Scalable learning environments for teaching cybersecurity hands-on

J Vykopal, P Čeleda, P Seda… - 2021 IEEE Frontiers …, 2021 - ieeexplore.ieee.org
This Innovative Practice full paper describes a technical innovation for scalable teaching of
cybersecurity hands-on classes using interactive learning environments. Hands-on …

Impact of capture the flag (CTF)-style vs. traditional exercises in an introductory computer security class

SV Cole - Proceedings of the 27th ACM Conference on on …, 2022 - dl.acm.org
The importance of possessing hands-on skills in addition to theoretical knowledge for
cybersecurity researchers and professionals cannot be overstated. Computer security …

Process mining analysis of puzzle-based cybersecurity training

M Macák, R Oslejsek, B Buhnova - … of the 27th ACM Conference on on …, 2022 - dl.acm.org
The hands-on cybersecurity training quality is crucial to mitigate cyber threats and attacks
effectively. However, practical cybersecurity training is strongly process-oriented, making the …

Automatic Problem Generation for CTF-Style Assessments in IT Forensics Courses

S Minagar, A Sakzad - Proceedings of the 2023 Conference on …, 2023 - dl.acm.org
In this experience paper, we present an automated assessment and marking generation
framework to create capture-the-flag (CTF) questions in the context of Information …

Using data clustering to reveal trainees' behavior in cybersecurity education

K Dočkalová Burská, JR Mlynárik… - Education and Information …, 2024 - Springer
In cyber security education, hands-on training is a common type of exercise to help raise
awareness and competence, and improve students' cybersecurity skills. To be able to …

Capture the flag for team construction in cybersecurity

SY Chang, K Yoon, S Wuthier, K Zhang - arXiv preprint arXiv:2206.08971, 2022 - arxiv.org
Team collaboration among individuals with diverse sets of expertise and skills is essential
for solving complex problems. As part of an interdisciplinary effort, we studied the effects of …

[HTML][HTML] A step-by-step definition of a reference architecture for cyber ranges

V Kampourakis, V Gkioulos, S Katsikas - Journal of Information Security and …, 2025 - Elsevier
Being on the advent of Industry 5.0, organizations have been progressively incorporating
information technology into their formerly air-gapped operational technology architectures …

Cyber range and cyber defense exercises: Gamification meets university students

E Russo, M Ribaudo, A Orlich, G Longo… - Proceedings of the 2nd …, 2023 - dl.acm.org
In the last decade, gamification has emerged as a valid alternative to more traditional
learning processes both in academia and for professional training. Gamification has been …

How to Design a Blue Team Scenario for Beginners on the Example of Brute-Force Attacks on Authentications

A Eipper, D Pöhn - arXiv preprint arXiv:2407.16238, 2024 - arxiv.org
Cyber attacks are ubiquitous and a constantly growing threat in the age of digitization. In
order to protect important data, developers and system administrators must be trained and …

A Comparative Study of Online Cybersecurity Training Platforms

A Rehaimi, Y Sadqi, Y Maleh - … on Verification and Evaluation of Computer …, 2023 - Springer
With the rapidly growing number of cybersecurity training solutions, new opportunities have
been introduced for real-world simulated cyber threats to be accessible. It has improved the …