Abstract
This study explores the relationship between the design of cyber range scenarios and the objectives of classroom teaching, elucidating the significant role of cyber range in cybersecurity education. It analyzes one workshop session as a teaching case by discussing the principles, strategies, key elements, and actual outcomes of experimental courses across various themes. The authors suggest that cyber range design should put focus on interactivity, timeliness, and engagement, and be closely aligned with students’ prior cybersecurity knowledge. An evaluation of students’ performance and feedback during their cyber range training is discussed.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Kwok, L.-F., Chen, Y., Lam, S.: Technology-enhanced cybersecurity education: a VPET approach. In: Cheung, S.K.S., Wang, F.L., Paoprasert, N., Charnsethikul, P., Li, K.C., Phusavat, K. (eds.) ICTE 2023. CCIS, vol. 1974, pp. 20–31. Springer, Singapore (2023). https://doi.org/10.1007/978-981-99-8255-4_3
Parrish, A., et al.: Global perspectives on cybersecurity education for 2030: a case for a meta-discipline. In: Proceedings Companion of the 23rd Annual ACM Conference on Innovation and Technology in Computer Science Education, pp. 36–54. Association for Computing Machinery (ACM), New York (2018)
Wang, X.: Research on the teaching reform of cyber security courses. Comput. Knowl. Technol. 12(35) (2016)
Dark, M., Mirkovic, J.: Evaluation theory and practice applied to cybersecurity education. IEEE Secur. Priv. 13(2), 75–80 (2015)
Payne, B.K., Mayes, L., Paredes, T., Smith, E., Wu, H., **n, C.: Applying high impact practices in an interdisciplinary cybersecurity program. J. Cybersecur. Educ. Res. Pract. 2020(2) (2021)
Wang, H., Song, L.: A brief analysis of the concept, classification and system architecture of cyber ranges. Secrecy Sci. Technol. (000–006) (2021)
Kavallieratos, G., Katsikas, S.K., Gkioulos, V.: Towards a cyber-physical range. In: Proceedings of the 5th on Cyber-Physical System Security Workshop, CPSS 2019, p. 2534. Association for Computing Machinery (ACM), New York (2019)
Ferguson, B., Tall, A., Olsen, D.: National cyber range overview. In: 2014 IEEE Military Communications Conference, pp. 123–128. IEEE (2014)
**a, P.: Reform of network security technology practice teaching system based on virtual simulation training platform. In: 2020 International Wireless Communications and Mobile Computing (IWCMC), pp. 199–203 (2020)
Tirado-Morueta, R., Ceada-Garrido, Y., Barragán, A.J., Enrique, J.M., Andujar, J.M.: Factors explaining students’ engagement and self-reported outcomes in a project-based learning case. J. Educ. Res. 115(6), 333–348 (2022)
Reddy, G.N., Reddy, G.J.: A study of cyber security challenges and its emerging trends on latest technologies. ar**v preprint ar**v:1402.1842 (2014)
Kam, H.-J., Menard, P., Ormond, D., Crossler, R.E.: Cultivating cybersecurity learning: an integration of self-determination and flow. Comput. Secur. 96, 101875 (2020)
Li, J.: Research on teaching cyber security course in colleges. J. Huaibei Coal Ind. Teach. Coll. (Nat. Sci.) 30(1), 94–96 (2009)
Dawson, J., Thomson, R.: The future cybersecurity workforce: going beyond technical skills for successful cyber performance. Front. Psychol. 9, 284332 (2018)
Chen, Y., Tao, T.: The design of evaluation index for learning-oriented classroom teaching. Curric. Teach. Mater. Method (2016)
Cai, H.M., Xu, X.D.: Construction of quality evaluation system of classroom teaching in colleges and universities. Res. High. Educ. Eng. 3, 177–180 (2014)
Acknowledgments
This study is partially supported by the Enhancement and Start-up Grant Scheme for Self-financing Post-secondary Education (ESGS/2021/APP-19).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2024 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Yi, C., Wang, W., Kwok, LF. (2024). Analysis of Cyber Range Scenario Design. In: Ma, W.W.K., Li, C., Fan, C.W., U, L.H., Lu, A. (eds) Blended Learning. Intelligent Computing in Education. ICBL 2024. Lecture Notes in Computer Science, vol 14797. Springer, Singapore. https://doi.org/10.1007/978-981-97-4442-8_25
Download citation
DOI: https://doi.org/10.1007/978-981-97-4442-8_25
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-97-4441-1
Online ISBN: 978-981-97-4442-8
eBook Packages: Computer ScienceComputer Science (R0)