Integrating Cyber Range Technologies and Certification Programs to Improve Cybersecurity Training Programs

Today more than ever, computer science students with actionable security skills are in high demand and this requirement is not expected to change in the near future [1]. Schools that provide traditional computer science education programs do a satisfactory job of exposing students to cybersecurity principles and some schools small labs that provide training. Industry essential cyber skills aren’t traditionally taught inside most undergraduate and graduate programs [2]. Recent college graduates are forced to enroll in numerous certification programs in order to develop critical industry useful hands-on skills that are not taught in college [1]. What is needed today is a comprehensive training environment with extensible configurations for deeper learning and adaptive teaching. This will enable students to gain firsthand experience with the tools for the attack and defense of systems. We present the results from an Action Research project focused on improving cybersecurity training by introducing elements of gamification and a cyber range.

[1]  D. Krathwohl A Revision of Bloom's Taxonomy: An Overview , 2002 .

[2]  Dale C. Rowe,et al.  The role of cyber-security in information technology education , 2011, SIGITE '11.

[3]  Todd R. Andel,et al.  A Systems Approach to Cyber Assurance Education , 2013, InfoSecCD.

[4]  Lennart E. Nacke,et al.  From game design elements to gamefulness: defining "gamification" , 2011, MindTrek.

[5]  Ronald E. Jones,et al.  Do Hands-On, Technology-Based Activities Enhance Learning by Reinforcing Cognitive Knowledge and Retention? , 1990 .

[6]  Ali Bicak,et al.  Cybersecurity Curriculum Development: Introducing Specialties in a Graduate Program , 2014 .

[7]  Karl M. Kapp,et al.  A Gamified Approach on Learning Logic Gates to Improve Student’s Engagement , 2012, IOP Conference Series: Materials Science and Engineering.

[8]  D. Kolb,et al.  Learning Styles and Learning Spaces: Enhancing Experiential Learning in Higher Education , 2005 .

[9]  Rossouw von Solms,et al.  Information Security Education in South Africa , 2010, Inf. Manag. Comput. Secur..

[10]  Jessica L. Wildman,et al.  Using Simulation-Based Training to Enhance Management Education , 2009 .

[11]  Galia Angelova,et al.  Gamification in Education: A Systematic Mapping Study , 2015, J. Educ. Technol. Soc..

[12]  Benjamin S. Bloom,et al.  Taxonomy of Educational Objectives: The Classification of Educational Goals. , 1957 .

[13]  E. Simpson THE CLASSIFICATION OF EDUCATIONAL OBJECTIVES, PSYCHOMOTOR DOMAIN. , 1966 .

[14]  K. Lewin Action Research and Minority Problems , 1946 .

[15]  Barry M. Lunt,et al.  Integrating Information Assurance and Security into IT Education: A Look at the Model Curriculum and Emerging Practice , 2006, J. Inf. Technol. Educ..

[16]  Mark A. Harris,et al.  Using Bloom's and Webb's Taxonomies to Integrate Emerging Cybersecurity Topics into a Computing Curriculum , 2015, J. Inf. Syst. Educ..