Issue No. 05 - Sept.-Oct. (2012 vol. 10)
DOI Bookmark: http://doi.ieeecomputersociety.org/10.1109/MSP.2012.117
Josh Pauli , Dakota State University
Patrick Engebretson , Dakota State University
This training article introduces readers to the specific tools and skills needed to best provide cyber operations education and training to university students at the undergraduate and graduate level. It isn't a curriculum-mapping exercise but rather a detailed listing of tools and techniques that can be included in existing and new courses to best align with the NSA's new Center of Academic Excellence in Cyber Operations (CAE-CO).
Training, Cyberspace, Education, Reverse engineering, Computer crime, Web services, CAE-CO, cyber operations, cybersecurity, training, education, curriculum, reverse engineering, shell code development, exploitation, debugging, network hacking, Web application hacking, malware analysis, NSA, Center of Academic Excellence in Cyber Operations
P. Engebretson and J. Pauli, "Filling Your Cyber Operations Training Toolbox," in IEEE Security & Privacy, vol. 10, no. , pp. 71-74, 2012.