Securing the human: a review of literature on broadening diversity in cybersecurity education

X Mountrouidou, D Vosen, C Kari, MQ Azhar… - Proceedings of the …, 2019 - dl.acm.org
Recent global demand for cybersecurity professionals is promising, with the US job growth
rate at 28%, three times the national average [1]. In a global survey, 2,300 security …

A Holistic Analysis of Internet of Things (IoT) Security: Principles, Practices, and New Perspectives

M Hossain, G Kayas, R Hasan, A Skjellum, S Noor… - Future Internet, 2024 - mdpi.com
Driven by the rapid escalation of its utilization, as well as ramping commercialization,
Internet of Things (IoT) devices increasingly face security threats. Apart from denial of …

Cybersecurity knowledge and skills taught in capture the flag challenges

V Švábenský, P Čeleda, J Vykopal, S Brišáková - Computers & Security, 2021 - Elsevier
Capture the Flag challenges are a popular form of cybersecurity education, where students
solve hands-on tasks in an informal, game-like setting. The tasks feature diverse …

Modeling and executing cyber security exercise scenarios in cyber ranges

MM Yamin, B Katt - Computers & Security, 2022 - Elsevier
The skill shortage in global cybersecurity is a well-known problem; to overcome this issue,
cyber ranges have been developed. These ranges provide a platform for conducting …

{RE-Mind}: a first look inside the mind of a reverse engineer

A Mantovani, S Aonzo, Y Fratantonio… - 31st USENIX Security …, 2022 - usenix.org
When a human activity requires a lot of expertise and very specialized cognitive skills that
are poorly understood by the general population, it is often consideredan art.'Different …

Security scenario generator ({{{{{SecGen)}}}}}: A framework for generating randomly vulnerable rich-scenario {VMs} for learning computer security and hosting {CTF} …

ZC Schreuders, T Shaw, M Shan-A-Khuda… - … USENIX Workshop on …, 2017 - usenix.org
Computer security students benefit from hands-on experience applying security tools and
techniques to attack and defend vulnerable systems. Virtual machines (VMs) provide an …

Sherlocked: A detective-themed serious game for cyber security education

A Jaffray, C Finn, JRC Nurse - Human Aspects of Information Security and …, 2021 - Springer
Abstract Gamification and Serious Games are progressively being used over a host of fields,
particularly to support education. Such games provide a new way to engage students with …

Adapting CTF challenges into virtual cybersecurity learning environments

S Karagiannis, E Magkos - Information & Computer Security, 2020 - emerald.com
Adapting CTF challenges into virtual cybersecurity learning environments | Emerald Insight
Books and journals Case studies Expert Briefings Open Access Publish with us Advanced …

Teaching a hands-on mobile and wireless cybersecurity course

TJ OConnor, C Stricklan - Proceedings of the 26th ACM Conference on …, 2021 - dl.acm.org
The combination of theory-based and practical hands-on learning represents a powerful
approach for cybersecurity education. Placing the student in the adversarial mindset …

Learning analytics perspective: Evidencing learning from digital datasets in cybersecurity exercises

K Maennel - 2020 IEEE European symposium on security and …, 2020 - ieeexplore.ieee.org
Cybersecurity exercises are gaining in popularity in university curricula and professional
training paths and are seen as an effective teaching method. Such exercises provide digital …