Publication Date
In 2025 | 0 |
Since 2024 | 4 |
Descriptor
Computer Networks | 4 |
Computer Science Education | 4 |
Computer Security | 4 |
Computer Software | 3 |
Crime | 2 |
Information Security | 2 |
Algorithms | 1 |
Automation | 1 |
Cluster Grouping | 1 |
Comparative Analysis | 1 |
Critical Thinking | 1 |
More ▼ |
Source
Journal of Cybersecurity… | 4 |
Author
Abhishek Vaish | 1 |
Carlos Novo | 1 |
Jinghua Zhang | 1 |
Jinsheng Xu | 1 |
Kelvin Bryant | 1 |
Kevin Hilliard | 1 |
Lori L. Sussman | 1 |
Mark Monnin | 1 |
Ravindra Kumar | 1 |
Rolando Martins | 1 |
Rui Pinto | 1 |
More ▼ |
Publication Type
Journal Articles | 4 |
Reports - Research | 3 |
Reports - Descriptive | 1 |
Education Level
Audience
Location
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Mark Monnin; Lori L. Sussman – Journal of Cybersecurity Education, Research and Practice, 2024
Data transfer between isolated clusters is imperative for cybersecurity education, research, and testing. Such techniques facilitate hands-on cybersecurity learning in isolated clusters, allow cybersecurity students to practice with various hacking tools, and develop professional cybersecurity technical skills. Educators often use these remote…
Descriptors: Computer Science Education, Computer Security, Computer Software, Data
Kevin Hilliard; Xiaohong Yuan; Kelvin Bryant; Jinsheng Xu; Jinghua Zhang – Journal of Cybersecurity Education, Research and Practice, 2024
Gamification has proven to be effective in engaging and encouraging people to work towards and achieve goals. Many students struggle to focus on schoolwork, due to a lack of interest, lack of understanding, or other factors unique to the student. Applying gamification elements to education can help engage these students in learning their course…
Descriptors: Gamification, Mastery Learning, Computer Security, Computer Networks
Rui Pinto; Rolando Martins; Carlos Novo – Journal of Cybersecurity Education, Research and Practice, 2024
An organization's infrastructure rests upon the premise that cybersecurity professionals have specific knowledge in administrating and protecting it against outside threats. Without this expertise, sensitive information could be leaked to malicious actors and cause damage to critical systems. In order to facilitate this process, the presented work…
Descriptors: Computer Science Education, Information Security, Computer Security, Vignettes
Abhishek Vaish; Ravindra Kumar; Samo Bobek; Simona Sternad – Journal of Cybersecurity Education, Research and Practice, 2024
The cyber security education market has grownup exponentially, with a CAGR of 13.9 % as reported by Data Intelo. The report published by the World Economic Forum 2023 indicates a shortfall of 2.27 million cyber security experts in 2021 across different roles and hence manifest that Skill-based cyber security education is the need of the hour.…
Descriptors: Experiential Learning, Computer Networks, Information Security, Computer Security