data transmitted.
70-293: MCSE Guide to Planning a Microsoft Windows Server 2003 Network, Enhanced Chapter 11: Planning Network Access.
MSIT 458: Information Security & Assurance By Curtis Pethley.
Security Issues on Distributed Systems 7 August, 1999 S 1 Prepared by : Lorrien K. Y. Lau Student I.D. : August 1999 The Chinese University.
Firewall 2 * Essential Network Security Book Slides. IT352 | Network Security |Najwa AlGhamdi 1.
Increasing Student Involvement with Hands-on Activities in Online Computer Science Classes Dr. Wayne Summers, Dr. Bhagyavati, Prof. Chris Whitehead Columbus.
Networking Components Manuel Palos. HUBS Hubs are inexpensive devices that connect multiple devices t0 a network. Hubs merely pass along network data.
Introduction An introduction to the software and organization of the Internet Lab.
Faten Yahya Ismael.  It is technology creates a network that is physically public, but virtually it’s private.  A virtual private network (VPN) is a.
Module 11: Supporting Remote Users. Overview Establishing Remote Access Connections Connecting to Virtual Private Networks Configuring Authentication.
Introduction An introduction to the equipment and organization of the Internet Lab.
© 2007 Cisco Systems, Inc. All rights reserved.ISCW-Mod3_L7 1 Network Security 2 Module 6 – Configure Remote Access VPN.
Increasing Student Involvement with Hands-on Activities in Online Computer Science Classes Dr. Wayne Summers, Dr. Bhagyavati, Prof. Chris Whitehead Columbus.
Security Guide for Interconnecting Information Technology Systems
LINUX Security, Firewalls & Proxies. Course Title Introduction to LINUX Security Models Objectives To understand the concept of system security To understand.
Chao-Hsien Chu, Ph.D. Abdullah Konak, Ph.D. College of Information Sciences and Technology The Pennsylvania State University University Park, PA
AIS, Passwords Should not be shared Should be changed by user Should be changed frequently and upon compromise (suspected unauthorized disclosure)
 Prototype for Course on Web Security ETEC 550.  Huge topic covering both system/network architecture and programming techniques.  Identified lack.
Page 1 NAT & VPN Lecture 8 Hassan Shuja 05/02/2006.
Version 4.0. Objectives Describe how networks impact our daily lives. Describe the role of data networking in the human network. Identify the key components.
CPMT 1451 IT Essentials: PC Hardware and Software ITCC 1301 Cisco Exploration 1: Network Fundamentals ITCC 1304 Cisco Exploration 2: Routing Protocols.
CSE 4481 Computer Security Lab Mark Shtern. INTRODUCTION.
This courseware is copyrighted © 2015 gtslearning. No part of this courseware or any training material supplied by gtslearning International Limited to.
Introduction to Computer Security1 Information Security Principles Assistant Professor Dr. Sana’a Wafa Al-Sayegh 1 st semester University of.
An Introduction to Encrypting Messages on the Internet Mike Kaderly INFS 750 Summer 2010.
1 Chapter 12: VPN Connectivity in Remote Access Designs Designs That Include VPN Remote Access Essential VPN Remote Access Design Concepts Data Protection.
Module 11: Remote Access Fundamentals
The Open Source Virtual Lab: a Case Study Authors: E. Damiani, F. Frati, D. Rebeccani, M. Anisetti, V. Bellandi and U. Raimondi University of Milan Department.
BZUPAGES.COM. What is a VPN VPN is an acronym for Virtual Private Network. A VPN provides an encrypted and secure connection "tunnel" path from a user's.
NuolSec VIspace Vientiane, Laos.
Chao-Hsien Chu, Ph.D. College of Information Sciences and Technology The Pennsylvania State University University Park, PA About the Hands-on Lab.
Module 4 Quiz. 1. Which of the following statements about Network Address Translation (NAT) are true? Each correct answer represents a complete solution.
CSE 4481 Computer Security Lab Mark Shtern. INTRODUCTION.
Data Communications and Networks Chapter 10 – Network Hardware and Software ICT-BVF8.1- Data Communications and Network Trainer: Dr. Abbes Sebihi.
Secure Wired Local Area Network( LAN ) By Sentuya Francis Derrick ID Module code:CT3P50N BSc Computer Networking London Metropolitan University.
NETWORKING COMPONENTS Buddy Steele Assignment 3, Part 1 CECS-5460: Summer 2014.
CERN - European Organization for Nuclear Research Beyond ACB – VPN’s FOCUS June 13 th, 2002 Frédéric Hemmer & Denise Heagerty- IT Division.
Introduction An introduction to the equipment and organization of the Internet Lab.
VPN. CONFIDENTIAL Agenda Introduction Types of VPN What are VPN Tokens Types of VPN Tokens RSA How tokens Work How does a user login to VPN using VPN.
Assignment # 3 Networking Components By: Jeff Long.
Lab #2 NET332 By Asma AlOsaimi. "Security has been a major concern in today’s computer networks. There has been various exploits of attacks against companies,
IS3220 Information Technology Infrastructure Security
1 © 2007 Cisco Systems, Inc. All rights reserved.Cisco Public Network Architecture Characteristics  Explain four characteristics that are addressed by.
The Challenges of Teaching an Interdisciplinary IA Course Rose Shumba Indiana University of Pennsylvania EPASEC 2006.
Virtual Private Network Technology Nikki London COSC 352 March 2, 2010.
Linux Firewalls By Shane Lofgren. Definition from wikipedia.org: A firewall is a security device which is configured to permit, deny or proxy data connections.
Advanced Network Labs & Remote Network Agent
Lab #2 NET332 By Asma AlOsaimi.
Virtual Private Networks and IPSec
Click to edit Master subtitle style
Introduction to Networking
IS4550 Security Policies and Implementation
Columbus State University
NTC 324 Teaching Effectively-- snaptutorial.com
Introduction An introduction to the software and organization of the Internet Lab.
CompTIA Security+ Study Guide (SY0-501)
Using An Isolated Network to Teach Advanced Networks and Security
Microsoft Virtual Academy
Firewalls Routers, Switches, Hubs VPNs
Introduction An introduction to the organization of the Networks Course and the Internet Lab.
Preparing for the Windows 8. 1 MCSA Module 6: Securing Windows 8
IP Addresses & Ports IP Addresses – identify a device on a network
Introduction to Networking Security
Presentation transcript:

1 Creating a Virtual Laboratory to Teach Information Assurance Courses Online Dr. Wayne Summers & Dr. Bhagyavati Columbus State University Columbus, Georgia

November 12, 2004Columbus State University2 Challenge How to provide students with hands- on activities teaching computer and network security courses… …in a distance learning environment

November 12, 2004Columbus State University3 Typical Solution Students use their own computers Assignments are limited by the students’ resources Students typically have access to only one computer and one operating system Unwise to allow students to use their personal computers to experiment with security software

November 12, 2004Columbus State University4 Traditional Environment Use an isolated computer lab Students experiment with security software without worry that their experiment may impact computer systems outside the isolated lab In an isolated lab, students can evaluate security of different operating systems, attempt to compromise the security of computer systems, and install additional security mechanisms without concern that there actions may affect computers outside the lab

November 12, 2004Columbus State University5 Security and Assurance of Information Lab (SAIL) Virtual security lab Lab is accessible by any student who has Internet access whether they are on- campus, out-of-state, or even out of the country Students are authenticated into the lab Students are able to access any of the computers in the lab and complete their assignments without fear that there actions will affect computer systems outside the lab

November 12, 2004Columbus State University6 Security and Assurance of Information Lab (SAIL) Hardware Configuration VPN Concentrator PCs Hubs (not switches) KVM switch

November 12, 2004Columbus State University7 Security and Assurance of Information Lab (SAIL)

November 12, 2004Columbus State University8 Security and Assurance of Information Lab (SAIL)

November 12, 2004Columbus State University9 Security and Assurance of Information Lab (SAIL) Software Configuration VPN Concentrator Software PCs running RealVNC (Virtual Network Computing) Operating Systems Security Software

November 12, 2004Columbus State University10 Security and Assurance of Information Lab (SAIL)

November 12, 2004Columbus State University11 Security and Assurance of Information Lab (SAIL)

November 12, 2004Columbus State University12 Security and Assurance of Information Lab (SAIL) Data Confidentiality, Data Availability, Data Integrity, Data Encryption in a Windows Environment /lab2.html /lab2.html Password Policy (and cracking) /lab6.html /lab6.html /lab6b.html /lab6b.html

November 12, 2004Columbus State University13 Security and Assurance of Information Lab (SAIL) Network Security - port scanner and security scanner (nmap & nessus) /lab9.html /lab9.html Network Security - network protocol analyzer (ethereal) /lab10.html

November 12, 2004Columbus State University14 Security and Assurance of Information Lab (SAIL) - TODO Install a Firewall in the lab Assignment on configuring a firewall Assignment on use of a firewall Install a router in the lab Assignment on configuring a router Assignments on router security Duplicate assignments with Linux (compare and contrast) Attack and Defend assignments Add more equipment modules

November 12, 2004Columbus State University15 Security and Assurance of Information Lab (SAIL) THANKS Bob DuCharme and CISCO for the training and insight CPAK for providing equipment and initial setup My students for putting up with the frustrations, especially Sharon Croke- Allsup & Carlos Martin who helped configure the SAIL

November 12, 2004Columbus State University16 Security and Assurance of Information Lab (SAIL) Questions?