Team for Research in
Ubiquitous Secure Technology

Courseware Repository and Curriculum Adaptation
Sigurd Meldal, Weider Yu, Simon Shim, Xiao Su

Citation
Sigurd Meldal, Weider Yu, Simon Shim, Xiao Su. "Courseware Repository and Curriculum Adaptation". Talk or presentation, 27, April, 2006; Poster given at TRUST NSF Site Visit.

Abstract
In San Jose State University, the educational initiatives are aligned in two directions. First, we worked with Vanderbilt University to identify a modeling platform (CAPE GME) to be used as a central repository of educational materials developed by the center. We populated the course repository with two sample courses: computer security (materials taken from Stanford and UC Berkeley) and network security (taken from Vanderbilt University, Stanford University, and SJSU). Currently we are working on enriching the course materials to cover all the TRUST universities. The objective of the repository is to facilitate quick reuse and adaptation of security educational materials for students with diverse background and different learning objectives. Second, SJSU is working towards NSA certification of its information security curriculum. We are in the process of integrating center research results into our own curriculum, and are developing an adaptation plan to meet NSA CNSS standards. In this poster, we present our work in both directions.

Electronic downloads

Citation formats  
  • HTML
    Sigurd Meldal, Weider Yu, Simon Shim, Xiao Su. <a
    href="http://www.truststc.org/pubs/90.html"
    ><i>Courseware Repository and Curriculum
    Adaptation</i></a>, Talk or presentation,  27,
    April, 2006; Poster given at TRUST NSF Site Visit.
  • Plain text
    Sigurd Meldal, Weider Yu, Simon Shim, Xiao Su.
    "Courseware Repository and Curriculum Adaptation".
    Talk or presentation,  27, April, 2006; Poster given at
    TRUST NSF Site Visit.
  • BibTeX
    @presentation{MeldalYuShimSu06_CoursewareRepositoryCurriculumAdaptation,
        author = {Sigurd Meldal, Weider Yu, Simon Shim, Xiao Su},
        title = {Courseware Repository and Curriculum Adaptation},
        day = {27},
        month = {April},
        year = {2006},
        note = {Poster given at TRUST NSF Site Visit.},
        abstract = {In San Jose State University, the educational
                  initiatives are aligned in two directions. First,
                  we worked with Vanderbilt University to identify a
                  modeling platform (CAPE GME) to be used as a
                  central repository of educational materials
                  developed by the center. We populated the course
                  repository with two sample courses: computer
                  security (materials taken from Stanford and UC
                  Berkeley) and network security (taken from
                  Vanderbilt University, Stanford University, and
                  SJSU). Currently we are working on enriching the
                  course materials to cover all the TRUST
                  universities. The objective of the repository is
                  to facilitate quick reuse and adaptation of
                  security educational materials for students with
                  diverse background and different learning
                  objectives. Second, SJSU is working towards NSA
                  certification of its information security
                  curriculum. We are in the process of integrating
                  center research results into our own curriculum,
                  and are developing an adaptation plan to meet NSA
                  CNSS standards. In this poster, we present our
                  work in both directions.},
        URL = {http://www.truststc.org/pubs/90.html}
    }
    

Posted by Christopher Brooks on 4 May 2006.
Groups: trust
For additional information, see the Publications FAQ or contact webmaster at www truststc org.

Notice: This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All persons copying this information are expected to adhere to the terms and constraints invoked by each author's copyright.