

{"id":1225,"date":"2019-08-28T00:03:45","date_gmt":"2019-08-28T04:03:45","guid":{"rendered":"https:\/\/sites.temple.edu\/care\/?page_id=1225"},"modified":"2024-09-05T18:19:21","modified_gmt":"2024-09-05T22:19:21","slug":"course-projects","status":"publish","type":"page","link":"https:\/\/sites.temple.edu\/care\/social-engineering\/course-projects\/","title":{"rendered":"Course Projects"},"content":{"rendered":"<p>Here you will find cybersecurity experiential learning course projects, datasets, and other materials that are free to use. <em>We ask that you acknowledge any material you use from this website in your publications and\/or conference presentations to help spread the word about these free resources and the work we are doing.<\/em><\/p>\n<p><span style=\"color: #008000\"><strong>Scroll down to view the course projects and datasets.<\/strong> <strong>\u00a0<\/strong><\/span><\/p>\n<p>The experiential learning projects below have been mapped onto the <a href=\"https:\/\/www.nist.gov\/itl\/applied-cybersecurity\/nice\/nice-cybersecurity-workforce-framework-resource-center\" target=\"_blank\" rel=\"noopener noreferrer\">NICE Cybersecurity Workforce Framework (NICE Framework)<\/a>. The NICE Framework, National Institute of Standards and Technology (NIST) Special Publication 800-181, is a nationally-focused resource that categorizes and describes cybersecurity work. The NICE Framework establishes a taxonomy and common lexicon that describes cybersecurity work and workers irrespective of where or for whom the work is performed. It is comprised of seven workforce Categories with a subset of 33 Specialty Areas, as well as Work Roles, Tasks, and Knowledge, Skills, and Abilities (KSAs). A complete mapping for each course project is available <a href=\"https:\/\/sites.temple.edu\/care\/files\/2021\/05\/ProjectMappingTo_NICE_CybersecurityWorkforceFramework.xlsx\" target=\"_blank\" rel=\"noopener noreferrer\">here<\/a>. These projects have been <span style=\"color: #ff00ff\"><strong>downloaded 1,000 times worldwide<\/strong> <\/span>thus far!<\/p>\n<p>We also have <span style=\"text-decoration: underline\">evaluation surveys for some of these projects<\/span>. We can send you the link so your students can complete these and share your class results with you. We are also trying to create longitudinal datasets, which we also hope to share.<\/p>\n<p><span style=\"color: #000000\">If you have any course projects you would like to share with the academic community, please let us know &#8211; we are trying to create an open source repository that will be useful to educators. Please use the <a style=\"color: #000000\" href=\"https:\/\/sites.temple.edu\/care\/contacts\/\">contact us<\/a> form.<\/span><\/p>\n<p><strong>CYBERSECURITY EXPERIENTIAL LEARNING COURSE PROJECTS<\/strong><\/p>\n<table style=\"height: 363px\" border=\"1\" width=\"986\">\n<tbody>\n<tr>\n<td width=\"5\"><strong>#<\/strong><\/td>\n<td width=\"30\"><strong>Title*^<\/strong><\/td>\n<td width=\"5\"><strong>Release Year<\/strong><\/td>\n<td width=\"5\"><strong># Downloads<\/strong><\/td>\n<td width=\"5\"><strong>Creator<\/strong><\/td>\n<td width=\"5\"><strong>Funder<\/strong><\/td>\n<td width=\"40\"><strong>NICE Knowledge<\/strong><\/td>\n<td width=\"40\"><strong>NICE Skills<\/strong><\/td>\n<td width=\"40\"><strong>NICE Abilities<\/strong><\/td>\n<\/tr>\n<tr>\n<td>1<\/td>\n<td><a href=\"https:\/\/sites.temple.edu\/care\/project-request-form\/\" target=\"_blank\" rel=\"noopener noreferrer\">Privacy, terms &amp; conditions<\/a> *^<\/td>\n<td>2018<\/td>\n<td>372<\/td>\n<td>Dr. Aunshul Rege<\/td>\n<td>NSF CAREER #1453040<\/td>\n<td><strong>K0110<\/strong>-Knowledge of adversarial tactics, techniques, and procedures<\/td>\n<td><strong>S0052<\/strong>-Skill in the use of social engineering techniques. (e.g., phishing, baiting, tailgating, etc.)<\/td>\n<td><strong>A0107<\/strong>-Ability to think like threat actors<\/td>\n<\/tr>\n<tr>\n<td>2<\/td>\n<td><a href=\"https:\/\/sites.temple.edu\/care\/project-request-form\/\" target=\"_blank\" rel=\"noopener noreferrer\">Shoulder surfing<\/a> *^<\/td>\n<td>2018<\/td>\n<td>166<\/td>\n<td>Dr. Aunshul Rege<\/td>\n<td>NSF CAREER #1453040<\/td>\n<td><strong>K0110<\/strong>-Knowledge of adversarial tactics, techniques, and procedures<\/td>\n<td><strong>S0044<\/strong>-Skill in mimicking threat behaviors<br \/>\n<strong>S0052<\/strong>-Skill in the use of social engineering techniques. (e.g., phishing, baiting, tailgating, etc.)<\/td>\n<td><strong>A0074<\/strong>-Ability to collaborate effectively with others<\/td>\n<\/tr>\n<tr>\n<td>3<\/td>\n<td><a href=\"https:\/\/sites.temple.edu\/care\/project-request-form\/\" target=\"_blank\" rel=\"noopener noreferrer\">Pretexting: Laptop distraction<\/a> *^<\/td>\n<td>2018<\/td>\n<td>142<\/td>\n<td>Dr. Aunshul Rege<\/td>\n<td>NSF CAREER #1453040<\/td>\n<td><strong>K0424<\/strong>-Knowledge of denial and deception techniques<\/td>\n<td><strong>S0052<\/strong>-Skill in the use of social engineering techniques. (e.g., phishing, baiting, tailgating, etc.)<br \/>\n<strong>S0070<\/strong>-Skill in talking to others to convey information effectively<\/td>\n<td><strong>A0088<\/strong>-Ability to function effectively in a dynamic, fast-paced environment.<\/td>\n<\/tr>\n<tr>\n<td>4<\/td>\n<td><a href=\"https:\/\/sites.temple.edu\/care\/project-request-form\/\" target=\"_blank\" rel=\"noopener noreferrer\">Pretexting: Group selfie with prop<\/a> *^<\/td>\n<td>2018<\/td>\n<td>123<\/td>\n<td>Dr. Aunshul Rege &amp;<br \/>\nMr. Chris Hadnagy<\/td>\n<td>NSF CAREER #1453040<\/td>\n<td><strong>K0426<\/strong>-Knowledge of dynamic and deliberate targeting<\/td>\n<td><strong>S0052<\/strong>-Skill in the use of social engineering techniques. (e.g., phishing, baiting, tailgating, etc.)<\/td>\n<td><strong>A0107<\/strong>-Ability to think like threat actors<\/td>\n<\/tr>\n<tr>\n<td>5<\/td>\n<td><a href=\"https:\/\/sites.temple.edu\/care\/project-request-form\/\" target=\"_blank\" rel=\"noopener noreferrer\">OSINT: Technical &amp; Physical<\/a> *^<\/td>\n<td>2019<\/td>\n<td>120<\/td>\n<td>Dr. Aunshul Rege<\/td>\n<td>NSF CAREER #1453040<\/td>\n<td><strong>K0603<\/strong>-Knowledge of the ways in which targets or threats use the internet<\/td>\n<td><strong>S0289<\/strong>-Skill in using multiple search engines (e.g. Google, Yahoo, LexisNexis, DataStar) and tools in conducting open-source searches<\/td>\n<td><strong>A0069<\/strong>-Ability to apply collaborative skills and strategies<\/td>\n<\/tr>\n<tr>\n<td>6<\/td>\n<td><a href=\"https:\/\/sites.temple.edu\/care\/project-request-form\/\" target=\"_blank\" rel=\"noopener noreferrer\">Cybersecurity Awareness Public Service Announcement<\/a><\/td>\n<td>2020<\/td>\n<td>77<\/td>\n<td>EDUCAUSE; Modification (instructions\/rubric) &amp; NICE Mapping by Dr. Aunshul Rege<\/td>\n<td>NSF CAREER #1453040<\/td>\n<td><strong>K0004<\/strong>-Knowledge of cybersecurity and privacy principles<\/td>\n<td><strong>S0052<\/strong>-Skill in the use of social engineering techniques. (e.g., phishing, baiting, tailgating, etc.)<br \/>\n<strong>S0070<\/strong>-Skills in talking to others to convey information effectively<\/td>\n<td><strong>A0032<\/strong>-Ability to develop curriculum for use within a virtual environment<br \/>\n<strong>A0171<\/strong>-Ability to conduct training and education needs assessment<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>* Ethics approved<br \/>\n^ Evaluation survey available<\/p>\n<p><!-- Start of StatCounter Code for Default Guide --><span style=\"color: #ffffff\">var sc_project=12070122;<\/span><br \/>\n<span style=\"color: #ffffff\">var sc_invisible=0;<\/span><br \/>\n<span style=\"color: #ffffff\">var sc_security=&#8221;fcd5b96a&#8221;;<\/span><\/p>\n<div class=\"statcounter\"><a title=\"Web Analytics\" href=\"https:\/\/statcounter.com\/\" target=\"_blank\" rel=\"noopener noreferrer\"><img decoding=\"async\" class=\"statcounter\" src=\"https:\/\/c.statcounter.com\/12070122\/0\/fcd5b96a\/1\/\" alt=\"Web Analytics\" \/><\/a><\/div>\n<p><!-- End of Statcounter Code --><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Here you will find cybersecurity experiential learning course projects, datasets, and other materials that are free to use. We ask that you acknowledge any material&#8230;<\/p>\n<div class=\"more-link-wrapper\"><a class=\"more-link\" href=\"https:\/\/sites.temple.edu\/care\/social-engineering\/course-projects\/\">Continue reading<span class=\"screen-reader-text\">Course Projects<\/span><\/a><\/div>\n","protected":false},"author":2224,"featured_media":0,"parent":2765,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"templates\/full-width.php","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"class_list":["post-1225","page","type-page","status-publish","hentry","entry"],"post_mailing_queue_ids":[],"_links":{"self":[{"href":"https:\/\/sites.temple.edu\/care\/wp-json\/wp\/v2\/pages\/1225","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/sites.temple.edu\/care\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.temple.edu\/care\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.temple.edu\/care\/wp-json\/wp\/v2\/users\/2224"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.temple.edu\/care\/wp-json\/wp\/v2\/comments?post=1225"}],"version-history":[{"count":4,"href":"https:\/\/sites.temple.edu\/care\/wp-json\/wp\/v2\/pages\/1225\/revisions"}],"predecessor-version":[{"id":3797,"href":"https:\/\/sites.temple.edu\/care\/wp-json\/wp\/v2\/pages\/1225\/revisions\/3797"}],"up":[{"embeddable":true,"href":"https:\/\/sites.temple.edu\/care\/wp-json\/wp\/v2\/pages\/2765"}],"wp:attachment":[{"href":"https:\/\/sites.temple.edu\/care\/wp-json\/wp\/v2\/media?parent=1225"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}