Scalable learning environments for teaching cybersecurity hands-on

J Vykopal, P Čeleda, P Seda… - 2021 IEEE Frontiers …, 2021 - ieeexplore.ieee.org
This Innovative Practice full paper describes a technical innovation for scalable teaching of
cybersecurity hands-on classes using interactive learning environments. Hands-on …

Automated feedback for participants of hands-on cybersecurity training

V Švábenský, J Vykopal, P Čeleda, J Dovjak - Education and Information …, 2024 - Springer
Computer-supported learning technologies are essential for conducting hands-on
cybersecurity training. These technologies create environments that emulate a realistic IT …

Student assessment in cybersecurity training automated by pattern mining and clustering

V Švábenský, J Vykopal, P Čeleda, K Tkáčik… - Education and …, 2022 - Springer
Hands-on cybersecurity training allows students and professionals to practice various tools
and improve their technical skills. The training occurs in an interactive learning environment …

[HTML][HTML] Dataset of shell commands used by participants of hands-on cybersecurity training

V Švábenský, J Vykopal, P Seda, P Čeleda - Data in Brief, 2021 - Elsevier
We present a dataset of 13446 shell commands from 175 participants who attended
cybersecurity training and solved assignments in the Linux terminal. Each acquired data …

Smart environment for adaptive learning of cybersecurity skills

J Vykopal, P Seda, V Švábenský… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
Hands-on computing education requires a realistic learning environment that enables
students to gain and deepen their skills. Available learning environments, including virtual …

Detecting unsuccessful students in cybersecurity exercises in two different learning environments

V Švábenský, K Tkáčik, A Birdwell, R Weiss… - arXiv preprint arXiv …, 2024 - arxiv.org
This full paper in the research track evaluates the usage of data logged from cybersecurity
exercises in order to predict students who are potentially at risk of performing poorly. Hands …

Process mining analysis of puzzle-based cybersecurity training

M Macák, R Oslejsek, B Buhnova - … of the 27th ACM Conference on on …, 2022 - dl.acm.org
The hands-on cybersecurity training quality is crucial to mitigate cyber threats and attacks
effectively. However, practical cybersecurity training is strongly process-oriented, making the …

Preventing cheating in hands-on lab assignments

J Vykopal, V Švábenský, P Seda… - Proceedings of the 53rd …, 2022 - dl.acm.org
Networking, operating systems, and cybersecurity skills are exercised best in an authentic
environment. Students work with real systems and tools in a lab environment and complete …

Designing adaptive cybersecurity hands-on training

P Seda, J Vykopal, P Čeleda… - 2022 IEEE Frontiers in …, 2022 - ieeexplore.ieee.org
This Research To Practice Full Paper presents an instructor guide and a tool to improve the
creation of cybersecurity hands-on training with adaptive learning support. Adaptive learning …

An Approach to Discover Students' Conceptions in Online Computing Education: A Case Study of Students' Understanding of Virtual Memory

S Pamplona, J Bravo-Agapito, I Seoane - IEEE Access, 2024 - ieeexplore.ieee.org
This study presents a new approach for discovering conceptions among online computer
science students. The research objectives were 1) to discover students' conceptions of …