situations and practice their required decision-making
expertise and capabilities.
The remainder of this paper is structured as fol-
lows: In Section 2 we provide an overview about ex-
isting publications on cyber security exercises as well
as on educational planning games. In Section 3 we
outline our teaching concept, which was elaborated in
the past decade. In Section 5, we highlight the feed-
back of the students of the corresponding courses. We
conclude our work in Section 6.
2 RELATED WORK
In this section, we outline the relevant research in the
context of cyber exercises in higher education. Be-
sides providing an overview on selected approaches
in teaching, we highlight essential literature, which
have been influenced the design and conception of the
herein presented approach.
The effectiveness and importance of plan-
ning/simulation games as a learning and teaching tool
has been outlined in the meta-analysis by Vogel (Jen-
nifer J. Vogel et al., 2006). It was found that interac-
tive activities such as games and simulations increase
motivation and learning outcomes compared to the
traditional teaching methods.
Also Prensky discusses in his paper (Prensky,
2002) how challenging is to keep students motivated
through the entire learning process. In contrast to the
traditional environment in HEI, playing interactive
games can be engaging and achieving some scores or
prizes can be very relaxing and motivating.
Steinkuehler emphasizes in (Steinkuehler, 2010)
that through games, students can acquire various
skills and be more enthusiastic about learning. How-
ever, beside acquired knowledge, students, as a com-
plete individuals, have to develop different skills and
gain experiences that may help them to think or react
rationally in new situations (Blazenka Divjak, 2011).
2.1 Cyber Exercise Guidelines
As defined in ISO 22398:2013 exercises are ”a pro-
cess to train for, assess, practice, and improve perfor-
mance in an organization” (ISO, 2013). Derived from
this definition, cyber exercises can be defined as an
event, in which organizations simulate a cyber secu-
rity incident in order to develop and test skills in the
prevention, detection, mitigation and recovery of op-
erations from cyber attack or security incident.
In order to facilitate a process of planning and or-
ganizing such events, many studies have been con-
ducted, which identified key components of a cyber
exercise. In 2015, the Spanish National Cybersecu-
rity Institute Incibe published a taxonomic classifica-
tion scheme that provides a comprehensive survey on
existing cyber exercises (Incibe, 2015). Based on col-
lected information about existing cyber exercises, the
authors defined a set of metrics and indicators for cy-
ber exercise profiling and developed a taxonomy pro-
posal to better plan and improve future cyber exer-
cises.
In Cybersecurity and Cyberdefense Exercises Re-
port (Dewar, 2018), the authors identified goals,
types, actors and resources as a core elements of cy-
ber defense exercise and also give insights into the ex-
periences and lessons learned based on various After
Action Reports (AAR).
The ENISA Good Practice Guide, which is widely
used in the EU, describes the general organizational
process from preparation to implementation of lo-
cal and national cyber exercise (ENISA, 2009). The
guide systematically explains the key steps in the life-
cycle for exercises (identifying, planning, conducting,
and evaluating). According to ENISA, it is essential
to incorporate experiences from previous exercises
into the planning and setting of framework conditions
in order to achieve the best possible outcome. There-
fore, in addition to this guideline, the Latest Report on
National and International Cyber Security Exercises
(ENISA, 2015) was published. The report analyses
the consisting data set of over 200 exercises and dis-
cusses the outcomes of previous exercises.
Similar to ENISA Good Practice Guide, the
Department of Homeland Security published The
Homeland Security Exercise and Evaluation Program
(HSEEP) (FEMA, 2020). HSEEP’s life cycle (Pro-
gram Management, Exercise Development and De-
sign, Exercise Conduct, Exercise Evaluation, Im-
provement Planning) is very flexible and can be
adapted to different types of exercises.
The Swedish Defence University (FHS) has pub-
lished a Handbook for planning, running, and evalu-
ating information technology and cyber security exer-
cises (Wilhemson and Svensson, 2014). Besides the
detailed description of exercise planning steps, this
handbook contains practical experiences from previ-
ous exercises and a list of criteria for the technical
exercise environment (e.g. Communication prepara-
tions, Exercise network, Equipment etc.).
In Cyber Exercise Playbook (Kick, 2015), MITRE
describes practical guidance on cyber exercises pro-
cess and gives an overview of essential activities of
every phase. This playbook also provides tips and
common pitfalls of previous exercises as well as sam-
ple documents and templates to assist planners of ex-
ercises.
Cyber Exercises in Computer Science Education
405