Phase 2.
In this phase, we have created, modified and added the content in the currently existing labs and assignment content. Such content and modified Laboratories are useful for the students, and they learn the latest technologies and methods which help them to work in a secure environment. After finalizing the content, we had created a rubric, which constitutes a quality evaluation of the materials. So after content modification and addition, we had created a rubric so that the security specialists can use the rubric to grade and to test the labs and exercises. With this, we came to know how efficient and good our material is. This phase was crucial as it helped us to review our material.
2. Survey of the Literature.
2.1 Literature Perspective.
Over the years, a number of security techniques have been developed that help in handling computer security and in reducing the chances of computer security breach. A security breach is a concept that acts from outside the organization and that ignores and overlooks security policies very smartly, practices and methods relative to information systems security. Third generation techniques include modeling whereas fourth generation methods are based on socio-technical design. So to have a complete idea about the work done by early researchers in this area, the perspective of the literature is taken as vast so that varied areas related to security are covered. .
2.2 Fundamental Literature.
2.2.1 Focus aspect.
1. Security.
Security is the biggest aspect that is kept in mind. Security plays one of the largest roles in today's networks. Therefore, students should learn all aspects of security. So that they can protect themselves from attacks and viruses, worms, etc.
2. Low Cost.
The proposed material also requires very low cost to implement in labs as most of the software that are either free or of very low cost.
3. Power Consumption.
In the proposed method power consumption is also low because of the introduction of virtualization.