Asee peer logo

Board 129: Facilitation of Cybersecurity Learning Through Real-world Hands-on Labs

Download Paper |


2019 ASEE Annual Conference & Exposition


Tampa, Florida

Publication Date

June 15, 2019

Start Date

June 15, 2019

End Date

October 19, 2019

Conference Session

NSF Grantees Poster Session

Tagged Topic

NSF Grantees Poster Session

Page Count




Permanent URL

Download Count


Request a correction

Paper Authors


Mohamed Rahouti University of South Florida Orcid 16x16

visit author page

Mohamed Rahouti received an M.S. degree in Statistics in 2016 at the University of South Florida and is currently perusing a Ph.D. degree in Electrical Engineering at the University of South Florida. Mohamed holds numerous academic achievements. His current research focuses on computer networking, Software-Defined Networking (SDN), and network security with applications to smart cities.

visit author page

Download Paper |


The NSF Grantees’ Poster Session at American Society for Engineering Education’s Annual Conference is to provide a high visibility venue to disseminate results and interact with colleagues in the engineering education field. In this coming session, we plan on sharing our elaborated cybersecurity labs. In our past teaching for different cybersecurity courses and workshops, we have developed a broad range of hands-on labs. Our readily-available labs are conducted in our own pre-built virtual machine image as we have installed all the necessary tools, software, and libraries that are needed by this type of security and cryptography labs. Students just need to download our provided VM and run it on their own computers using VirtualBox (or VMWare). Our developed labs have been ported to the latest version of Ubuntu18.04 VM. These labs mainly focus on network security (cover topics on network security, ranging from attacks on TCP/IP and DNS to various network security technologies such as, Firewall, VPN, and IPSec), web security (cover some of the most common vulnerabilities in web applications in order to show students how attacks work through exploiting these vulnerabilities), applied cryptography (cover three essential concepts in cryptography, including secrete-key encryption, one-way hash function, and public-key encryption and PKI), and mobile security (target the smartphone security through covering the most common vulnerabilities and attacks on mobile devices). Over and above, we have ported some of these developed labs to the Global Environment for Network Innovations (GENI), an NSF-funded federated and real-world testbed that provides a virtual laboratory for networking and distributed systems research and education. It is well suited for exploring network security aspects, thereby promoting innovations in network security, services, and applications. The advantage of deploying GENI for network and computer security education is allowing experimenters to have access to different computing resources from locations around the United States, connect computing resources in topologies best suited to network and security experiments, and install custom software or even custom operating systems on these computing resources. The labs that are fitted to GENI were significantly revised and modified in order to be applicable on such a real-world testbed.

Rahouti, M. (2019, June), Board 129: Facilitation of Cybersecurity Learning Through Real-world Hands-on Labs Paper presented at 2019 ASEE Annual Conference & Exposition , Tampa, Florida. 10.18260/1-2--32228

ASEE holds the copyright on this document. It may be read by the public free of charge. Authors may archive their work on personal websites or in institutional repositories with the following citation: © 2019 American Society for Engineering Education. Other scholars may excerpt or quote from these materials with the same citation. When excerpting or quoting from Conference Proceedings, authors should, in addition to noting the ASEE copyright, list all the original authors and their institutions and name the host city of the conference. - Last updated April 1, 2015