3 RELATED WORK
As mentioned in previous sections, there is a lack of
approaches that systematically starts by identifying
roles and skills to be trained on a cyber range, and
then shape the training material and exercises
accordingly. According to Pfrang, Kippe, Meier, and
Haas (2016), one of the main issues in early cyber
ranges was that they did not consider learning and
educational aspects such as courses, learning goals
and learning objectives, specific skills to train and
develop, etc. A recent literature review by Yamin,
Katt, and Gkioulos (2020), shows that cyber ranges
have advanced within the aspects of monitoring,
scenario development and management, environment
generation and hardware, teaming in terms of
red/blue/white/green/autonomous teams,
management of the cyber range, and learning in the
sense of tutoring, scoring and evaluating student
performance. However, there is still a gap to cover
with respect to learning and educational aspects in
terms of systematic development of courses and
training material. Our method explicitly includes
learning and educational aspects such as courses,
learning goals and objectives, specific skills to train
and develop, etc. as explained in previous sections.
To the best of our knowledge, the approach
reported in this paper is a first attempt in providing a
systematic "top-down" approach starting with roles
and producing risk-centric courses and training
material to be used in context of cyber ranges,
specialized for certain cybersecurity roles and their
skills. The approach most similar to our approach is a
Learning Management System developed by
Carnegie Mellon University named STEPfwd (CMU,
2020). STEPfwd provides both theoretical and
practical cybersecurity skill set in a realistic
environment. It achieves this by combining multiple
choice questions with simulation/emulation labs.
However, STEPfwd does not start by identifying
specific cybersecurity roles as a basis for building and
providing courses and training material as in our
approach.
Regarding "bottom-up approaches", the literature
reports on several approaches where exercises are
first developed for training purposes and then
integrated in various cybersecurity training
programmes. Secure Eggs (Essentials and Global
Guidance for Security) by NRI Secure (NRISecure,
2020), enPiT-Security (SecCap) (EnpitSecurity,
2020), and CYber Defense Exercise with Recurrence
(CYDER) are approaches and security training
programs focusing on basic cybersecurity hands on
and awareness training (Beuran, Chinen, Tan, &
Shinoda, 2016).
There are various approaches focusing on
cybersecurity skills training within specific domains
such as smart grid (Ashok, Krishnaswamy, &
Govindarasu, 2016) and cybersecurity assurance
(Somarakis, Smyrlis, Fysarakis, & Spanoudakis,
2019).
Several approaches focus mainly on the cyber
range architecture and improving the efficiency and
performance of cyber ranges. Pham, Tang, Chinen,
and Beuran (2016) suggest a cyber range framework
named CyRIS/CyTrONE focusing on improving the
accuracy of the training setup, decreasing the setup
time and cost, and making training possible
repeatedly and for a large number of participants.
4 DISCUSSION
In the following, we discuss the feasibility of our
approach as well as observations and lessons learned
we believe is worth sharing with the community to
further improve the development of courses and
training material for cybersecurity training in context
of cyber ranges. We also provide initial feedback
from end users who have taken some of our courses
using the platform as part of piloting exercises in the
CYBERWISER.eu project (CYBERWISER.eu,
2020), which is also where we developed and applied
the method reported in this paper.
As mentioned in above sections, we developed in
total 22 courses including training material covering
all parts of our risk-centric learning path depicted in
Figure 2. The course developers using the method
were people with different background grouped in
academia, critical infrastructure, research, and service
providers. This demonstrates the feasibility of our
approach. Table 4 and Table 5 provide an overview of
the 22 courses we developed using our method. The
tables show the name of each course and relate the
courses to the relevant parts of the cyber-risk centric
learning path illustrated in Figure 2. We also see from
the tables the roles that are trained in each course and
the skills developed in the course. The rightmost
column of Table 4 and Table 5 shows the skill level
that is achieved for the corresponding skill after the
successful completion of the course. Note that the
courses C-02 to C-06 have no skill levels because
these courses focus on the awareness of specific
cybersecurity risks. Thus, the objective of courses C-
02 to C-06 is to make participants aware of
cybersecurity risks the society is often exposed to; not
to develop certain security skills. Section 2.3 describes
Level 1 of Skill S1, and Level 1 and 2 of Skill S2. For
a
complete descriptions of the courses, roles, skills,