Publication Date
In 2025 | 0 |
Since 2024 | 3 |
Descriptor
Automation | 3 |
Computer Security | 3 |
Computer Software | 2 |
Active Learning | 1 |
Artificial Intelligence | 1 |
Cluster Grouping | 1 |
Computer Networks | 1 |
Computer Science Education | 1 |
Computer System Design | 1 |
Data | 1 |
Data Use | 1 |
More ▼ |
Author
Jan Vykopal | 1 |
Ján Dovjak | 1 |
Lori L. Sussman | 1 |
Mark Monnin | 1 |
Pavel Celeda | 1 |
Steven Ullman | 1 |
Valdemar Švábenský | 1 |
Publication Type
Journal Articles | 2 |
Reports - Research | 2 |
Dissertations/Theses -… | 1 |
Education Level
Audience
Location
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Valdemar Švábenský; Jan Vykopal; Pavel Celeda; Ján Dovjak – Education and Information Technologies, 2024
Computer-supported learning technologies are essential for conducting hands-on cybersecurity training. These technologies create environments that emulate a realistic IT infrastructure for the training. Within the environment, training participants use various software tools to perform offensive or defensive actions. Usage of these tools generates…
Descriptors: Computer Security, Information Security, Training, Feedback (Response)
Mark Monnin; Lori L. Sussman – Journal of Cybersecurity Education, Research and Practice, 2024
Data transfer between isolated clusters is imperative for cybersecurity education, research, and testing. Such techniques facilitate hands-on cybersecurity learning in isolated clusters, allow cybersecurity students to practice with various hacking tools, and develop professional cybersecurity technical skills. Educators often use these remote…
Descriptors: Computer Science Education, Computer Security, Computer Software, Data
Steven Ullman – ProQuest LLC, 2024
Modern Information Technology (IT) infrastructure and open-source software (OSS) have revolutionized our ability to access and process data, enabling us to tackle increasingly complex problems and challenges. While these technologies provide substantial benefits, they often expose users to vulnerabilities that can severely damage individuals and…
Descriptors: Artificial Intelligence, Information Technology, Information Systems, Computer Security