The Community for Technology Leaders
RSS Icon
Issue No.05 - Sept.-Oct. (2012 vol.10)
pp: 71-74
Josh Pauli , Dakota State University
Patrick Engebretson , Dakota State University
This training article introduces readers to the specific tools and skills needed to best provide cyber operations education and training to university students at the undergraduate and graduate level. It isn't a curriculum-mapping exercise but rather a detailed listing of tools and techniques that can be included in existing and new courses to best align with the NSA's new Center of Academic Excellence in Cyber Operations (CAE-CO).
Training, Cyberspace, Education, Reverse engineering, Computer crime, Web services, CAE-CO, cyber operations, cybersecurity, training, education, curriculum, reverse engineering, shell code development, exploitation, debugging, network hacking, Web application hacking, malware analysis, NSA, Center of Academic Excellence in Cyber Operations
Josh Pauli, Patrick Engebretson, "Filling Your Cyber Operations Training Toolbox", IEEE Security & Privacy, vol.10, no. 5, pp. 71-74, Sept.-Oct. 2012, doi:10.1109/MSP.2012.117
16 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool