[HTML][HTML] Complex yet attainable? An interdisciplinary approach to designing better cyber range exercises

M Glas, G Messmann, G Pernul - Computers & Security, 2024 - Elsevier
The global shortage of cybersecurity professionals poses a daunting challenge for
organizations seeking to protect their assets and data. To counteract this workforce …

Automated feedback for participants of hands-on cybersecurity training

V Švábenský, J Vykopal, P Čeleda, J Dovjak - Education and Information …, 2024 - Springer
Computer-supported learning technologies are essential for conducting hands-on
cybersecurity training. These technologies create environments that emulate a realistic IT …

Train as you fight: evaluating authentic cybersecurity training in cyber ranges

M Glas, M Vielberth, G Pernul - Proceedings of the 2023 CHI Conference …, 2023 - dl.acm.org
Humans can play a decisive role in detecting and mitigating cyber attacks if they possess
sufficient cybersecurity skills and knowledge. Realizing this potential requires effective …

Multi-institutional multi-national studies of Parsons problems

BJ Ericson, JL Pearce, SH Rodger… - Proceedings of the …, 2023 - dl.acm.org
Students are often asked to learn programming by writing code from scratch. However, many
novices struggle to write code and get frustrated when their code does not work. Parsons …

Student assessment in cybersecurity training automated by pattern mining and clustering

V Švábenský, J Vykopal, P Čeleda, K Tkáčik… - Education and …, 2022 - Springer
Hands-on cybersecurity training allows students and professionals to practice various tools
and improve their technical skills. The training occurs in an interactive learning environment …

How universities teach cybersecurity courses online: a systematic literature review

A Ahmed, C Watterson, S Alhashmi… - Frontiers in Computer …, 2024 - frontiersin.org
Introduction Distance learning has seen a significant increase as educational institutions
have shifted toward offering online courses. Although some institutions quickly adapted …

Applying process discovery to cybersecurity training: an experience report

M Macák, R Oslejsek, B Buhnova - 2022 IEEE European …, 2022 - ieeexplore.ieee.org
Quality improvement of practical cybersecurity training is challenging due to the process-
oriented nature of this learning domain. Event logs provide only a sparse preview of …

Process mining analysis of puzzle-based cybersecurity training

M Macák, R Oslejsek, B Buhnova - … of the 27th ACM Conference on on …, 2022 - dl.acm.org
The hands-on cybersecurity training quality is crucial to mitigate cyber threats and attacks
effectively. However, practical cybersecurity training is strongly process-oriented, making the …

Using data clustering to reveal trainees' behavior in cybersecurity education

K Dočkalová Burská, JR Mlynárik… - Education and Information …, 2024 - Springer
In cyber security education, hands-on training is a common type of exercise to help raise
awareness and competence, and improve students' cybersecurity skills. To be able to …

[PDF][PDF] Automated feedback for cybersecurity training

V Švábenský - … Pavel Čeleda. Disertační práce. Masarykova univerzita …, 2022 - is.muni.cz
Cybersecurity students and experts need hands-on training to acquire experience and learn
how to mitigate the current cyber threats. Providing feedback on their learning is a crucial …