DOJO: Applied Cybersecurity Education In The Browser

被引:0
|
作者
Nelson, Connor [1 ]
Shoshitaishvili, Yan [1 ]
机构
[1] Arizona State Univ, Tempe, AZ 85287 USA
关键词
Cybersecurity Education; Capture The Flag; Infrastructure; System Design; Accessibility;
D O I
10.1145/3626252.3630836
中图分类号
G40 [教育学];
学科分类号
040101 ; 120403 ;
摘要
This paper introduces DOJO, a state-of-the-art, open-source learning platform for hands-on cybersecurity education that aims to minimize barriers for both students and instructors. DOJO draws insight and inspiration from the Capture The Flag (CTF) community, which has pioneered the use of hands-on challenges to teach cybersecurity concepts. DOJO improves upon the accessibility and usability of existing platforms by making available a pre-configured, full-featured learning environment immediately accessible from any device in the browser. Students are able to write code, interact with a shell, explore complex network configurations, debug processes and kernel modules, and more, all from the browser. Instructors can easily deploy DOJO to their own servers with a single docker run command, or use our already-deployed instance to host their own challenges or already existing challenges with a single git push command. DOJO has been successfully used in multiple university courses and workshops, and is available for free to the world, with more than 10,000 students from around the world having already benefited from using DOJO. In this paper, we discuss the infrastructure, design, implementation, and effectiveness of DOJO, and compare it to related work.
引用
收藏
页码:930 / 936
页数:7
相关论文
共 50 条
  • [1] Evaluation Theory and Practice Applied to Cybersecurity Education
    Dark, Melissa
    Mirkovic, Jelena
    [J]. IEEE SECURITY & PRIVACY, 2015, 13 (02) : 75 - 80
  • [2] Computational intelligence applied to cybersecurity
    Herrero, Alvaro
    Urda, Daniel
    Sedano, Javier
    Quintian, Hector
    Corchado, Emilio
    [J]. EXPERT SYSTEMS, 2022, 39 (09)
  • [3] The Future of Cybersecurity Education
    McDuffie, Ernest L.
    Piotrowski, Victor P.
    [J]. COMPUTER, 2014, 47 (08) : 67 - 69
  • [4] Cybersecurity Education in Universities
    Schneider, Fred B.
    [J]. IEEE SECURITY & PRIVACY, 2013, 11 (04) : 3 - 4
  • [5] Education in Management of Cybersecurity
    Tagarev, Nedko Georgiev
    [J]. 9TH INTERNATIONAL CONFERENCE THE FUTURE OF EDUCATION, 2019, : 49 - 54
  • [6] Advancing Cybersecurity Education
    Dark, Melissa
    [J]. IEEE SECURITY & PRIVACY, 2014, 12 (06) : 79 - 83
  • [7] Preface to Research on Applied Ethics (Cybersecurity)
    Warren, Matthew
    Burmeister, Oliver
    [J]. AUSTRALASIAN JOURNAL OF INFORMATION SYSTEMS, 2019, 23
  • [8] Toward Effective Cybersecurity Education
    McGettrick, Andrew
    [J]. IEEE SECURITY & PRIVACY, 2013, 11 (06) : 66 - 68
  • [9] Cybersecurity Education: Insights From a Novel Cybersecurity Summer Workshop
    Crabb, James
    Izurieta, Clemente
    Van Wie, Bernard
    Adesope, Olusola
    Gebremedhin, Assefaw
    Mirkovic, Jelena
    Taylor, Blair
    [J]. IEEE Security and Privacy, 2024, 22 (06): : 89 - 98
  • [10] An Example of a Cybersecurity Education Model
    Turkanovic, Muhamed
    Welzer, Tatjana
    Holbl, Marko
    [J]. 2019 29TH ANNUAL CONFERENCE OF THE EUROPEAN ASSOCIATION FOR EDUCATION IN ELECTRICAL AND INFORMATION ENGINEERING (EAEEIE 2019), 2019,