Skip to main content

Integrating Cyber Range Technologies and Certification Programs to Improve Cybersecurity Training Programs

  • Conference paper
  • First Online:
The Challenges of the Digital Transformation in Education (ICL 2018)

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 917))

Included in the following conference series:

Abstract

Today more than ever, computer science students with actionable security skills are in high demand and this requirement is not expected to change in the near future [1]. Schools that provide traditional computer science education programs do a satisfactory job of exposing students to cybersecurity principles and some schools small labs that provide training. Industry essential cyber skills aren’t traditionally taught inside most undergraduate and graduate programs [2]. Recent college graduates are forced to enroll in numerous certification programs in order to develop critical industry useful hands-on skills that are not taught in college [1]. What is needed today is a comprehensive training environment with extensible configurations for deeper learning and adaptive teaching. This will enable students to gain firsthand experience with the tools for the attack and defense of systems. We present the results from an Action Research project focused on improving cybersecurity training by introducing elements of gamification and a cyber range.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 259.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 329.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Cybersecurity Training Online, Combat Threats with Cybersecurity Training. www.villanovau.com/resources/iss/cyber-security-training/#.Wrm05IjwbIU. 20 July 2018

  2. While, S.: Cybersecurity Skills Aren’t Taught in College. IDG Communications, Inc., www.cio.com, 13 Dec 2016

  3. Bloom, B.S., Engelhart, M.D., Furst, E.J., Hill, W.H., Krathwohl, D.R.: Taxonomy of Educational Objectives: The Classification of Educational Goals. Handbook I: Cognitive Domain. David McKay Company, New York (1956)

    Google Scholar 

  4. Krathwohl, D.R.: A revision of Bloom’s taxonomy: an overview. In: Theory Into Practice, vol. 41, issue 4, Special Issue: Revising Bloom’s Taxonomy, pp. 212–218. Routledge, London (2002)

    Article  Google Scholar 

  5. Leaman, C.: Improving learning and transfer: using brain science to drive successful learning transfer. In: Training: The Source for Professional Development. http://trainingmag.com/improving-learning-transfer. (2014)

  6. Jones, R., Korwin, A.: Do hands-on, technology-based activities enhance learning by reinforcing cognitive knowledge and retention? J. Technol. Educ. 1(2) (1990)

    Google Scholar 

  7. Andel, T., McDonald, J.: A systems approach to cyber assurance education. In: Proceedings of infoSecCD’13: Information Security Curriculum Development Conference (2013)

    Google Scholar 

  8. Bicak, A., Liu, X., Murphy, D.: Cybersecurity curriculum development: introducing specialties in a graduate program. Inf. Syst. Educ. J. 13(3), 99 (2015)

    Google Scholar 

  9. Dark, M., Ekstrom, J., Lunt, B.: Integration of information assurance and security into education: a look at the model curriculum and emerging practice. J. Inf. Technol. Educ. 5(5), 389–403 (2006)

    Google Scholar 

  10. Futcher, L., Schroder, C., Von Solms, R.: Information security education in South Africa. Inf. Manage. Comput. Secur. 18(5), 366–374 (2010)

    Article  Google Scholar 

  11. Rowe, D., Lunt, B., Ekstrom, J.: The role of cyber-security in information technology education. In: Proceedings of the 2011 Conference on Information Technology Education, pp. 113–122 (2011)

    Google Scholar 

  12. Harris, M., Patten, K.: Using Bloom’s and Webb’s taxonomies to integrate emergeing cybersecurity topics into a computing curriculum. J. Inf. Syst. Educ. 26(3), 219–234 (2015)

    Google Scholar 

  13. Simpson, E.: The Classification of Educational Objectives in the Psychomotor Domain. Gryphon House, Washington, DC (1972)

    Google Scholar 

  14. Dave, R.: Psychomotor Levels in Developing and Writing Behavioral Objectives. In: Armstrong, R.J. (ed.) pp. 20–21. Educational Innovators Press. Tuscon, AZ (1970)

    Google Scholar 

  15. Wikipedia: Definition of Learning. https://en.wikipedia.org/wiki/Learning

  16. Transfer of Learning Slide deck

    Google Scholar 

  17. Kolb, D.A., Kolb, A.Y.: Learning Styles and Learning Spaces: Enhancing Experiential Learning in Higher Education. In: Academy of Management Learning and Education, vol. 4, issue 2, pp. 198–212. Academy of Management, Briarcliff Manor (2005)

    Article  MathSciNet  Google Scholar 

  18. Salas, E., Wildman, J.L., Piccolo, R.F.: Using simulation-based training to enhance management education. In: Academy of Management Learning & Education, vol. 8, issue. 4, pp. 559–573, Academy of Management, Briarcliff Manor (2009)

    Google Scholar 

  19. Stanford University: Speaking of Teaching: Teaching with Cases. In: Stanford University Newsletter on Teaching, Winter Edition, vol. 5, issue 2, Stanford (1994)

    Google Scholar 

  20. Deterding, S., Dixon, D., Khaled, R., Nacke, L.: From game design elements to gamefulness: defining “Gamification.” In: Laugmayr, A., Franssilia, H., Safran, C., Hammouda, I. (eds.) MindTrek 2011: Proceedings of the 15th International Academic MindTrek Conference: Envisioning Future Media Environments, pp. 9–15. Association for Computing Machinery, New York (2011)

    Google Scholar 

  21. Dicheva, D., Dichev, C., Agre, G., Angelova, G.: Gamification in education: asystematic mapping study. In: Educational Technology and Society, vol. 18, issue 3, pp. 75–88. Athabasca, Canada (2015)

    Google Scholar 

  22. Kapp, K.: The Gamification of Learning and Instruction: Game-Based Methods and Strategies for Training and Education. Pfeiffer, San Francisco (2012)

    Google Scholar 

  23. Lewin, K.: Action research and minority problems. J. Soc. Issues 2, 34–46 (1946)

    Article  Google Scholar 

  24. Buchanan, L., Wolanczyk, F., Zinghini, F.: Blending Bloom’s taxonomy and serious game design. In: Proceedings of 2011 International Conference on Security and Management. Las Vegas, NV (2011)

    Google Scholar 

  25. Damn Vulnerable Web Application. www.dvwa.co.uk

  26. Smartphone Pentest Framework. www.bulbsecurity.com

  27. https://www.wday.com/news/4424170-ethical-hackers-expose-businesses-security-problems

  28. https://www.mprnews.org/story/2018/04/09/class-combats-cyber-crime-by-promoting-ethical-hacking

  29. https://www.usnews.com/news/best-states/north-dakota/articles/2018-04-21/north-dakota-class-combats-cybercrime-with-hacking-skills

  30. https://www.indianagazette.com/leisure/class-members-combat-cybercrime-by-learning-advanced-hacking-skills/article_197c1790-caa5-58ba-9e35-792938ac5594.html

  31. Webster’s Dictionary for Learning (2015)

    Google Scholar 

  32. Stanford University: Speaking of Teaching: Problem-Based Learning. In: Stanford University Newsletter on Teaching, Winter Edition, vol. 11, issue 1, Stanford (2001)

    Google Scholar 

  33. Armstrong, E.: Case Based Teaching: Overview: Advantages of the Case Based Approach. http://pedicases.org/teaching/overview/approach.html

  34. Christensen, C.R.: Teaching with cases at the Harvard Business School. In: Barnes, L., Christensen, C.R., Hansen, A. (eds.) Teaching and the Case Method, 3rd Edition, p. 34. Harvard Business School Press, Boston (1994)

    Google Scholar 

  35. USMC Systems Approach to Training and Education

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Terry Traylor .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Fenton, D., Traylor, T., Hokanson, G., Straub, J. (2019). Integrating Cyber Range Technologies and Certification Programs to Improve Cybersecurity Training Programs. In: Auer, M., Tsiatsos, T. (eds) The Challenges of the Digital Transformation in Education. ICL 2018. Advances in Intelligent Systems and Computing, vol 917. Springer, Cham. https://doi.org/10.1007/978-3-030-11935-5_60

Download citation

Publish with us

Policies and ethics