DIGITAL LIBRARY
AN APPROACH FOR DESIGNING EFFECTIVE INSTRUCTION OF SECURITY EDUCATION BY ANALYZING DUMPED COMMAND LOG
Kyushu University (JAPAN)
About this paper:
Appears in: INTED2018 Proceedings
Publication year: 2018
Pages: 7464-7469
ISBN: 978-84-697-9480-7
ISSN: 2340-1079
doi: 10.21125/inted.2018.1756
Conference name: 12th International Technology, Education and Development Conference
Dates: 5-7 March, 2018
Location: Valencia, Spain
Abstract:
Since total number of cyber-security incidents are increasing year by year, security education for fostering cyber-security engineers becomes an urgent task all over the world. It is very important for a cyber-security engineer to acquire the practical skills to protect from various types of cyber-attacks. Therefore, the curriculum of almost cyber-security courses includes not only classroom-based lectures but also experiential trainings. The trainings have wide range such as network monitoring, server configuration, programming and so on. In the trainings, they need to type “commands” to complete these training tasks. The command logs are an objective data containing learner’s thinking. Analyzing the dumped log has possibility to bring an appropriate instructional design for each learner. The author tried to analyzing the dumped command logs of an experiential trainings in cyber-security course and consider instructional designs from the analyzing results. This paper provides these analyzing results.
Keywords:
Security Education, Learning Analytics.