Scalable learning environments for teaching cybersecurity hands-on
This Innovative Practice full paper describes a technical innovation for scalable teaching of
cybersecurity hands-on classes using interactive learning environments. Hands-on …
cybersecurity hands-on classes using interactive learning environments. Hands-on …
Automated feedback for participants of hands-on cybersecurity training
Computer-supported learning technologies are essential for conducting hands-on
cybersecurity training. These technologies create environments that emulate a realistic IT …
cybersecurity training. These technologies create environments that emulate a realistic IT …
Student assessment in cybersecurity training automated by pattern mining and clustering
Hands-on cybersecurity training allows students and professionals to practice various tools
and improve their technical skills. The training occurs in an interactive learning environment …
and improve their technical skills. The training occurs in an interactive learning environment …
[HTML][HTML] Dataset of shell commands used by participants of hands-on cybersecurity training
We present a dataset of 13446 shell commands from 175 participants who attended
cybersecurity training and solved assignments in the Linux terminal. Each acquired data …
cybersecurity training and solved assignments in the Linux terminal. Each acquired data …
Smart environment for adaptive learning of cybersecurity skills
Hands-on computing education requires a realistic learning environment that enables
students to gain and deepen their skills. Available learning environments, including virtual …
students to gain and deepen their skills. Available learning environments, including virtual …
Detecting unsuccessful students in cybersecurity exercises in two different learning environments
V Švábenský, K Tkáčik, A Birdwell, R Weiss… - arxiv preprint arxiv …, 2024 - arxiv.org
This full paper in the research track evaluates the usage of data logged from cybersecurity
exercises in order to predict students who are potentially at risk of performing poorly. Hands …
exercises in order to predict students who are potentially at risk of performing poorly. Hands …
Process mining analysis of puzzle-based cybersecurity training
The hands-on cybersecurity training quality is crucial to mitigate cyber threats and attacks
effectively. However, practical cybersecurity training is strongly process-oriented, making the …
effectively. However, practical cybersecurity training is strongly process-oriented, making the …
Preventing cheating in hands-on lab assignments
Networking, operating systems, and cybersecurity skills are exercised best in an authentic
environment. Students work with real systems and tools in a lab environment and complete …
environment. Students work with real systems and tools in a lab environment and complete …
Designing adaptive cybersecurity hands-on training
This Research To Practice Full Paper presents an instructor guide and a tool to improve the
creation of cybersecurity hands-on training with adaptive learning support. Adaptive learning …
creation of cybersecurity hands-on training with adaptive learning support. Adaptive learning …
An Approach to Discover Students' Conceptions in Online Computing Education: A Case Study of Students' Understanding of Virtual Memory
This study presents a new approach for discovering conceptions among online computer
science students. The research objectives were 1) to discover students' conceptions of …
science students. The research objectives were 1) to discover students' conceptions of …