Publication Date
In 2025 | 0 |
Since 2024 | 1 |
Since 2021 (last 5 years) | 2 |
Since 2016 (last 10 years) | 3 |
Since 2006 (last 20 years) | 3 |
Descriptor
Computer Security | 3 |
Information Security | 3 |
Training | 3 |
Active Learning | 1 |
Artificial Intelligence | 1 |
Automation | 1 |
Computer Assisted Instruction | 1 |
Data Analysis | 1 |
Data Collection | 1 |
Data Use | 1 |
Delivery Systems | 1 |
More ▼ |
Source
Education and Information… | 3 |
Author
Beuran, Razvan | 1 |
Celeda, Pavel | 1 |
Hasegawa, Shinobu | 1 |
Jan Vykopal | 1 |
Jiang, Weiwei | 1 |
Ján Dovjak | 1 |
Pavel Celeda | 1 |
Popovic, Daniel | 1 |
Tan, Yasuo | 1 |
Tan, Zheyu | 1 |
Tkácik, Kristián | 1 |
More ▼ |
Publication Type
Journal Articles | 3 |
Reports - Research | 2 |
Reports - Descriptive | 1 |
Education Level
Audience
Location
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Valdemar Švábenský; Jan Vykopal; Pavel Celeda; Ján Dovjak – Education and Information Technologies, 2024
Computer-supported learning technologies are essential for conducting hands-on cybersecurity training. These technologies create environments that emulate a realistic IT infrastructure for the training. Within the environment, training participants use various software tools to perform offensive or defensive actions. Usage of these tools generates…
Descriptors: Computer Security, Information Security, Training, Feedback (Response)
Tan, Zheyu; Beuran, Razvan; Hasegawa, Shinobu; Jiang, Weiwei; Zhao, Min; Tan, Yasuo – Education and Information Technologies, 2020
Cybersecurity is no longer an issue discussed only between the professionals or technologists, but it is also closely related to ordinary people whose daily life is exposed to kinds of cyberattacks. And Womabat Security Technologies conducted a survey revealed that ransomware is an unknown concept to nearly two-thirds of employees. In practical,…
Descriptors: Computer Security, Information Security, Training, Computer Assisted Instruction
Švábenský, Valdemar; Vykopal, Jan; Celeda, Pavel; Tkácik, Kristián; Popovic, Daniel – Education and Information Technologies, 2022
Hands-on cybersecurity training allows students and professionals to practice various tools and improve their technical skills. The training occurs in an interactive learning environment that enables completing sophisticated tasks in full-fledged operating systems, networks, and applications. During the training, the learning environment allows…
Descriptors: Computer Security, Information Security, Training, Data Collection