Scalable learning environments for teaching cybersecurity hands-on
This Innovative Practice full paper describes a technical innovation for scalable teaching of
cybersecurity hands-on classes using interactive learning environments. Hands-on …
cybersecurity hands-on classes using interactive learning environments. Hands-on …
Impact of capture the flag (CTF)-style vs. traditional exercises in an introductory computer security class
SV Cole - Proceedings of the 27th ACM Conference on on …, 2022 - dl.acm.org
The importance of possessing hands-on skills in addition to theoretical knowledge for
cybersecurity researchers and professionals cannot be overstated. Computer security …
cybersecurity researchers and professionals cannot be overstated. Computer security …
Process mining analysis of puzzle-based cybersecurity training
The hands-on cybersecurity training quality is crucial to mitigate cyber threats and attacks
effectively. However, practical cybersecurity training is strongly process-oriented, making the …
effectively. However, practical cybersecurity training is strongly process-oriented, making the …
Automatic Problem Generation for CTF-Style Assessments in IT Forensics Courses
In this experience paper, we present an automated assessment and marking generation
framework to create capture-the-flag (CTF) questions in the context of Information …
framework to create capture-the-flag (CTF) questions in the context of Information …
Using data clustering to reveal trainees' behavior in cybersecurity education
K Dočkalová Burská, JR Mlynárik… - Education and Information …, 2024 - Springer
In cyber security education, hands-on training is a common type of exercise to help raise
awareness and competence, and improve students' cybersecurity skills. To be able to …
awareness and competence, and improve students' cybersecurity skills. To be able to …
Capture the flag for team construction in cybersecurity
Team collaboration among individuals with diverse sets of expertise and skills is essential
for solving complex problems. As part of an interdisciplinary effort, we studied the effects of …
for solving complex problems. As part of an interdisciplinary effort, we studied the effects of …
[HTML][HTML] A step-by-step definition of a reference architecture for cyber ranges
Being on the advent of Industry 5.0, organizations have been progressively incorporating
information technology into their formerly air-gapped operational technology architectures …
information technology into their formerly air-gapped operational technology architectures …
Cyber range and cyber defense exercises: Gamification meets university students
In the last decade, gamification has emerged as a valid alternative to more traditional
learning processes both in academia and for professional training. Gamification has been …
learning processes both in academia and for professional training. Gamification has been …
How to Design a Blue Team Scenario for Beginners on the Example of Brute-Force Attacks on Authentications
A Eipper, D Pöhn - arXiv preprint arXiv:2407.16238, 2024 - arxiv.org
Cyber attacks are ubiquitous and a constantly growing threat in the age of digitization. In
order to protect important data, developers and system administrators must be trained and …
order to protect important data, developers and system administrators must be trained and …
A Comparative Study of Online Cybersecurity Training Platforms
With the rapidly growing number of cybersecurity training solutions, new opportunities have
been introduced for real-world simulated cyber threats to be accessible. It has improved the …
been introduced for real-world simulated cyber threats to be accessible. It has improved the …