skip to main content
US FlagAn official website of the United States government
dot gov icon
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
https lock icon
Secure .gov websites use HTTPS
A lock ( lock ) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.


This content will become publicly available on February 18, 2026

Title: Creating Your Own Hands-on Cybersecurity Exercises
Cybersecurity is a topic of growing interest. Do you have hands-on exercises that match the skills and levels of your students? Over the last few years, we have worked on making it easier to create, modify, and deploy exercises with assessment questions. EDURange is an open source project with exercises that span a wide range and can serve as templates for new ones. In addition to providing a framework for editing exercises, EDURange also allows Instructors to see student interaction and offer hints while they are doing the exercise. The features, that support this include chat with the instructor and machine learning algorithms for identifying which students need help. We plan to share some of the existing exercises and show how to adapt them to different students' profiles. We will also share our experiences with the hint system. Participants will gain experience in designing and adapting cybersecurity exercises and writing learning objectives and assessments. All backgrounds are welcome, whether you are new to teaching cybersecurity and have little experience with the command line, or whether you can create a network of containers and bash scripts to configure them. You will come away with a better understanding of how to design and create your own hands-on exercises.  more » « less
Award ID(s):
2216492 2216485
PAR ID:
10595439
Author(s) / Creator(s):
; ;
Publisher / Repository:
ACM
Date Published:
ISBN:
9798400705328
Page Range / eLocation ID:
1775 to 1775
Subject(s) / Keyword(s):
security and privacy machine learning interactive learning
Format(s):
Medium: X
Location:
Pittsburgh PA USA
Sponsoring Org:
National Science Foundation
More Like this
  1. We explore building a Kubernetes-powered, cloud-based cybersecurity education platform and framework named “EDURange Cloud”. It allows instructors to efficiently design and host their own cybersecurity competitions and exercises. The benefits of this system include enhanced security through isolated instances, cost-effective scaling that adjusts resources based on demand, and the agility to deploy or update challenges rapidly. Originally focused primarily on hosting Capture The Flag (CTF) competitions, the scope of EDURange Cloud will include support for cybersecurity demos and other educational exercises. This evolution will allow for a broader range of educational opportunities within the platform. EDURange Cloud was created as a distributed cloud alternative to the existing EDURange software \cite{Weiss2017Cybersecurity}, leveraging the power of Kubernetes to create an efficient and highly modular cybersecurity education framework. In addition to providing better load balancing and achievement tracking, EDURange Cloud extends the existing project by enabling full GUI desktop environments that are also much more easily customizable compared to command-line restricted exercises. The continued development of this platform could provide a new format for a wide range of hands-on exercises, going beyond just cybersecurity. 
    more » « less
  2. The critical shortage of cyber security professionals has driven faculty interest in adding this to the curriculum, and it was added to the ACM/ IEEE Model Curriculum of 2013. This is a subject that demands hands-on exercises. There has been a modest increase in the number of such exercises, but the limit is usability. Most faculty do not have the time to create their own exercises, modify and install VMs, and set up assessment mechanisms. EDURange is a framework for accessing, developing and assessing interactive cybersecurity exercises. It has a range of exercises from introductory to advanced. We will demo an introductory exercise about using the command line and an advanced exercise about network scanning. We want to reach and engage as many faculty as possible, so that they can develop their own exercises. EDURange uses VMs in the cloud. Students only need an ssh-client. We have built tools to give faculty detailed information on how students are doing. This allows instructors to more easily see when students are stuck or heading in the wrong direction. The exercises we have created have manuals that instructors can use. Information about EDURange can be found at https://edurange.org. 
    more » « less
  3. This paper evaluates the use of data logged from cybersecurity exercises in order to predict which students are potentially at risk of performing poorly. Hands-on exercises are essential for learning since they enable students to practice their skills. In cybersecurity, hands-on exercises are often complex and require knowledge of many topics. Therefore, students may miss solutions due to gaps in their knowledge and become frustrated, which impedes their learning. Targeted aid by the instructor helps, but since the instructor’s time is limited, efficient ways to detect struggling students are needed. This paper develops automated tools to predict when a student is having diffculty. We formed a dataset with the actions of 313 students from two countries and two learning environments: KYPO CRP and EDURange. These data are used in machine learning algorithms to predict the success of students in exercises deployed in these environments. After extracting features from the data, we trained and cross-validated eight classifiers for predicting the exercise outcome and evaluated their predictive power. The contribution of this paper is comparing two approaches to feature engineering, modeling, and classification performance on data from two learning environments. Using the features from either learning environment, we were able to detect and distinguish between successful and struggling students. A decision tree classifier achieved the highest balanced accuracy and sensitivity with data from both learning environments. The results show that activity data from cybersecurity exercises are suitable for predicting student success. In a potential application, such models can aid instructors in detecting struggling students and providing targeted help. We publish data and code for building these models so that others can adopt or adapt them. 
    more » « less
  4. In order to address the cybersecurity education and workforce challenges, we need a greater number of prepared faculty. In this workshop, we will introduce the EDURange framework, present one or two hands-on exercises that faculty can try, and discuss how they can be taught in classes. 
    more » « less
  5. In order to address the cybersecurity education and workforce challenges, we need a greater number of prepared faculty. In this workshop, we will introduce the EDURange framework, present one or two hands-on exercises that faculty can try, and discuss how they can be taught in classes. 
    more » « less