Publication Date
| In 2026 | 0 |
| Since 2025 | 0 |
| Since 2022 (last 5 years) | 2 |
| Since 2017 (last 10 years) | 2 |
| Since 2007 (last 20 years) | 2 |
Descriptor
| Data Use | 2 |
| Information Security | 2 |
| Training | 2 |
| Active Learning | 1 |
| Automation | 1 |
| Computer Science Education | 1 |
| Computer Security | 1 |
| Educational Research | 1 |
| Feedback (Response) | 1 |
| Learning Analytics | 1 |
| Students | 1 |
| More ▼ | |
Source
| Education and Information… | 2 |
Author
| Celeda, Pavel | 1 |
| Jan Vykopal | 1 |
| Ján Dovjak | 1 |
| Kraus, Lydia | 1 |
| Pavel Celeda | 1 |
| Valdemar Švábenský | 1 |
| Vykopal, Jan | 1 |
| Švábenský, Valdemar | 1 |
Publication Type
| Journal Articles | 2 |
| Reports - Research | 2 |
Education Level
Audience
Location
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Valdemar Švábenský; Jan Vykopal; Pavel Celeda; Ján Dovjak – Education and Information Technologies, 2024
Computer-supported learning technologies are essential for conducting hands-on cybersecurity training. These technologies create environments that emulate a realistic IT infrastructure for the training. Within the environment, training participants use various software tools to perform offensive or defensive actions. Usage of these tools generates…
Descriptors: Computer Security, Information Security, Training, Feedback (Response)
Švábenský, Valdemar; Vykopal, Jan; Celeda, Pavel; Kraus, Lydia – Education and Information Technologies, 2022
Cybersecurity professionals need hands-on training to prepare for managing the current advanced cyber threats. To practice cybersecurity skills, training participants use numerous software tools in computer-supported interactive learning environments to perform offensive or defensive actions. The interaction involves typing commands, communicating…
Descriptors: Data Use, Learning Analytics, Information Security, Training

Peer reviewed
Direct link
