This Article 
   
 Share 
   
 Bibliographic References 
   
 Add to: 
 
Digg
Furl
Spurl
Blink
Simpy
Google
Del.icio.us
Y!MyWeb
 
 Search 
   
Filling Your Cyber Operations Training Toolbox
Sept.-Oct. 2012 (vol. 10 no. 5)
pp. 71-74
Josh Pauli, Dakota State University
Patrick Engebretson, Dakota State University
This training article introduces readers to the specific tools and skills needed to best provide cyber operations education and training to university students at the undergraduate and graduate level. It isn't a curriculum-mapping exercise but rather a detailed listing of tools and techniques that can be included in existing and new courses to best align with the NSA's new Center of Academic Excellence in Cyber Operations (CAE-CO).
Index Terms:
Training,Cyberspace,Education,Reverse engineering,Computer crime,Web services,CAE-CO,cyber operations,cybersecurity,training,education,curriculum,reverse engineering,shell code development,exploitation,debugging,network hacking,Web application hacking,malware analysis,NSA,Center of Academic Excellence in Cyber Operations
Citation:
Josh Pauli, Patrick Engebretson, "Filling Your Cyber Operations Training Toolbox," IEEE Security & Privacy, vol. 10, no. 5, pp. 71-74, Sept.-Oct. 2012, doi:10.1109/MSP.2012.117
Usage of this product signifies your acceptance of the Terms of Use.