Cyber defense competitions (CDCs) simulate a real-world environment, where the competitors must protect the information assets of a fictional organization. These competitions are becoming popular at the high school and college levels, as well as in industry and governmental settings. However, there is little research to date on the learning outcomes associated with CDCs or the long-term benefits to the participants as they pursue future educational, employment or military goals. For this exploratory research project, we surveyed 11 judges and mentors participating in a well-established high school CDC held in the southeastern United States. Then we developed a set of recommended learning outcomes for CDCs, based on importance of the topic a...
Network security analysis has evolved as cyber threats have grown and adapted to new technologies an...
There is a shortage of cyber security professionals in the current labour market, which is detriment...
In order to combat malicious actors of the digital age, cybersecurity experts have quickly become es...
Cyber defense competitions (CDCs) simulate a real-world environment where the competitors must prote...
The objective of this article is to encourage schools to participate in the Collegiate Cyber Defense...
Numerous cyber defense competitions exist today for individuals and teams to test their cyber secur...
ABSTRACT (REQUIRED) This paper is part of a proposed study that looks at the emerging information se...
To support the workforce gap of skilled cybersecurity professionals, gamified pedagogical approaches...
Collegiate Cyber Defense Competitions have recently grown in popularity as a means of providing real...
This paper describes the development of a visualization system used by students participating in a c...
This paper is part of a proposed study that looks at the emerging information security personnel nee...
On June 15, 2013, the Atlantic Council’s Cyber Statecraft Initiative, with Science Applications Inte...
The research objective is to develop a Capture the Flag (CTF) competition to educate local high scho...
This resource is a 15-page white paper that was written by John Sener and is provided free for dow...
This resource guide, commissioned by the National CyberWatch Center, is intended to prepare student...
Network security analysis has evolved as cyber threats have grown and adapted to new technologies an...
There is a shortage of cyber security professionals in the current labour market, which is detriment...
In order to combat malicious actors of the digital age, cybersecurity experts have quickly become es...
Cyber defense competitions (CDCs) simulate a real-world environment where the competitors must prote...
The objective of this article is to encourage schools to participate in the Collegiate Cyber Defense...
Numerous cyber defense competitions exist today for individuals and teams to test their cyber secur...
ABSTRACT (REQUIRED) This paper is part of a proposed study that looks at the emerging information se...
To support the workforce gap of skilled cybersecurity professionals, gamified pedagogical approaches...
Collegiate Cyber Defense Competitions have recently grown in popularity as a means of providing real...
This paper describes the development of a visualization system used by students participating in a c...
This paper is part of a proposed study that looks at the emerging information security personnel nee...
On June 15, 2013, the Atlantic Council’s Cyber Statecraft Initiative, with Science Applications Inte...
The research objective is to develop a Capture the Flag (CTF) competition to educate local high scho...
This resource is a 15-page white paper that was written by John Sener and is provided free for dow...
This resource guide, commissioned by the National CyberWatch Center, is intended to prepare student...
Network security analysis has evolved as cyber threats have grown and adapted to new technologies an...
There is a shortage of cyber security professionals in the current labour market, which is detriment...
In order to combat malicious actors of the digital age, cybersecurity experts have quickly become es...