Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 3 |
Since 2016 (last 10 years) | 3 |
Since 2006 (last 20 years) | 3 |
Descriptor
Author
Celeda, Pavel | 3 |
Vykopal, Jan | 3 |
Švábenský, Valdemar | 2 |
Kraus, Lydia | 1 |
Popovic, Daniel | 1 |
Seda, Pavel | 1 |
Svabensky, Valdemar | 1 |
Tkácik, Kristián | 1 |
Publication Type
Journal Articles | 3 |
Reports - Research | 3 |
Education Level
Audience
Location
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Švábenský, Valdemar; Vykopal, Jan; Celeda, Pavel; Kraus, Lydia – Education and Information Technologies, 2022
Cybersecurity professionals need hands-on training to prepare for managing the current advanced cyber threats. To practice cybersecurity skills, training participants use numerous software tools in computer-supported interactive learning environments to perform offensive or defensive actions. The interaction involves typing commands, communicating…
Descriptors: Data Use, Learning Analytics, Information Security, Training
Vykopal, Jan; Seda, Pavel; Svabensky, Valdemar; Celeda, Pavel – IEEE Transactions on Learning Technologies, 2023
Hands-on computing education requires a realistic learning environment that enables students to gain and deepen their skills. Available learning environments, including virtual and physical laboratories, provide students with real-world computer systems but rarely adapt the learning environment to individual students of various proficiency and…
Descriptors: Students, Educational Technology, Computer Assisted Instruction, Media Adaptation
Švábenský, Valdemar; Vykopal, Jan; Celeda, Pavel; Tkácik, Kristián; Popovic, Daniel – Education and Information Technologies, 2022
Hands-on cybersecurity training allows students and professionals to practice various tools and improve their technical skills. The training occurs in an interactive learning environment that enables completing sophisticated tasks in full-fledged operating systems, networks, and applications. During the training, the learning environment allows…
Descriptors: Computer Security, Information Security, Training, Data Collection