Increasing Student Involvement with Hands-on Activities in Online Computer Science Classes Dr. Wayne Summers, Dr. Bhagyavati, Prof. Chris Whitehead Columbus.

Slides:



Advertisements
Similar presentations
Rockingham County Public Schools Technology Acceptable Use Policy
Advertisements

MADISON COUNTY SCHOOLS ACCEPTABLE USE AND INTERNET SAFETY POLICY.
Northside I.S.D. Acceptable Use Policy
Hart District Acceptable Use Policy Acceptable Use Policy.
Janis Gatewood EDU689 January 27, Faculty and Staff COMPUTER CRIME ACT Section of the Code of Laws of S.C. states that: 1. It is unlawful.
Cyber security refers to the technologies and processes designed to protect computers, networks and data from unauthorized access and attacks delivered.
AUP Acceptable Use Policy Summarized by Mr. Kirsch from the Sioux Falls School District Technology Plan.
1 Copyright © 2010 AQA and its licensors. All rights reserved. Introduction to the new specification GCSE Computer Science Paul Varey.
Boyertown Area School District Acceptable Use Policy.
Phoenix Union High School District Governing Board Policy In-Service Technology Usage Electronic Information System (EIS) 2014/2015 School Year.
 I will not post personal information (includes picture)  I will not agree to meet someone I met online  I will notify teacher of inappropriate messages.
Department of Mathematics and Computer Science
Hands-On Ethical Hacking and Network Defense
Information Assurance & Network Security Certificate Prof. Rafael M. Rivera Universidad del Turabo School of Engineering Institute of Telecommunications.
Riverside Community School District
The Education of a Software Engineer Mehdi Jazayeri Presented by Matthias Hauswirth.
Breadth-Last Technical Electives: Integrating the CS Core via Computer Games and Mobile Robotics William W. White Southern Illinois University Edwardsville.
January 14, 2010 Introduction to Ethical Hacking and Network Defense MIS © Abdou Illia.
CSCD 434 Spring 2011 Lecture 1 Course Overview. Contact Information Instructor Carol Taylor 315 CEB Phone: Office.
Cryptography and Network Security Chapter 1. Chapter 1 – Introduction The art of war teaches us to rely not on the likelihood of the enemy's not coming,
VISD Acceptable Use Policy
Developing a Security Policy Chapter 2. Learning Objectives Understand why a security policy is an important part of a firewall implementation Determine.
 All employees will be able to communicate with other people in the district, schools, colleges, and various organizations.  Access is provided to hundreds.
Increasing Student Involvement with Hands-on Activities in Online Computer Science Classes Dr. Wayne Summers, Dr. Bhagyavati, Prof. Chris Whitehead Columbus.
Kittiphan Techakittiroj (04/09/58 19:56 น. 04/09/58 19:56 น. 04/09/58 19:56 น.) Network Security (the Internet Security) Kittiphan Techakittiroj
BUS1MIS Management Information Systems Semester 1, 2012 Week 7 Lecture 1.
1 Creating a Virtual Laboratory to Teach Information Assurance Courses Online Dr. Wayne Summers & Dr. Bhagyavati Columbus State University Columbus, Georgia.
Internet and Computer Rules If you want to use the computers you need to follow the rules.
A cceptable U se P olicy A student’s guide to using technological tools safely and responsibly. Please see BOE Policy #7314 and Regulation #7314R * This.
Employee Guidelines for Acceptable Use of Technology Resources.
CS CS 5150 Software Engineering Lecture 18 Security.
Clark County School District (CCSD)
Cyberspace Rules for Mrs. Johnson’s Kindergarten Class These are the rules we will use to learn, play, and have fun on the internet.
The Open Source Virtual Lab: a Case Study Authors: E. Damiani, F. Frati, D. Rebeccani, M. Anisetti, V. Bellandi and U. Raimondi University of Milan Department.
CSCD 434 Network Security Spring 2014 Lecture 1 Course Overview.
Jenkins Independent Schools NETWORK STAFF USER CONTRACT Acceptable Use Policy 2007 – 2008.
Technology Lab Rules, Procedures, Acceptable Use Policy Review Kindergarten-Second Grade This PowerPoint is meant to be used as a quick review! Students.
EAST HARDIN MIDDLE SCHOOL MR. ERVIN Internet Safety Policy and Acceptable Use Procedures.
1 ISA&D29-Oct ISA&D29-Oct-13 Systems Analyst: problem solver IT and Strategic Planning.
Session III. Information Systems A system, whether automated or manual, that comprises people, machines, and/or methods organized to collect, process,
EDUCAUSE 2005 Annual Conference October 19, 2005.
Virtual Workspaces Kate Keahey Argonne National Laboratory.
Major Disciplines in Computer Science Ken Nguyen Department of Information Technology Clayton State University.
Hoover High School Computer Labs San Diego City Schools Network Use Guidelines.
Computer Science in Context Evangelos E. Milios Professor and Graduate Coordinator Faculty of Computer Science Dalhousie University.
By: Christina Anderson EDTC 630. AUP stands for Acceptable Use Policy  The AUP is an outline of procedures/rules to inform all students and employees.
LAUSD Responsible Use Policy (RUP) BUL – Attachment A.
Advanced System Security Dr. Wayne Summers Department of Computer Science Columbus State University
Chapter 19: Building Systems with Assurance Dr. Wayne Summers Department of Computer Science Columbus State University
Woodland Hills School District Computer Network Acceptable Use Policy.
PREPARED BY : Harsh patel dhruv patel sreejit sundaram.
School Accounts Presented by: Mrs. Mazzola.
Intro to Information Security Phil Grimes Coach / Mentor Security Consultant.
Ethical Hacking and Network Defense. Contact Information Sam Bowne Sam Bowne Website: samsclass.info Website:
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Interdisciplinary MS in Information Assurance Jim Wolfe Computer Science Department Indiana University of Pennsylvania EPASEC 2006.
Writing an Internet Policy for Your School Kathie Carwile Morgan, ED.D. Liberty University ACSI Washington DC Educator Convention Nov. 22 & 23, 2010 Crystal.
ACCEPTABLE USE POLICY: INFORMATION TECHNOLOGY RESOURCES IN THE SCHOOLS The school's information technology resources, including and Internet access,
New Computer Science Programme at the Department of Informatics Pedro Guerreiro University of Nis, March 24, 2006.
Advanced System Security Dr. Wayne Summers Department of Computer Science Columbus State University
Introduction to Information Security Module 1. Objectives Definitions of information technology and information security Fundamental Security Concepts.
Clark County School District
CSCD 434 Network Security Spring 2012 Lecture 1 Course Overview.
Penetration Testing Computer Science and Software Engineering
IS4680 Security Auditing for Compliance
Chapter 13 Security and Ethical Challenges.
Information Assurance & Network Security Certificate
Online Learning.
CSCD 434 Network Security Spring 2019 Lecture 1 Course Overview.
Student User Agreement and Policy 2022
Presentation transcript:

Increasing Student Involvement with Hands-on Activities in Online Computer Science Classes Dr. Wayne Summers, Dr. Bhagyavati, Prof. Chris Whitehead Columbus State University Columbus, GA

Dr. Wayne Summers Columbus State University Introduction Different learning styles of students Designing and delivering hands-on activities to engage the kinesthetic learner are particularly challenging in computer science courses Provide students in Computer Science courses the same hands-on experiences that are standard in courses taught in a face-to-face environment

Dr. Wayne Summers Columbus State University Agenda –Computer science assignments using students’ computers –Computer science assignments developed for the virtual lab –Problems encountered with both types of assignments –Solutions and workaround for the problems –Repository of hands-on assignments for use in online and blended classes

Dr. Wayne Summers Columbus State University Computer Science Body of Knowledge Discrete Structures Programming Fundamentals Algorithms and Complexity Architecture and Organization Operating Systems Net-Centric Computing Programming Languages Human-Computer Interaction Graphics and Visual Computing Intelligent Systems Information Management Social and Professional Issues Software Engineering Computer and Network Security Computer and Network Security

Dr. Wayne Summers Columbus State University Security Lab Assignments using student computers Elementary Cryptography –Uses spreadsheets to replicate cryptography Program Security –Requires downloading software Computer Forensics –Requires downloading software and data Security Policy Review –Requires inspecting website and collaboration with classmates CyberProtect (Network Management) –Requires downloading software or mailing a CD

Dr. Wayne Summers Columbus State University Security Lab Assignments using virtual lab Firewall Policy –Uses software that would require reconfiguring student’s computer Network Security - Intrusion Detection –Uses software that students should not be running over the Internet

Dr. Wayne Summers Columbus State University Problems Assignments have to be designed so as not to be limited by the students’ computing resources. Students typically have access to only one computer and one operating system which limits the flexibility in the assignments Unwise to allow students to use their personal computers to experiment with security software Technical problems in the virtual lab

Dr. Wayne Summers Columbus State University Computer Security Class Student Agreement I understand that I am taking a class that will teach me computer access techniques that can be used to break in to, damage or otherwise alter ("hack") computer systems. I also understand that it is the purpose of the class that this knowledge be used to protect information resources and not to compromise or destroy them or otherwise break any laws or disrupt educational, commercial or other activities. Any access to a system without the administrator/owners permission is illegal. The following actions are clearly not ethical: –Breaking into a computer system without the permission of the owner or administrator of that computer system. –Doing anything that substantially interferes with other user's access to computer-based services (i. e., denial of service attacks). –Accessing computer-based information without appropriate authorization. –Accessing any computer-based service without appropriate authorization. –Unauthorized monitoring of electronic communication. I agree that I will not damage, disrupt or access any computer systems or other students work during this class. I also understand that I will be expected to work with other students to test security, but I agree that it will always be done with their knowledge. I addition I will not destroy or damage their work and will let them know what I have accessed on their system. I will cease accessing their system when asked. I understand that if I can not accept these terms, I can drop the class with no academic penalty. Once accepted, their violation entitles the class administrator to administer disciplinary consequences if I fail to abide by these agreements.

Dr. Wayne Summers Columbus State University Solutions Limit assignments to those that do not require special technology Use virtual machines (VM) to emulate the hardware of different computers in a network –VMWare ( –Planetlab ( –Emulab ( Virtual network/security lab –SAIL - Using a Virtual Lab to teach an online Information Assurance ProgramUsing a Virtual Lab to teach an online Information Assurance Program

Dr. Wayne Summers Columbus State University Summary Students in online and blended courses can be provided with hands-on assignments There are a variety of solutions

Dr. Wayne Summers Columbus State University Where to Get More Information – – –