BSI (2024). RdpCacheStitcher. url: https://github.com/BSI-
Bund/RdpCacheStitcher/tree/main (accessed on Oct 20,
2024).
Chung, K. (2017). Live Lesson: Lowering the Barriers to
Capture The Flag Administration and Participation. In:
2017 USENIX Workshop on Advances in Security
Education (ASE 17). USENIX Association. url:
https://www.usenix.org/conference/ase17/workshoppr
ogram/presentation/chung (accessed on Oct 20, 2024).
Chung, K. (2024a). CTFD: What is capture the Flag? url:
https://ctfd.io/whats-a-ctf/ (accessed on Oct 20, 2024).
Chung, K. (2024b). CTFd: The Easiest Capture The Flag
Framework. url: https://ctfd.io/about/ (accessed on Oct
20, 2024).
Csikszentmihalyi, M. (1990). Flow: The Psychology of
Optimal Experience. Harper Perennial. isbn:
9780060920432
CTFd (2024a). GitHub - CTFd/ctfcli: ctfcli is a tool to
manage Capture The Flag events and challenges —
github.com. url: https://github.com/CTFd/ctfcli
(accessed on Oct 20, 2024).
CTFd (2024b). CTFd Exports | CTFd Docs - docs.ctfd.io.
url: https://docs.ctfd.io/docs/exports/ctfd-exports/
(accessed on Oct 20, 2024).
Ctftime (2024). url: https://ctftime.org/ctf-wtf/ (accessed on
Oct 20, 2024).
CyberDefenders (2024). CyberDefenders. url: https://
cyberdefenders.org/blue-team-labs/plans/ (accessed on
Oct 20, 2024).
CyberVista (2020). Capture the flag (CTF): A gamification
of cybersecurity learning. url: https://certify.
cybervista.net/capture-the-flag-agamification-of-
cybersecurity-learning/ (accessed on Oct 20, 2024).
Deterding, S., Dixon, D., Khaled, R., Nacke, L. (2011).
From game design elements to gamefulness. In:
Proceedings of the 15th International Academic
MindTrek Conference: Envisioning Future Media
Environments. Publisher Artur Lugmayr et al. ACM,
2011, pp. 9–15. isbn: 9781450308168. doi:
10.1145/2181037.2181040.
Diercks, J., Kupka, K. (2013). Recrutainment - Meaning,
Influencing Factors and Definition (in German). In:
Recrutainment. Publisher Diercks, J., Kupka, K.
Springer-Gabler, 2013, pp. 1–18. isbn: 3658015691.
doi: 10.1007/978-3-658-01570-1_1.
European Parliament (2023). The NIS2 Directive - A high
common level of cybersecurity in the EU. url:
https://www.europarl.europa.eu/thinktank/en/documen
t/EPRS_BRI(2021)689333 (accessed on Oct 20, 2024).
Gonzales-Scheller, P. (2013). The trending topic of
gamification: what's behind this term? (in German). In:
Recrutainment. Publisher Diercks, J., Kupka, K.
Springer-Gabler, 2013, pp. 33–51. isbn: 3658015691.
doi: 10.1007/978-3-658-01570-1_1.
Hacking Academy (2024). CTF-Hacking (in German). url:
https://hacking-akademie.de/capture-the-flag-ctf-
hacking/ (accessed on Oct 20, 2024).
HackTheBox (2024a). Hack The Box - Hacking-Labs.
url: https://www.hackthebox.com/hacker/hacking-labs
(accessed on Oct 20, 2024).
HackTheBox (2024b). HTB Academy. url: https://
academy.hackthebox.com/preview/certifications
(accessed on Oct 20, 2024).
Huawei (2024). Huawei Health App. url:
https://consumer.huawei.com/de/mobileservices/health
/ (accessed on Oct 20, 2024).
ICS2 (2023). Cybersecurity Workforce Study,
https://media.isc2.org/-/media/Project/ISC2/
Main/Media/documents/research/ISC2_Cybersecurity
_Workforce_Study_2023.pdf?rev=28b46de71ce24e6a
b7705f6e3da8637e (accessed on Oct 20, 2024)
Jacob, A., Teuteberg, F. (2017). Game-Based Learning,
Serious Games, Business Games and Gamification -
Application scenarios conducive to learning, insights
gained and recommendations for action (in German).
In: Gamification and Serious Games. Publishers
Strahringer, S., Leyh, C. Edition HMD. Springer
Fachmedien Wiesbaden, 2017, pp. 97–112. isbn: 978-
3-658-16741-7. doi: 10.1007/978-3-658-16742-4_8.
Kahoot (2024). About Us. url: https://kahoot.com/
company/ (accessed on Oct 20, 2024).
Kelly, S. (2019). What Is Python? In: Python, PyGame, and
Raspberry Pi Game Development. Apress, 2019, pp. 5–
9. isbn: 978-1-4842-4533-0. doi: 10.1007/978-1-4842-
4533-0_2.
Kim, S., Song, K., Lockee, B., Burton, J. (2018). What is
Gamification in Learning and Education? In:
Gamification in Learning and Education. Publisher
Kim S. et al. Springer International Publishing, 2018,
pp. 25–38. isbn: 978-3-319-47282-9. doi: 10.1007/978-
3-319-47283-6_4.
Luber, S., Schmitz, P (2020). What is a Blue Team? (in
German). url: https://www.security-insider.de/was-ist-
ein-blue-team-a-911741/ (accessed on Oct 20, 2024).
Mentimeter (2023). Annual Report 2023. url:
https://storage.mfn.se/a/mentimeter/917e22f7-6165-
4cfa-8c73-a01820d71255/mentimeter_annual-
20report_2023-20-eng.pdf (accessed on Oct 20, 2024).
Microsoft (2021). Open Specifications: 3.1.1.1.1 Bitmap
Caches. url: https://learn.microsoft.com/en-us/
openspecs/windows_protocols/msrdpegdi/2bf92588-
42bd-4527-8b3e-b90c56e292d2 (accessed on Oct 20,
2024).
Müller, H., Jahnke, J., Smith, D., Storey, M., Tilley, S.,
Wong, K. (2000). Reverse engineering. In: Proceedings
of the Conference on The Future of Software
Engineering. Publisher Finkelstein, A. ACM, 2000, pp.
47–60. isbn: 1581132530. doi: 10.1145/
336512.336526.
Nike (2024). Nike Run Club. 2024. url:
https://www.nike.com/de/nrc-app (accessed on Oct 20,
2024).
Ophie (2023). Hack The Box reaches 2 million platform
members worldwide: Yet another great milestone
for the #1 upskilling platform. url:
https://www.hackthebox.com/blog/htb-two-million-
platformmembers#:~:text=Hack%20The%20Box%20(
HTB)%2C,globally%20across%20the%20HTB%20m
ultiverse (accessed on Oct 20, 2024).