About This Text iii Figure 1 The spectrum of the academic discipline of cybersecurity. Hands-on lab exercises accompany each chapter. The labs drive home the main points of each chapter and include supplemental material. They provide students with practical skills more closely aligned with training outcomes as outlined above. The labs are designed to be completed in a custom VM pod meant to be hosted on an Internet-accessible cyber range. This allows students to perform cybersecurity tasks on Windows and Linux virtual machines from within web browsers using their own computers. The labs follow a storyline about Alice and Bob, two college freshmen, providing a fun backstory to the technical content. The labs walk students through meaningful cybersecurity exercises involving cyber attacks, cyber defenses, cryptography, and more, and provide step-by-step instructions with illustrations to ensure students can complete the tasks successfully. This material is meant to be covered in a semester-long undergraduate introductory cybersecurity course. Chapters 1-6 should be covered by midterm. Chapters 7-11 are lengthier and should be covered over the second half of the semester. For convenience only, male pronouns are used throughout this book to refer to the generic subject. Please see the text’s website for supplemental materials and to provide feedback: cedarville.edu/invitationtocyber
RkJQdWJsaXNoZXIy MTM4ODY=