Loading…
Welcome to the GPN & ARE-ON Joint Conference 2026 schedule. Use this page to browse sessions, view speaker and session details, and build your personal agenda for June 22–24 in Rogers, Arkansas. Check back through May as additional sessions and details are added.
Monday June 22, 2026 12:30pm - 3:00pm CDT
Max Attendee Tickets Available:25
*IMPORTANT REGISTRATION INFORMATION
Attendees must first complete their Joint Conference registration prior to attending this workshop. In addition, pre-registration for this workshop session is required at: https://gpnandareonjointconference2026.eventbrite.com/

Overview
To support modern instruction in cybersecurity, networking, wireless communications, and advanced computing disciplines, this proposal recommends implementing segmented, locally managed academic technology environments. These environments are intentionally designed to balance security, performance, wireless mobility, operational control, and instructional flexibility while remaining isolated from institutional production systems.
Rationale
Cybersecurity, networking, and wireless technology programs require learning spaces that safely support activities such as simulated attacks, red/blue team exercises, wireless traffic analysis, secure Wi‑Fi design, and infrastructure experimentation. A deliberately segmented network architecture—including both wired and wireless domains—significantly reduces risk by isolating instructional platforms, student endpoints, shared services, and departmental systems into distinct security zones. This design limits lateral movement, reduces the blast radius of potential security events, and ensures that hands‑on labs do not expose enterprise systems or sensitive institutional data.
Proposed Architecture
The proposed design establishes each classroom or laboratory as an independent, firewall‑protected environment supported by localized switching, wireless access infrastructure, and on‑premise compute resources. Key features include:
  • Network and Wireless Segmentation: Instructional systems, wired and wireless student endpoints, servers, and lab services reside in isolated zones, separated from the broader enterprise network.
  • Dedicated Instructional Wireless: Lab‑specific wireless networks enable instruction in Wi‑Fi design, authentication, encryption, roaming, interference analysis, and wireless security testing without impacting campus production wireless services.
  • Internal Firewalls and Local Switching: Each environment is protected by internal controls while remaining centrally observable and manageable.
  • Localized Virtualization and Compute: On‑premise infrastructure supports virtual machines, private cloud emulation, container platforms, and high‑performance or render‑dense workloads.
  • Edge‑Level Administrative Control: Configuration management, access control, monitoring, and incident response for both wired and wireless environments are managed locally, enabling rapid reconfiguration and strong security containment.
Instructional Capabilities
Within this architecture, faculty can support realistic, industry‑aligned instructional scenarios, including:
  • Cyber defense and offensive security labs (wired and wireless)
  • Simulated breaches and red/blue team exercises
  • Wireless security testing, monitoring, and hardening
  • Digital forensics and incident response
  • Secure network and Wi‑Fi architecture design
  • AI, virtualization, and data‑intensive computing workloads
  • Relational database design and administration
  • Use of regulated data sets, specialized hardware, and licensed software
All activities are conducted while constraining lateral movement and safeguarding institutional systems and data.
Benefits
This approach delivers clear academic and operational value:
  • Enhanced Security: Strong containment for wired and wireless experimentation environments
  • Improved Performance: Low‑latency access through local infrastructure
  • Wireless Instructional Depth: Safe, hands‑on experience with real‑world Wi‑Fi technologies
  • Operational Oversight: Improved visibility and control across lab environments
  • Scalability: Modular design expandable across programs and facilities
Conclusion
By combining robust network and wireless segmentation with locally deployed infrastructure, the institution can provide a secure, reliable, and scalable foundation for advanced technical education. This model closely mirrors real‑world enterprise and cybersecurity operations while protecting institutional assets, making it ideally suited for cybersecurity, networking, wireless, and multidisciplinary computing programs.
Speakers
SR

Shankar Ravi

Associate Professor, Computer Science, Northwest Arkansas Community College

Monday June 22, 2026 12:30pm - 3:00pm CDT
NWACC Conference Room 2 1 College Dr, Bentonville, AR 72712

Log in to save this to your schedule, view media, leave feedback and see who's attending!

Share Modal

Share this link via

Or copy link