Incorporating CyberCIEGE into an Introductory Cyber Security Course
1/8/13This syllabus identifies specific CyberCIEGE scenarios and tutorial videos that could be included within selected modules of an introductory cyber security course. The seven modules identified below are a notional organization of material contained in typical cyber security courses. This syllabus does not attempt to cover all such material, rather the purpose is to identify which elements of CyberCIEGE could be deployed within selected instruction modules. It is expected that traditional lecture and/or reading assignments would cover material not included below, and would also provide introduction and context to much of the CyberCIEGE material.
Table 1 identifies the modules and approximates the amount of CyberCIEGE tutorial video and scenario play time that might be required for each. While a natural strategy is to incorporate CyberCIEGE scenarios as labs to augment lecture presentations, an alternate approach is to more tightly integrate CyberCIEGE into the instructional material, and thus blur the distinction between labs and subject matter presentations. For example, scenarios might be covered using the following sequence:
1) Lecture or assigned reading of related material.
2) Assignment of a scenario for individual exploration at the student's own pace.
3) Group review of the scenario decision points and consequences (e.g., in the style of case studies).
Note that since CyberCIEGE scenarios are intended to provide a context for experiencing consequences of choices, the scenarios don't always stick to a given topic. This becomes particularly true as students advance to the cryptography scenarios which are designed to illustrate the role and limits of cryptography within selected environments.
Table 1: Instructional module summary and links to individual modules
The tables below identify the CyberCIEGE material that can contribute to course content for each of the modules. The tables include links to tutorial movies and scenario lab manuals. The tables include an estimate of the amount of time (in minutes) that students would be expected to spend on the material.
1 If the course does not include a PKI & Identity Management module, one of the PKI scenarios (e.g, "Advanced VPNs" or "Hard Rain") could be included here.