Abstract
Today more than ever, computer science students with actionable security skills are in high demand and this requirement is not expected to change in the near future [1]. Schools that provide traditional computer science education programs do a satisfactory job of exposing students to cybersecurity principles and some schools small labs that provide training. Industry essential cyber skills aren’t traditionally taught inside most undergraduate and graduate programs [2]. Recent college graduates are forced to enroll in numerous certification programs in order to develop critical industry useful hands-on skills that are not taught in college [1]. What is needed today is a comprehensive training environment with extensible configurations for deeper learning and adaptive teaching. This will enable students to gain firsthand experience with the tools for the attack and defense of systems. We present the results from an Action Research project focused on improving cybersecurity training by introducing elements of gamification and a cyber range.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Cybersecurity Training Online, Combat Threats with Cybersecurity Training. www.villanovau.com/resources/iss/cyber-security-training/#.Wrm05IjwbIU. 20 July 2018
While, S.: Cybersecurity Skills Aren’t Taught in College. IDG Communications, Inc., www.cio.com, 13 Dec 2016
Bloom, B.S., Engelhart, M.D., Furst, E.J., Hill, W.H., Krathwohl, D.R.: Taxonomy of Educational Objectives: The Classification of Educational Goals. Handbook I: Cognitive Domain. David McKay Company, New York (1956)
Krathwohl, D.R.: A revision of Bloom’s taxonomy: an overview. In: Theory Into Practice, vol. 41, issue 4, Special Issue: Revising Bloom’s Taxonomy, pp. 212–218. Routledge, London (2002)
Leaman, C.: Improving learning and transfer: using brain science to drive successful learning transfer. In: Training: The Source for Professional Development. http://trainingmag.com/improving-learning-transfer. (2014)
Jones, R., Korwin, A.: Do hands-on, technology-based activities enhance learning by reinforcing cognitive knowledge and retention? J. Technol. Educ. 1(2) (1990)
Andel, T., McDonald, J.: A systems approach to cyber assurance education. In: Proceedings of infoSecCD’13: Information Security Curriculum Development Conference (2013)
Bicak, A., Liu, X., Murphy, D.: Cybersecurity curriculum development: introducing specialties in a graduate program. Inf. Syst. Educ. J. 13(3), 99 (2015)
Dark, M., Ekstrom, J., Lunt, B.: Integration of information assurance and security into education: a look at the model curriculum and emerging practice. J. Inf. Technol. Educ. 5(5), 389–403 (2006)
Futcher, L., Schroder, C., Von Solms, R.: Information security education in South Africa. Inf. Manage. Comput. Secur. 18(5), 366–374 (2010)
Rowe, D., Lunt, B., Ekstrom, J.: The role of cyber-security in information technology education. In: Proceedings of the 2011 Conference on Information Technology Education, pp. 113–122 (2011)
Harris, M., Patten, K.: Using Bloom’s and Webb’s taxonomies to integrate emergeing cybersecurity topics into a computing curriculum. J. Inf. Syst. Educ. 26(3), 219–234 (2015)
Simpson, E.: The Classification of Educational Objectives in the Psychomotor Domain. Gryphon House, Washington, DC (1972)
Dave, R.: Psychomotor Levels in Developing and Writing Behavioral Objectives. In: Armstrong, R.J. (ed.) pp. 20–21. Educational Innovators Press. Tuscon, AZ (1970)
Wikipedia: Definition of Learning. https://en.wikipedia.org/wiki/Learning
Transfer of Learning Slide deck
Kolb, D.A., Kolb, A.Y.: Learning Styles and Learning Spaces: Enhancing Experiential Learning in Higher Education. In: Academy of Management Learning and Education, vol. 4, issue 2, pp. 198–212. Academy of Management, Briarcliff Manor (2005)
Salas, E., Wildman, J.L., Piccolo, R.F.: Using simulation-based training to enhance management education. In: Academy of Management Learning & Education, vol. 8, issue. 4, pp. 559–573, Academy of Management, Briarcliff Manor (2009)
Stanford University: Speaking of Teaching: Teaching with Cases. In: Stanford University Newsletter on Teaching, Winter Edition, vol. 5, issue 2, Stanford (1994)
Deterding, S., Dixon, D., Khaled, R., Nacke, L.: From game design elements to gamefulness: defining “Gamification.” In: Laugmayr, A., Franssilia, H., Safran, C., Hammouda, I. (eds.) MindTrek 2011: Proceedings of the 15th International Academic MindTrek Conference: Envisioning Future Media Environments, pp. 9–15. Association for Computing Machinery, New York (2011)
Dicheva, D., Dichev, C., Agre, G., Angelova, G.: Gamification in education: asystematic mapping study. In: Educational Technology and Society, vol. 18, issue 3, pp. 75–88. Athabasca, Canada (2015)
Kapp, K.: The Gamification of Learning and Instruction: Game-Based Methods and Strategies for Training and Education. Pfeiffer, San Francisco (2012)
Lewin, K.: Action research and minority problems. J. Soc. Issues 2, 34–46 (1946)
Buchanan, L., Wolanczyk, F., Zinghini, F.: Blending Bloom’s taxonomy and serious game design. In: Proceedings of 2011 International Conference on Security and Management. Las Vegas, NV (2011)
Damn Vulnerable Web Application. www.dvwa.co.uk
Smartphone Pentest Framework. www.bulbsecurity.com
https://www.wday.com/news/4424170-ethical-hackers-expose-businesses-security-problems
https://www.mprnews.org/story/2018/04/09/class-combats-cyber-crime-by-promoting-ethical-hacking
Webster’s Dictionary for Learning (2015)
Stanford University: Speaking of Teaching: Problem-Based Learning. In: Stanford University Newsletter on Teaching, Winter Edition, vol. 11, issue 1, Stanford (2001)
Armstrong, E.: Case Based Teaching: Overview: Advantages of the Case Based Approach. http://pedicases.org/teaching/overview/approach.html
Christensen, C.R.: Teaching with cases at the Harvard Business School. In: Barnes, L., Christensen, C.R., Hansen, A. (eds.) Teaching and the Case Method, 3rd Edition, p. 34. Harvard Business School Press, Boston (1994)
USMC Systems Approach to Training and Education
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Switzerland AG
About this paper
Cite this paper
Fenton, D., Traylor, T., Hokanson, G., Straub, J. (2019). Integrating Cyber Range Technologies and Certification Programs to Improve Cybersecurity Training Programs. In: Auer, M., Tsiatsos, T. (eds) The Challenges of the Digital Transformation in Education. ICL 2018. Advances in Intelligent Systems and Computing, vol 917. Springer, Cham. https://doi.org/10.1007/978-3-030-11935-5_60
Download citation
DOI: https://doi.org/10.1007/978-3-030-11935-5_60
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-11934-8
Online ISBN: 978-3-030-11935-5
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)