SlideShare a Scribd company logo
Learning ethical hacking
Abstract
Teaching offensive security (ethical hacking) is
becoming a necessary component of information
security curricula with a goal of developing better
security professionals. The offensive security
components extend curricula beyond system
defense strategies. This paper identifies and
discusses the learning outcomes achieved as a
result of hands-on lab exercises which focus on
attacking systems. The paper includes the ethical
implications associated with including such labs. The
discussion is informed by analyses of log data on
student malicious activities, and student survey
results. The examination of student behavior after
acquiring these skills demonstrates that there is
potentially a high risk of inappropriate and illegal
behavior associated with this type learning. While
acknowledging these risks and problems, the paper
recommends that curricula should opt for a teaching
approach that offers students both offensive and
defensive hands-on lab exercises in conjunction with
lecture material. The authors propose steps to
minimize the risk of inappropriate behavior and
reduce institutional liability.
Article Preview
 Introduction
The importance of experimental learning has long
been recognized in the learning theory literature
(Denning, 2003; Du, Jayaraman, & Gaubatz, 2010).
Despite this fact many graduate and undergraduate
courses in information security still offer a limited
number of hands-on laboratory exercises. The need
for using a theory and practice-oriented approach in
information security education is seen as paramount
(Chiou Chen & Lin, 2007). A program that covers
only the theoretical aspects of information security
may not prepare students for overcoming the
difficulties associated with the efficient protection of
complex computer systems and information assets.
Furthermore a learning environment that does not
give the student an opportunity to experiment and
practice with security technologies does not equip
him/her with the skills and knowledge required for
doing research and development in the computer
security field.
So far most information security courses have
supplemented content by adding a practice-oriented
component which includes laboratory exercises
(labs) based on defensive information security
techniques (Hill, Carver, Humphries, & Pooch, 2001;
Mullins et al., 2002; Vigna, 2003; Whitman, Mattord,
& Green, 2014; Trabelsi, Hayawi, Al Braiki, &
Mathew, 2013). However many academics and
industry practitioners feel that to defend a system
one needs a good knowledge of the attacks a
system may face (Arce & McGraw, 2004). Students
who understand how attacks are designed and
launched will be better prepared for opportunities as
security administrators rather than those without
such skills (Logan and Clarkson, 2005). As a result,
interest for including labs on offensive techniques
originally developed by hackers has grown
significantly. Teaching ethical hacking techniques
has become a vital component of programs that aim
to produce competent information security
professionals (Brutus & Locasto, 2010; Damon,
Dale, Land & Weiss, 2012; Dornseif, Gärtner, Holz &
Mink, 2005; Ledin, 2011; Mink & Freiling, 2006;
Trabelsi & Al Ketbi, 2013; Trabelsi, 2011; Yuan &
Zhong, 2008; Trabelsi et al., 2013).
Adding hacking activities to the information security
curriculum raises some variety of ethical and legal
issues. By using log data as well as data gathered
through a student survey, this paper investigates the
ethical implications of offering hands-on lab
exercises on attack techniques in information
security education. The paper emphasizes teaching
offensive techniques which are central to better
understanding the hacker’s thinking and the ways in
which security systems fail in these situations.
Moreover, hands-on labs using attack techniques
allow students to experiment with common attack
techniques and consequently allow them to
implement the appropriate security solutions and
more efficiently protect the confidentiality, integrity,
and availability of computer systems, networks,
resources, and data. The paper proposes measures
that schools and educators can take to develop
successful and problem-free information security
programs while reducing legal liabilities, preventing
student misconduct, and teaching students
responsible behavior.
The paper is organized as follows: Section 2
presents the case of teaching offensive techniques
in hands-on lab exercises and the expected learning
outcomes resulting from this approach. Sections 3
and 4 discuss the risks arising from teaching
offensive techniques in an academic environment,
the associated ethical concerns, and the emerging
liability issues; along with practical steps to mitigate
these risks. Finally, Section 5 summarizes the
results and concludes the paper.
https://uii.io/becomehacker

More Related Content

PDF
Security in Learning Management Systems: Designing Collaborative Learning Act...
PPTX
Muller Chapter 4 Notes
PDF
RISKS AND REMEDIES IN E-LEARNING SYSTEM
DOC
Nabila__proposal4.doc
PPTX
E-learning
PDF
IoT-based students interaction framework using attention-scoring assessment i...
PDF
Primary national curriculum_-_computing
PPT
ICWL 2009
Security in Learning Management Systems: Designing Collaborative Learning Act...
Muller Chapter 4 Notes
RISKS AND REMEDIES IN E-LEARNING SYSTEM
Nabila__proposal4.doc
E-learning
IoT-based students interaction framework using attention-scoring assessment i...
Primary national curriculum_-_computing
ICWL 2009

What's hot (10)

PDF
In tech application-of_data_mining_technology_on_e_learning_material_recommen...
DOCX
Artifact map
PDF
01357477
PPTX
Feasibility study on an answer grading system based on keyword scanning
PDF
The success factors for effective implementation of e learning systems
PPTX
Insight into Managing mobile devices webinar
DOCX
3 Content/Body
DOCX
Technology organization system
PPTX
Technology Integration Education Issues
PPTX
Training Technology Resource Center (TRC) Employees with Brightspace
In tech application-of_data_mining_technology_on_e_learning_material_recommen...
Artifact map
01357477
Feasibility study on an answer grading system based on keyword scanning
The success factors for effective implementation of e learning systems
Insight into Managing mobile devices webinar
3 Content/Body
Technology organization system
Technology Integration Education Issues
Training Technology Resource Center (TRC) Employees with Brightspace

Similar to Learning ethical hacking (20)

PDF
Journal of Information Technology Education/tutorialoutletdotcom
PDF
Recapitulating the development initiatives of a robust information security s...
PDF
INVESTIGATING THE DETERMINANTS OF COLLEGE STUDENTS INFORMATION SECURITY BEHAV...
PDF
INVESTIGATING THE DETERMINANTS OF COLLEGE STUDENTS INFORMATION SECURITY BEHAV...
PDF
Investigating the Determinants of College Students Information Security Behav...
PDF
Secured cloud support for global software
PDF
Improving Delivery Effectiveness of Information Security Learning Continuum
PDF
Cybersecurity in Educational Institutions: Management Strategies (www.kiu.ac.ug)
PDF
Information Security Management in University Campus Using Cognitive Security
PDF
System Dynamics Based Insider Threats Modeling
PPTX
Towards a Structured Information Security Awareness Programme
PDF
An Empirical Study on the Security Measurements of Websites of Jordanian Publ...
DOCX
ISSC451 Cybercrime.docx
PDF
Appling tracking game system to measure user behavior toward cybersecurity p...
DOCX
Journal of Information Technology Education Volume 11, 2012 .docx
PPTX
144 presentation iee_tel2021
DOCX
SkinnerJ_PS533_Final Paper
PDF
Ikeepsafe Cyber Safety, Ethics and Security Competencies
PDF
Electronic Healthcare Record Security and Management in Healthcare Organizations
PDF
Legal and Ethical Guidelines in CCTV Surveillance.pdf
Journal of Information Technology Education/tutorialoutletdotcom
Recapitulating the development initiatives of a robust information security s...
INVESTIGATING THE DETERMINANTS OF COLLEGE STUDENTS INFORMATION SECURITY BEHAV...
INVESTIGATING THE DETERMINANTS OF COLLEGE STUDENTS INFORMATION SECURITY BEHAV...
Investigating the Determinants of College Students Information Security Behav...
Secured cloud support for global software
Improving Delivery Effectiveness of Information Security Learning Continuum
Cybersecurity in Educational Institutions: Management Strategies (www.kiu.ac.ug)
Information Security Management in University Campus Using Cognitive Security
System Dynamics Based Insider Threats Modeling
Towards a Structured Information Security Awareness Programme
An Empirical Study on the Security Measurements of Websites of Jordanian Publ...
ISSC451 Cybercrime.docx
Appling tracking game system to measure user behavior toward cybersecurity p...
Journal of Information Technology Education Volume 11, 2012 .docx
144 presentation iee_tel2021
SkinnerJ_PS533_Final Paper
Ikeepsafe Cyber Safety, Ethics and Security Competencies
Electronic Healthcare Record Security and Management in Healthcare Organizations
Legal and Ethical Guidelines in CCTV Surveillance.pdf

Recently uploaded (20)

PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PDF
Assigned Numbers - 2025 - Bluetooth® Document
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PPTX
A Presentation on Artificial Intelligence
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PPTX
sap open course for s4hana steps from ECC to s4
PDF
Encapsulation_ Review paper, used for researhc scholars
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PDF
cuic standard and advanced reporting.pdf
PPTX
MYSQL Presentation for SQL database connectivity
PDF
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
PDF
MIND Revenue Release Quarter 2 2025 Press Release
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PDF
Unlocking AI with Model Context Protocol (MCP)
DOCX
The AUB Centre for AI in Media Proposal.docx
PDF
gpt5_lecture_notes_comprehensive_20250812015547.pdf
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
Assigned Numbers - 2025 - Bluetooth® Document
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
A Presentation on Artificial Intelligence
Dropbox Q2 2025 Financial Results & Investor Presentation
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
“AI and Expert System Decision Support & Business Intelligence Systems”
Mobile App Security Testing_ A Comprehensive Guide.pdf
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
sap open course for s4hana steps from ECC to s4
Encapsulation_ Review paper, used for researhc scholars
Building Integrated photovoltaic BIPV_UPV.pdf
cuic standard and advanced reporting.pdf
MYSQL Presentation for SQL database connectivity
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
MIND Revenue Release Quarter 2 2025 Press Release
Advanced methodologies resolving dimensionality complications for autism neur...
Unlocking AI with Model Context Protocol (MCP)
The AUB Centre for AI in Media Proposal.docx
gpt5_lecture_notes_comprehensive_20250812015547.pdf

Learning ethical hacking

  • 1. Learning ethical hacking Abstract Teaching offensive security (ethical hacking) is becoming a necessary component of information security curricula with a goal of developing better security professionals. The offensive security components extend curricula beyond system defense strategies. This paper identifies and discusses the learning outcomes achieved as a result of hands-on lab exercises which focus on attacking systems. The paper includes the ethical implications associated with including such labs. The discussion is informed by analyses of log data on student malicious activities, and student survey results. The examination of student behavior after acquiring these skills demonstrates that there is potentially a high risk of inappropriate and illegal behavior associated with this type learning. While acknowledging these risks and problems, the paper recommends that curricula should opt for a teaching approach that offers students both offensive and defensive hands-on lab exercises in conjunction with lecture material. The authors propose steps to
  • 2. minimize the risk of inappropriate behavior and reduce institutional liability. Article Preview  Introduction The importance of experimental learning has long been recognized in the learning theory literature (Denning, 2003; Du, Jayaraman, & Gaubatz, 2010). Despite this fact many graduate and undergraduate courses in information security still offer a limited number of hands-on laboratory exercises. The need for using a theory and practice-oriented approach in information security education is seen as paramount (Chiou Chen & Lin, 2007). A program that covers only the theoretical aspects of information security may not prepare students for overcoming the difficulties associated with the efficient protection of complex computer systems and information assets. Furthermore a learning environment that does not give the student an opportunity to experiment and practice with security technologies does not equip him/her with the skills and knowledge required for doing research and development in the computer security field. So far most information security courses have supplemented content by adding a practice-oriented
  • 3. component which includes laboratory exercises (labs) based on defensive information security techniques (Hill, Carver, Humphries, & Pooch, 2001; Mullins et al., 2002; Vigna, 2003; Whitman, Mattord, & Green, 2014; Trabelsi, Hayawi, Al Braiki, & Mathew, 2013). However many academics and industry practitioners feel that to defend a system one needs a good knowledge of the attacks a system may face (Arce & McGraw, 2004). Students who understand how attacks are designed and launched will be better prepared for opportunities as security administrators rather than those without such skills (Logan and Clarkson, 2005). As a result, interest for including labs on offensive techniques originally developed by hackers has grown significantly. Teaching ethical hacking techniques has become a vital component of programs that aim to produce competent information security professionals (Brutus & Locasto, 2010; Damon, Dale, Land & Weiss, 2012; Dornseif, Gärtner, Holz & Mink, 2005; Ledin, 2011; Mink & Freiling, 2006; Trabelsi & Al Ketbi, 2013; Trabelsi, 2011; Yuan & Zhong, 2008; Trabelsi et al., 2013). Adding hacking activities to the information security curriculum raises some variety of ethical and legal issues. By using log data as well as data gathered through a student survey, this paper investigates the
  • 4. ethical implications of offering hands-on lab exercises on attack techniques in information security education. The paper emphasizes teaching offensive techniques which are central to better understanding the hacker’s thinking and the ways in which security systems fail in these situations. Moreover, hands-on labs using attack techniques allow students to experiment with common attack techniques and consequently allow them to implement the appropriate security solutions and more efficiently protect the confidentiality, integrity, and availability of computer systems, networks, resources, and data. The paper proposes measures that schools and educators can take to develop successful and problem-free information security programs while reducing legal liabilities, preventing student misconduct, and teaching students responsible behavior. The paper is organized as follows: Section 2 presents the case of teaching offensive techniques in hands-on lab exercises and the expected learning outcomes resulting from this approach. Sections 3 and 4 discuss the risks arising from teaching offensive techniques in an academic environment, the associated ethical concerns, and the emerging liability issues; along with practical steps to mitigate
  • 5. these risks. Finally, Section 5 summarizes the results and concludes the paper. https://uii.io/becomehacker