This Article 
   
 Share 
   
 Bibliographic References 
   
 Add to: 
 
Digg
Furl
Spurl
Blink
Simpy
Google
Del.icio.us
Y!MyWeb
 
 Search 
   
How the Cyber Defense Exercise Shaped an Information-Assurance Curriculum
September/October 2007 (vol. 5 no. 5)
pp. 40-49
Barry E. Mullins, US Air Force Institute of Technology
Timothy H. Lacey, US Air Force Institute of Technology
Robert F. Mills, US Air Force Institute of Technology
Joseph E. Trechter, Office of the Secretary of the Air Force for Warfighting Integration
Samuel D. Bass, Defense Information Systems Agency
The US Air Force Institute of Technology's curriculum and course format evolved based on experiences with the Cyber Defense Exercise, an annual cyberwarfare exercise sponsored by the US National Security Agency.

1. M. Gettle, "Air Force Releases New Mission Statement," Air Force Print News,8 Dec. 2005; www.af.mil/newsstory.asp?storyID=123013440 .
1. M. Gettle, "Air Force Releases New Mission Statement," Air Force Print News,8 Dec. 2005; www.af.mil/newsstory.asp?storyID=123013440 .
1. M. Gettle, "Air Force Releases New Mission Statement," Air Force Print News,8 Dec. 2005; www.af.mil/newsstory.asp?storyID=123013440 .
2. R.C. Dodge and D.J. Ragsdale, "Technology Education at the US Military Academy," IEEE Security & Privacy, vol. 3, no. 2, 2005, pp. 49–53.
2. R.C. Dodge and D.J. Ragsdale, "Technology Education at the US Military Academy," IEEE Security &Privacy, vol. 3, no. 2, 2005, pp. 49–53.
2. R.C. Dodge and D.J. Ragsdale, "Technology Education at the US Military Academy," IEEE Security & Privacy, vol. 3, no. 2, 2005, pp. 49–53.
3. W.J. Schepens and J.R. James, "Architecture of a Cyber Defense Competition," Proc. IEEE Int'l Conf. Systems, Man & Cybernetics (IEEE SMC 03), IEEE CS Press, 2003, pp. 4300–4305.
3. W.J. Schepens and J.R. James, "Architecture of a Cyber Defense Competition," Proc. IEEE Int'l Conf. Systems, Man &Cybernetics (IEEE SMC 03), IEEE CS Press, 2003, pp. 4300–4305.
3. W.J. Schepens and J.R. James, "Architecture of a Cyber Defense Competition," Proc. IEEE Int'l Conf. Systems, Man & Cybernetics (IEEE SMC 03), IEEE CS Press, 2003, pp. 4300–4305.
4. G.H. Gunsch, R.A. Raines, and T.H. Lacey, "Integrating CDX into the Graduate Program," Proc. IEEE Int'l Conf. Systems, Man and Cybernetics (IEEE SMC 03), 2003, pp. 4306–4310.
4. G.H. Gunsch, R.A. Raines, and T.H. Lacey, "Integrating CDX into the Graduate Program," Proc. IEEE Int'l Conf. Systems, Man and Cybernetics (IEEE SMC 03), 2003, pp. 4306–4310.
4. G.H. Gunsch, R.A. Raines, and T.H. Lacey, "Integrating CDX into the Graduate Program," Proc. IEEE Int'l Conf. Systems, Man and Cybernetics (IEEE SMC 03), 2003, pp. 4306–4310.
5. A. Conklin, "Cyber Defense Competitions and Information Security Education: An Active Learning Solution for a Capstone Course," Proc. 39th Ann. Hawaii Int'l Conf. System Sciences (HICSS-39), IEEE CS Press, 2006, pp. 1–6.
5. A. Conklin, "Cyber Defense Competitions and Information Security Education: An Active Learning Solution for a Capstone Course," Proc. 39th Ann. Hawaii Int'l Conf. System Sciences (HICSS-39), IEEE CS Press, 2006, pp. 1–6.
5. A. Conklin, "Cyber Defense Competitions and Information Security Education: An Active Learning Solution for a Capstone Course," Proc. 39th Ann. Hawaii Int'l Conf. System Sciences (HICSS-39), IEEE CS Press, 2006, pp. 1–6.
6. G.B. White and D. Williams, "The Collegiate Cyber Defense Competition," Proc. 9th Colloquium for Information Systems Security Education (CISSE 05), Georgia Inst. of Technology, 2005, pp. 26–31.
6. G.B. White and D. Williams, "The Collegiate Cyber Defense Competition," Proc. 9th Colloquium for Information Systems Security Education (CISSE 05), Georgia Inst. of Technology, 2005, pp. 26–31.
6. G.B. White and D. Williams, "The Collegiate Cyber Defense Competition," Proc. 9th Colloquium for Information Systems Security Education (CISSE 05), Georgia Inst. of Technology, 2005, pp. 26–31.
7. T. Augustine and R.C. Dodge, "Cyber Defense Exercise: Meeting Learning Objectives thru Competition," Proc. 10th Colloquium for Information Systems Security Education (CISSE 06), Adelphi, 2006, pp. 61–67.
7. T. Augustine and R.C. Dodge, "Cyber Defense Exercise: Meeting Learning Objectives thru Competition," Proc. 10th Colloquium for Information Systems Security Education (CISSE 06), Adelphi, 2006, pp. 61–67.
7. T. Augustine and R.C. Dodge, "Cyber Defense Exercise: Meeting Learning Objectives thru Competition," Proc. 10th Colloquium for Information Systems Security Education (CISSE 06), Adelphi, 2006, pp. 61–67.
8. US Air Force Inst. of Technology, Graduate Catalog, 2006–2008,15 Aug. 2006. www.afit.edu/en/enerCatalog.cfm.
8. US Air Force Inst. of Technology, Graduate Catalog, 2006–2008,15 Aug. 2006. www.afit.edu/en/enerCatalog.cfm.
8. US Air Force Inst. of Technology, Graduate Catalog, 2006–2008,15 Aug. 2006. www.afit.edu/en/enerCatalog.cfm.
9. US Nat'l Security Agency, Router Security Configuration Guide,25 Mar. 2002.
9. US Nat'l Security Agency, Router Security Configuration Guide,25 Mar. 2002.
9. US Nat'l Security Agency, Router Security Configuration Guide,25 Mar. 2002.
10. J. Kleppinger, "Uncrackable Win2k/NT4 Passwords," SysOpt.com,3 Jan. 2001; www.sysopt.com/tutorials/article.php3532756 .
10. J. Kleppinger, "Uncrackable Win2k/NT4 Passwords," SysOpt.com,3 Jan. 2001; www.sysopt.com/tutorials/article.php3532756 .
10. J. Kleppinger, "Uncrackable Win2k/NT4 Passwords," SysOpt.com,3 Jan. 2001; www.sysopt.com/tutorials/article.php3532756 .
11. B. Kozicki, "Installing and Securing IIS Servers," WindowsSecurity,23 July 2004; www.windowsecurity.com/articlesInstalling_Securing_IIS_Servers_Part1.html .
11. B. Kozicki, "Installing and Securing IIS Servers," WindowsSecurity,23 July 2004; www.windowsecurity.com/articlesInstalling_Securing_IIS_Servers_Part1.html .
11. B. Kozicki, "Installing and Securing IIS Servers," WindowsSecurity,23 July 2004; www.windowsecurity.com/articlesInstalling_Securing_IIS_Servers_Part1.html .
12. R.M. Felder and R. Brent, "Learning by Doing," Chemical Eng. Education, vol. 37, no. 4, 2003, pp. 282–283.
12. R.M. Felder and R. Brent, "Learning by Doing," Chemical Eng. Education, vol. 37, no. 4, 2003, pp. 282–283.
12. R.M. Felder and R. Brent, "Learning by Doing," Chemical Eng. Education, vol. 37, no. 4, 2003, pp. 282–283.
13. D.W. Welch, D.J. Ragsdale, and W.J. Schepens, "Training for Information Assurance," Computer, vol 35, no. 4, 2002, pp. 30–37.
13. D.W. Welch, D.J. Ragsdale, and W.J. Schepens, "Training for Information Assurance," Computer, vol 35, no. 4, 2002, pp. 30–37.
13. D.W. Welch, D.J. Ragsdale, and W.J. Schepens, "Training for Information Assurance," Computer, vol 35, no. 4, 2002, pp. 30–37.

Index Terms:
network-level security and protection, network topology, network management, computer and information science education, Information Security
Citation:
Barry E. Mullins, Timothy H. Lacey, Robert F. Mills, Joseph E. Trechter, Samuel D. Bass, "How the Cyber Defense Exercise Shaped an Information-Assurance Curriculum," IEEE Security & Privacy, vol. 5, no. 5, pp. 40-49, Sept.-Oct. 2007, doi:10.1109/MSP.2007.111
Usage of this product signifies your acceptance of the Terms of Use.