Publication Date
2020
Abstract
In today’s world, there is an increasing need for cybersecurity professionals because of the increase of Internet-connected devices, digital assets, and information systems infrastructure. Growth of automation and digitization, enterprise safety risks, the illusion of privacy and consumer data breaching, data storage, and management in the world of massive internet device connectivity that is expected in the near future collectively bring new security concerns. In order for students to gain the required skill sets to enter the workforce, they need hands-on experience to build essential employability qualities, confidence, knowledge, and experience. Murray State University’s Telecommunications Systems Management program uses a lab environment that has been developed using Netlab software to create a secure environment isolated from the campus network, allowing students to experience the execution of these attacks and exploits.
Creative Commons License
This work is licensed under a Creative Commons Attribution 4.0 License.
Creating a Deep Learning Environment in a Virtual Lab for Cybersecurity
In today’s world, there is an increasing need for cybersecurity professionals because of the increase of Internet-connected devices, digital assets, and information systems infrastructure. Growth of automation and digitization, enterprise safety risks, the illusion of privacy and consumer data breaching, data storage, and management in the world of massive internet device connectivity that is expected in the near future collectively bring new security concerns. In order for students to gain the required skill sets to enter the workforce, they need hands-on experience to build essential employability qualities, confidence, knowledge, and experience. Murray State University’s Telecommunications Systems Management program uses a lab environment that has been developed using Netlab software to create a secure environment isolated from the campus network, allowing students to experience the execution of these attacks and exploits.