Table 2: Methodology and Approaches.
Flipped Class-
room
Lessons are designed to improve the quality of teaching
through a learner-centred approach. It requires learners to
independently prepare for the lesson and work on a problem
within the sessions. (Ozdamli and Asiksoy, 2016)
Blended Learn-
ing
A combination of offline and online resources are used. It al-
lows learners to control the time, place and pace of learning.
This also requires that educators and learners are in physical
contact with each other however face-to-face practices are
enhanced by digital based activities in terms of content and
delivery. (Graham, 2006)
Work based
learning
Is a strategy that allows learners to have real-life experiences.
It is a combination of theoretical and technical skills and is
usually linked to business practices. (Boud and Solomon,
2001) It is not possible at the higher education level - here the
cyber-range environment is applied. This provides learners
the opportunity to work on real systems and to develop topics
that are otherwise only available in business.
Student-led
learning
The responsibility for the teaching experience rests with the
learner. Knowledge acquisition is facilitated as learners in-
teract with a peer-to-peer process. (Marvell, 2013) In the
model, this approach is fundamentally used in exercises to
provide learners with all the opportunities and in order to
strengthen skills.
Table 3: Type of Sessions.
Theoretical exer-
cise
During the lessons, exercises can be performed where theo-
retical topics are elaborated. This means that learners have
to deal with the content of the lessons. This is similar to the
lessons that children receive to learn mathematics.
Collaborative
hands-on exam-
ples
Learners have to work together on abstract and real exam-
ples in the sessions. This allows for immediate assistance in
case of problems and enables timely preparation of results
for all learners. The complexity of the exercises is variable
and always depends on the level of knowledge and skills of
the learners.
Interactive learn-
ing of the content
Use of specific tasks and questions to encourage learners to
participate in the lesson without communicating directly with
the lecturer. This should reduce the barriers and lead to a new
teaching experience.
3.2.2 Exercise Principles
The exercises represent an extension of the theoretical
lessons and should serve to consolidate the content.
The exercises are therefore important as they are not
isolated and follow the same narrative. Therefore, the
principles of the exercise follow the didactical guide-
lines. During the exercises, the learners work collab-
oratively together, so it is on the meta level.
An application scenario represents the first part
of the exercise that needs to be prepared. The exer-
cise topic and the individual focus points will be de-
termined and different storylines will be generated.
A storyline deals with a specific CS challenge, e.g.
ransomware, APT, etc., or a storyline pushes the sce-
nario ahead to guide the learner to the desired objec-
tive. Storylines can also be incorporated to increase
the difficulty of the scenario and produce background
noise in order to disguise the attacker’s actions. For
this reason, the Table 4 contains scenarios that sup-
port this model and can be built upon. There are three
dimensions in the concept to adapt the exercise to the
different conditions of the environment, enabling all
teaching concepts to be addressed. To do this, edu-
cators have to address the three dimensions of man-
agement, learning and technology. The first dimen-
Table 4: Application scenarios.
Technical cyber-
security scenario
This kind of exercise involves a strong technological com-
ponent. In order to design this type of exercise, an infras-
tructure (Cyber Range) has to be integrated into the training
where learners will be able to work with the scenario and
repeat the scenario if necessary in case the chosen solution
does not lead to the desired result.
Non-technical
cybersecurity
scenario
Represents the logical opposite of the technical scenarios. In
this type of scenario, technology can and will be used, but
the aim is not that learners develop a solution that focuses
on the technical level. The aim here is rather to focus on the
non-technical areas such as risk management etc. that can
be developed without the use of technical resources. Purely
non-technical exercises are the preliminary stage of the in-
terdisciplinary exercises and are designed to evaluate learner
procedures and processes.
Interdisciplinary
cybersecurity
scenario
The storyline approach can be a combination of technical and
non-technical exercises with the integration of different dis-
ciplines or a pure exercise where learners from different dis-
ciplines work on the same challenge. Storylines must there-
fore be planned in a way that all learners can contribute their
strengths and pass on their knowledge to other learners by
working together.
Other scenario This teaching method also allows other types of scenarios for
integration. The educators have to make sure that all parame-
ters can be implemented and that the learning objectives and
the expected outcome are properly defined.
Table 5: First dimension.
Strategic deci-
sions
Learners have to make decisions in order to succeed in the ex-
ercise and therefore in the scenario. The decisions will change
as the information content evolves. It is very important that the
decisions are documented and on which basis they were taken.
It prepares learners for future leadership roles.
Resource plan-
ning
Learners need to consider resources that are supposed to be
lacking in the exercise, like money, human resources etc. It
prepares learners for future leadership roles.
Leadership It is essential for future decision-makers to build up compe-
tences and skills in this sector. This is often neglected in edu-
cation and training programmes or reduced to the transmission
of soft skills.
Other Additional management duties can be added to the exercise,
depending on the scenario.
sion is the management environment, while the role
assignment belongs to the learners. The characteris-
tics of the dimension are shown in the Table 5.
The second integrated environment that is sup-
ported and embedded by the model deals with the
topic area of Learning with Application. In this field,
competences and skills are addressed that are used
and acquired. The following strategies of this dimen-
sion are listed in the Table 6.
Table 6: Second dimension.
Self-Guided
learning
Combines learning organisation, learning goal identification,
learning control and learning outcome monitoring. Learners
are stimulated to learn by their own and educators provide the
environment. (Kraft, 1999)
Experimental ap-
proaches to prob-
lem solving
Enables learners to independently develop solutions based on
experience and acquired knowledge. In the exercise, these so-
lutions are evaluated and in case of a failure, the learners are
forced to reconsider the solution and develop a new approach
to the problem.
(Meta) Cognitive
Equipment
Firmly anchored in the teaching method in order to guarantee
the processing of information on the different dimensions and
to enable learners to acquire new knowledge and is linked to
the logical thinking.
The last environmental dimension which is inte-
grated into the teaching concept as a fixed element is
the technical dimension, see Table 7. The exercise
methodology is provided and carried out with tech-
nical resources. The different exercises in the sub-
A Tailored Model for Cyber Security Education Utilizing a Cyber Range
371