[HTML][HTML] Cyber security training for critical infrastructure protection: A literature review

N Chowdhury, V Gkioulos - Computer Science Review, 2021 - Elsevier
Introduction: Today, cyber-security curricula are available across educational types and
levels, including a vast array of programs and modules tailored to specific sectors of industry …

Exploring cybersecurity education and training techniques: a comprehensive review of traditional, virtual reality, and augmented reality approaches

AM Alnajim, S Habib, M Islam, HS AlRawashdeh… - Symmetry, 2023 - mdpi.com
Considering the alarming increase in cyberattacks and their potential financial implications,
the importance of cybersecurity education and training cannot be overstated. This paper …

Teaching cybersecurity using the cloud

K Salah, M Hammoud… - IEEE Transactions on …, 2015 - ieeexplore.ieee.org
Cloud computing platforms can be highly attractive to conduct course assignments and
empower students with valuable and indispensable hands-on experience. In particular, the …

[PDF][PDF] Cyber security teaching and learning laboratories: A survey

L Topham, K Kifayat, YA Younis, Q Shi, B Askwith - Information & Security, 2016 - procon.bg
Currently there is a great demand for trained cyber security professionals with hands-on
skills. The need for these professionals stems from our reliance on technology in many …

Cyber range for research-inspired learning of “attack defense by pretense” principle and practice

KB Vekaria, P Calyam, S Wang… - IEEE Transactions …, 2021 - ieeexplore.ieee.org
There is an increasing trend in cloud adoption of enterprise applications in, for example,
manufacturing, healthcare, and finance. Such applications are routinely subject to targeted …

Harnessing the cloud for teaching cybersecurity

K Salah - Proceedings of the 45th ACM technical symposium on …, 2014 - dl.acm.org
Cloud computing has become an attractive paradigm for many organizations in government,
industry as well as academia. In academia, the cloud can offer instructors and students …

Analysis of Interdependency of ICCT Underlying Technologies and Related New Research Opportunities with Special Emphasis on Cyber Security and Forensic …

PS Aithal, S Aithal - Proceedings of the Conference on Future …, 2020 - papers.ssrn.com
Abstract Information Communication and Computation technology (ICCT) is a 21st-century
name of Information Communication Technology (ICT) that covers a broader definition of …

Method and system for controlling remote session on computer systems

J Schmidt, S Goeckel, J Allsop - US Patent 10,075,532, 2018 - Google Patents
Method and devices are provided for controlling access of a device to a remote desktop or
an application running on a remote desktop or application server using a remoting protocol …

[PDF][PDF] Exploring Barriers and Challenges to Accessibility in Virtual Laboratories: A Preliminary Review

F Deriba, M Saqr, M Tukiainen - Proceedings of the Technology …, 2023 - ceur-ws.org
Virtual laboratories (VL) have become an essential tool for educational sectors, allowing
students to develop practical skills in a remote environment. However, the accessibility of VL …

[PDF][PDF] A container-based virtual laboratory for internet security e-learning

J Sianipar, C Willems, C Meinel - … Journal of Learning and Teaching. IJLT, 2016 - ijlt.org
Tele-Lab is a platform for e-learning in Internet security with a special focus on teaching by
means of handson experience. A virtual laboratory is implemented for the provision of …