Max Attendee Tickets Available:25
*IMPORTANT REGISTRATION INFORMATIONAttendees must first complete their Joint Conference registration prior to attending this workshop. In addition, pre-registration for this workshop session is required at:
https://gpnandareonjointconference2026.eventbrite.com/OverviewTo support modern instruction in cybersecurity, networking, wireless communications, and advanced computing disciplines, this proposal recommends implementing segmented, locally managed academic technology environments. These environments are intentionally designed to balance security, performance, wireless mobility, operational control, and instructional flexibility while remaining isolated from institutional production systems.
RationaleCybersecurity, networking, and wireless technology programs require learning spaces that safely support activities such as simulated attacks, red/blue team exercises, wireless traffic analysis, secure Wi‑Fi design, and infrastructure experimentation. A deliberately segmented network architecture—including both wired and wireless domains—significantly reduces risk by isolating instructional platforms, student endpoints, shared services, and departmental systems into distinct security zones. This design limits lateral movement, reduces the blast radius of potential security events, and ensures that hands‑on labs do not expose enterprise systems or sensitive institutional data.
Proposed ArchitectureThe proposed design establishes each classroom or laboratory as an independent, firewall‑protected environment supported by localized switching, wireless access infrastructure, and on‑premise compute resources. Key features include:
- Network and Wireless Segmentation: Instructional systems, wired and wireless student endpoints, servers, and lab services reside in isolated zones, separated from the broader enterprise network.
- Dedicated Instructional Wireless: Lab‑specific wireless networks enable instruction in Wi‑Fi design, authentication, encryption, roaming, interference analysis, and wireless security testing without impacting campus production wireless services.
- Internal Firewalls and Local Switching: Each environment is protected by internal controls while remaining centrally observable and manageable.
- Localized Virtualization and Compute: On‑premise infrastructure supports virtual machines, private cloud emulation, container platforms, and high‑performance or render‑dense workloads.
- Edge‑Level Administrative Control: Configuration management, access control, monitoring, and incident response for both wired and wireless environments are managed locally, enabling rapid reconfiguration and strong security containment.
Instructional CapabilitiesWithin this architecture, faculty can support realistic, industry‑aligned instructional scenarios, including:
- Cyber defense and offensive security labs (wired and wireless)
- Simulated breaches and red/blue team exercises
- Wireless security testing, monitoring, and hardening
- Digital forensics and incident response
- Secure network and Wi‑Fi architecture design
- AI, virtualization, and data‑intensive computing workloads
- Relational database design and administration
- Use of regulated data sets, specialized hardware, and licensed software
All activities are conducted while constraining lateral movement and safeguarding institutional systems and data.
BenefitsThis approach delivers clear academic and operational value:
- Enhanced Security: Strong containment for wired and wireless experimentation environments
- Improved Performance: Low‑latency access through local infrastructure
- Wireless Instructional Depth: Safe, hands‑on experience with real‑world Wi‑Fi technologies
- Operational Oversight: Improved visibility and control across lab environments
- Scalability: Modular design expandable across programs and facilities
ConclusionBy combining robust network and wireless segmentation with locally deployed infrastructure, the institution can provide a secure, reliable, and scalable foundation for advanced technical education. This model closely mirrors real‑world enterprise and cybersecurity operations while protecting institutional assets, making it ideally suited for cybersecurity, networking, wireless, and multidisciplinary computing programs.